Digital-VTS User S-Manual V1.0.1
Digital-VTS User S-Manual V1.0.1
User's Manual
V1.0.1
Foreword
This manual introduces the configurations on local VTS and webpage. Read carefully before using
the VTS, and keep the manual safe for future reference.
Safety Instructions
The following signal words might appear in the manual.
Signal Words Meaning
Indicates a high potential hazard which, if not avoided, will result in
death or serious injury.
Indicates a medium or low potential hazard which, if not avoided,
could result in slight or moderate injury.
Indicates a potential risk which, if not avoided, could result in property
damage, data loss, reductions in performance, or unpredictable
results.
Revision History
Version Revision Content Release Time
V1.0.1 Revised advanced parameters. June 2023
V1.0.0 First release. November 2022
I
● There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation.
● Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
● All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
● Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
● If there is any uncertainty or controversy, we reserve the right of final explanation.
II
Important Safeguards and Warnings
This section introduces content covering the proper handling of the device, hazard prevention, and
prevention of property damage. Read carefully before using the device, and comply with the
guidelines when using it.
Operation Requirements
Installation Requirements
● Do not connect the power adapter to the device while the adapter is powered on.
● Strictly comply with the local electric safety code and standards. Make sure the ambient voltage
is stable and meets the power supply requirements of the device.
● Do not connect the device to two or more kinds of power supplies, to avoid damage to the
device.
● Improper use of the battery might result in a fire or explosion.
● Personnel working at heights must take all necessary measures to ensure personal safety
including wearing a helmet and safety belts.
● Do not place the device in a place exposed to sunlight or near heat sources.
● Keep the device away from dampness, dust, and soot.
● Install the device on a stable surface to prevent it from falling.
● Install the device in a well-ventilated place, and do not block its ventilation.
● Use an adapter or cabinet power supply provided by the manufacturer.
● Use the power cords that are recommended for the region and conform to the rated power
specifications.
● The power supply must conform to the requirements of ES1 in IEC 62368-1 standard and be no
higher than PS2. Please note that the power supply requirements are subject to the device label.
● The device is a class I electrical appliance. Make sure that the power supply of the device is
connected to a power socket with protective earthing.
III
Table of Contents
Foreword ........................................................................................................................................................................................................I
Important Safeguards and Warnings ............................................................................................................................................ III
1 Initializing VTS ....................................................................................................................................................................................... 1
1.1 Initialization through Local Device .................................................................................................................................. 1
1.2 Initialization through Webpage ......................................................................................................................................... 1
2 Building Scenes ..................................................................................................................................................................................... 3
2.1 Operations on Local Device .................................................................................................................................................. 3
2.1.1 Local Screen ....................................................................................................................................................................... 3
2.1.2 Configuring the Display Parameters..................................................................................................................... 4
2.1.3 Configuring the Sound Parameters ....................................................................................................................... 4
2.1.4 Configuring the Intercom Parameters ................................................................................................................. 5
2.1.5 Configuring the Advanced Parameters ............................................................................................................... 6
2.1.6 Resetting Password ....................................................................................................................................................... 7
2.1.7 Project Settings ............................................................................................................................................................... 8
2.1.7.1 Configuring VTS ................................................................................................................................................... 8
2.1.7.2 Configuring SIP Server ...................................................................................................................................... 9
2.1.7.3 Adding Devices ...................................................................................................................................................10
2.1.7.4 Resetting Information .....................................................................................................................................12
2.1.7.5 Debugging and Factory Defaults ...............................................................................................................13
2.1.8 Commissioning ..............................................................................................................................................................13
2.1.8.1 Call .............................................................................................................................................................................13
2.1.8.2 Checking the Information .............................................................................................................................15
2.1.8.3 Monitoring ............................................................................................................................................................16
2.2 Operations on Webpage ......................................................................................................................................................18
2.2.1 Logging in to the Webpage .....................................................................................................................................18
2.2.2 Resetting Password .....................................................................................................................................................19
2.2.3 Home Page Introduction ...........................................................................................................................................19
2.2.4 Configuring Network ..................................................................................................................................................20
2.2.4.1 Configuring TCP/IP............................................................................................................................................20
2.2.4.2 Configuring SIP Server ....................................................................................................................................22
2.2.4.3 Configuring Basic Services ............................................................................................................................22
2.2.4.4 Configuring Auto Registration....................................................................................................................23
2.2.5 System Management ..................................................................................................................................................24
2.2.5.1 Configuring Basic Parameters of VTS ......................................................................................................24
2.2.5.2 Configuring Video Parameters ...................................................................................................................24
IV
2.2.5.3 Account Management .....................................................................................................................................25
2.2.5.3.1 Adding User ...............................................................................................................................................26
