III
Table of Contents
Foreword .................................................................................................................................................... I
Important Safeguards and Warnings ..................................................................................................... II
1 Initialization ............................................................................................................................................ 1
2 Login Interface ....................................................................................................................................... 2
Login .............................................................................................................................................. 2 2.1
Resetting Password ...................................................................................................................... 2 2.2
3 Main Interface ........................................................................................................................................ 4
4 Local Setting .......................................................................................................................................... 5
Basic .............................................................................................................................................. 5 4.1
4.1.1 Device Properties & Events ................................................................................................ 5
4.1.2 Façade Layout (Only for VTO3211D) ................................................................................. 6
Video & Audio ................................................................................................................................ 7 4.2
Access Control .............................................................................................................................. 9 4.3
4.3.1 Local ................................................................................................................................... 9
4.3.2 RS-485 .............................................................................................................................. 10
System ........................................................................................................................................ 10 4.4
Security ........................................................................................................................................ 11 4.5
Onvif User ................................................................................................................................... 12 4.6
5 Household Setting ............................................................................................................................... 13
VTO No. Management ................................................................................................................ 13 5.1
5.1.1 Adding VTO ....................................................................................................................... 13
5.1.2 Modifying VTO Information ............................................................................................... 14
5.1.3 Deleting VTO .................................................................................................................... 15
Room No. Management .............................................................................................................. 15 5.2
5.2.1 Adding Room Number ...................................................................................................... 15
5.2.2 Modifying Room Number .................................................................................................. 17
5.2.3 Issuing Access Card ......................................................................................................... 17
VTS Management ....................................................................................................................... 18 5.3
Status .......................................................................................................................................... 19 5.4
6 Network Setting ................................................................................................................................... 20
Basic ............................................................................................................................................ 20 6.1
6.1.1 TCP/IP .............................................................................................................................. 20
6.1.2 Port ................................................................................................................................... 20
6.1.3 HTTPS .............................................................................................................................. 21
6.1.4 P2P ................................................................................................................................... 21
SIP Server ................................................................................................................................... 21 6.2
Firewall ........................................................................................................................................ 22 6.3
7 Log Management ................................................................................................................................. 24
Call .............................................................................................................................................. 24 7.1
Alarm ........................................................................................................................................... 24 7.2
Unlock ......................................................................................................................................... 24 7.3
Log .............................................................................................................................................. 25 7.4
Cybersecurity Recommendations ................................................................................... 26 Appendix 1