Dahua ARC5402A-GW User Manual

Video Alarm Control Panel
User’s Manual
V1.0.1
I
Legal Statement
Trademark
VGA is the trademark of IBM. Windows logo and Windows are trademarks or registered trademarks of Microsoft. Other trademarks and company names mentioned are the properties of their respective
owners.
Disclaimer
Within the scope allowed by applicable laws, in any case, this company won’t compensate
any special, contingent, indirect and secondary damages resulting from relevant contents and products described in this document, nor compensate any losses in profits, data, reputation, document loss or expected savings.
Products described in this document are provided “as is”. Unless required by applicable
laws, this company doesn’t provide any express or implicit guarantees for all contents in
the document, including but not limited to guarantees for marketability, quality satisfaction, application to specific purpose and non-infringement of third-party rights.
About this Document
This document is for reference only. Please refer to the actual product for more details. The user shall undertake any losses resulting from violation of guidance in the document. In case that PDF document cannot be opened, please upgrade the reading tool to the
latest version or use other mainstream reading tools.
This company reserves rights to revise any information in the document anytime; and the
revised contents will be added to the new version without prior announcement. Some functions of the products may be slightly different before and after revision.
The document may include technically inaccurate contents, inconsistencies with product
functions and operations, or misprint. Final explanations of the company shall prevail.
II
Cybersecurity Recommendations
Mandatory actions to be taken towards cybersecurity
1. Change Passwords and Use Strong Passwords:
The number one reason systems get “hacked” is due to having weak or default passwords. It is recommended to change default passwords immediately and choose a strong password whenever possible. A strong password should be made up of at least 8 characters and a combination of special characters, numbers, and upper and lower case letters.
2. Update Firmware As is standard procedure in the tech-industry, we recommend keeping NVR, DVR, and IP camera firmware up-to-date to ensure the system is current with the latest security patches and fixes.
“Nice to have” recommendations to improve your network security
1. Change Passwords Regularly Regularly change the credentials to your devices to help ensure that only authorized users are able to access the system.
2. Change Default HTTP and TCP Ports:
● Change default HTTP and TCP ports for systems. These are the two ports used to
communicate and to view video feeds remotely.
● These ports can be changed to any set of numbers between 1025-65535. Avoiding the default ports reduces the risk of outsiders being able to guess which ports you are using.
3. Enable HTTPS/SSL: Set up an SSL Certificate to enable HTTPS. This will encrypt all communication between your devices and recorder.
4. Enable IP Filter: Enabling your IP filter will prevent everyone, except those with specified IP addresses, from accessing the system.
5. Change ONVIF Password: On older IP Camera firmware, the ONVIF password does not change when you change the
system’s credentials. You will need to either update the camera’s firmware to the latest revision
or manually change the ONVIF password.
6. Forward Only Ports You Need:
III
● Only forward the HTTP and TCP ports that you need to use. Do not forward a huge range of
numbers to the device. Do not DMZ the device's IP address.
● You do not need to forward any ports for individual cameras if they are all connected to a
recorder on site; just the NVR is needed.
7. Disable Auto-Login on SmartPSS: Those using SmartPSS to view their system and on a computer that is used by multiple people should disable auto-login. This adds a layer of security to prevent users without the appropriate credentials from accessing the system.
8. Use a Different Username and Password for SmartPSS: In the event that your social media, bank, email, etc. account is compromised, you would not want someone collecting those passwords and trying them out on your video surveillance system. Using a different username and password for your security system will make it more difficult for someone to guess their way into your system.
9. Limit Features of Guest Accounts: If your system is set up for multiple users, ensure that each user only has rights to features and functions they need to use to perform their job.
10. UPnP:
● UPnP will automatically try to forward ports in your router or modem. Normally this would be a good thing. However, if your system automatically forwards the ports and you leave the credentials defaulted, you may end up with unwanted visitors.
● If you manually forwarded the HTTP and TCP ports in your router/modem, this feature should be turned off regardless. Disabling UPnP is recommended when the function is not used in real applications.