2.2.5.3.2 Resetting Password ...............................................................................................................................27
2.2.5.3.3 Adding ONVIF User ................................................................................................................................27
2.2.5.4 Viewing Online User .........................................................................................................................................28
2.2.5.5 Configuring Time ...............................................................................................................................................29
2.2.5.6 Configuring Maintenance..............................................................................................................................30
2.2.5.7 Configuration Management.........................................................................................................................30
2.2.5.7.1 Import/Export Configuration File ...................................................................................................31
2.2.5.7.2 Factory Default.........................................................................................................................................31
2.2.5.8 Updating ................................................................................................................................................................31
2.2.5.9 Viewing Version..................................................................................................................................................32
2.2.5.10 Viewing Legal Information.........................................................................................................................32
2.2.6 Device Management ...................................................................................................................................................32
2.2.6.1 Configuring IPC ...................................................................................................................................................32
2.2.6.2 Adding VTO or Fence Station.......................................................................................................................34
2.2.7 Log........................................................................................................................................................................................34
2.2.7.1 Viewing System Log .........................................................................................................................................34
2.2.7.2 Viewing Call History .........................................................................................................................................35
2.2.7.3 Viewing Alarm Log ............................................................................................................................................35
2.2.8 Security ..............................................................................................................................................................................35
2.2.8.1 Security Status ....................................................................................................................................................35
2.2.8.2 Configuring System Service .........................................................................................................................36
2.2.8.3 Attack Defense ....................................................................................................................................................37
2.2.8.3.1 Configuring Firewall..............................................................................................................................37
2.2.8.3.2 Configuring Account Lockout...........................................................................................................38
2.2.8.3.3 Configuring Anti-DoS Attack ............................................................................................................39
2.2.8.4 Installing Device Certificate .........................................................................................................................40
2.2.8.4.1 Creating Certificate ................................................................................................................................40
2.2.8.4.2 Applying for and Importing CA Certificate ................................................................................41
2.2.8.4.3 Installing Existing Certificate ............................................................................................................43
2.2.8.5 Installing Trusted CA Certificate ................................................................................................................44
2.2.8.6 Configuring Video Encryption ....................................................................................................................44
3 Industrial Scenes .................................................................................................................................................................................46
3.1 Operations on Local Device ................................................................................................................................................46
3.1.1 Local Screen .....................................................................................................................................................................46
3.1.2 Configuring the Advanced Parameters .............................................................................................................47
3.1.3 Project Settings .............................................................................................................................................................47
V
3.1.3.1 Configuring VTS .................................................................................................................................................47
3.1.3.2 Configuring Protocols .....................................................................................................................................48
3.1.4 Commissioning ..............................................................................................................................................................48
3.1.4.1 Broadcasting ........................................................................................................................................................48
3.1.4.1.1 Broadcasting on Part of the Devices .............................................................................................48
3.1.4.1.2 Broadcasting on All Devices ..............................................................................................................50
3.1.4.2 Record ......................................................................................................................................................................50
3.1.4.3 Monitoring ............................................................................................................................................................52
3.2 Operations on Webpage ......................................................................................................................................................53
3.2.1 Configuring Device Role............................................................................................................................................53
3.2.2 Configuring FTP .............................................................................................................................................................54
3.2.3 Adding Devices ..............................................................................................................................................................54
3.2.3.1 Adding VTA ...........................................................................................................................................................54
3.2.3.2 Adding Lower-level VTS .................................................................................................................................56
3.2.4 Call Forwarding .............................................................................................................................................................56
3.2.4.1 Configuring Forwarding.................................................................................................................................56
3.2.4.2 Configuring Receiving.....................................................................................................................................57
Appendix 1 Cybersecurity Recommendations ........................................................................................................................58
VI
1 Initializing VTS
You can initialize VTS through the local device or through the webpage.
