IP Indoor Monitor Quick Start Guide V1.0.0 Foreword General This document mainly introduces structure, installation process, and basic configuration of the IP Indoor Monitor (hereinafter referred to as the "indoor monitor"). Safety Instructions The following categorized signal words with defined meaning might appear in the manual. Signal Words Meaning CAUTION Indicates a potential risk which, if not avoided, could result in property damage, data loss, lower performance, or unpredictable result. NOTE Provides additional information as the emphasis and supplement to the text. Revision History Version V1.0.0 Revision Content First release Release Date April 2020 About the Manual The manual is for reference only. If there is inconsistency between the manual and the actual product, the actual product shall prevail. We are not liable for any loss caused by the operations that do not comply with the manual. The manual would be updated according to the latest laws and regulations of related regions. For detailed information, see the paper manual, CD-ROM, QR code or our official website. If there is inconsistency between paper manual and the electronic version, the electronic version shall prevail. All the designs and software are subject to change without prior written notice. The product updates might cause some differences between the actual product and the manual. Please contact the customer service for the latest program and supplementary documentation. There still might be deviation in technical data, functions and operations description, or errors in print. If there is any doubt or dispute, please refer to our final explanation. Upgrade the reader software or try other mainstream reader software if the manual (in PDF format) cannot be opened. All trademarks, registered trademarks and the company names in the manual are the properties of their respective owners. Please visit our website, contact the supplier or customer service if there is any problem occurred when using the device. If there is any uncertainty or controversy, please refer to our final explanation. I Important Safeguards and Warnings The following description is the correct application method of the device. Read the manual carefully before use to prevent danger and property loss. Strictly conform to the manual during application and keep it properly after reading. Operating Requirement Do not place and install the device in an area exposed to direct sunlight or near heat generating device. Do not install the device in a humid, dusty or fuliginous area. Keep its horizontal installation, or install it at stable places, and prevent it from falling. Do not drip or splash liquids onto the device; do not put on the device anything filled with liquids to prevent liquids from flowing into the device. Install the device at well-ventilated places; do not block its ventilation opening. Use the device only within rated input and output range. Do not dismantle the device arbitrarily. The device shall be used with screened network cables. Power Requirement The product shall use electric wires (power wires) required by the region where the device will be used. Use power supply that meets SELV (safety extra low voltage) requirements, and supply power with rated voltage that conforms to Limited Power Source in IEC60950-1. For specific power supply requirements, refer to device labels. Appliance coupler is a disconnecting device. During normal use, keep an angle that facilitates operation. Do not cut off power supply during device upgrade. II Table of Contents Foreword ............................................................................................................................................................ I Important Safeguards and Warnings .............................................................................................................. II 1 Introduction ................................................................................................................................................... 1 Overview ....................................................................................................................................................................................... 1 Front Panel .................................................................................................................................................................................... 1 Rear Panel ..................................................................................................................................................................................... 3 Cable Connection ...................................................................................................................................................................... 4 2 Network Diagram .......................................................................................................................................... 5 3 Configuration ................................................................................................................................................ 6 Configuration Process .............................................................................................................................................................. 6 VDPConfig ..................................................................................................................................................................................... 6 Configuring Indoor Monitor .................................................................................................................................................. 6 3.3.1 Initialization .................................................................................................................................................................... 6 3.3.2 Network Settings ........................................................................................................................................................ 