IP Indoor Monitor - Quick Start Guide - V1.0.0-Eng
IP Indoor Monitor - Quick Start Guide - V1.0.0-Eng
V1.0.0
Foreword
General
This document mainly introduces structure, installation process, and basic configuration of the IP
Indoor Monitor (hereinafter referred to as the "indoor monitor").
Safety Instructions
The following categorized signal words with defined meaning might appear in the manual.
Signal Words Meaning
Revision History
The manual is for reference only. If there is inconsistency between the manual and the actual
product, the actual product shall prevail.
We are not liable for any loss caused by the operations that do not comply with the manual.
The manual would be updated according to the latest laws and regulations of related regions.
For detailed information, see the paper manual, CD-ROM, QR code or our official website. If
there is inconsistency between paper manual and the electronic version, the electronic version
shall prevail.
All the designs and software are subject to change without prior written notice. The product
updates might cause some differences between the actual product and the manual. Please
contact the customer service for the latest program and supplementary documentation.
There still might be deviation in technical data, functions and operations description, or errors
in print. If there is any doubt or dispute, please refer to our final explanation.
Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
All trademarks, registered trademarks and the company names in the manual are the properties
of their respective owners.
Please visit our website, contact the supplier or customer service if there is any problem
occurred when using the device.
If there is any uncertainty or controversy, please refer to our final explanation.
I
Important Safeguards and Warnings
The following description is the correct application method of the device. Read the manual carefully
before use to prevent danger and property loss. Strictly conform to the manual during application
and keep it properly after reading.
Operating Requirement
Do not place and install the device in an area exposed to direct sunlight or near heat generating
device.
Do not install the device in a humid, dusty or fuliginous area.
Keep its horizontal installation, or install it at stable places, and prevent it from falling.
Do not drip or splash liquids onto the device; do not put on the device anything filled with
liquids to prevent liquids from flowing into the device.
Install the device at well-ventilated places; do not block its ventilation opening.
Use the device only within rated input and output range.
Do not dismantle the device arbitrarily.
The device shall be used with screened network cables.
Power Requirement
The product shall use electric wires (power wires) required by the region where the device will
be used.
Use power supply that meets SELV (safety extra low voltage) requirements, and supply power
with rated voltage that conforms to Limited Power Source in IEC60950-1. For specific power
supply requirements, refer to device labels.
Appliance coupler is a disconnecting device. During normal use, keep an angle that facilitates
operation.
Do not cut off power supply during device upgrade.
II
Table of Contents
Foreword ............................................................................................................................................................ I
Important Safeguards and Warnings .............................................................................................................. II
1 Introduction ................................................................................................................................................... 1
Overview ....................................................................................................................................................................................... 1
Front Panel.................................................................................................................................................................................... 1
Rear Panel ..................................................................................................................................................................................... 3
Cable Connection ...................................................................................................................................................................... 4
2 Network Diagram .......................................................................................................................................... 5
3 Configuration ................................................................................................................................................ 6
Configuration Process .............................................................................................................................................................. 6
VDPConfig ..................................................................................................................................................................................... 6
Configuring Indoor Monitor .................................................................................................................................................. 6
3.3.1 Initialization .................................................................................................................................................................... 6
3.3.2 Network Settings ........................................................................................................................................................12
3.3.3 Project Settings............................................................................................................................................................15
Unlocking ....................................................................................................................................................................................21
Commissioning .........................................................................................................................................................................22
3.5.1 Watching Monitoring Videos ..................................................................................................................................22
3.5.2 Making Calls ..................................................................................................................................................................23
Cybersecurity Recommendations ............................................................................................. 26
III
1 Introduction
Overview
The 10-inch IP indoor monitor, widely used in intelligent buildings, integrates functions of
monitoring, voice/video call, and unlock. Technologies like embedded technology, IP
communication methods, simple network management protocol (SNMP), network encryption, and
more are applied to make the whole system more stable, safer, and easier to be managed.
Front Panel
10 Inch
Front panel [mm (inch)]
1
7 Inch
Front panel [mm (inch)]
2
Rear Panel
10 Inch
Rear panel
7 Inch
Rear panel
3
Table 1-2 Rear panel description
No. Description
1 USB port, used by project personnel.
2 SD card slot.
3 Alarm ports, power cables, RS-485 port, and network ports are under the cover.
On/off button. Press the button, and then you can turn on/off the screen; press and hold
4
the button, you can turn on/off or restart the indoor monitor.
Cable Connection
Cable connection
4
2 Network Diagram
Network diagram
5
3 Configuration
This chapter introduces initialization, cable connection, and parameter configuration to realize basic
functions, including device management, calling, and monitoring.
Configuration Process
Before configuration, make sure that there is no short circuit or open circuit.
Plan IP address for every device, and also plan the unit number and room number you need.
Configure door stations (VTO). For details, see the IP Indoor Monitor_User’s Manual.
1) Initialize VTO.
2) Configure VTO number.
3) Configure VTO network parameters.
