Do not cut off power supply during device upgrade. Power supply can be cut off only after the
device has completed upgrade and restarted.
Safety Instructions
Foreword
The following categorized signal words with defined meaning might appear in the Manual.
Revision History
Privacy Protection Notice
As the device user or data controller, you might collect personal data of others such as face,
fingerprints, car plate number, Email address, phone number, GPS and so on. You need to be
in compliance with the local privacy protection laws and regulations to protect the legitimate
rights and interests of other people by implementing measures include but not limited to:
Providing clear and visible identification to inform data subject the existence of surveillance
area and providing related contact.
Foreword I
Page 3
About the Manual
The manual is for reference only. If there is inconsistency between the manual and the
actual product, the actual product shall prevail.
We are not liable for any loss caused by the operations that do not comply with the manual.
The manual would be updated according to the latest laws and regulations of related
regions. For detailed information, see the paper manual, CD-ROM, QR code or our official
website. If there is inconsistency between paper manual and the electronic version, the
electronic version shall prevail.
All the designs and software are subject to change without prior written notice. The product
updates might cause some differences between the actual product and the manual. Please
contact the customer service for the latest program and supplementary documentation.
There still might be deviation in technical data, functions and operations description, or
errors in print. If there is any doubt or dispute, please refer to our final explanation.
Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
All trademarks, registered trademarks and the company names in the manual are the
properties of their respective owners.
Please visit our website, contact the supplier or customer service if there is any problem
occurred when using the device.
If there is any uncertainty or controversy, please refer to our final explanation.
Foreword II
Page 4
Important Safeguards and Warnings
The following description is the correct application method of the device. Read the manual
carefully before use, in order to prevent danger and property loss. Strictly conform to the
manual during application and keep it properly after reading.
Operating Requirement
Do not place and install the device in an area exposed to direct sunlight or near heat
generating device.
Do not install the device in a humid, dusty or fuliginous area.
Keep its horizontal installation, or install it at stable places, and prevent it from falling.
Do not drip or splash liquids onto the device; do not put on the device anything filled with
liquids, in order to prevent liquids from flowing into the device.
Install the device at well-ventilated places; do not block its ventilation opening.
Use the device only within rated input and output range.
Do not dismantle the device arbitrarily.
Transport, use and store the device within allowed humidity and temperature range.
Power Requirement
The product shall use electric wires (power wires) recommended by this area, which shall
be used within its rated specification.
Use power supply that meets SELV (safety extra low voltage) requirements, and supply
power with rated voltage that conforms to Limited Power Source in IEC60950-1. For
specific power supply requirements, refer to device labels.
Appliance coupler is a disconnecting device. During normal use, keep an angle that
facilitates operation.
Important Safeguards and Warnings III
Page 5
Table of Contents
Foreword .................................................................................................................................................... I
Important Safeguards and Warnings .................................................................................................... III
Modular VTO consists of camera module, indicator light module, one-button module,
two-button module, five-button module, keyboard module, card swiping module, fingerprint
module, audio module, and display module. Camera module and audio module are
indispensable, whereas other modules can be selected as needed.
The combination of modular VTO, VTH, VTS and platform makes a voice/video communication
system.
Function
Video call: Make video calls on the modular VTO with VTH users.
Group call: Call multiple VTH users at one VTO simultaneously.
Be monitored: Videos captured by the VTO can be viewed in real time; support maximum
6-channel video stream.
Emergency call: Press the key to call the Center in case of an emergency.
Unlock: Card, fingerprint, password and remote unlock.
Alarm: Support tamper alarm, door sensor alarm and duress password unlock alarm.
Alarm information can be sent to the Management Center.
Record search: Call records, alarm records and unlock records can be searched.
Overview 1
Page 7
Camera Module
No.
Name
Description
1
Microphone
Audio input.
2
Camera
Monitor area in front of the door.
3
Speaker
Audio output.
2 Structure
Camera module (front panel)
Table 2-1 Camera module (front panel) description
Camera module (rear panel)
Structure 2
Page 8
No.