12 3.3.3 Project Settings ............................................................................................................................................................ 15 Unlocking .................................................................................................................................................................................... 21 Commissioning ......................................................................................................................................................................... 22 3.5.1 Watching Monitoring Videos .................................................................................................................................. 22 3.5.2 Making Calls .................................................................................................................................................................. 23 Cybersecurity Recommendations ............................................................................................. 26 III 1 Introduction Overview The 10-inch IP indoor monitor, widely used in intelligent buildings, integrates functions of monitoring, voice/video call, and unlock. Technologies IP communication methods, simple network management protocol (SNMP), network encryption, and more are applied to make the whole system more stable, safer, and easier to be managed. like embedded technology, Front Panel 10 Inch Front panel [mm (inch)]
1 7 Inch Front panel [mm (inch)]
No. Name Table 1-1 Components 1 2 On/off button. Press the button, and then you can turn on/off the screen; press and hold the button, you can turn on/off or restart the indoor monitor. MIC, inputs audio. 2 Rear Panel 10 Inch Rear panel 7 Inch Rear panel 3 No. Description Table 1-2 Rear panel description 1 2 3 4 USB port, used by project personnel. SD card slot. Alarm ports, power cables, RS-485 port, and network ports are under the cover. On/off button. Press the button, and then you can turn on/off the screen; press and hold the button, you can turn on/off or restart the indoor monitor. Cable Connection Cable connection 4 2 Network Diagram Network diagram 5 3 Configuration This chapter introduces initialization, cable connection, and parameter configuration to realize basic functions, including device management, calling, and monitoring. Configuration Process Before configuration, make sure that there is no short circuit or open circuit. Plan IP address for every device, and also plan the unit number and room number you need. Configure door stations (VTO). For details, see the IP Indoor Monitor_Users Manual. Initialize VTO. 1) 2) Configure VTO number. 3) Configure VTO network parameters. 4) Configure SIP Server. 5) Add door stations (VTO) to the SIP server. 6) Add room number to the SIP server. Configure indoor monitor (VTH). Commissioning. VDPConfig You can download the "VDPConfig" to initialize devices, change IP address and upgrade system for multiple devices at the same time. For the detailed information, see the VDPConfig user's manual. Configuring Indoor Monitor When the indoor monitor is used for the first time, you need to select a language that you prefer, initialize the indoor monitor to get a password to enter project setting interface and an email to reset password. In addition, you need to configure parameters for all door stations (VTO) and indoor monitors that are found on the indoor monitor you are operating. 3.3.1 Initialization 3.3.1.1 Quick Configuration for VTH (For Villa) Power on the device. 6 Select a language Select a language that you prefer. Tap OK. Select apartment or villa Apartment: Select Apartment when the door stations and indoor monitors are installed in apartments. Quick configuration is not available when you select apartment. Villa: Select Villa when the door stations and indoor monitors are installed in villas. Quick configuration is available when you select villa. Select Villa. Tap OK. 7 Set local password Enter password, confirm password, and email for the VTH you are to initialize. Tap OK. Set another device password Tap Refresh, and then tap Next. Networking configuration 8 Tap Edit behind each device to do configurations. Configure indoor monitor (VTH). 1) Select an indoor monitor (VTH). VTH config 2) Enter local IP, Network, and gateway. 3) Tap OK. The indoor monitor (VTH) configuration is completed. Configure Main VTO and Sub VTO. There must be only one main VTO and one or more sub VTOs. If there are no sub door stations (VTO), then you do not need to do sub door station
(VTO) configurations. 1) Select a door station (VTO). VTO config (1) 9 VTO config (2) 2) Select Main or Sub. Enter local IP, Network, gateway; select video standard, date format, time format; set date and time. 3) Tap OK. 4) Tap One-key Config. The VTO configuration will be completed in a few seconds. 3.3.1.2 Normal Configuration for VTH (For Apartment) Tap Apartment on Figure 3-2. Connect the indoor monitor to power source. Enter the password, confirm password, and email. Password: The password is used when administrators need to go to the project mode. Email: The email is used when you need to reset the password. Tap OK. 10 Main menu No. Name Description Table 3-1 Description of the main menu 1 2 3 Room number Number of the room where the indoor monitor Is installed. Date and time Current time and date are displayed here. Arm and disarm Shortcut icons to arm or disarm are displayed here. The four icons represent at home mode, away from home mode, sleep mode, and customizable mode. Select Arm Mode or Disarm Mode first, and then tap the icons to arm or disarm.
: The wired network is not connected.
: The wired network is connected.
: The indoor monitor failed to be connected to the SIP server. If this icon does not appear, then the indoor monitor is connected to the SIP server. 4 Status bar
: The SD card is inserted and recognized.
