Fanvil I67 User Manual
Fanvil I67 User Manual
i66&i67 用户手册
Version:2.12 |
版本:2.12 | 日期:2024.3.29
Directory ......................................................................................................................................................... I
I
5.1.2.1 i66 IP Call ......................................................................................................................... 19
5.1.2.2 i67 IP Call ......................................................................................................................... 19
5.1.3 Call Through Contacts .................................................................................................................20
5.1.3.1 i66 Call Through Contacts ................................................................................................20
5.1.3.2 i67 Call Through Contacts ................................................................................................20
5.1.4 Speed Dial ................................................................................................................................... 20
5.1.4.1 i66 Speed Dial .................................................................................................................. 20
5.1.4.2 i67 Speed Dial .................................................................................................................. 20
5.2 Answer .................................................................................................................................................. 21
5.2.1 Auto Answer ............................................................................................................................... 21
5.3 End The Call .......................................................................................................................................... 21
5.3.1 i66 End The Call ...........................................................................................................................21
5.3.2 i67 End The Call ...........................................................................................................................21
5.4 Call Settings ...........................................................................................................................................21
5.4.1 IP Call Settings .............................................................................................................................21
II
8 Monitoring function .................................................................................................................................. 37
III
13 Network Settings ..................................................................................................................................... 55
13.1.1 Ethernet Connection ................................................................................................................ 55
13.2 Network Mode ....................................................................................................................................55
13.3 Network Server ...................................................................................................................................56
15 Security ....................................................................................................................................................61
17 Appendix ................................................................................................................................................. 66
IV
1 Safety Instruction
Please read the following safety notices before installing or using this unit. They are
crucial for the safe and reliable operation of the device.
Before using the external power supply in the package, please check the home
power voltage. Inaccurate power voltage may cause fire and damage.
Please do not damage the power cord. If power cord or plug is impaired, do not use
it because it may cause fire or electric shock.
Do not drop, knock or shake the phone. Rough handling can break internal circuit
boards.
Before using the product, please confirm that the temperature and humidity of the
environment meet the working requirements of the product.
Avoid wetting the unit with any liquid.
Do not attempt to open it. Non-expert handling of the device could damage it.
Consult your authorized dealer for help, or else it may cause fire, electric shock and
breakdown.
Do not use harsh chemicals, cleaning solvents, or strong detergents to clean it.
Wipe it with a soft cloth that has been slightly dampened in a mild soap and water
solution.
When lightning, do not touch power plug, it may cause an electric shock.
Do not install this phone in an ill-ventilated place. You are in a situation that could
cause bodily injury. Before you work on any equipment, be aware of the hazards
involved with electrical circuitry and be familiar with standard practices for
preventing accidents.
1.2 FCC
NOTE: This equipment has been tested and found to comply with the limits for a Class B
digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference in a residential installation. This
equipment generates, uses and can radiate radio frequency energy and, if not installed
and used in accordance with the instructions, may cause harmful interference to radio
communications. However, there is no guarantee that interference will not occur in a
particular installation. If this equipment does cause harmful interference to radio or
television reception, which can be determined by turning the equipment off and on, the
1
user is encouraged to try to correct the interference by one or more of the following
measures:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.
-Connect the equipment into an outlet on a circuit different from that to which the receiver
is connected.
-Consult the dealer or an experienced radio/TV technician for help
This device complies with Part 15 of the FCC Rules. Operation is subject to the following
two conditions:
(1) this device may not cause harmful interference, and (2) this device must accept any
interference received, including interference that may cause undesired operation.
2
2 Product Overview
2.1 Overview
The i66 and i67 are newly designed facial recognition door phone by Fanvil. The product
structure is crafted from aluminum alloy, with an explosion-proof rating of IK07. Featuring
clear and thoughtful lines, the design provides users with a luxurious and elegant
appearance, ensuring high-strength protection. With various door-opening methods
available, it uses the standard SIP protocol, delivering high-definition voice
communication quality for premium access control, security, and intercom services.
3
3 Installation Instructions
3.2.1 Wall-mounted
4
Wall-mounted:
Step 1: Installation preparation
1,Check the following contents:
• KM3*30 screw x3
• TA4 x 30mm screw x5
• φ6*30mm screw anchor x5
• KM4*30 screw x3
• TM6#*20/screw x5
• KM3*6mm screw x3
• KB2.6*5 screw x1
2,Tools required for installation
• The special L-shaped Torx screw tool provided with the product
• Ph2 or Ph3 Phillips screwdriver, hammer, RJ45 crimping pliers
• Wall drilling impact drill, 8mm impact drill x1
Step2:Installation Environment
Do not install the device in the following locations: direct sunlight, high temperature,
low temperature, areas with corrosive chemicals, and places with excessive dust.
Install the device at an appropriate eye level, with a recommended mounting height of
approximately 120-140cm.
If installed indoors, maintain a distance of at least 2 meters from light sources and at
least 3 meters from doors and windows to avoid direct sunlight.
5
Avoid severe vibration, collisions, and impacts, as they may cause damage to internal
precision components and the outer casing.
When the device is powered on, if any abnormal conditions are detected, the power
should be immediately disconnected until the issue is resolved. After the system is
abnormally disconnected, please check according to the user manual. If the cause
cannot be determined, please contact the sales agent or the manufacturer's
after-sales service provider. Do not attempt to repair the system on your own. When
using access cards, handle them carefully to avoid damage from magnetic fields,
water, bending, and other hazards. If equipped with facial recognition functionality,
install it in an environment with uniform lighting to avoid situations where the camera
faces strong backlight, is exposed to oblique light, or is subjected to close-range
illumination.
Face backlight Direct sunlight Sun shines directly Sun slanted Lighting at
through the window through the window close range
6
Note:
One cannot assume that biometric recognition products are 100% applicable to all
identification scenarios.
Step 3:Drilling
7
The wall bracket is separated from the device downwards, and use a screwdriver to
loosen the 6 screws of the rear case
1. Align the screw holes of the wall bracket with the drilled holes on the wall, put in the
φ6*30mm rubber plug, and fix it on the wall with the TA4*30mm screws provided.
2. Pass all the wires through the silicone plug in the middle of the bottom case, and
reserve a length of 15~20CM for all wires。
Note:
8
3. Connect the network cable with the RJ45 crystal head, and connect the power cable
and the terminals of the electric lock control cable. Please refer to Section 2 for the
connection sequence.
4. Connect the connected terminals to the motherboard socket, see Section 2 for the
connection location.
5. Test whether there is electricity by doing the following:
Enter the dialing interface, enter #*107, enter the password, enter the engineering
mode, you can view the IP address of the device, and you can switch between static
and dynamic IP modes.