Name
Description
1
Tamper
switch
When VTO is detached from the wall forcibly, alarm sound will be made
and alarm information will be sent to management center.
2
User port
Provide power port, lock port, door sensor feedback port and exit button
port to connect power supply, electric control lock, solenoid lock and exit
button. See Figure 2-3.
3
Ethernet
Port
Connected to network cables.
4
Cascade
connection
port
Connect other modules.
In case of cascade connection of multiple modules, modules need
cascade connection.
Rear panel of audio module is the same as rear panel of camera module.
Audio module
Table 2-5 Audio module description
Button Module
One-button module, two-button module, and five-button module are available. Their functions
are the same, although button quantity is different.
Here five-button module is taken as an example. See Figure 2-7 and Table 2-6.
Structure 4
Page 10
No.
Name
Description
1
User directory
Display user information according to buttons.
2
Call button
Call the VTH and call the management center (you
need to do seetings on the web first).
No.
Name
Description
1
Cascade input port
Connected to other modules.
2
Cascade output port
Five-button module (front panel)
Table 2-6 Button module (front panel) description
Five-button module (rear panel)
Table 2-7 Button module (rear panel) description
Structure 5
Page 11
No.
Name
Description
1
Selection buttons
Press the buttons to select previous or next item.
2
Numeric button
Enter the password and VTH nombers. For example,
unlock password is 123456. Enter “#+ 123456 +#”.
3
Call button
Press the button to start a call to VTH.
4
Call management centre
Call management centre.
Keyboard Module (with Braille)
Rear panel of keyboard module is the same as rear panel of button module.
Keyboard module
Table 2-8 Keyboard module description
Card Swiping Module
You can swipe card near the icon shown in Figure 2-10.
Rear panel of card swiping module is the same as rear panel of button module.
Card swiping module (mm [inch])
Structure 6
Page 12
Fingerprint Module
The module is helpful for collecting fingerprints or unlocking with fingerprint.
Rear panels of fingerprint module and button module have different port positions, but port
functions are the same.
Fingerprint module
Display Module
Display module can be used for displaying user information.
Rear panels of display module and button module have different port positions, but port
functions are the same.
Structure 7
Page 13
Display module
Blank Module
Blank module can be used for more attractive appearance when there is extra space.
Rear panels of blank module and button module have different port positions, but port functions
are the same.
Blank module
Structure 8
Page 14
3 Installation
Modular VTO supports mounting two modules and three modules, and you can mount it
horizontally or vertically. Depending on the actual conditions of the installation surface, you can
install the VTO in the wall or on the wall.
This section takes 3-module mounting for example.
Visiting cards and card cover are included in the package by default.
When powering on after mounting, make sure that all modules have been connected;
otherwise, the modules might fail to work normally.
Before installing surface mounting box and flush mounting box, cables in the wall shall go
through the bracket or mounting box.
Installing on/in the Wall
3.1.1 Installing on the Wall
Drill holes according to hole positions of the mounting box, and put expansion pipe in
place.
Fix the mounting box onto the wall with ST4×25 screws.
Fix the rear panel on the mounting box with M2×8 screws.
Connect cables. See "2 Structure."
Fix modules on the rear panel with M3×8 screws.
Apply glue to gaps between the mounting box and the wall.
Write room number or the username on the visiting card, and insert it into user
directory.
Apply silicone sealant to gaps between the device and the wall.
Installation 9
Page 15
Apply silicone sealant to gaps
Installing on the wall
Installation 10
Page 16
3.1.2 Installing in the Wall
Drill a hole in the wall.
For 2-module mounting, the rectangular hole dimension is 126mm×226mm to
128mm×228mm.
For 3-module mounting, the rectangular hole dimension is 126mm×326mm to
268mm×329mm.
Put the mounting box into the wall with ST4×25 screws; ensure that box edge clings to
the wall.
Fix the rear panel on the mounting box with M2×8 screws.
Connect cables. Please refer to "2 Structure."
Fix every module on the rear panel with M3×8 screws.