11. SNMP: Disable SNMP if you are not using it. If you are using SNMP, you should do so only temporarily, for tracing and testing purposes only.
12. Multicast: Multicast is used to share video streams between two recorders. Currently there are no known issues involving Multicast, but if you are not using this feature, deactivation can enhance your network security.
13. Check the Log: If you suspect that someone has gained unauthorized access to your system, you can check the system log. The system log will show you which IP addresses were used to login to your system and what was accessed.
14. Physically Lock Down the Device:
IV
Ideally, you want to prevent any unauthorized physical access to your system. The best way to achieve this is to install the recorder in a lockbox, locking server rack, or in a room that is behind a lock and key.
15. Connect IP Cameras to the PoE Ports on the Back of an NVR: Cameras connected to the PoE ports on the back of an NVR are isolated from the outside world and cannot be accessed directly.
16. Isolate NVR and IP Camera Network The network your NVR and IP camera resides on should not be the same network as your
public computer network. This will prevent any visitors or unwanted guests from getting access to the same network the security system needs in order to function properly.
V
Preface
Overview
This document elaborates device structure, installation and system functional operation of video alarm control panel.
Symbol Definition
The following symbols may appear in this document. And their meanings are as follows:
Symbol
Note
It indicates a potentially hazardous situation which, if not avoided, could result in death or serious injury.
It indicates a moderate or low level of potential danger which, if not avoided, could result in minor or moderate injury.
It indicates a potential risk that, if ignored, could result in damage to device, loss of data, degraded performance, or unpredictable results.
It means electrostatic-sensitive device.
It means high-voltage danger.
It means intensive laser radiation. It means that it can help you to solve some problems or save your time.
It means the additional information, which is to emphasize or supplement.
VI
Important Safeguards and Warnings
The following description is the correct application method of the device. Please read the manual carefully before use, in order to prevent danger and property loss. Strictly conform to the manual during application and keep it properly after reading.
Operating Requirement
Please modify default password timely after device deployment, in order not to be
embezzled.
Please don’t place and install the device in an area exposed to direct sunlight or near heat
generating device.
Please don’t install the device in a humid, dusty or fuliginous area. Please keep its horizontal installation, or install it at stable places, and prevent it from
falling.
Please don’t drip or splash liquids onto the device; don’t put on the device anything filled
with liquids, in order to prevent liquids from flowing into the device.
Please install the device at well-ventilated places; don’t block its ventilation opening. Use the device only within rated input and output range. Please don’t dismantle the device arbitrarily. Please transport, use and store the device within allowed humidity and temperature range.
Power Requirement
Please make sure to use batteries according to requirements; otherwise, it may result in
fire, explosion or burning risks of batteries!
To replace batteries, only the same type of batteries can be used! The product shall use electric cables (power cables) recommended by this area, which
shall be used within its rated specification.
Please use power supply that meets SELV (safety extra low voltage) requirements, and
supply power with rated voltage that conforms to Limited Power Source in IEC60950-1. For specific power supply requirements, please refer to device labels.
Products with category I structure shall be connected to grid power output socket, which is
equipped with protective grounding.
If power plug or appliance coupler is a disconnecting device, please keep its convenient
operation.