: The indoor monitor is in the Do not disturb mode. It if disabled by default. Door Status
: Door closed.
: Door open.
: Unknown. 11 No. Name 5 SOS 6 Do not disturb Description Tap the SOS icon, the indoor monitor will call the management center. Tap the icon, and then you can set do not disturb period. You need to enable DND Period first, and then you can do do-not-disturb settings. For details, see DND after tapping and entering the password
(123456 by default; for password changing, see the Monitor_Users Manual). IP Indoor 7 Turn off screen Tap the icon, and then the screen will be turned off. It is recommended that the password be changed during the first use.
: Tap the icon, and then you can watch videos from door stations and IP cameras.
: Tap the icon, and then text messages and videos left by visitors, or public notices released by the management center will be displayed.
: Tap the icon, and then you can make calls to other indoor monitors and the management center; and you can also view call logs and your contacts on this interface.
: Tap the icon, and then you can view alarm logs, do alarm settings for 6 areas as needed. 8 Function buttons
: Tap the icon, enter the password (123456 by default) and then you can select ringtones for different door stations, Do Not Disturb period, call forward mode (there are three options:
Always, Busy, and No Answer), and other settings. Sound Recorder: You can record your voice messages to the SD card or to the indoor monitor. Calculator: You can do calculations through the calculator. Files: You can view files like images, videos, audio, and recently produced files. Calendar: You can view date through the indoor monitor, and create notes, schedules, and plans. Gallery: You can view images captured by door stations (VTO) or IP cameras. 3.3.2 Network Settings Connect the indoor monitor to the network, and then the indoor monitor can communicate with other devices. Wired Network Make sure that IP address of the indoor monitor and IP address of door stations are in the same network segment; otherwise the indoor monitor cannot acquire door station information. 12 Tap the Settings icon. Enter the password (123456 by default; for password changing, see the IP Indoor Monitor_Users Manual). Network settings Configure parameters. Parameter Description Table 3-2 Parameter description You can choose to enable Wi-Fi or not by tapping
. Network &
Internet Tap
, and then available Wi-Fi networks will be displayed. You can select Ethernet IP mode. There are two options: Static and DHCP.
Apps notifications You can view the recently opened apps, apps opened by default, app permissions
(apps using location, microphone, and camera), app notifications, and special app access. Display You can adjust display brightness, display sleep duration, font size, and display size. Sound Storage You can adjust media volume and notification volume. You can also select to use default notification sound and default alarm sound. Spaces used and spaces left can be viewed. You can delete unwanted files as needed. Languages &
Input System Languages: You can select languages as needed. Keyboard & Inputs: There are two options: Virtual keyboard and physical keyboard. Input assistance: You can use spell checker, autofill service
(not available at present), personal dictionary, and text-to-speech output as needed. Pointer speed can also be adjusted. Backup You can use backup storage as needed. Reset options You can reset Wi-Fi, mobile, and Bluetooth, and app preferences. You can also erase all data, which means restoring the indoor monitor to factory settings. About tablet You can see details
(battery status, network status, legal 13 Parameter Description information, model, android version, Android security patch level, baseband version, Kernel version, build number, and more) about the indoor monitor. Tap Network & Internet. Tap Ethernet. Network setting Tap Ethernet Ip mode. Select static: Enter IP address, gateway, netmask, and then tap CONNECT. Select dhcp: Tap dhcp, the IP information will be automatically acquired. Wireless Network Tap the Settings icon. Tap Network & Internet. Tap
, the Wi-Fi is enabled. Tap
, the available wireless networks are displayed. 14 Wi-Fi Select a wireless network. Enter the password. Tap CONNECT. The network is connected. 3.3.3 Project Settings Tap and hold