4) Configure SIP Server.
5) Add door stations (VTO) to the SIP server.
6) Add room number to the SIP server.
Configure indoor monitor (VTH).
Commissioning.
VDPConfig
You can download the "VDPConfig" to initialize devices, change IP address and upgrade system for
multiple devices at the same time. For the detailed information, see the VDPConfig user's manual.
3.3.1 Initialization
6
Select a language
Apartment: Select Apartment when the door stations and indoor monitors are
installed in apartments. Quick configuration is not available when you select
apartment.
Villa: Select Villa when the door stations and indoor monitors are installed in villas.
Quick configuration is available when you select villa.
Select Villa.
Tap OK.
7
Set local password
Enter password, confirm password, and email for the VTH you are to initialize.
Tap OK.
Set another device password
8
Tap Edit behind each device to do configurations.
Configure indoor monitor (VTH).
1) Select an indoor monitor (VTH).
VTH config
If there are no sub door stations (VTO), then you do not need to do sub door station
(VTO) configurations.
1) Select a door station (VTO).
VTO config (1)
9
VTO config (2)
Password: The password is used when administrators need to go to the project mode.
Email: The email is used when you need to reset the password.
Tap OK.
10
Main menu
11
No. Name Description
5 SOS Tap the SOS icon, the indoor monitor will call the management center.
Tap the icon, and then you can set do not disturb period. You need to
enable DND Period first, and then you can do do-not-disturb settings.
For details, see DND after tapping and entering the password
6 Do not disturb
(123456 by default; for password changing, see the IP Indoor
Monitor_User’s Manual).
: Tap the icon, and then you can view alarm logs, do alarm
Wired Network
Make sure that IP address of the indoor monitor and IP address of door stations are in the same
network segment; otherwise the indoor monitor cannot acquire door station information.
12
Tap the Settings icon.
Enter the password (123456 by default; for password changing, see the IP Indoor
Monitor_User’s Manual).
Network settings
Configure parameters.
You can select Ethernet IP mode. There are two options: Static and DHCP.
You can view the recently opened apps, apps opened by default, app permissions
Apps &
(apps using location, microphone, and camera), app notifications, and special app
notifications
access.
Display You can adjust display brightness, display sleep duration, font size, and display size.
You can adjust media volume and notification volume. You can also select to use
Sound
default notification sound and default alarm sound.
Spaces used and spaces left can be viewed. You can delete unwanted files as
Storage
needed.
Languages: You can select languages as needed.
Keyboard & Inputs: There are two options: Virtual keyboard
and physical keyboard.
Languages &
Input assistance: You can use spell checker, autofill service
Input
(not available at present), personal dictionary, and
text-to-speech output as needed. Pointer speed can also be
System
adjusted.
Backup You can use backup storage as needed.
You can reset Wi-Fi, mobile, and Bluetooth, and app preferences.
Reset
You can also erase all data, which means restoring the indoor
options
monitor to factory settings.
About tablet You can see details (battery status, network status, legal
13
Parameter Description
information, model, android version, Android security patch level,
baseband version, Kernel version, build number, and more) about
the indoor monitor.
Tap Network & Internet.
Tap Ethernet.
Network setting
Wireless Network
14
Wi-Fi
Tap and hold , enter the password (the password set during initialization), and then the Project
15
3.3.3.1 VTH Config
Room No.: Number of the room where the indoor monitor is installed.
Device Type: There are two options: Master and Extension.
Master: If the indoor monitor that you are operating works as the master station, you need
to select Master.
Extension: If the indoor monitor works as an extension, you need to select Extension.
Master IP: When the indoor monitor works as an extension, you need to enter IP address of the
master station.
Master Name: Keep the default value.
Master Pwd: The password you set during initialization (6 characters).
System Version: You can view system version of the indoor monitor.
Security Baseline Version: You can view security baseline version of the indoor monitor.
You need to enter SIP server information, and then video door phones in the same system can
communicate with each other.
SIP server (1)
16
Parameter Description
Password
Registration domain of SIP server, which can be null.
Domain
When VTO works as SIP server, registration domain of SIP server shall be VDP.
Login Name
Username and password to log in to web of the SIP server.
Login Pwd
Status Enable the SIP server status, and then the SIP server can start to work.
You need to add door stations to the indoor monitor, and then calls can be made among door
stations and indoor monitors.
Tap VTO Config,
Door station (VTO) configuration
17
VTO IP
You can add 20 door stations (one main door station and 19 sub door stations) to the
indoor monitor.
Make sure that user name and password that you entered here are the same as the
user name and password used when logging in to the door station web interface.
Tap to enable the door station.
Tap the Search Device icon, and then the system starts to search devices automatically. You can add
the device found to the indoor monitor.
18
Searching device (1)
You can change the email address that you use to reset your password.
You need to enable the Resst Password first if you want to reset the password.
19
Scan the QR code with any app with scanning function.
Send the string to the email address displayed on your device interface with the email
address you set on the Reset MSG interface.