Enter the local opening password or test the indoor opening to see if the electric lock
works normally.
If it works fine, continue with the next steps.
6. Fasten the device and the wall bracket from top to bottom, and tighten the screws at
the bottom
9
• Built-in wall decorative panel x1
• Built-in wall bracket x2
• KM3*6mm screw x3
• PM3*3mm screw x5
• PM3*4mm screw x5
• φ6*30mm screw anchor x5
• M3*70mm screwdriver x1
10
4 User Guide
11
When the lighting is insufficient and faces cannot be
White Light Fill
⑤⑥ recognized, turn on the fill light for supplementary
Light
illumination
⑦ Screen 4-inch,Used for displaying facial recognition, calls, etc.
⑧ Speaker Play sound
⑨ Dialing key Dial
⑩ Unlock key Unlock
⑪ Return key Return
⑫ Concierge key The user quickly calls the concierge
⑬ Numeric key Numeric key
⑭ RFID area Identification card
The following image is the default standby screen interface, representing the state of
the user interface for most of the time.
The description of icons is provided in Appendix I.
Number Description
① Device Standby Logo
② Display Time
③ Display Network Connection Status
The main screen displays operation instructions such as 'Dial,' 'Contacts,'
④
'Password Unlock,' 'Call Concierge,' etc.
12
4.1.3 i67 Button and Interface Instructions
13
4.2 Standby Screen Instructions
The following image is the default standby screen interface, representing the state of
the user interface for most of the time.
The description of icons is provided in Appendix Il.
Number Description
The function menu buttons allow switching between different functional
①
interfaces. By default, they include Dial, PIN, and Contacts.
② Number input and display area.
③ Call the entered number.
④ Card-swiping area, swipe the card in this area to open the door.
14
4.3 Touchscreen Instructions(Only i67)
The device can be configured and operated through the touchscreen, performing a series
of configurations and operations.
Click:
On any interface, the device can enter the settings and operations interface through a
click/tap.
Slide:
The device supports swiping up, down, left, and right.
The device allows you to swipe up, down, left, and right to view information that is not fully
displayed on the current screen.
Users can input numbers or set functional parameters through the touchscreen keyboard
in interfaces such as dialing and menu settings.
i67 Menu:
In the dialing interface, enter '#*107' to access the engineering settings. The initial
password for the engineering settings is 123456. After entering the engineering settings,
click on the application icon for the corresponding submenu to access it.
i66 Menu:
In standby mode, enter '#*107' to access the engineering settings. The initial password for
the engineering settings is 123456. Press the "#" key to enter the menu interface. Once in
the menu interface, navigate by pressing the "2" key to move up, the "8" key to move
down, and press the "Call" key to enter.
Menu Functions:
Menu Description
System Display network, device, and account information.
15
Network Change network mode and network type.
Display Adjust media volume, screen brightness, and time settings.
Language Language settings.
User Add user facial recognition related information
Account SIP account settings.
Factory Reset Perform a factory reset on the device.
Reboot Reboot the device.
Users can view the status of i66/i67 through the device screen/web interface.
16
2. Open the IP scanning tool (Device Manager), click on the scan button to obtain the IP
address of i66/i67 devices within the local network.
Ensure that the computer and the device are on the same local network. Open a web
browser, enter the obtained device IP, log in to the device's web page, and access the
login page.
Users must enter the correct username and password to log in to the web page. The
default username and password are both "admin."
Users can set the language for i66/i67 through both the device interface and the web
interface. Upon initial startup under factory settings, the default language is English.
17
The device supports two SIP accounts simultaneously, allowing registration based on
application. Users can switch between the two SIP accounts as needed.
Users can register SIP accounts through the device menu and the web interface.
SIP Parameters:
Parameters Description
On this page, the current status of the line is displayed. To
Line Status obtain the latest online status, users must manually refresh
the page.
Enable The status of this line is 'Enabled'
Username Enter the username of the service account.
Authentication User Enter the authentication name of the service account.
Display Name Enter the display name shown when a call request is sent.
Authentication
Enter the authentication password of the service account.
Password
Server Address Enter the SIP server address.
Server Port Enter the SIP server port.
18
5 Calling Features
5.1.1 Dial
Follow the on-screen instructions, input the desired number in standby mode, and press
Enter the [Dial] interface, input the desired number, and click the [Call] button to
initiate the call.
5.1.2 IP Call
In standby mode, enter the IP address of the device you want to call. Replace the '.' in the
IP address with the '*' key. After completing the input, press the [#] key to initiate
the call.
Enter the [Dial] interface, input the IP address of the device you want to call, replacing the
'.' in the IP address with the '*' key. Click the [Call] button or [#] key to
initiate the call.
19
5.1.3 Call Through Contacts
In standby mode, press the [Dial] key to enter the contact list. Use [2] or [8] to
scroll up or down and select the desired contact to call.
After selecting, press the [Dial] key to make the call. Press the [Return] key
to exit the contacts interface and return to the standby interface.
On the standby interface, click the [Contacts] icon to enter the contact list. Choose
or search for the desired contact, then click the [Call] button to initiate the call.
Users can set the quick call numbers through the web page. Navigate to [Function
Keys]>> [Function Keys] on the web page.
Type: Set the type of quick key, configure it as a memory key.
Name: Set the name.
Value: Enter the number to be called.
Subtype: Set it as speed dial.
Line: Set the calling line.
Media: Choose between voice call or video call.
On the dialing interface, click on the set speed dial number for calling, or click on the
shortcut list to choose a quick dial number for calling.
20
5.2 Answer
Users can disable the automatic answer function on the device web page (enabled by
default). Once disabled, you will hear the incoming call ringtone, and it will not
automatically answer after a timeout.
During a call, click the [Hang Up] button on the call interface to end the call.
Users can configure IP call settings through the web page at [Lines] >> [Basic Settings].
Configuration parameters:
Enable Auto Answer: When enabled, the device will automatically answer IP calls.
Auto Answer Delay: Set the waiting time for automatic answer in IP calls. The device
will answer automatically after the specified waiting time.
21
6 Advance Function
6.1 MCAST
This feature allows user to make some kind of broadcast call to people who are in
multicast group. User can configure a multicast DSS Key on the phone, which allows user
to send a Real Time Transport Protocol (RTP) stream to the pre-configured multicast
address without involving SIP signaling. You can also configure the phone to receive an
RTP stream from pre-configured multicast listening address without involving SIP
signaling.
Users can configure multicast listening address and port on the web page of [Intercom
Settings]>> [Multicast].
Configuration parameters:
Parameters Description
Defines the priority in the current call, with 1 being the highest
Priority
priority and 10 the lowest.