VII
Table of Contents
Legal Statement ..................................................................................................................................................... I
Cybersecurity Recommendations ................................................................................................................... II
Preface .................................................................................................................................................................... V
Important Safeguards and Warnings ............................................................................................................. VI
1 Overview .............................................................................................................................................................. 1
1.1 Product Introduction ................................................................................................................................. 1
1.2 Product Function ....................................................................................................................................... 1
1.3 Typical Network ......................................................................................................................................... 1
2 Device Structure ................................................................................................................................................ 3
2.1 Structure Dimension ................................................................................................................................. 3
2.2 Front Panel ................................................................................................................................................ 4
2.3 Rear Panel ................................................................................................................................................. 5
3 Installation ........................................................................................................................................................... 7
3.1 SD Card Installation .................................................................................................................................. 7
3.2 SIM Card Installation ................................................................................................................................ 7
3.3 Battery Installation .................................................................................................................................... 8
3.4 Cable Installation....................................................................................................................................... 9
3.5 Host Installation ......................................................................................................................................... 9
3.5.1 86 Box Installation ......................................................................................................................... 9
3.5.2 Non-86 Box Installation .............................................................................................................. 10
4 Operation Instruction....................................................................................................................................... 11
4.1 Password Setting .....................................................................................................................................11
4.1.1 First Login ......................................................................................................................................11
4.1.2 Not First Login ..............................................................................................................................11
4.2 Homepage Introduction .......................................................................................................................... 12
4.3 Network Setting ....................................................................................................................................... 14
4.3.1 Wired Network ............................................................................................................................. 14
4.3.2 WIFI ............................................................................................................................................... 15
4.3.3 2G .................................................................................................................................................. 16
4.3.4 P2P ................................................................................................................................................ 17
4.4 Wireless Enrollment ................................................................................................................................ 18
4.4.1 Add Wireless Device ................................................................................................................... 19
4.4.2 Delete Wireless Device .............................................................................................................. 20
4.5 Camera Management ............................................................................................................................. 21
4.5.1 Add Camera ................................................................................................................................. 21
4.5.2 Modify/View Camera Parameters ............................................................................................. 23
4.5.3 Delete Camera ............................................................................................................................ 24
4.6 RFID Management ................................................................................................................................. 24
4.6.1 Add RFID Card ............................................................................................................................ 24
4.6.2 Delete RFID Card ........................................................................................................................ 25
4.7 Zone Setting ............................................................................................................................................ 25
VIII
4.8 Mode Setting ............................................................................................................................................ 27
4.9 PGM Setting ............................................................................................................................................ 28
4.10 Event Reporting Setting ....................................................................................................................... 29
4.11 Time Setting ........................................................................................................................................... 29
4.11.1 Time Setting ............................................................................................................................... 29
4.11.2 DST Setting ................................................................................................................................ 30
4.11.3 Time Format ............................................................................................................................... 31
4.12 Call Center Setting ................................................................................................................................ 31
4.13 Delay and Volume Setting ................................................................................................................... 32
4.14 SD Card Format .................................................................................................................................... 33
4.15 Initialization ............................................................................................................................................ 34
4.15.1 Reboot ........................................................................................................................................ 34
4.15.2 Initialization ................................................................................................................................ 34
4.16 Info .......................................................................................................................................................... 34
4.16.1 View Device Log ....................................................................................................................... 34
4.16.2 View Version Info ...................................................................................................................... 35
4.17 Event ....................................................................................................................................................... 36
4.17.1 Search and View Events .......................................................................................................... 36
4.17.2 Play Record ............................................................................................................................... 37
4.17.3 Backup Video............................................................................................................................. 37
4.18 Arm and Disarm..................................................................................................................................... 38
4.18.1 Arm and Disarm with Shortcut Keys ...................................................................................... 38
4.18.2 Arm and Disarm with Card ....................................................................................................... 40
4.18.3 Arm and Disarm with Remote Control ................................................................................... 41
4.18.4 Arm and Disarm with Mobile Phone APP .............................................................................. 42
4.19 Duress Password .................................................................................................................................. 42
4.20 View Zone Alarm Info ........................................................................................................................... 42
4.21 Sound Recording and Playback ......................................................................................................... 43
4.21.1 Sound Recording ...................................................................................................................... 43
4.21.2 Playback ..................................................................................................................................... 43
4.22 Video Preview ........................................................................................................................................ 43
Appendix 1 Operating Instructions of Input Method ................................................................................. 44
1
1 Overview
1.1 Product Introduction
Video alarm control panel integrates alarm information acquisition, alarm output and linkage control, telephone alarm, audio-video acquisition encoding, recording playback, voice message and video output. With strong stability and reliability, it applies to communities, villas and shops.
