Download Print this page
Dahua DH-PFS3005-5GT Quick Start Manual
Dahua DH-PFS3005-5GT Quick Start Manual

Dahua DH-PFS3005-5GT Quick Start Manual

Ethernet switch (5-port & 8-port unmanaged switch with metal housing)

Advertisement

Quick Links

Ethernet Switch (5-port & 8-port
Unmanaged Switch with Metal Housing)
Quick Start Guide
V1.0.0

Advertisement

loading
Need help?

Need help?

Do you have a question about the DH-PFS3005-5GT and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Dahua DH-PFS3005-5GT

  • Page 1 Ethernet Switch (5-port & 8-port Unmanaged Switch with Metal Housing) Quick Start Guide V1.0.0...
  • Page 2: Foreword

    Foreword This manual introduces the functions and operations of the 5-port & 8-port unmanaged switch with metal housing (hereinafter referred to as "the Switch"). Read carefully before using the Switch, and keep the manual safe for future reference. Safety Instructions The following signal words might appear in the manual.
  • Page 3 ● There might be errors in the print or deviations in the description of the functions, operations and technical data. If there is any doubt or dispute, we reserve the right of final explanation. ● Upgrade the reader software or try other mainstream reader software if the manual (in PDF format) cannot be opened.
  • Page 4: Important Safeguards And Warnings

    Important Safeguards and Warnings This section introduces content covering the proper handling of the device, hazard prevention, and prevention of property damage. Read carefully before using the device, and comply with the guidelines when using it. Transportation Requirements Transport the device under allowed humidity and temperature conditions. Storage Requirements Store the device under allowed humidity and temperature conditions.
  • Page 5 Operation Requirements ● Do not disassemble the device without professional instruction. ● Operate the device within the rated range of power input and output. ● Make sure that the power supply is correct before use. ● Make sure the device is powered off before disassembling wires to avoid personal injury ●...
  • Page 6: Table Of Contents

    Table of Contents Foreword ........................................I Important Safeguards and Warnings ............................III 1 Structure ........................................1 1.1 Top Panel ....................................... 1 1.2 Side Panel ...................................... 2 1.3 Back Panel ..................................... 2 2 Installation and Connection ................................3 2.1 Installing the Switch ................................. 3 2.2 Connection ....................................
  • Page 7: Structure

    1 Structure 1.1 Top Panel Figure 1-1 Top panel (5-port) Figure 1-2 Top panel (8-port) Table 1-1 Top panel Description Port connection/ transmission status (Link/Act) indicator. ● Solid on: Connected. ● Off: Disconnected. ● Flashes: Transmitting data. Power indicator. ● Solid on: Powered on. ●...
  • Page 8: Side Panel

    1.2 Side Panel Figure 1-3 Side panel (5-port) Figure 1-4 Side panel (8-port) Table 1-2 Side panel Name Description DC power input port Powers on the Switch with an external DC power adapter. 1.3 Back Panel Figure 1-5 Back panel (5-port) Figure 1-6 Back panel (5-port) Table 1-3 Back panel Name...
  • Page 9: Installation And Connection

    2 Installation and Connection 2.1 Installing the Switch Step 1 Place the Switch on a flat desktop. Step 2 Check the DC power adapter, and then connect it to the DC power input port on the side panel. ● Make sure to leave enough space for heat dissipation. ●...
  • Page 10: Appendix 1 Cybersecurity Recommendations

    Appendix 1 Cybersecurity Recommendations Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks.
  • Page 11 6. Enable HTTPS We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel. 7. MAC Address Binding We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing the risk of ARP spoofing.
  • Page 12 device.