Apply glue to gaps among the rear panel, mounting box and wall.
Write room number or the username on the visiting card, and insert it into user
directory.
Apply silicone sealant to gaps between the device and the wall.
Installing in the wall
Installation 11
Page 17
Horizontal/Vertical Mounting
3.2.1 Horizontal Mounting
Horizontal mounting (1)
Horizontal mounting (2)
When the VTO is horizontally mounted, make sure that the tamper switch on the rear panel
(marked with "1" in Figure 3-4) is retracted so that once the VTO is dismantled, tamper switch
will be released, and then alarms will be triggered. The alarm will keep ringing for 15 seconds.
Installation 12
Page 18
3.2.2 Vertical Mounting
Vertical mounting illustrations
When the VTO is vertically mounted, make sure that the tamper switch on the rear panel
(marked with "1" in Figure 3-5) is retracted so that once the VTO is dismantled, tamper switch
will be released, and then alarms will be triggered. The alarm will keep ringing for 15 seconds.
Cascade Connection
To make modules work collaboratively, cascade connection is needed. See a cascade
connection example in Figure 3-7.
Cascade connection
Installation 13
Page 19
4 Configuration
This chapter introduces how to initialize, connect, and make primary configurations to the VTO
and VTH devices to realize basic functions, including device management, calling, and
monitoring. For more detailed configuration, see the user's Manual.
Configuration Process
Before configuration, check every device and make sure that there is no short circuit or open
circuit in the circuits.
Plan IP address for every device, and also plan the unit number and room number you
need.
Configure VTO. See "4.2 Configuring VTO."
1) Initialize VTO. See "4.2.1 Initialization."
2) Configure VTO number. See "4.2.2 Configuring VTO Number."
3) Configure VTO network parameters. See "4.2.3 Configuring Network Parameters."
4) Configure SIP Server. See "4.2.4 Selecting SIP Servers."
5) Add VTO devices to the SIP server. See "4.2.5 Adding VTO Devices."
6) Add room number to the SIP server. See "4.2.6 Adding Room Number."
Configure VTH. See the VTH users' manual.
Verify Configuration. See "4.3 Verifying Configuration."
Configuring VTO
Connect the VTO to your PC with network cable, and for first-time login, you need to create a
new password for the web interface.
4.2.1 Initialization
The default IP address of VTO is 192.168.1.108, and make sure that the PC is in the same
network segment as the VTO.
Connect the VTO to power source, and then boot it up.
Open the internet browser on the PC, then enter the default IP address of the VTO in
the address bar, and then press Enter.
The Device Init interface is displayed. See Figure 4-1.
Configuration 14
Page 20
Device initialization
Enter and confirm the password, and then click Next.
The Email setting interface is displayed.
Select the Email check box, and then enter your Email address. This Email address
can be used to reset the password, and it is recommended to finish this setting.
Click Next. The initialization succeeded.
Click OK.
The Login interface is displayed. See Figure 4-2.
Login
4.2.2 Configuring VTO Number
The VTO number can be used to differentiate each VTO, and it is normally configured
according to unit or building number.
You can change the number of a VTO when it is not working as SIP server.
The VTO number can contain 5 numbers at most, and it cannot be the same with any room
number.
Configuration 15
Page 21
Log in to the web interface of the VTO, and then the main interface is displayed. See
Figure 4-3.
Main interface
Select Local Setting > Basic.
The device properties are displayed. See Figure 4-4.
Device properties
In the VTO No. input box, enter the VTO number you planned for this VTO, and then
click Confirm to save.
4.2.3 Configuring Network Parameters
Select Network Setting > Basic.
TCP/IP interface is displayed. See Figure 4-5.
Configuration 16
Page 22
Enter the network parameters you planed, and then click Save.
The VTO will restart, and you need to modify the IP address of your PC to the same
network segment as that of the VTO to log in again.
4.2.4 Selecting SIP Servers
TCP/IP information
The Session Initiation Protocol (SIP) is used for signaling and controlling multimedia
communication sessions in applications of voice and video calls. A SIP server is an application
provides information or direction to a user agent.