1.2 Product Function
Its main functions are as follows:
Support 100M network. 32 wireless zones, 2 wired zones, 9 remote controls and wireless emergency buttons, 1
NO relay output, 4 wireless sirens, 1 wired siren (12v/500mA), 1 built-in loudspeaker, 1 off-wall tamper, 1 auxiliary power supply (12V/500mA).
4-channel D1 IPCs added. Off-wall tamper alarm and low battery alarm. Report alarm and fault event through SMS. Arm and disarm with ID card. Leave and play voice message. Max. 128G SD card to save alarm recording. USB flash disk to backup recording, import and export configuration. 3.7V/1900mAh lithium battery power supply when main power is off. Support CID standard protocol. 4.3'' TFT color screen supports video preview and playback, alarm and fault events view. Restore factory settings.
1.3 Typical Network
Video alarm control panel combines with IPC, detector, siren, APP and alarm center, and thus forms an omnidirectional arm and disarm alarm system, as shown in Figure 1-1.
2
Figure 1-1
3
2 Device Structure
2.1 Structure Dimension
External dimension of the device is shown in Figure 2-1 and Figure 2-2. The unit is mm.
Figure 2-1
4
Figure 2-2
2.2 Front Panel
Front panel is shown in Figure 2-3. For keys and icons, please refer to Table 2-1.
Figure 2-3
Key or Icon
Description
0~9 A~Z
Enter number 0~9, page up/down.
Enter English letters A~Z and a~z.
In homepage, press [1] to customize arm quickly; press [2] to view failure alarm info; press [3] to view zone alarm info.
Return to homepage.
Switch the input method.
Enter point (.).
Return to previous menu.
Delete info.
Exit recording playback/video preview interface.
Move up.
Move down.
OK
Confirm.
SOS
Press this key for 3s, to give an emergency alarm.
Disarm.
Away arm. Stay arm.
Long press it to record audio, up to 30s each time. Save it in system.
Press it once, to play the last recording.
Press it to preview video. Then, press [ ] or [ ] to switch the channel.
The indicator turns on in case of detector offline or main power off.
5
Key or Icon
Description
Red light on during arm.
Away arm and disarm by swiping a registered card.
Red light on when there is an alarm.
Table 2-1
2.3 Rear Panel
Rear panel includes battery box and all kinds of ports, as shown in Figure 2-4. Please refer to Table 2-2 for details.
Figure 2-4
Port/slot
Description
Battery Case
Install 1900mAh battery; provide emergency power when
12V power supply fails. Please refer to “3.3 Battery
Installation” for details.
USB Port
USB port connects storage device to backup linkage video in event info.
Tamper Switch
Prevent individuals from dismantling the device.
Wiring Duct
After arrangement, cables go out of wiring duct.
Cable Port
Please refer to Figure 2-5 for mark of every pin. Detailed
descriptions are as follows:
PWR: 12V power input port.
AUX: 12V auxiliary power output.
GND: ground.
Z1/2: two-channel wired zone input.
RING-O/TIP-O: telephone line port.
NO/COM: 1-channel relay alarm output.
BELL: wired siren output.
6
Port/slot
Description
RING-I/TIP-I: telephone port.
485-A/485-B: 485 device port.
LAN: network port.
SIM Card Slot
Support SIM cards of local operators.
Initialization Hole
Insert both ends of the cable into two holes for about 5s, so as to restore factory settings.
Table 2-2
Figure 2-5
7
3 Installation
3.1 SD Card Installation
This device is able to install maximum 128G SD card, in order to save alarm recordings. Step 1 Open battery cover and take out the battery. Step 2 Push SD card into the slot in accordance with arrow direction in Figure 3-1.
SD card can only be installed and dismantled when the power is off. To dismantle SD card, press it inward a bit, so SD card will pop up slightly and can be taken out with a tool.
Figure 3-1
3.2 SIM Card Installation
This device supports SIM card, in order to report alarm and fault events through short message. Step 1 Push slot cover toward cable port, flip it up and open the slot cover.
Step 2 Insert SIM card into the slot in accordance with arrow direction in Figure 3-2.
Step 3 Put back slot cover, and push it forward to fix SIM card.
Loading...
+ 37 hidden pages