EasyManua.ls Logo

Dahua VTO6521H - User Manual

Dahua VTO6521H
29 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
Digital Door Station (VTO65 Series)
Quick Start Guide
V1.0.0
V1.0.0
Question and Answer IconNeed help?

Do you have a question about the Dahua VTO6521H and is the answer not in the manual?

Dahua VTO6521H Specifications

General IconGeneral
ModelVTO6521H
Operating SystemEmbedded Linux
Audio OutputBuilt-in speaker
Ingress ProtectionIP65
Display Screen7-inch touch screen
Display Resolution1024 x 600
Camera2MP CMOS
Video CompressionH.264
Audio CompressionG.711
AudioSupport dual-way audio
Ethernet10/100Mbps
Network ProtocolTCP/IP
Network Interface1
Alarm Output1 channel
Door Control1 channel
RS4851 channel
Tamper Switch1
Power SupplyDC 12V
Operating Temperature-30°C to +60°C (-22°F to +140°F)
Protection GradeIP65

Summary

Foreword

Safety Instructions

Explains signal words and their meanings in the manual.

About the Manual

Provides disclaimers and usage guidelines for the manual.

Important Safeguards and Warnings

Operating Requirement

Specifies environmental and operational conditions for the device.

Power Requirement

Details necessary power supply and connection specifications.

1 Structure

Physical Dimensions Overview

Illustrates physical dimensions of various VTO front panels and rear panel.

Component Description Table

Lists and describes the components of the door station.

2 Cable Connection

Cable Connection Diagram

Diagram showing how to connect various cables to the door station ports.

3 Installation

Recommended Installation Height

Visual guide for the recommended installation height of the door station.

Wall Mounting Diagram

Depicts the process of mounting the door station on a wall.

Step-by-Step Installation

Step-by-step instructions for installing the door station.

4 Web Configuration

Configuration Process Steps

Outlines the steps for initial setup and parameter configuration of the door station.

Web Interface Initialization

Guides on accessing and performing the first-time login to the device's web interface.

Modifying Device IP Address

Explains how to change the IP address of the door station via the web interface.

SIP Server Selection

Details how to configure the Session Initiation Protocol (SIP) server settings.

VTO as SIP Server Configuration

Configuration steps when the VTO itself acts as the SIP server.

Setting VTO Number (SIP Server)

How to assign a unique number to the door station when it's a SIP server.

Platform as SIP Server Configuration

Configuration steps when the management platform serves as the SIP server.

Setting VTO Number (Platform SIP)

Assigning VTO number when the platform is the SIP server.

5 Engineering Setting

Accessing Engineering Settings

Instructions on how to access the advanced engineering configuration menu.

Setting IP Address in Engineering Mode

Guide to configuring the device's IP address within engineering settings.

6 User Registration

User Registration Interface

Visual representation of the user registration interface.

Face Recording and Management

Procedures for recording and managing user face images for recognition.

Fingerprint Capture Procedure

Steps for capturing and recording user fingerprints for authentication.

Access Card Issuance

Instructions on how to issue access cards to users and manage authorized cards.

Appendix 1 Notes of Face Recording

Face Recording Best Practices

Information on optimal face positioning and image requirements for recognition.

Appendix 2 Fingerprint Record Instruction

Fingerprint Capture Best Practices

Procedures for recording fingerprints, including recommended fingers and pressing methods.

Appendix 3 Cybersecurity Recommendations

Mandatory Cybersecurity Actions

Essential steps for securing the device's network connections, including strong passwords and software updates.

Nice to Have Security Enhancements

Optional measures for improved security: physical protection, password management, port changes, service disabling.

Advanced Cybersecurity Practices

Recommendations for HTTPS, whitelisting, MAC binding, user privileges, encryption, auditing, and logging.

Safe Network Environment Design

Guidance on creating a secure network via partitioning, isolation, and authentication systems.

Related product manuals