Mcast Listening Renew Set the interval for re-listening to multicast after interrupting
Time(s) the listening.
Enable Emer Chan When enabled, channel 25 has the highest priority.
MCAST Dynamic:
Description: send multicast configuration information through SIP notify signaling. After
receiving the message, the device configures it to the system for multicast monitoring or
22
cancels multicast monitoring in the system.
6.2 Hotspot
SIP hotspot is a simple utility. Its configuration is simple, which can realize the function of
group vibration and expand the quantity of sip account.
Take one device A as the SIP hotspot and the other devices (B, C) as the SIP hotspot
client. When someone calls device A, devices A, B, and C will ring, and if any of them
answer, the other devices will stop ringing and not be able to answer at the same time.
When A B or C device is called out, it is called out with A SIP number registered with
device A.
Users can set up a SIP Hotspot on the web page of [Line]>> [SIP Hotspot].
Configuration parameters:
Parameters Description
Enable Hotspot Enable or disable hotspot
Selecting 'SIP Hotspot' indicates that this device exists as a SIP
Mode Hotspot.
Selecting 'Client' indicates that this device exists as a client."
The monitoring type can be broadcast or multicast. If you want to
restrict broadcast packets in the network, you can choose
multicast. The type of monitoring on the server side and the client
Monitor Type
side must be the same, for example, when the device on the client
side is selected for multicast, the device on the SIP hotspot server
side must also be set for multicast
The multicast address used by the client and server when the
Monitor monitoring type is multicast. If broadcasting is used, this address
Address does not need to be configured, and the system will communicate
by default using the broadcast address of the device's wan port IP
Fill in a custom hotspot communication port. The server and client
Remote Port
ports need to be consistent
Fill in the name of the SIP hotspot. This configuration is used to
Name identify different hotspots on the network to avoid connection
conflicts
Select 'All' for both the client and hotspot to ring.
Select 'Client' for only the client to ring.
Ring Mode
Select 'Hotspot' for only the hotspot to ring
23
Sets whether to enable the SIP hotspot function on the
Line Settings
corresponding SIP line
Client Settings:
As a SIP hotspot client, there is no need to set up a SIP account, which is automatically
acquired and configured when the device is enabled. Just change the mode to "client" and
the other options are set in the same way as the hotspot.
The device is the hotspot server, and the default extension is 0. The device ACTS as a
client, and the extension number is increased from 1 (the extension number can be
viewed through the [SIP hotspot] page of the webpage).
24
7 Door Opening Operation
1) Face recognition to open the door, through the pre-saved face data to open the door.
2) Open the door by swiping the RFID card, which supports IC card and ID card.
3) The access control helps to call owner, and the owner enters the remote opening
4) The other device helps to call the door phone, enters the corresponding remote
authentication code, and opens the door after timeout or the password check length is
6) The door can be opened through the indoor door button when the door phone is
In any state.
7) Timed door opening: automatically opens the door in a predetermined time period
7.1.1 Card
Place the access card in the card reader area( or ). Upon successful
recognition, the door will unlock. The device will display a 'Successful' message and play
a corresponding prompt tone. Only access cards added to the access control system will
be recognized; access cards not added to the system will result in recognition failure,
displaying a 'Failed' message on the device along with a corresponding prompt tone.
7.1.2 Password
i66: Click the [Unlock] button to access the password entry interface. Enter
your User password and press '#' to unlock the door. A popup notification will appear upon
successful or unsuccessful attempts.
25
i67: Click on the icon displayed on the screen to access the password entry interface.
Enter your User password and press to unlock the door. A popup
notification will appear upon successful or unsuccessful attempts.
Note:
It's advisable to modify the default local door-opening password to a user-defined one
during the initial setup.
7.1.3 Face
When someone approaches the device and the face is facing the screen, the device will
perform face recognition;
If the detected image has been saved in the image database, the door will be opened after
recognition and the recognition will be successful;
If the detected portrait is not saved in the portrait library, the User is recognized as a
stranger, and the door will not be opened and the recognition will be prompted to fail.
Note:
The face recognition function of the device is turned off by default. When using face
recognition to open the door, you need to enable the face door on the device first.
The device supports adding User and opening the rights of the card, password, or portrait.
After opening the rights, the user can open the door through the card, password, or
portrait on the device.
Parameters:
Parameters Description
Name User name.
26
Click Add, click Upload on the Add User page, and
select a local face photo to upload; the image supports
jpg format, and the image size cannot exceed 100k
Click the photo, WEB prompt "Photoing , Do not
Upload photos perform other operations.", LCD screen will prompt
"Take the photo in five seconds.", after the completion of
the photo, the portrait will be displayed in the picture
area
Normal, namely to open the door card.
Add Card, swipe the add administrator card in the
normal mode, the device will enter the card add mode,
and then swipe the card, the card that has not been
added to the card list will be added. Once completed,
swipe the add administrator card again to switch the
device's card reader back to standard mode.
Delete Card, swipe the delete card administrator card in
Card Type
the normal mode, the device will enter the card delete
mode, and then swipe the card, the added card will be
deleted.After completing the deletion, swipe the delete
administrator card again to switch the device's card
reader back to normal mode.
Regular residents should use the ‘Normal’ type.
Property managers hold the ‘add administrator card’ and
‘delete administrator card’.
RFID card number of the access card (first ten digits of
the access card, for example, 0004111806). To
configure and add an access card number on the web
Card Number
page, swipe the card once on the device, check the
access log page, copy the card number, and paste it
here.
Local, that is, the local door opening password, enter
the password dial interface in standby and enter the set
opening password to open the door immediately.
Remote, remote opening password, when the indoor
Password Type unit calls the door or when the door calls the indoor unit
to open the door, enter the DTMF password to open the
door.
Remote and local, one password supports two door
opening methods at the same time.
Password Password to open the door
Number When the indoor unit calls the access control or the
27
access control calls the indoor unit to open the door,
enter the DTMF password to open the door.
Position speed dial. After this number is set, you can use
Location
this number to make calls
When the number cannot be called, the call is forwarded
Call Forward
to the number
Relay Select the door lock you want to open
Disable, after disabling swipe card, password, portrait
can not open the door
Mode
Enable, available 24 hours after being enabled
Period: Available within the specified time range
Note:
Using the add administrator card and delete administrator card requires extreme caution.
Forgetting to switch the card reader mode to normal mode might lead to data corruption
for users and compromise the security of access control systems.
28
7.2.1.1 Add User
Supports adding card, password, and face information for users through the webpage
Click [Add]
Enter the user's name, card type, card number, password, upload face, number, and
other information
Select the user's relevant access control permissions, mode, and usage frequency
After setting, click save
Select the user you want to edit and click [Edit] to enter the user's information page for
editing
Select the user(s) you wish to delete (multiple selections allowed), and click [Delete] to
successfully remove them.