A safe number will be sent to your email address.
Tap Next and then enter the new password, confirm password, and safe number.
The password is reset.
Reset password
You need to enable the trusted list, and then trusted devices can communicate with the indoor
monitor. You can also use Dshell to get the ability to develop custom analysis modules which help
you understand events of cyber intrusion.
20
Enable trusted list
You need to tap on the enable trusted list interface, and then the Add Network Trusted List will
be displayed.
Unlocking
You can unlock doors connected to the door stations through the indoor monitor when watching
monitoring videos, when someone is calling you from the door station, or when talking to the
people at the door station over the indoor monitor.
21
Commissioning
Monitor (2)
22
IPC information
: All thumbnails of interfaces you have opened will be displayed. Select an interface and slide
23
Making calls
Calling
If SD card is not inserted, the video recording icon and snapshot icon cannot be used.
You can tap the unlock icon / to unlock doors. If the icons turn grey, the unlock
function cannot be used.
Tap
24
Tap Call User.
Enter room number (room number you entered in the indoor monitor), and then tap .
If you call the extensions (101#1) from the main indoor monitor (101#0), just enter -1.
If you call the main indoor monitor from the extensions, just enter -0.
25
Cybersecurity Recommendations
Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is
connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps
toward protecting and strengthening networks and networked appliances will make them less
susceptible to attacks. Below are some tips and recommendations on how to create a more secured
security system.
Mandatory actions to be taken for basic device network security:
1. Use Strong Passwords
Please refer to the following suggestions to set passwords:
The length should not be less than 8 characters;
Include at least two types of characters; character types include upper and lower case
letters, numbers and symbols;
Do not contain the account name or the account name in reverse order;
Do not use continuous characters, such as 123, abc, etc.;
Do not use overlapped characters, such as 111, aaa, etc.;
2. Update Firmware and Client Software in Time
According to the standard procedure in Tech-industry, we recommend to keep your device
(such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is equipped
with the latest security patches and fixes. When the device is connected to the public
network, it is recommended to enable the “auto-check for updates” function to obtain
timely information of firmware updates released by the manufacturer.
We suggest that you download and use the latest version of client software.
"Nice to have" recommendations to improve your device network security:
1. Physical Protection
We suggest that you perform physical protection to device, especially storage devices. For
example, place the device in a special computer room and cabinet, and implement well-done
access control permission and key management to prevent unauthorized personnel from
carrying out physical contacts such as damaging hardware, unauthorized connection of
removable device (such as USB flash disk, serial port), etc.
2. Change Passwords Regularly
We suggest that you change passwords regularly to reduce the risk of being guessed or cracked.
3. Set and Update Passwords Reset Information Timely
The device supports password reset function. Please set up related information for password
reset in time, including the end user’s mailbox and password protection questions. If the
information changes, please modify it in time. When setting password protection questions, it is
suggested not to use those that can be easily guessed.
4. Enable Account Lock
The account lock feature is enabled by default, and we recommend you to keep it on to
guarantee the account security. If an attacker attempts to log in with the wrong password
several times, the corresponding account and the source IP address will be locked.
5. Change Default HTTP and Other Service Ports
We suggest you to change default HTTP and other service ports into any set of numbers
between 1024~65535, reducing the risk of outsiders being able to guess which ports you are
using.
26
6. Enable HTTPS
We suggest you to enable HTTPS, so that you visit Web service through a secure communication
channel.
7. MAC Address Binding
We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing
the risk of ARP spoofing.
8. Assign Accounts and Privileges Reasonably
According to business and management requirements, reasonably add users and assign a
minimum set of permissions to them.
9. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to
reduce risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to the
following services:
SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.
SMTP: Choose TLS to access mailbox server.
FTP: Choose SFTP, and set up strong passwords.
AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords.
10. Audio and Video Encrypted Transmission
If your audio and video data contents are very important or sensitive, we recommend that you
use encrypted transmission function, to reduce the risk of audio and video data being stolen
during transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.
11. Secure Auditing
Check online users: we suggest that you check online users regularly to see if the device is
logged in without authorization.
Check device log: By viewing the logs, you can know the IP addresses that were used to log
in to your devices and their key operations.
12. Network Log
Due to the limited storage capacity of the device, the stored log is limited. If you need to save
the log for a long time, it is recommended that you enable the network log function to ensure
that the critical logs are synchronized to the network log server for tracing.
13. Construct a Safe Network Environment
In order to better ensure the safety of device and reduce potential cyber risks, we recommend:
Disable the port mapping function of the router to avoid direct access to the intranet
devices from external network.
The network should be partitioned and isolated according to the actual network needs. If
there are no communication requirements between two sub networks, it is suggested to
use VLAN, network GAP and other technologies to partition the network, so as to achieve
the network isolation effect.
Establish the 802.1x access authentication system to reduce the risk of unauthorized access
to private networks.
Enable IP/MAC address filtering function to limit the range of hosts allowed to access the
device.
27