background image

   

22

 

5.  Change Default HTTP and Other Service Ports 

We suggest you to change default HTTP and other service ports into any set of numbers 

between 1024~65535, reducing the risk of outsiders being able to guess which ports you 

are using. 

6.  Enable HTTPS 

We suggest you to enable HTTPS, so that you visit Web service through a secure 

communication channel. 

7.  Enable Whitelist 

We suggest you to enable whitelist function to prevent everyone, except those with 

specified IP addresses, from accessing the system. Therefore, please be sure to add your 
computer’s IP address and the accompanying equipment’s IP address to the whitelist. 

8.  MAC Address Binding 

We recommend you to bind the IP and MAC address of the gateway to the equipment, 

thus reducing the risk of ARP spoofing. 

9.  Assign Accounts and Privileges Reasonably 

According to business and management requirements, reasonably add users and assign a 

minimum set of permissions to them.   

10.  Disable Unnecessary Services and Choose Secure Modes 

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, 

etc., to reduce risks. 

If necessary, it is highly recommended that you use safe modes, including but not limited to 

the following services: 

 

SNMP

Choose SNMP v3, and set up strong encryption passwords and authentication 

passwords. 

 

SMTP

Choose TLS to access mailbox server. 

 

FTP

Choose SFTP, and set up strong passwords.   

 

AP hotspot

Choose WPA2-PSK encryption mode, and set up strong passwords. 

11.  Audio and Video Encrypted Transmission 

If your audio and video data contents are very important or sensitive, we recommend that 

you use encrypted transmission function, to reduce the risk of audio and video data being 

stolen during transmission. 

Reminder: encrypted transmission will cause some loss in transmission efficiency. 

12.  Secure Auditing   

 

Check online users: we suggest that you check online users regularly to see if the 

device is logged in without authorization.   

 

Check equipment log: By viewing the logs, you can know the IP addresses that were 

used to log in to your devices and their key operations. 

13.  Network Log 

Due to the limited storage capacity of the equipment, the stored log is limited. If you need 

to save the log for a long time, it is recommended that you enable the network log function 

to ensure that the critical logs are synchronized to the network log server for tracing. 

14.  Construct a Safe Network Environment 

In order to better ensure the safety of equipment and reduce potential cyber risks, we 

recommend: 

 

Disable the port mapping function of the router to avoid direct access to the intranet 

devices from external network. 

Summary of Contents for VTH5221 series

Page 1: ...Digital VTH Version 4 3 Quick Start Guide V1 0 1...

Page 2: ...March 13 2019 V1 0 1 Modified the title of 1 2 7 and increased 1 2 8 May 20 2019 Privacy Protection Notice As the device user or data controller you might collect personal data of others such as face...

Page 3: ...ct the customer service for the latest program and supplementary documentation There still might be deviation in technical data functions and operations description or errors in print If there is any...

Page 4: ...t put on the device anything filled with liquids in order to prevent liquids from flowing into the device Please install the device at well ventilated places don t block its ventilation opening Use t...

Page 5: ...VTH5222CH VTH5222CHW 2 4 1 2 5 VTH1660CH 4 1 2 6 VTH2221A VTH2221A S2 4 1 2 7 VTH2421FB VTH2421FS VTH2421FB P VTH2421FW P 5 1 2 8 VTH5441G 5 2 Installation and Debugging 6 Installation 6 2 1 2 1 1 Su...

Page 6: ...VTO During speaking press this key to exit speaking Monitor In standby mode press this key to monitor the main VTO During monitoring press this key to exit monitoring Unlock In case of incoming call...

Page 7: ...e 1 1 VTH5221 Series VTH5241 Series Figure 1 1 1 2 2 VTH5221E H VTH5221EW H Rear panel of VTH5221E H VTH5221EW H is shown in Figure 1 2 VTH5221E H VTH5221EW H Figure 1 2 1 2 3 VTH15XX S2 Series Type B...

Page 8: ...5XX type CH series different types of digital VTH have different port positions but the same port provides the same function Taking VTH1550CH as an example specific functions of ports are introduced a...