Click [Delete All] to clear all user data.
29
7.2.1.4 Search user
If there are too many User and you cannot manually manage them one by one, you can
import and export them in batches on the device web page.
Import:
Users can use the web page [Security Settings] >> [User] >> [Import] User. Import a tar
file for upgrade. Users can export User templates first (see Export User operations), edit
and import.
Export:
Users can use the web page [Security Settings] >> [User] >> [Export] Export User.
Period Management is utilized to define specific time frames, allowing individuals to use
corresponding authentication methods to open the door during the set time period.
Start Time: Defaulted to the current system time, users can choose the start date and
time for the period (e.g., November 30, 2023).
End Time: Users can select the end date and time for the period. The end time must
be later than the start time (e.g., December 30, 2023).
30
Effective Time: Time frame within each day when the period is effective, ranging from
00:00 to 23:59.
Usage Example:
Create a Period named 'Workdays,' set to repeat weekly from Monday to Friday, with
an effective time span of 00:00 to 23:59 for those days. As shown in the picture.
Go to the web page: [Security Settings] >> [DoorPhone Settings], select the
operating mode of the Relay.
31
Parameters Value Description
Monostable State: Defaulting to
Monostable state, where the default is
to keep the door closed. When a user
opens the door, the lock opens and
remains open for a set duration. After
the timeout, it returns to the closed
state.
Relay1 Switch Monostable State ,
Bistability: The Bistability option allows
Mode Bistability
for long-term maintenance of either the
open or closed door states. When a
user swipes a card to control access,
the door switches from an open state
to a closed state and remains closed
until the next user access control
command.
Relay1 Switch Default 5 seconds, range Effective in monostable state. Default
On Duration from 1 to 600 seconds door opening duration
Relay2 Switch Monostable State , Same as relay 1
Mode Bistability
Relay2 Switch Default 5 seconds, range Same as relay 1
On Duration from 1 to 600 seconds
Independent opening: Relay 2 is
independently controlled and not
synchronized with Relay 1.
Relay2 Follow Independent opening, synchronous:Relay 2 synchronizes
Mode synchronous,asynchronous with Relay 1, opening simultaneously
when Relay 1 opens.
Synchronous:Relay 2 opens after a
delay following the opening of Relay 1.
The default is 1, measured Effective when Relay 2 opens
Async Timeout
in seconds. asynchronously.
32
Parameters Value Description
Card format displayed after using the built-in card
reader.
8H10D ,
Card Format 8H10D: Decimal card number, conventional card
8HR10D
display format.
8HR10D: Card number in reverse order.
After a Wiegand card reader reads a card, the
Wiegand Card 8H10D ,
displayed card format. Only valid when the Wiegand
Format 8HR10D
out is closed.
out: Wiegand interface operates in Wiegand output
mode, used when connecting to access controller.
Wiegand Mode In, out In: Wiegand interface operates in Wiegand input
mode, used when connecting to Wiegand card
readers.
Wiegand Type 26bit, 34bit Only effective in Wiegand Out mode.
The door sensor is used to detect the open/close status of access control. If the access
control remains open after a timeout, an alert will be triggered. Before configuring, the
door sensor needs to be connected to the access control system. Users can check the
33
status of the relay, door sensor, and control the relay via the web page [Security
Settings] >> [Relay].
Relay Status:
Parameters Value Description
When the door sensor is enabled, if the door
remains improperly closed after the timeout
Check to
following door unlock, signaling a mismatch
Door Sensor 1/2 enable Door
between the door sensor and lock status, it
Sensor 1/2.
indicates that the physical door hasn't closed
correctly, the device will sound an alarm.
Delay detection time for Door Sensor 1/2 matches
the door opening duration. For instance, if the door
The default is remains open for 5 seconds, the door sensor delay
Door Sensor
5, measured detection is also configured for 5 seconds. If normal
Check Delay 1/2
in seconds. detection isn't confirmed after 5 seconds, and the
door sensor and lock status don’t align, an alarm is
triggered.
Relay Status 1/2 Open ,Close Status of Relay 1/2
Status of Door Sensor 1/2: Indicates whether the
Door Sensor
Open ,Close door is properly closed as detected by the door
Status 1/2
sensor.
Relay Control:
Parameters Value Description
Relay 1、2、All Select the Relay you want to control
Action Open ,Close Door Open/Close
Once: perform door opening action, and will be
closed automatically after 5 seconds.
Open Mode Once, Always Always: perform the door opening action, the door
will not be closed automatically and need to closed
manually when timeout.
34
7.5 Face Settings
Users can set facial recognition parameters by navigating to [Facial Management] >>
[Face Settings] on the web page.
Parameters:
Parameters Value Description
For different scenarios, different biopsy models
Highest,
will be used to cope with "Close", "Normal" and
Motion Detection Normal,
"Highest" biopsy requirements. The highest level
Close
of motion detection is enabled by default.
Facial recognition pose angle settings, default is
Max Recognition 30 degrees. 0 indicates the closure of pose angle
30
Angle detection; 10-45 degrees indicate recognition
within that range.
Maximum face width level: Used to set the
Maximum
95 distance for facial recognition. The closer the
Recognition Width
distance, the larger the face width.
Minimum face width level: Used to set the
Minimum
9 distance for facial recognition. The closer the
Recognition Width
distance, the larger the face width.
Face Tracking Open,Close Whether to turn on the face tracking.
Duration for displaying facial recognition results,
Display Results 3
default is 3 seconds.
Success
After successful recognition, the interval time of
Recognition 2s
re-recognition.
Interval
Failure Identification The interval time of re-identification after failed
2s
Interval recognition.
Timeout To Turn Off After the timeout period, the white light fill light will
10s
White Light Filling be closed automatically.
The larger the face recognition similarity value is,
Similarity Measure 70.0
the lower the recognition rate is; face recognition
35
similarity will only go to the face database for
comparison if it is greater than the set similarity
degree.
Standard mode is suitable for most scenarios.
Performance mode has higher brightness and is
Fill light brightness Standard
suitable for darker or brighter environments.
mode Performance
If this mode is set to performance mode, the panel
temperature may rise.