When this VTO or other VTOs work as SIP server, select VTO from the Server Type
drop-down list. It applies to a scenario where there is only one building.
When the platform (Express/DSS) works as SIP server, select Express/DSS from the
Server Type drop-down list. It applies to a scenario where there are multiple buildings or
multiple units.
If the VTO you are operating is the SIP server, Building No. and Unit No. will not be
displayed on the Device Properties interface in Local Setting > Basic.
If you selected the Enable checkbox of the Alternate Server in Network Setting > SIP
Server and save the setting, you need to log in the web interface again, and Building No. and Unit No. will be displayed on the Device Properties interface in Local Setting >
Basic.
Log in to the web page.
On the homepage, select Local Setting > Basic.
The Device Properties interface is displayed, see Figure 4-6.
Configuration 17
Page 23
Device properties
1) Select TCP/IP from the System Type drop-down list.
Default system type is analogue system and shall be changed to TCP/IP.
Otherwise, it will fail to be connected to the VTH.
2) Click OK to save the settings.
3) Restart the device manually, or wait for auto reboot to make the settings effective.
Log in to the web interface again.
Select Network Setting > SIP Server.
The SIP Server interface is displayed. See Figure 4-7.
SIP server (1)
Select a SIP server.
VTO as SIP server
Select Enable behind SIP Server.
Select VTO from the Server Type drop-down list.
Configure parameters (see Table 4-1 for details).
Click Save.
The VTO will restart automatically.
Configuration 18
Page 24
Parameter
Description
IP Address
IP address of SIP server.
When the Alternate Server checkbox is not selected,
IP Addr., Username, and Password can be entered,
and you cannot call the VTS through VTO.
Port
It is 5060 by default when other VTOs work as SIP
server.
It is 5080 by default when the platform works as
SIP server.
Username/Password
Use default value.
SIP Domain
It shall be VDP when another VTO works as SIP
server.
It can be null or keep default value when the
platform works as SIP server.
Login Username/
Password
Username and password to log in to SIP server.
Alternate IP Addr.
IP address of the alternate server.
Alternate Username
Username and password for logging in to the alternate
server.
Alternate Password
Alternate VTS IP
Addr.
IP address of the alternate VTS.
Alternate Server
After entering alternate IP address, username,
password, and VTS IP address, you need to
Platform (Express/DSS) as a SIP server
Select Network Setting > SIP Server.
The SIP Server interface is displayed. See Figure 4-8.
Disable SIP Server.
Select Express/DSS from the Server Type drop-down list.
Set parameters according to Table 4-1.
SIP server (2)
Table 4-1 SIP server parameter description
Configuration 19
Page 25
Parameter
Description
select the Enable checkbox to enable the
alternate server.
After you have selected the Alternate Server
Enable checkbox, you can only enter the VTS IP
address, and the VTO will restart.
Click OK to save the configuration.
The VTO will restart automatically.
When the platform works as SIP server, if it is necessary to set Building No. and
Building Unit No., enable Support Building and Support Unit first.
4.2.5 Adding VTO Devices
You can add VTO devices to the SIP server, and all the VTO devices connected to the same
SIP server can make video call between each other. This section applies to the condition in
which a VTO device works as SIP server, and if you are using other servers as SIP server, see
the corresponding manual for the detailed configuration.
Log in to the web interface of the SIP server, and then select Household Setting >
VTO No. Management.
The VTO No. Management interface is displayed. See Figure 4-9.
VTO No. management
Click Add.
The Add interface is displayed. See Figure 4-10.
Configuration 20
Page 26
Parameter
Description
Rec No.
The VTO number you configured for the target VTO. See the details
in "4.2.2 Configuring VTO Number."
Register Password
Keep default value.
Build No.
Available only when other servers work as SIP server.
Unit No.
IP Address
The IP address of the target VTO.
Username
The user name and password for the web interface of the target
VTO.
Password
Add VTO
Configure the parameters, and be sure to add the SIP server itself too. See Table 4-2.
