For the list of HWT-IVS1800 users at the application layer, see the HWT-IVS1800 Account List.
This section describes how to create a maintenance user, for example, sysman, and add it to the management group admin.
How Do I Log In to the Operating System Through a Network Port?)groupadd admin
useradd -g admin -m -d /home/sysman -s /bin/bash sysman
In the preceding command, sysman indicates the user name, admin indicates the user group to which the user will be added, and /home/sysman indicates the user's home directory.
The parameters are described as follows:
-g: specifies a user group where a user will be added. Here, admin is specified.
-m: creates the specified home directory /home/sysman if it does not exist. This parameter is invalid if the directory exists.
-d: specifies the home directory for the user.
-s: specifies the shell type of the user.
passwd sysman
Changing password for sysman.
chage -d0 XXX (user name)

For example, after the chage -d0 test command is executed, the test user must change the password upon the first login.
Logging In to the LDU)You are advised to use a password with a high complexity. For details about the password rules, see Suggestions on Password Maintenance.
How Do I Log In to the Operating System Through a Network Port?)Changing password for user root. New password: // Enter a new password. For details about the password rules, see Suggestions on Password Maintenance. Retype new password: // Confirm the new password. passwd: all authentication tokens updated successfully.
The new password takes effect upon the next login.
passwd admin
passwd ivsoper
chage -d0 XXX (user name)

For example, after the chage -d0 test command is executed, the test user must change the password upon the first login.
If a maintenance user is created for temporary use, you must delete this user when security maintenance is complete.
How Do I Log In to the Operating System Through a Network Port?)userdel sysman -r
Lock a user if you do not want to use the user for sometime.
How Do I Log In to the Operating System Through a Network Port?)passwd -l sysman
Locking password for user test. passwd: Success
You can unlock a locked user if necessary.
How Do I Log In to the Operating System Through a Network Port?)passwd -u sysman
Unlocking password for user test. passwd: Success
How Do I Log In to the Operating System Through a Network Port?)passwd -x 90 -w 7 sysman
Adjusting aging data for user test. passwd: Success
You are advised to periodically check the password validity and change a password if it is about to expire. Generally, the validity period of a password is 90 days.
How Do I Log In to the Operating System Through a Network Port?)passwd -S sysman
name status mm/dd/yy min max warn sysman PS 2020-01-14 0 90 7 35 (Password set, SHA512 crypt.)
The parameters are described as follows:
If an account does not have a password, set a password immediately.
Logging In to the OMU portal)You are advised to set the password based on the requirements illustrated in Suggestions on Password Maintenance.
You are advised to use a stronger password. For details about password rules, see Suggestions on Password Maintenance.
Logging In to the OMU portal)Click admin in the upper right corner and choose Password Security.
Choose . Then, click Reset Password in the Operation column in the row of the user whose password needs to be changed.
Click the user name displayed in the upper right corner and choose Password Security.
You are advised to use a password with a high complexity. For details about the password rules, see Suggestions on Password Maintenance.
You can change the password at one time within a minimum interval of 5 minutes.
Logging In to the OMU portal)
Logging In to the OMU portal)Enter the password of the current logged-in user and click OK to verify the password.
When traffic control is triggered upon system overload, calls can be rejected to ensure running of some services and implement system recovery. Traffic control is a key measure for preventing system breakdown.
The access control mechanism enables the system to check and authorize the external access requests. Through access control, you can prevent unauthorized users from logging in to devices and authorized login users from performing operations beyond their rights.
Firewall access control is implemented based on access control lists (ACLs). An ACL defines data streams on a network by using the source IP address, destination IP address, port number, and upper-layer protocol. The ACL serves as the basis of applications such as quality of service (QoS) and policy-based routing.
Type |
Description |
|---|---|
Basic ACL |
A basic ACL defines data streams by source IP address. |
Advanced ACL |
An advanced ACL defines data streams by a combination of elements such as the source IP address, destination IP address, source port number, destination port number, and upper-layer protocol. |
For example, if port 80 provides the HTTP service, run the following command to restrict HTTP access of the suspicious client: iptables -A INPUT -p tcp --syn --dport 80 -m connlimit --connlimit-above 100 -j DROP
You can configure trusted IP addresses to control user access to the OMU portal.