Display: The device saves the recorded portrait
picture
Face Picture
Display Not Display: The device does not save the
Display Mode
recorded portrait picture, only extract the feature
value
Parameters:
Parameters Description
Custom Prompts
Identify Successful Titles Default: $name, support custom setting
Recognize Success Default ‘Successful’.Support custom setting
Status Cues
Recognize The Success Default ‘Welcome’.Support custom setting
Message
Identifying Failed Titles Default ‘Strange’.Support custom setting
Identify The Failure Status Default ‘Failed’.Support custom setting
Prompt
Recognize The Failure Default ‘Please contact the administrator ! ’.Support
Message custom setting
Successful Opening Default ‘Successful’.Support custom setting
Status Prompt
Door Opening Failure Default ‘Failed’.Support custom setting
Status Prompt
Failure Prompt For Default ‘Please contact the administrator!’.Support
non-time Period custom setting
36
8 Monitoring function
Access control systems can integrate with video surveillance systems such as NVR, VMS,
etc. This section describes integration through RTSP and ONVIF protocols.
8.1 RTSP
The device enables the RTSP protocol by default, allowing users to integrate it into NVR,
VMS, etc. The RTSP URL format is:
rtsp://username:password@device ip/h264/stream.live0
'stream.live0' represents the main stream, while 'stream.live1' represents the sub-stream
'username' represents the RTSP authentication username, defaulting to 'admin'.
'password' represents the RTSP authentication password, defaulting to 'admin'.
8.2 ONVIF
Users can also integrate with NVR, VMS, etc., using the ONVIF protocol. ONVIF is
enabled by default.
37
9 Contacts(only i67)
Users can add, edit, and delete contacts through the web interface under [Contacts] >>
[Contacts].
Contacts added via the web will synchronize and appear on both the web and device
interfaces for viewing.
Parameters Description
Name Contact Name
Contact Phone Number (required), supports IP address and SIP
Phone
number
Contact Phone Number (optional), supports IP address and SIP
Phone 1
number
Contact Phone Number (optional), supports IP address and SIP
Phone 2
number
Line Select the outgoing line
Ring Choose a specific ringtone for incoming calls from this contact
Group Select default or pre-configured group
Users can customize contact icons
Note: Only *.png, *.jpg, *.jpeg, .bmp image formats can be
Picture
selected, with a maximum size of 1MB per image and a
resolution of 100*74
After adding a contact, users can make calls by selecting the contact from the device's
contact interface. For more details, refer to i67 for making calls through contacts.
When there are too many contacts in the contacts list for manual management, you can
use the device's web interface to import and export contacts in bulk.
Importing Contacts:
38
Users can navigate to the web page [Contacts] >> [Advanced] >> [Import Contact List]
to import contacts. It supports CSV, VCF, and XML formats. Users can first export a
contact template (see exporting contacts operation), edit it, and then import.
Exporting Contacts:
Users can navigate to the web page [Contacts] >> [Advanced] >> [Export Contact List]
to export contacts. It supports CSV, VCF, and XML formats.
The device supports a restricted incoming call list, where adding a number to this list
results in rejecting incoming calls from that number directly (Numbers listed in the
restricted incoming call list can still make outgoing calls normally).
Users can access the web page [Contacts] >> [Call List] >> [Restricted Incoming
Calls] to set up the restricted incoming call numbers.
The device supports an allowed incoming call list. By adding numbers to this allowed list,
only calls from numbers on the list will be permitted to come through. (Calls from numbers
not on the allowed list will not be able to get through.)
Users can access the web page [Contacts] >> [Call List] >> [Allowed Incoming Calls]
to set up the allowed incoming call numbers.
Supports setting a number that prohibits outgoing calls. If you enter this number on the
dialing interface, you will not be allowed to make outgoing calls. The device will sound a
tone and pop-up prompt that prohibits outgoing calls.
Users can set restricted outgoing numbers through the web page [Contacts] >> [Call
List] >> [Restricted Outgoing Calls].
39
10 Open The Door Record
The log of door opening events is displayed. Click the Export button to select Save Target
As to export the door opening records in CSV format.
Parameters Description
Relay Relay ID
Result Display the result of a single door opening (success or
failure)
Name Display the name of the door opening record
Type Open the door type, including password, swipe card, etc.
Source Open the door card number or password, etc. display
Reason The reason for opening the door failure
Time Open the door time
Passing records are used to display the images and results of people who have been
added to the portrait database and captured when face recognition is performed.
Click the Export button and select Save Target As to export the record in tar.gz format.
Failure record is used for people whose faces are recognized by the device but not
recorded in the portrait database. When the device detects it, it will save the failure record
with the captured images.
Click the Export button and select Save Target As to export the failure record in tar.gz
format.
40
11 Device Functions
The Time Plan feature allows users to set specific actions to occur at either a particular
time or within a period. A time point triggers an action at a specific moment, while a period
triggers an action during a specified duration.
Users can access this functionality through the web page under [Intercom Settings] >>
[Time Plan]. They can define a Name, Type, Repetition Period, along with the effective
date and time, then click 'Add'. Once configured, the device will execute the designated
action at the specified times.
Parameters:
Parameters Description
Name Enter a defined action name
Timing restart, timing upgrade, timing sound detection, timing
Type
playback audio
Support local
Audio Path
Local: select the audio file uploaded locally
Select the audio file you want to play, it supports trial listening,
Audio Settings
and you can play it immediately after clicking the trial listening
Circle: Loop playback within the specified time frame.
Play Mode
Once: Play once within the specified time frame.
Do not repeat: execute once within the set time range
Daily: Perform this operation in the same time frame every day
Repetition
Weekly: Do this in the time frame of the day of the week
Monthly: the time frame of the month to perform this operation
Start date Effective date
End date End date
Effective Time Set the time period for execution
Note:
If there's an ongoing call within the set time frame, skip and do not execute the restart or
upgrade operation.
41
11.2 Maintenance
11.2.1 Configurations
On this page, users with administrator privileges can view, export, or import the phone
configuration, or restore the phone to factory Settings.
Export Configurations
Right click to select target save as, that is, to download the device's configuration file,
suffix “.txt” (note: profile export requires administrator privileges).
Import Configurations
Import the configuration file of Settings.
Reset Phone
The phone data will be cleared, including configuration and database tables.
11.2.2 Upgrade
Upgrade the software version of the device, and upgrade to the new version through the
webpage. After the upgrade, the device will automatically restart and update to the new
version.
Go to [System] >> [Upgrade], select the file, choose the System Image File, and click
'Upload'.
Devices support SIP PnP, DHCP options, Static provision, TR069. If all of the 4 methods
are enabled, the priority from high to low as below:
Parameters Description
42
Basic Settings
CPE Serial Number Display the device SN
Configure the user name of FTP server; TFTP protocol does
not need to be configured; if you use FTP protocol to
Authentication Name
download, if you do not fill in here, the default user of FTP is
anonymous
Authentication
The password of provision server
Password
Configuration File If the device configuration file is encrypted , user should add
Encryption Key the encryption key here
General Configuration If the common configuration file is encrypted, user should
File Encryption Key add the encryption key here
Download Fail Check The default value is 1. If the download of the configuration
Times fails, it will be re-downloaded 1 time.