Table 4-2 VTO configuration
Click Save.
4.2.6 Adding Room Number
You can add the planned room number to the SIP server, and then configure the room number
on VTH devices to connect them to the network. This section applies to the condition in which a
VTO device works as SIP server, and if you use other servers as SIP server, see the
corresponding manual for the detailed configuration.
The room number contains at most 6 numbers or letters or their combinations, and it cannot be
the same as any VTO number.
Log in to the web interface of the SIP server, and then select Household Setting >
Room No. Management.
The Room No. Management interface is displayed. See Figure 4-11.
Configuration 21
Page 27
Parameter
Description
First Name
Enter the information you need to differentiate each room.
Last Name
Room No. management
You can add single room number or do it in batches.
Adding single room number
1) Click Add. See Figure 4-11.
The Add interface is displayed. See Figure 4-12.
Add single room number
2) Configure room information. See Table 4-3.
Table 4-3 Room information
Configuration 22
Page 28
Parameter
Description
Nick Name
Room No.
The room number you planned.
If you use multiple VTH devices, the room number of the master VTH
should be "room number#0", and the room number of the extension
VTH should be "room number#1", "room number#2", …, "room
number#99".
You can have 10 extension VTH devices at most for one master VTH.
Register Type
Select public, and local is reserved for future use.
Register
Password
Keep the default value.
3) Click Save.
The added room number is displayed. Click to modify room information, and click
to delete a room.
Adding room number in batches
1) Configure the Unit Layer Amount, Room Amount in One Layer, First Floor Number,
and Second Floor Number according to the actual condition.
2) Click the Add at the bottom. See Figure 4-13
All the added room numbers are displayed. Click Refresh to view the latest status,
and click Clear to delete all the room numbers.
4.2.7 Configuring Module
Camera module is designed by default. All other modules need to be added in facade layout
before use.
Add in batch
You can add 9 modules at most to VTO4202F-MB1, VTO4202F-MB2, VTO4202F-MB5.
For VTOs of other modules, you can only add one module.
For fingerprint module, card swiping module, and keyboard module, only one module of
each type can be added respectively. Other modules can be matched freely.
4.2.7.1 Adding Modules
Select Local Setting > Basic > Façade Layout.
The Façade Layout interface is displayed. See Figure 4-14.
Configuration 23
Page 29
Façade layout
Click .
The system displays the modules available.
Keyboard module, card swiping module, and fingerprint module will not be displayed if
they have been added.
Select modules according to actual layout of VTO.
Actual connection position of the device on web interface is from top to bottom and
from left to right.
Support adding multiple modules at the same time and saving the configurations.
Click Confirm, and then restart the browser to make the configurations take effective.
4.2.7.2 Setting Modules
You need to set call keys for button module and camera module respectively.
Select Local Setting > Basic > Façade Layout.
The Façade Layout interface is displayed. See Figure 4-15.
Configuration 24
Page 30
Set modules
Click .
The Room List interface is displayed. See Figure 4-16.
The room no. displayed on the interface corresponds to the added VTH. "888888" is
the Centre Call No.
Room list
Configuration 25
Page 31
Select room no. and click Save.
The interface displays room No. information. See Figure 4-17.
Room No. information
Click Confirm, and then restart the browser to make the configurations take effective.
save the settings.
Verifying Configuration
4.3.1 Calling VTH from VTO
Dial room number on the VTO.
Press .
The VTO is calling the VTH. See Figure 4-18.
Configuration 26
Page 32
Call screen
Tap on the VTH to answer the call.
4.3.2 Doing Monitor from VTH
On the main interface of the VTH, select Monitor > Door.
The Door interface is displayed. See Figure 4-19.
Door
Select the VTO you need to do monitor.
The monitor screen is displayed. See Figure 4-20.
Configuration 27
Page 33
Monitor screen
Configuration 28
Page 34
Cybersecurity Recommendations
Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is
connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic
steps toward protecting and strengthening networks and networked appliances will make them
less susceptible to attacks. Below are some tips and recommendations on how to create a
more secured security system.