, enter the password (the password set during initialization), and then the Project Settings interface will be displayed. Project settings 15 3.3.3.1 VTH Config Room No.: Number of the room where the indoor monitor is installed. Device Type: There are two options: Master and Extension. Master: If the indoor monitor that you are operating works as the master station, you need to select Master. Extension: If the indoor monitor works as an extension, you need to select Extension. Master IP: When the indoor monitor works as an extension, you need to enter IP address of the master station. Master Name: Keep the default value. Master Pwd: The password you set during initialization (6 characters). System Version: You can view system version of the indoor monitor. Security Baseline Version: You can view security baseline version of the indoor monitor. 3.3.3.2 SIP Server You need to enter SIP server information, and then video door phones in the same system can communicate with each other. SIP server (1) Parameter Description Table 3-3 SIP server description Server IP When the platform works as SIP server, server IP is IP address of the management platform. When a door station works as SIP server, server IP is IP address of the door station. Network Port When the platform works as SIP server, network port is 5080. When VTO works as SIP server, network port is 5060. User Name Keep default value. 16 Parameter Password Domain Login Name Login Pwd Status 3.3.3.3 VTO Config Description Registration domain of SIP server, which can be null. When VTO works as SIP server, registration domain of SIP server shall be VDP. Username and password to log in to web of the SIP server. Enable the SIP server status, and then the SIP server can start to work. You need to add door stations to the indoor monitor, and then calls can be made among door stations and indoor monitors. Tap VTO Config, Door station (VTO) configuration Tap a door station (VTO). 17 VTO IP Tap the default IP. Enter the door station (VTO) IP, user name, and password (used to log in to the door station web interface). You can add 20 door stations (one main door station and 19 sub door stations) to the indoor monitor. Make sure that user name and password that you entered here are the same as the user name and password used when logging in to the door station web interface. Tap to enable the door station. 3.3.3.4 Searching Device Tap the Search Device icon, and then the system starts to search devices automatically. You can add the device found to the indoor monitor. 18 Searching device (1) Searching device (2) 3.3.3.5 Resetting Password You can change the email address that you use to reset your password. You need to enable the Resst Password first if you want to reset the password. Tap and hold
. Tap Forgot password?. Tap OK. 19 Scan the QR code with any app with scanning function. Send the string to the email address displayed on your device interface with the email address you set on the Reset MSG interface. A safe number will be sent to your email address. Tap Next and then enter the new password, confirm password, and safe number. The password is reset. Reset password 3.3.3.6 Security Settings You need to enable the trusted list, and then trusted devices can communicate with the indoor monitor. You can also use Dshell to get the ability to develop custom analysis modules which help you understand events of cyber intrusion. 20 Enable trusted list Add network trusted list You need to tap on the enable trusted list interface, and then the Add Network Trusted List will be displayed. Unlocking You can unlock doors connected to the door stations through the indoor monitor when watching monitoring videos, when someone is calling you from the door station, or when talking to the people at the door station over the indoor monitor. 21 Commissioning 3.5.1 Watching Monitoring Videos Tap
, and the Monitor interface is displayed. On the indoor monitor, you can watch videos captured by door stations and IP cameras. You can also put door stations and IP cameras that you like into the Favorite folder by tapping at the lower right corner of each device. During the call with a door station, you can watch the real-time videos capture by door stations or IP cameras. Monitor (1) Monitor (2) 22 IPC information
: Turn down the volume.
: Go to the previous page.
: Go to the main menu.
: All thumbnails of interfaces you have opened will be displayed. Select an interface and slide it to the left or right to close the interface.
