IP Villa System - Quick Start Guide - V1.0.0 PDF
IP Villa System - Quick Start Guide - V1.0.0 PDF
IP Villa System - Quick Start Guide - V1.0.0 PDF
V1.0.0
Foreword
General
This document mainly introduces structure, installation process, debugging, and verification
process of the IP villa system.
Safety Instructions
The following categorized signal words with defined meaning might appear in the manual.
Signal Words Meaning
Revision History
The manual is for reference only. If there is inconsistency between the manual and the
actual product, the actual product shall prevail.
We are not liable for any loss caused by the operations that do not comply with the manual.
The manual would be updated according to the latest laws and regulations of related
regions. For detailed information, see the paper manual, CD-ROM, QR code or our official
website. If there is inconsistency between paper manual and the electronic version, the
electronic version shall prevail.
All the designs and software are subject to change without prior written notice. The product
updates might cause some differences between the actual product and the manual. Please
contact the customer service for the latest program and supplementary documentation.
There still might be deviation in technical data, functions and operations description, or
errors in print. If there is any doubt or dispute, please refer to our final explanation.
Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
All trademarks, registered trademarks and the company names in the manual are the
properties of their respective owners.
Please visit our website, contact the supplier or customer service if there is any problem
occurred when using the device.
Foreword I
If there is any uncertainty or controversy, please refer to our final explanation.
Foreword II
Important Safeguards and Warnings
The following description is the correct application method of the device. Read the manual
carefully before use, in order to prevent danger and property loss. Strictly conform to the
manual during application and keep it properly after reading.
Operating Requirement
Do not place and install the device in an area exposed to direct sunlight or near heat
generating device.
Do not install the device in a humid, dusty or fuliginous area.
Keep its horizontal installation, or install it at stable places, and prevent it from falling.
Do not drip or splash liquids onto the device; don’t put on the device anything filled with
liquids to prevent liquids from flowing into the device.
Install the device at well-ventilated places; do not block its ventilation opening.
Use the device only within rated input and output range.
Do not dismantle the device arbitrarily.
The device shall be used with screened network cables.
Power Requirement
The product shall use electric wires (power wires) recommended by this area, which shall
be used within its rated specification!
Use power supply that meets SELV (safety extra low voltage) requirements, and supply
power with rated voltage that conforms to Limited Power Source in IEC60950-1. For
specific power supply requirements, refer to device labels.
Appliance coupler is a disconnecting device. During normal use, keep an angle that
facilitates operation.
Do not cut off power supply during device upgrade. Power supply can be cut off only after
the device has completed upgrade and has rebooted.
Table of Contents IV
1 Overview
Outdoor Station (VTO) Front Panel
VTO front panel
Overview 1
Outdoor Station (VTO) Rear Panel
Outdoor station (VTO) rear panel
Overview 2
Table 1-3 Front panel button
Icon or
Name Description
Silkscreen
SOS Tap this key to call the call center in case of emergency.
Overview 3
Network Diagram
Network diagram
Overview 1
2 Installation and Configuration
Do not install the device in environment with condensation, high temperature, stained,
dusty, chemically corrosive and direct sunshine.
In case of abnormality after power on, pull out network cable and cut off power supply at
once. Power on again after troubleshooting.
Installation and commission shall be done by professionals. Do not dismantle or repair
arbitrarily in case of device failure. Contact after-sales department.
It is suggested that installation height of device central point shall be 1.4cm–1.6cm above
the ground.
-
Power
+
+ -
Electric Lock Unlock Button
-
Power
+
+ Door Sensor - Magnetic
Feedback
Configuration
Before configuration, check whether the following work has been completed or not.
Check whether there is short circuit or open circuit. Power on the device only after the
circuit is normal.
IP addresses and No. of every outdoor station (VTO) and indoor monitor (VTH) have been
planned.
Scan QR code on the cover for details.
Set outdoor station (VTO) info and indoor monitor (VTH) info at web interface of every outdoor
station (VTO), set indoor monitor (VTH) info, network info and outdoor station (VTO) info on
every indoor monitor (VTH) so that video and voice communication can be realized.
2.4.1.1 Initialization
When the indoor monitor (VTH) is used for the first time, you need to select a language that you
prefer, initialize the indoor monitor (VTH) to get a password to enter project setting interface
and an email to retrieve your password.
Power on the device.
Welcome is displayed, and then the Device Init interface is displayed. See Figure 2-7.