Page 9: ...and VTH5222CHW 2 are the same in other aspects VTH5222CH has 1 group of 2 wire port while VTH1550CHW 2 has 3 groups of 2 wire port VTH5222CH is shown in Figure 1 7 VTH5222CH Figure 1 7 1 2 5 VTH1660CH...

Page 10: ...5 1 2 7 VTH2421FB VTH2421FS VTH2421FB P VTH2421FW P VTH2421FB VTH2421FS VTH2421FB P VTH2421FW P Figure 1 10 1 2 8 VTH5441G VTH5441G Figure 1 11...

Page 11: ...ales department It is suggested that installation height of device central point shall be 1 4cm 1 6cm above the ground 2 1 1 Surface Installation Directly install the device with a bracket onto a wall...

Page 12: ...only applies to handset VTH Take VTH5221E H for example With two M3 6 cross recessed countersunk head screws tighten the metal bracket Step 1 onto the top two nuts of desktop bracket Please connect w...

Page 13: ...P server Please scan QR code on the cover for details Set VTO info and VTH info at WEB interface of every VTO set VTH info network info and VTO info on every VTH and thus realize video intercom functi...

Page 14: ...4 The system displays TCP IP interface as shown in Figure 2 5 TCP IP Figure 2 5 Enter the planned IP Address Subnet Mask and Gateway and click OK Step 5 After modification is completed VTO reboots aut...

Page 15: ...re there is only one unit When the platform Express DSS works as SIP server select Server Type to be Express DSS It applies to a scenario where there are multiple buildings or multiple units 2 Set VTO...

Page 16: ...rks as SIP server Username Password Use default value SIP Domain It shall be VDP when another VTO works as SIP server It can be null or keep default value when the platform works as SIP server Login U...

Page 17: ...unit where VTO is located IP Address IP address of VTO Username Password Username and password to login WEB interface of this VTO Optional Select Household Setting Room No Management Step 11 The syst...

Page 18: ...master VTH is 101 0 extensions will be 101 1 101 2 Register Type Signaling interactive use in SIP system Adopt default value Register Password 2 2 2 VTH Settings 2 2 2 1 Initialization For the first...

Page 19: ...gure 2 12 or Figure 2 13 IP addresses of VTH and VTO shall be in the same network segment Otherwise VTH will fail to obtain VTO info after configuration Network 1 Figure 2 12 Network 2 Figure 2 13 LAN...

Page 20: ...At WLAN interface select Wi Fi click Wireless IP tab to enter Local IP Subnet Mask and Gateway and press OK At WLAN interface select Wi Fi click Wireless IP tab press to enable DHCP function and obta...

Page 21: ...shall end with 0 Otherwise it will fail to connect VTO Be used as an extension VTH 1 Press Master and switch to Extension 2 Enter Room No such as 101 1 and Master IP IP address of master VTH Master Na...

Page 22: ...e platform works as SIP server network port is 5080 When VTO works as SIP server network port is 5060 User Name Use default value Register Pwd Domain Registration domain of SIP server which can be nul...

Page 23: ...Enter Sub VTO Fence Station Name Sub VTO Fence Station IP address User Name and Password 2 Switch the Enable Status to be Press to turn page and add more sub VTO fence stations Debugging Verification...

Page 24: ...Take VTO for example Select Monitor Door as shown in Figure 2 19 Select the VTO to enter monitoring image as shown in Figure 2 20 The following figure means that SD card has been inserted into VTH If...

Page 25: ...20 VTH monitors VTO 2 Figure 2 20...

Page 26: ...le the auto check for updates function to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice to...

Page 27: ...s SNMP Choose SNMP v3 and set up strong encryption passwords and authentication passwords SMTP Choose TLS to access mailbox server FTP Choose SFTP and set up strong passwords AP hotspot Choose WPA2 PS...

Page 28: ...no communication requirements between two sub networks it is suggested to use VLAN network GAP and other technologies to partition the network so as to achieve the network isolation effect Establish t...

Reviews: