EasyManua.ls Logo

Dahua Technology VTH2421FW-P - User Manual

Dahua Technology VTH2421FW-P
133 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
V1.0.2
Digital VTH (Version 4.7)
User's Manual

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Dahua Technology VTH2421FW-P and is the answer not in the manual?

Dahua Technology VTH2421FW-P Specifications

General IconGeneral
BrandDahua Technology
ModelVTH2421FW-P
CategoryIntercom System
LanguageEnglish

Summary

Foreword

Safety Instructions

Explains the meaning of signal words used in the manual.

Revision History

Lists the version history of the manual.

Privacy Protection Notice

Details privacy protection requirements for data collection.

About the Manual

Provides general information and disclaimers about the manual.

Important Safeguard and Warnings

Operation Requirements

Specifies requirements for operating the device safely.

Installation Requirements

Details requirements for safe installation of the device.

Product Overview

Front Panel

Describes the front panel of various VTH series models.

Rear Panel

Details the rear panel of various VTH series models.

Alarm Port

Function

Wi-Fi Networking

Enables connection to Wi-Fi networks.

Video;Voice Call

Allows making video or voice calls to other VTOs and VTHs.

Monitoring

Enables monitoring of fence stations, VTO, and IPC devices.

DND (Do Not Disturb)

Mutes all message and call notifications.

VTH Initialization

Initialization through the Device

Step-by-step process for initializing the VTH directly via the device interface.

Initialization through the ConfigTool

Explains how to initialize the VTH using the ConfigTool software.

VTH Screen Operation

Home Screen

Describes the main screen interface and its icons.

Editing Home Screen

Guides on customizing the home screen layout and displayed functions.

Call

Call Log

Details how to view and manage call history.

Contacts

Explains how to view, add, and edit contacts.

Calling User

Instructions for initiating calls to other users.

By Room Number

Process for calling users by entering their room number.

Call from VTO

Steps to answer calls originating from a VTO.

Calling DMSS

Instructions for making calls to the DMSS application.

Information

Security Alarm

Details how to view and manage security alarm events.

Video Pictures

Covers viewing and managing captured video and pictures.

Monitor

Monitoring VTO

Steps for monitoring a connected VTO device.

Monitoring IPC

Details on how to monitor connected IPC devices.

Favorites

Displays devices added to the favorites list for quick access.

Setting

Call Settings

Allows configuration of VTH ring, VTO ring, alarm rings, and volume.

Forward Setting

Configuration options for forwarding incoming calls.

Alarm Setting

Configuration for wired zones, call linkage, and alarm volume.

Card Management

Procedure for issuing and managing card information for access.

WLAN

Configuration steps for connecting to Wi-Fi networks.

Mode Setting

Allows setting the area status under different arming modes.

General Setting

Covers system time, display, password, and other general settings.

User Password Setting

Process to change the user password for arm/disarm and unlock.

Network Password Setting

Setting the network password for adding the VTH to the DMSS app.

Project Settings

Forget Password

Procedure to reset the project settings password.

Network Settings

Configuration of network parameters like IP, subnet mask, and gateway.

Configuring VTH

Steps to configure VTH as main or sub device, including SSH and security settings.

Configuring VTO

Procedure for adding and configuring main and sub VTO devices.

Configuring SIP Server

Steps to configure the SIP server parameters for communication.

Factory Settings or Reset

Procedure to restore device parameters to factory default settings.

QR Code

Arm and Disarm Function

Arm

Procedure to arm the system in different modes (Home, Away, Sleep, Custom).

Disarm

Procedure to disarm the security system.

Property Management

Unlock Function

Cloud Update

DSS Agile VDP

Downloading the App

Instructions on how to download and install the DSS Agile VDP app.

Registration and Login

Steps for registering a new account and logging into the DSS Agile VDP app.

Call Functions

Forwarding Calls

Configuration of call forwarding from VTH to the mobile app.

Calling Operations

Describes receiving and answering calls from VTO or management center via app.

Monitoring

Call Records

Message

Visitor

Creating Pass

Procedure to create a visitor pass with access permissions.

Visit Records

Viewing visitor status, modifying passes, and managing appointments.

Setting

DMSS App

Downloading DMSS

Steps to download and install the DMSS app on iOS and Android.

Registration and Login

Process for creating a DMSS account and logging in.

Adding VTH to DMSS

Steps to add a VTH device to the DMSS app.

Configuring Arm and Disarm

How to configure arming and disarming modes for the VTH via DMSS app.

DMSS Calling VTH

Procedure for calling a VTH from the DMSS app.

DMSS Calling VTO

Procedure for calling a VTO from the DMSS app.

DMSS Unlocking Door

How to remotely unlock a door using the DMSS app.

DMSS Monitoring VTO

Procedure for monitoring a VTO's live video feed through the DMSS app.

Viewing Alarm Information

How to view alarm records reported from VTOs and VTHs in the app.

Device Sharing

Process for sharing device access with other users via QR code.

Appendix 1 Cybersecurity Recommendations

Use Strong Passwords

Guidelines for creating robust and secure passwords.

Update Firmware and Client Software in Time

Importance of keeping device firmware and client software up-to-date.

Physical Protection

Recommendations for physical security of the device and storage.

Change Passwords Regularly

Advice on regularly changing passwords to enhance security.

Disable Unnecessary Services and Choose Secure Modes

Disabling unused services and selecting secure operational modes.

Construct a Safe Network Environment

Tips for creating a secure network environment to prevent cyber risks.

Related product manuals