: Turn up the volume. 3.5.2 Making Calls Tap
, and then you can call other indoor monitors and the management center; and you can also view call logs and your contacts on this interface. You can also call the indoor monitor from door stations. 23 Making calls Calling If SD card is not inserted, the video recording icon and snapshot icon cannot be used. You can tap the unlock icon
to unlock doors. If the icons turn grey, the unlock function cannot be used. Call Residents through Dialing Numbers Tap 24 Tap Call User. Enter room number (room number you entered in the indoor monitor), and then tap
. If door station (VTO) works as SIP server, enter a room number. If management platform like DSS Pro or DSS Express works as SIP server. Call residents in your apartment or your building, enter a room number. Call residents in other apartments and buildings, enter 1#1#101 for apartment 1 building 1 room 101. If you call the extensions (101#1) from the main indoor monitor (101#0), just enter -1. If you call the main indoor monitor from the extensions, just enter -0. Call Residents through Contacts You can also call residents through contacts. Call through Call Logs You can make calls through tapping call records. 25 Cybersecurity Recommendations Cybersecurity is more than just a buzzword: its something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks. Below are some tips and recommendations on how to create a more secured security system. Mandatory actions to be taken for basic device network security:
1. Use Strong Passwords Please refer to the following suggestions to set passwords:
The length should not be less than 8 characters;
Include at least two types of characters; character types include upper and lower case letters, numbers and symbols;
Do not contain the account name or the account name in reverse order;
Do not use continuous characters, such as 123, abc, etc.;
Do not use overlapped characters, such as 111, aaa, etc.;
2. Update Firmware and Client Software in Time According to the standard procedure in Tech-industry, we recommend to keep your device
(such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is equipped with the latest security patches and fixes. When the device is connected to the public network, it is recommended to enable the auto-check for updates function to obtain timely information of firmware updates released by the manufacturer. We suggest that you download and use the latest version of client software.
"Nice to have" recommendations to improve your device network security:
1. Physical Protection We suggest that you perform physical protection to device, especially storage devices. For example, place the device in a special computer room and cabinet, and implement well-done access control permission and key management to prevent unauthorized personnel from carrying out physical contacts such as damaging hardware, unauthorized connection of removable device (such as USB flash disk, serial port), etc. 2. Change Passwords Regularly We suggest that you change passwords regularly to reduce the risk of being guessed or cracked. 3. Set and Update Passwords Reset Information Timely The device supports password reset function. Please set up related information for password reset in time, including the end users mailbox and password protection questions. If the information changes, please modify it in time. When setting password protection questions, it is suggested not to use those that can be easily guessed. 4. Enable Account Lock The account lock feature is enabled by default, and we recommend you to keep it on to guarantee the account security. If an attacker attempts to log in with the wrong password several times, the corresponding account and the source IP address will be locked. 5. Change Default HTTP and Other Service Ports We suggest you to change default HTTP and other service ports into any set of numbers between 1024~65535, reducing the risk of outsiders being able to guess which ports you are using. 26 6. Enable HTTPS We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel. 7. MAC Address Binding We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing the risk of ARP spoofing. 8. Assign Accounts and Privileges Reasonably According to business and management requirements, reasonably add users and assign a minimum set of permissions to them. 9. Disable Unnecessary Services and Choose Secure Modes If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to reduce risks. If necessary, it is highly recommended that you use safe modes, including but not limited to the following services:
SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication passwords. SMTP: Choose TLS to access mailbox server. FTP: Choose SFTP, and set up strong passwords. AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 10. Audio and Video Encrypted Transmission If your audio and video data contents are very important or sensitive, we recommend that you use encrypted transmission function, to reduce the risk of audio and video data being stolen during transmission. Reminder: encrypted transmission will cause some loss in transmission efficiency. 11. Secure Auditing Check online users: we suggest that you check online users regularly to see if the device is logged in without authorization. Check device log: By viewing the logs, you can know the IP addresses that were used to log in to your devices and their key operations. 12. Network Log Due to the limited storage capacity of the device, the stored log is limited. If you need to save the log for a long time, it is recommended that you enable the network log function to ensure that the critical logs are synchronized to the network log server for tracing. 13. Construct a Safe Network Environment In order to better ensure the safety of device and reduce potential cyber risks, we recommend:
Disable the port mapping function of the router to avoid direct access to the intranet devices from external network. The network should be partitioned and isolated according to the actual network needs. If there are no communication requirements between two sub networks, it is suggested to use VLAN, network GAP and other technologies to partition the network, so as to achieve the network isolation effect. Establish the 802.1x access authentication system to reduce the risk of unauthorized access to private networks. Enable IP/MAC address filtering function to limit the range of hosts allowed to access the device. 27