Mandatory actions to be taken for basic equipment network security:
1. Use Strong Passwords
Please refer to the following suggestions to set passwords:
The length should not be less than 8 characters;
Include at least two types of characters; character types include upper and lower case
letters, numbers and symbols;
Do not contain the account name or the account name in reverse order;
Do not use continuous characters, such as 123, abc, etc.;
Do not use overlapped characters, such as 111, aaa, etc.;
2. Update Firmware and Client Software in Time
According to the standard procedure in Tech-industry, we recommend to keep your
equipment (such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the
system is equipped with the latest security patches and fixes. When the equipment is
connected to the public network, it is recommended to enable the “auto-check for
updates” function to obtain timely information of firmware updates released by the
manufacturer.
We suggest that you download and use the latest version of client software.
"Nice to have" recommendations to improve your equipment network security:
1. Physical Protection
We suggest that you perform physical protection to equipment, especially storage devices.
For example, place the equipment in a special computer room and cabinet, and implement
well-done access control permission and key management to prevent unauthorized
personnel from carrying out physical contacts such as damaging hardware, unauthorized
connection of removable equipment (such as USB flash disk, serial port), etc.
2. Change Passwords Regularly
We suggest that you change passwords regularly to reduce the risk of being guessed or
cracked.
3. Set and Update Passwords Reset Information Timely
The equipment supports password reset function. Please set up related information for
password reset in time, including the end user’s mailbox and password protection
questions. If the information changes, please modify it in time. When setting password
protection questions, it is suggested not to use those that can be easily guessed.
4. Enable Account Lock
The account lock feature is enabled by default, and we recommend you to keep it on to
guarantee the account security. If an attacker attempts to log in with the wrong password
several times, the corresponding account and the source IP address will be locked.
Cybersecurity Recommendations 29
Page 35
5. Change Default HTTP and Other Service Ports
We suggest you to change default HTTP and other service ports into any set of numbers
between 1024~65535, reducing the risk of outsiders being able to guess which ports you
are using.
6. Enable HTTPS
We suggest you to enable HTTPS, so that you visit Web service through a secure
communication channel.
7. Enable Whitelist
We suggest you to enable whitelist function to prevent everyone, except those with
specified IP addresses, from accessing the system. Therefore, please be sure to add your
computer’s IP address and the accompanying equipment’s IP address to the whitelist.
8. MAC Address Binding
We recommend you to bind the IP and MAC address of the gateway to the equipment,
thus reducing the risk of ARP spoofing.
9. Assign Accounts and Privileges Reasonably
According to business and management requirements, reasonably add users and assign a
minimum set of permissions to them.
10. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP,
etc., to reduce risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to
the following services:
SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.
SMTP: Choose TLS to access mailbox server.
FTP: Choose SFTP, and set up strong passwords.
AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords.
11. Audio and Video Encrypted Transmission
If your audio and video data contents are very important or sensitive, we recommend that
you use encrypted transmission function, to reduce the risk of audio and video data being
stolen during transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.
12. Secure Auditing
Check online users: we suggest that you check online users regularly to see if the
device is logged in without authorization.
Check equipment log: By viewing the logs, you can know the IP addresses that were
used to log in to your devices and their key operations.
13. Network Log
Due to the limited storage capacity of the equipment, the stored log is limited. If you need
to save the log for a long time, it is recommended that you enable the network log function
to ensure that the critical logs are synchronized to the network log server for tracing.
14. Construct a Safe Network Environment
In order to better ensure the safety of equipment and reduce potential cyber risks, we
recommend:
Disable the port mapping function of the router to avoid direct access to the intranet
devices from external network.
Cybersecurity Recommendations 30
Page 36
The network should be partitioned and isolated according to the actual network needs.
If there are no communication requirements between two sub networks, it is
suggested to use VLAN, network GAP and other technologies to partition the network,
so as to achieve the network isolation effect.
Establish the 802.1x access authentication system to reduce the risk of unauthorized
access to private networks.
Cybersecurity Recommendations 31
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.