To defend against IP attacks from the external networks for enhanced system security, you can run commands to determine which packets can be received or rejected by the system based on networking and link configuration. An ACL rule is used to define the packets to be received or rejected based on the setting of the protocol type, local IP address, peer IP address, local port, and peer port.
For details about the ports, see the following attachment:
Communication Matrix
Login security policies are configured to prevent unauthorized users from logging in to the system.
Security Policy |
Description |
Default Setting |
Operations |
|---|---|---|---|
User identity authentication |
You can log in to the system only after the entered user name and password are authenticated. |
Enable |
N/A |
Account locking policy |
|
Enable |
N/A |
Password change at the first login |
The system prompts you to change the password upon the first login. If you do not change the password, you cannot log in to the system with the initial password again. |
Enable |
N/A |
Logout upon timeout |
By default, the system enables the function of logout upon timeout. If no action signal (clicking the mouse or pressing the keyboard) is received within 5 minutes, the system automatically logs out. This improves system security. |
Enable |
|
Screen lock upon timeout (on the live video viewing or recording playback page) |
After LDU Timeout Interval (min) is set, if no action signal (clicking the mouse or pressing the keyboard) is received within the specified period, the system automatically locks the screen, but the live video viewing or recording playback continues. You can click any area on the GUI and enter the login password to unlock the screen. |
Disable |
|
Security Policy |
Description |
Default Setting |
Operations |
|---|---|---|---|
User identity authentication |
You can log in to the system only after the entered user name and password are authenticated. |
Enable |
N/A |
Account locking policy |
If you fail to log in for three consecutive times, the system automatically locks the account for 5 minutes. |
Enable |
N/A |
Password change at the first login |
The system prompts you to change the password upon the first login. If you do not change the password, you cannot log in to the system with the initial password again. |
Enable |
N/A |
Repeated login restriction |
You cannot log in to the system from multiple devices concurrently. |
Enable |
N/A |
Security Policy |
Description |
Default Setting |
Operations |
|---|---|---|---|
User identity authentication |
You can log in to the system only after the entered user name and password are authenticated. |
Enable |
N/A |
Screen lock upon timeout (on the live video viewing or recording playback page) |
After Auto-Lock Screen is set, if no action signal (clicking the mouse or pressing the keyboard) is received within the specified period, the system automatically locks the screen, but the live video viewing or recording playback continues. You can click any area on the GUI and enter the login password to unlock the screen. |
Disable |
|
Security logs record user login, logout, authorization, and authentication information.
Logging In to the OMU portal)Operation logs record the following:
Information about execution initiated by the system administrator and service administrator.
Log information generated during system maintenance.
Logging In to the OMU portal)Run logs record the following:
Log information generated by scheduled tasks in the system
System running status and key information about service processing
Log information generated during interface data exchange between internal subsystems and between the device and service systems
Logging In to the OMU portal)The downloaded fault information is a .tgz package. Decompress the package to extract the log and config folders. The log folder stores the log information and the config folder stores the module configurations.
The system reports event information to the security alarm management system when detecting an event or behavior that does not comply with the security alarm policy so that the administrator can handle the event or behavior in a timely manner to eliminate potential security risks. The information reported to the security alarm management system includes alarm sources, time when alarms are generated, alarm causes, and alarm severity. Currently, the following security alarms are supported:
In routine operation and maintenance, the system administrator can manage users on the OMU portal to detect abnormal login information (based on logs) in a timely manner. For example, an account is frequently used for logging in to or out of the system, an account is used on multiple terminals with different IP addresses, or an account is frequently used for risky operations. After detecting a suspicious account, the system administrator can analyze and forcibly suspend the account if it may threaten the system security.
User management of the OMU portal consists of user information query and forcible account suspension.
User information query: The system administrator can query the information about all users in the system, including:
User name
User role
PTZ control priority
User status
Forcible account suspension: When detecting an abnormal account, the system administrator can forcibly suspend the account.