Enter password, confirm Pwd, and email, and then press OK.
The indoor monitor (VTH) is initialized.
Tap OK.
All video intercoms and voice intercoms in the network will be displayed automatically.
See Figure 2-9.
Initialization of all intercoms must be done on the indoor monitor (VTH); otherwise
the quick configuration might fail.
If no device is uninitialized, tap Next to go to the configuration interface. See
Figure 2-11.
Device Init
Enter password, confirm password, and email for the device you are to initialize.
Tap OK.
The intercom list interface is displayed again. See Figure 2-11.
If there are no sub VTHs, then you do not need to do sub VTH configurations.
1) Select an indoor monitor (VTH).
The VTH Config interface is displayed. See Figure 2-12.
Indoor Monitor (VTH) config
If there are no sub outdoor stations (VTO), then you do not need to do sub outdoor
stations (VTO) configurations.
1) Select an outdoor station (VTO).
The VTO Config interface is displayed. See Figure 2-13.
VTO config
Function Verification
The following figure means that SD card has been inserted into indoor monitor (VTH). If SD
card is not inserted, recording and snapshot icons are gray.
The following figure means that SD card has been inserted into indoor monitor (VTH). If
SD card is not inserted, recording and snapshot icons are gray.
Door
Run the app, and then select DOOR on the home page. See Figure 3-2.
Home page
Tap the "+" sign to add device, and the tap Add Device > P2P.
The P2P interface is displayed. See Figure 3-3.
Name your target outdoor monitor (VTO), and then tap the sign.
The mobile phone starts to scan.
Log in to the web interface of the outdoor monitor (VTO) you need to add, and then
select Network.
The P2P interface is displayed. See Figure 3-4.
For VTO3211D, select Household Setting > Room No. Management to get the QR
code.
P2P
Scan the QR code with your phone, then enter the user name and password of its web
interface, and then tap Start Live Preview.
The live video is displayed. And you can also start audio intercom or unlock the door.
See Figure 3-5.
Tap Alarm Manager > Subscribe, and then subscribe the outdoor monitor (VTO) you
need. See Figure 3-6.
Subscribe
When someone is calling you from the subscribed villa outdoor monitor (VTO), there
will be push message on your phone. See Figure 3-7.
Cybersecurity Recommendations 18
5. Change Default HTTP and Other Service Ports
We suggest you to change default HTTP and other service ports into any set of numbers
between 1024~65535, reducing the risk of outsiders being able to guess which ports you
are using.
6. Enable HTTPS
We suggest you to enable HTTPS, so that you visit web service through a secure
communication channel.
7. Enable Whitelist
We suggest you to enable whitelist function to prevent everyone, except those with
specified IP addresses, from accessing the system. Therefore, please be sure to add your
computer’s IP address and the accompanying equipment’s IP address to the whitelist.
8. MAC Address Binding
We recommend you to bind the IP and MAC address of the gateway to the equipment,
thus reducing the risk of ARP spoofing.
9. Assign Accounts and Privileges Reasonably
According to business and management requirements, reasonably add users and assign a
minimum set of permissions to them.
10. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP,
etc., to reduce risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to
the following services:
SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.
SMTP: Choose TLS to access mailbox server.
FTP: Choose SFTP, and set up strong passwords.
AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords.
11. Audio and Video Encrypted Transmission
If your audio and video data contents are very important or sensitive, we recommend that
you use encrypted transmission function, to reduce the risk of audio and video data being
stolen during transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.
12. Secure Auditing
Check online users: we suggest that you check online users regularly to see if the
device is logged in without authorization.
Check equipment log: By viewing the logs, you can know the IP addresses that were
used to log in to your devices and their key operations.
13. Network Log
Due to the limited storage capacity of the equipment, the stored log is limited. If you need
to save the log for a long time, it is recommended that you enable the network log function
to ensure that the critical logs are synchronized to the network log server for tracing.
14. Construct a Safe Network Environment
In order to better ensure the safety of equipment and reduce potential cyber risks, we
recommend:
Disable the port mapping function of the router to avoid direct access to the intranet
devices from external network.
Cybersecurity Recommendations 19
The network should be partitioned and isolated according to the actual network needs.
If there are no communication requirements between two sub networks, it is
suggested to use VLAN, network GAP and other technologies to partition the network,
so as to achieve the network isolation effect.
Establish the 802.1x access authentication system to reduce the risk of unauthorized
access to private networks.
Cybersecurity Recommendations 20