Save Auto Provision
Configure whether to save the automatic update information.
Information
Download
CommonConfig Whether phone will download the common configuration file.
enabled
43
Configure DHCPv6 option, DHCPv6 option supports custom
Custom Option Value option | option 66 | option 43, 3 methods to get the provision
URL. The default is Disable.
44
ACS Server URL ACS server address
ACS User ACS server username
ACS Password ACS server password
Enable TR069 Warning If TR069 is enabled, there will be a prompt tone when
Tone connecting.
TLS Version TLS Version
STUN Server Address Enable the STUN
STUN Enable Enable TR069 after selection
Month Start The DST start month
Week Start The DST start week
Weekday Start The DST start weekday
Day Start The DST start day
Hour Start The DST start hour
Month End The DST end month
Week End The DST end week
Weekday End The DST end weekday
Day End The DST end day
Hour End The DST end hour
To set the time manually, you need to disable the SNTP
service first, and you need to fill in and submit each item of
Manual Time Settings
year, month, day, hour and minute in the figure above to
make the manual settings successful.
45
12 Screen Settings
12.1 Time/Date
Users can set the time and date through the device web page and device menu.
Parameters:
Parameters Description
Time Synchronized via
Enable time-sync through SNTP protocol
SNTP
Time Synchronized via
Enable time-sync through DHCP protocol
DHCP
Primary Time Server Primary Time Server
Set secondary time server address, when primary server is not
Secondary Time
reachable, the device will try to connect to secondary time server
Server
to get time synchronization.
Time zone Select the time zone
Resync Period Time of re-synchronization with time server
12-Hour Clock Set the time display in 12-hour mode
Date Format Select the time/date display format
Daylight Saving Time Settings
Choose your location, phone will set daylight saving time
Location
automatically based on the location
Choose DST Set Type, if Manual, you need to set the start time
DST Set Type
and end time.
Daylight saving time rules are based on specific dates or relative
Fixed Type rule dates for conversion. Display in read-only mode in automatic
mode.
Offset The offset minutes when DST started
Month Start The DST start month
Week Start The DST start week
46
Weekday Start The DST start weekday
Hour Start The DST start hour
Minute Start The DST start minute
Month End The DST end month
Week End The DST end week
Weekday End The DST end weekday
Hour End The DST end hour
Minute End The DST end minute
Manual Time
You can set your time manually
Settings
Users can adjust brightness and backlight settings through both the webpage and device
menu. The device enters backlight mode after a period of inactivity.
When the device is idle for the preset waiting time, it will automatically display the
screensaver. The screensaver can be stopped by pressing any key, touching the screen,
or the device detecting someone approaching.
By default, the device will display builtin images during the screensaver. Users can
customize the screensaver.
47
Users can enable the screensaver through both the webpage and device menu. The
device enters the screensaver interface after a period of inactivity.
Screensaver parameters:
Screensaver switch: Enable the screen saver function.
Timeout to enter screensaver: Set the timeout for entering the screen saver, support for
customization.
Custom Screensaver:
Users can upgrade custom screensaver images through the webpage: [System] >>
[Upgrade] >> [Screensaver].
Image format:
Supports BMP and PNG formats.
Resolution: i66: 800*480, i67: 600*1024.
Bit Depth: 24 bits
12.3 UI Settings
12.3.1 Theme
48
Note:
The selected default standby interface must be within visible functionalities; otherwise, it
cannot be used as a standby interface.
Once set as visible, the selected functions will be displayed during standby; otherwise,
they will be hidden and unavailable.
Dialing: Set the visibility of the dialing function.
Password: Set the visibility of the password function.
Face Recognition: Set the visibility of the face recognition function.
Contacts: Set the visibility of the contacts function.
Operation interface (i66): The operation guide interface serves as the standby page.
The startup logo image displayed when the device is powered on can be customized.
Users can upgrade custom startup logo images through the webpage: [System] >>
[Upgrade] >> [Boot Logo].
Image format:
Supports BMP format
Resolution:
i66: 800*480
i67: 600*1024
Bit Depth: 24 bits
Note:
The startup logo image must be created strictly according to the above requirements.
Please take note of the following:
For i66, rotate the image 90 degrees to the right before upgrading through the
webpage.
49
For i67, rotate the image 180 degrees before upgrading through the webpage.
The i66 device supports customizing the standby logo displayed in the upperleft corner of
the standby interface.
Users can upgrade custom standby logo images through the webpage: [System] >>
[Upgrade] >> [Standby Logo].
Image format:
Supports BMP and PNG formats
Resolution: 120*34
Bit Depth: 32 bits
Users can set the fill light brightness mode through the webpage: [Facial
Management] >> [Face Settings]. There are two supported modes:
Standard Mode: It can meet the needs of most scenarios when using face
recognition for door access.
Performance Mode: This mode can be selected when using face recognition for
door access in particularly dark or bright environments.
When the device detects someone approaching, the keyboard backlight automatically
lights up.
Users can adjust the device volume through both the web and device menu.
50
Users can set the device volume through the device menu: [Display] >> [Media].
Volume parameters:
Handsfree Ringtone: Adjusts the volume for incoming call ringtone and door opening
prompts.
Signal Sound Volume: Sets the volume for signals such as incoming and outgoing
calls.
Preset ringtone types: Select the desired ringtone
Handsfree Volume: Adjusts the volume during calls when using the handsfree mode.
Users can set the device door opening and call prompt sounds through the webpage:
[Intercom Settings] >> [Features] >> [Tone Settings], with options to choose from: off,
default, voice, and custom.
Parameters Description
When the user presses the device's numeric keys during a
Play Talking DTMF Tone call, DTMF prompt tones will be heard. This feature is
enabled by default.
Enabled: When there is an incoming SIP or IP direct dialing
call, if automatic answering is enabled, there will be a
Automatic Answering prompt tone during the automatic answering.
Prompt Tone for IP Direct
Dialing Disabled: When there is an incoming SIP or IP direct dialing
call, if automatic answering is enabled, there will be no
prompt tone during the automatic answering.
Closed: Disables the ringback tone for calls.
Default: Uses the default ringback tone.
Ring Back Tone Supports custom ringback tones, which can be set by
upgrading ringtone files under [System] >> [Upgrade] >>
[Ring Upgrade], and then selecting the custom option for
the ringback tone.
51
Closed: Disables the call waiting tone.
Default: Uses the default call waiting tone.
Busy Tone Supports custom call waiting tones, which can be set by
upgrading ringtone files under [System] >> [Upgrade] >>
[Ring Upgrade], and then selecting the custom option for
the call waiting tone.
Closed: No prompt tone after a successful door opening.
Default: Uses the default prompt tone.
Voice: Default builtin voice prompt, typically saying "Door
open success."
Open success prompting
Supports custom door open success prompt tones, which
can be set by upgrading ringtone files under [System] >>
[Upgrade] >> [Ring Upgrade], and then selecting the
custom option for the door open success tone.
Closed: No prompt tone after a failed door opening.
Default: Uses the default prompt tone.
Voice: Default builtin voice prompt, typically saying "Door
open failure."
Open failed prompting
Supports custom door open failure prompt tones, which can
be set by upgrading ringtone files under [System] >>
[Upgrade] >> [Ring Upgrade], and then selecting the
custom option for the door open failure tone.
Closed: No prompt tone after closing the door.
Default: Uses the default prompt tone.
Voice: Default builtin voice prompt, typically saying "Door
Close Door prompting closed."
Supports custom closing door prompt tones, which can be
set by upgrading ringtone files under [System] >>
[Upgrade] >> [Ring Upgrade], and then selecting the
custom option for the closing door tone.
Closed: No prompt tone after a successful card addition.
Default: Uses the default prompt tone.
Voice: Default builtin voice prompt, typically saying "Card
added successfully."
Issuing Success
Supports custom card addition success prompt tones,
Prompting
which can be set by upgrading ringtone files under
[System] >> [Upgrade] >> [Ringtone Upgrade], and then
selecting the custom option for the card addition success
tone.
52
Closed: No prompt tone after a failed card addition.
Default: Uses the default prompt tone.
Voice: Default builtin voice prompt, typically saying "Card
addition failed."
Issuing Failed Prompting
Supports custom card addition failure prompt tones, which
can be set by upgrading ringtone files under [System] >>
[Upgrade] >> [Ring Upgrade], and then selecting the
custom option for the card addition failure tone.
Closed: No prompt tone after a successful card deletion.
Default: Uses the default prompt tone.
Voice: Default builtin voice prompt, typically saying "Card
deleted successfully."
Revoke Prompting Supports custom card deletion success prompt tones,
which can be set by upgrading ringtone files under
[System] >> [Upgrade] >> [Ring Upgrade], and then
selecting the custom option for the card deletion success
tone.
Closed: No prompt tone after a failed card deletion.
Default: Uses the default prompt tone.
Voice: Default builtin voice prompt, typically saying "Card
deletion failed."
Revoke Failed Prompting
Supports custom card deletion failure prompt tones, which
can be set by upgrading ringtone files under [System] >>
[Upgrade] >> [Ring Upgrade], and then selecting the
custom option for the card deletion failure tone.
Closed: No prompt tone after an abnormal door magnetic
detection.
Default: Uses the default prompt tone.
Voice: Default builtin voice prompt, typically saying "Please
Door Sensor Prompting close the door."
Supports custom door magnetic detection prompt tones,
which can be set by upgrading ringtone files under
[System] >> [Upgrade] >> [Ring Upgrade], and then
selecting the custom option for the door magnetic detection
tone.
Closed: No prompt tone after the prohibition of outgoing
calls.
Default: Uses the default prompt tone.
Ban Outgoing Prompting
Custom: Supports custom prompt tones. After upgrading
Mode
ringtone files under [System] >> [Upgrade] >> [Ring
Upgrade], the custom option for the prohibition of outgoing
call prompt tone becomes available for selection.
53
12.5.3 Upload Ring
Users can upgrade ringtone files through the webpage: [System] >> [Upgrade] >>
[Ringtone Upgrade].
54
13 Network Settings
Users can configure the Ethernet network settings through the device webpage and
device menu. The device defaults to using IPv4 mode, and users can refer to the network
mode to modify the network settings.
The device supports three network modes: IPv4, IPv6, and IPv4&IPv6. Users can
configure the Ethernet network mode through both the device webpage and device menu.
Each network mode allows for the configuration of network type, using either static IP or
DHCP.
55
13.3 Network Server
Users can configure the network service type through the webpage: [Network] >>
[Server Port].
Parameters Description
Restart after setting takes effect. Optional web login as
Web server type
HTTP/HTTPS
The default is 15 minutes, the timeout will automatically log
Web login timeout
out of the login page, and you need to log in again
No need to enter the user name and password after the
Web auto login
timeout, it will automatically log in to the web page.
The default is 80, if you want system security, you can set
HTTP port other port
Such as: 8080, web page login: HTTP://ip:8080
HTTPS port The default is 443, same as HTTP port usage
The value range is 102565535. The value of rtp port starts
RTP port range start from the initial value set. Each time a call is made, the value
of the voice and video ports is increased by 2
RTP port quantity Number of calls
56
14 Security Settings
Short Circuit Input Detection Interface: Used to connect switches, infrared detectors, door
magnets, vibration sensors, and other input devices.
After a short circuit input is triggered, it can send a short message to a specified server
address, or make a call to a designated number, and play a local alarm sound. This
facilitates quick response by management User.
Users can modify the configuration parameters related to the input interface through the
webpage: [Security Settings] >> [Security Settings].
Parameters Description
Basic Settings
When the input interface triggers an alarm, if the alarm sound is
Ringtone Duration
enabled, specify the duration of the alarm sound.
Configure the remote response server address, including the
remote response server address and the triggered alarm server
Input & Tamper
address. When the input interface or tamper is triggered, it will
Server Address
send a short message to the server. The server address
supports IP:PORT or SIP number.
The alarm information to be sent:
Parameters can be replaced with actual values. The
supported parameters include:
Model, replace with the actual model name
Active_user, replace with the actual SIP username
Information
Mac, replace with the MAC address of the device
IP, replace with the IP address of the device
Trigger, replace with the triggered interface, such as input1,
input2, etc.
Trigger Name, replace with the triggered name.
Input settings
Parameters Description
Input 1/2/3 Enable or disable Input 1/2/3
When choosing the low level trigger (closed trigger), detect the
input port (low level) closed trigger.
Triggered by
When choosing the high level trigger (disconnect trigger), detect
the input port (high level) disconnected trigger.
Input Duration Set the Input change duration time, the default is 0 seconds.
57
Enable or disable the input port from sending messages to the
Triggered Behavior
server.
Triggered events: When connected to a door magnet, select
Event door magnet; when connected to an indoor switch, select indoor
switch.
Triggered Ringtone Supports ringtone selection: None, no ringtone triggered.
Relay Output Control Interface: Used to control electric locks, alarms, etc.
The relay output can be triggered through short messages, active URIs, call states, etc.,
and will reset within the set timeout period after being triggered.
Users can modify the configuration parameters related to the output interface through the
webpage: [Security Settings] >> [Security Settings].
