User's Manual
Manuals
Brands
Zhejiang Dahua Vision Technology Manuals
Electronics
IP Indoor Monitor
1
2
3
4
5
6
7
8
9
10
Table Of Contents
Foreword
Important Safeguards and Warnings
1 Product Overview
1.1 Introduction
1.2 Function
2 Network Diagram
2.1 2-wire System
2.2 Digital System
3 Preparation and Commissioning
3.1 Preparation
3.1.1 VTO Settings
3.1.1.1 Initialization
3.1.1.2 Network Parameters
3.1.1.3 System Type
3.1.1.4 Server Type
3.1.1.5 SIP Server
3.1.1.6 Adding VTO
3.1.1.7 Adding VTH
3.1.2 VTH Settings
3.1.2.1 Initialization
3.1.2.2 Network Parameters
3.1.2.3 VTH Config
3.1.2.4 SIP Server
3.1.2.5 VTO Configuration
3.1.2.6 Searching Device
3.2 Commissioning
3.2.1 VTO Calling VTH
3.2.2 VTH Monitoring VTO
4 Interface Operation
4.1 Main Interface
4.2 Call
4.2.1 Recent Call
4.2.2 Contact
4.2.3 Call User
4.2.3.1 By Room Number
4.2.3.2 From Contact
4.2.4 Call from User
4.2.5 Call from VTO
4.3 Info
4.3.1 Security Alarm
4.3.2 Guest Message
4.3.3 Publish Info
4.3.4 Video Pictures
4.4 Monitor
4.4.1 Monitoring VTO
4.4.2 Monitoring IPC
4.4.2.1 Adding IPC
4.4.2.2 Modifying IPC
4.4.2.3 Deleting IPC
4.4.2.4 Monitoring IPC
4.4.3 Favorite
4.5 SOS
4.6 Setting
4.6.1 Ring Settings
4.6.1.1 VTO Ring
4.6.1.2 VTH Ring
4.6.1.3 Alarm Ring
4.6.1.4 Other Ring Settings
4.6.2 Card Information
4.6.3 Alarm Setting
4.6.3.1 Wire Zone
4.6.3.2 Wireless Zone
4.6.3.3 Alarm Output
4.6.4 Mode Setting
4.6.5 Forward Setting
4.6.6 General Setting
4.6.6.1 Time Setting
4.6.6.2 Display Setting
4.6.6.3 Password Setting
4.6.6.4 QR Code
4.6.6.5 Other Settings
4.6.7 Product Info
4.7 Project Settings
4.7.1 Forget Password
4.7.1.1 Reset the Password at the Interface
4.7.1.2 Reset the Password in VDPconfig
4.7.2 Network Settings
4.7.3 VTH Configuration
4.7.4 VTO Configuration
4.7.5 Default
4.7.6 Reset MSG
4.8 Unlock Function
4.9 Arm and Disarm Function
4.9.1 Arm
4.9.2 Disarm
5 DSS Agile VDP
5.1 Downloading the App
5.2 Registration and Login
5.3 Call Functions
5.3.1 Forwarding Calls
5.3.2 Calling Operations
5.4 Monitoring
5.5 Call Records
5.6 Message
5.7 Visitor
5.7.1 Creating Pass
5.7.2 Visit Records
5.8 Setting
Appendix 1 Cybersecurity Recommendations
4
Networ
k diagram of digital system (1)
The
V
T
H
i
s
independent
ly
p
ower
ed through
a
po
wer su
pply
.
1
...
...
8
9
10
11
12
...
...
87