Parameters Description
Enable Logs Enable or disable LOG
Triggered by Whether to play a prompt ringtone when the relay output port is
URI Ringtone triggered by URl.
Triggered By Whether to play a prompt ringtone when the relay output port is
SMS Ringtone triggered by SMS
Triggered by
Triggered by URI Ringtone
URI Ringtone
"Whether the default state of the relay is normally closed or normally
Standard open is recommended to be kept as default. The choice between
Status normally closed and normally open can be made by connecting to the
NC/NO port of the relay.
Output The duration of the relay output trigger is set to 5 seconds by default.
Duration After 5 seconds, it returns to the standard state."
Enable or disable URI triggering.
Trigger by
Sending commands from a remote device or server, if correct,
active URI
triggers/resets the corresponding output port.
Trigger
Messages Triggered by Output Port
Message
Reset
Messages Sent on Reset
Message
Short
Message Enable or Disable Short Message Triggering.
Trigger
58
On receiving the command ALERT = [command] from a remote
device or server, if correct, it triggers/resets the corresponding output
port.
Input Trigger Choose whether the relay output port can be triggered by an input
port. When the input port is configured as an indoor switch, and the
corresponding input port is enabled here, the door can be triggered by
the input port
Whether to allow call state triggering of the relay. For example,
triggering the output port by a call (the output port will remain in the
call state continuously responding). Supported call states include:
1. Ringing
Trigger By
2. Talking
Call Status
3. Talking (Calling)
4. Talking (Called)
5. Talking (Intercom)
6. Talking (Multicast)
Triggered Enabling the auto hangup feature by checking this option. After the
Hangup relay is triggered, it will automatically hang up.
Default is 5 seconds. After enabling auto hangup, the relay will
Hangup Delay
automatically hang up 5 seconds after opening the door.
14.3 Tamper
After enabling the tamper alarm function, when the device is violently disassembled or
moved, the device will play an alarm sound and send an alert message to the specified
location.
Users can modify the tamper related configuration parameters through the webpage:
[Security Settings] >> [Security Settings] >> [Tamper Alarm Settings].
Parameters Description
Motion Enable
Enable or disable tamper detection.
Tamper Alarm
If the device is tampered with, the device will continuously play the set
Alarm alarm sound and send an alarm command to the server (server
Command address same as the input port & tamper alarm server address under
short circuit input settings).
Reset When the server sends a reset command to the device, the device will
Command stop playing the alarm sound.
Alarm When an tamper alarm occurs, the alarm sound played can be
Ringtone customized by the user.
59
Tamper Alarm Reset
Reset Alarm
This button resets the tamper function to its default state.
Status
60
15 Security
Users can customize the engineering password by entering the webpage: [Intercom
Settings] >> [Screen Settings] >> [LCD Menu Password Settings] interface for
configuration.
After changing the password, the new password must be used to access the device
menu.
click on the 'Change Password' option under the user avatar in the top right
corner for modification.
61
enter the new password to log in again.
Users can configure to allow only machines from a specific IP subnet to access and
manage the configuration of the device.
Navigate to the webpage [Security] >> [Web Filter], add or delete allowed IP subnets.
Configure the starting and ending IP addresses within the specified range, then click [Add]
to apply the changes. You can set a large subnet or add multiple subnets. When deleting,
choose the starting IP of the subnet you want to remove from the dropdown menu, and
then click [Delete] to apply the changes.
Enable Web Filtering: Configure to enable/disable web access filtering. Click the [Submit]
button to apply the changes.
Note:
If accessing the device from a machine within the same subnet, do not configure the web
filtering subnet to be outside of your own subnet; otherwise, you won't be able to log in to
the webpage.
62
16 Trouble Shooting
When the device is not functioning properly, users can try the following methods to restore
normal operation or collect relevant information to send a problem report to the technical
support email.
Users can obtain information through the device webpage [System] >> [Information] or
the device [Menu] >> [System] options. The following information will be provided:
Device information (model, software and hardware version), account information and
Internet Information etc.
Users can restart the device through the webpage or the device menu.
Users can restore the device to its default settings through the webpage or the device
menu.
63
16.4 Screenshot
If the device encounters issues, taking a screenshot can help technical support locate
specific functions and understand the problem. To capture a screenshot, log in to the
webpage, go to [System] >> [Tools] >> [Screenshot], click [Save BMP] (capture the
problematic screen), save the image, and send it to technical support for issue
resolution.
In order to obtain the data packet of the device, the user needs to log in to the webpage of
the device, open the webpage [System] >> [Tools] >> [LAN Packet Capture], and click
the [Start] option in the "Network Packets Capture". A message will pop up asking the
user to save the captured file. At this time, the user can perform related operations, such
as starting/deactivating the line or making a call, and clicking the [Stop] button on the
webpage after completion. Network packets during the device are saved in a file. Users
can analyze the packet or send it to the Technical Support mailbox.
Log information is helpful when encountering abnormal problems. In order to obtain the
log information of the device, the user can log on to the device web page, open the web
page [Device Log], click the "start" button, follow the steps of the problem until the
problem appears, and then click the "end" button, "save" to the local for analysis or send
the log to the technician to locate the problem.
64
1. Please check if the device is connected to the network.
2. Verify if the device has an IP address. Check the system
information; if the IP address is 0.0.0.0, it indicates that the
device has not obtained an IP address. Ensure that the
Device could not register network configuration is correct.
to a service provider 1. If the network connection is fine, recheck your cable
configuration. If all configurations are correct, contact your
service provider for support, or follow the instructions in "16.5
Network Data Capture" to obtain network packets for analysis.
Send them to the support email to help diagnose the issue.。
The device's facial 1. Check if the User is list in the facial recognition database.
recognition is not 2. Ensure that the facial photos entered are clear and free
successful from any obstructions.
65
17 Appendix
i67: Click on this icon to enter the dialing interface, then proceed with the
corresponding dialing operations using the screen or keyboard.
Dail
i66: Press this key to enter the contact list.
Click on this icon to enter the password interface, then use the screen or
keyboard to input the access code for door entry.
PIN
Clicking on this icon will take you to the face recognition interface. Face
recognition allows for door unlocking when the face is aligned with the
Facial screen.
i67: Clicking on this icon will take you to the contact list interface, where you
can select a contact for calling.
Contacts
i66: Pressing this button initiates a call to the security guard.
After entering the number on the dial pad, click this icon to dial the entered
number.
Call
After entering the door open password, click this icon to open the door.
Open Door
66
Configure device network.
Network
Delete
Collapse the keyboard.
Keyboard
Switch to the next input field.
Switch
Switch to special character input mode.
Character
Switch to alphabet input mode.
Alphabet
Switch to number input mode.
67
Number
68