Procedure
Step 1 Power on the VTS.
Step 2 Select the language.
Step 3 Enter the password and e-mail address.
Step 4 Select I have read and agree to all the terms Privacy, Software License Agreement,
and then tap Next.
Step 5 Select the scene depending on your needs.
Prerequisites
Make sure that the computer is on the same network segment as VTS.
Procedure
Step 1 Enter the IP address of VTS in a browser, and then click Enter.
Step 2 Select the language.
Step 3 Select I have read and agree to the terms and conditions and accept privacy policy
1
and license agreement, and then click Next.
Step 4 Enter the password and e-mail address, and then click Done.
Step 5 Enter the username and password, and then click Log in.
Step 6 Select the scene, and then click OK.
2
2 Building Scenes
4
If you select Setting > Display Settings, and turn on Lock Screen, you need
to enter the default password 123456 to unlock the screen when you lock it
after the configuration.
5 The connection status of the network, the SIP server, and the SD card.
3
2.1.2 Configuring the Display Parameters
Configure the brightness and screen turn-off time. Turn on or turn off Lock Screen.
Procedure
Step 1 On the home screen, select Setting > .
Step 2 Configure the parameters.
Lock screen: After turning on the function, if you need to unlock the screen again, and then
enter the default password 123456.
Procedure
Step 1 On the home screen, select Setting > .
Step 2 Configure the parameters.
4
Figure 2-3 Sound settings
Procedure
Step 1 On the home screen, select Setting > .
Step 2 Configure the parameters.
5
Table 2-2 Description of intercom parameters
Parameter Description
The call from VTO stops ringing after the time
VTO Ringtone (s)
you set.
VTO automatically hangs up the call to VTS
VTO Call Limit (min)
after the time you set.
The call from VTH stops ringing after the time
VTH Ringtone (s)
you set.
VTH automatically hangs up the call to VTS
VTH Call Limit (min)
after the time you set.
The time that VTS monitor VTO and other
Monitoring Time (min)
devices.
Procedure
Step 1 On the home screen, select Setting > .
Step 2 Configure the parameters.
SD Card Status
System of numeration differs in Android system and Windows system
when converting the capacity. So the capacity of the SD card displayed
on VTS is larger than that displayed on the computer.
6
Parameter Description
Format SD Card Supports formatting the SD card.
Check the latest version through the interactions with the cloud, and
Cloud Update
then update online.
Restore to Default
Restore the display, sound and intercom settings to default settings.
Settings
Enter the initial password to enter the project settings screen. For
Project Settings
details, see "2.1.7 Project Settings".
Device Info View the legal information, version and security baseline version of VTS.
Prerequisites
Make sure that you have turned on Reset Info in Project Settings. For details, see "2.1.7.4 Resetting
Information".
Procedure
Step 1 On the home screen, select Setting > > Project Settings.
Step 2 Tap Forget password?, and then tap OK.
Step 3 Get the Security Code according to the instructions, and then enter the new password
and security code.
Step 4 Tap OK.
7
2.1.7 Project Settings
Procedure
Step 1 Select Settings > > Project Setting on the home screen.
Step 2 Enter the password that you configured during initialization and tap OK.
Step 3 Tap and configure the parameters.
8
Parameter Description
DNS 1 IP address of DNS server.
DNS 2 Standby IP address of DNS server.
Building No. ● If the platform is used as the SIP server, make sure that the
configuration status of building and unit number is the same on the
platform, VTS and VTO.
● If the VTO is used as the SIP server, make sure that the
enable/disable status of building and unit number is the same on
Unit No. VTS and VTO.
Procedure
Step 1 Select Setting > > Project Setting on the home screen.
Step 2 Enter the password and tap OK.
Step 3 Tap and configure the parameters.
9
Table 2-5 Parameters description
Parameter Description
IP Address IP address of SIP server.
Network port number of SIP server.
Network Port ● VTO as the SIP server: 5060.
● The platform as the SIP server: 5080.
Username Default.
Password Default.
Domain Name Keep consistent with the SIP server. Domain name is VDP by default.
Step 4 Tap Save.
Procedure
Step 1 Select Settings > > Project Setting on the home screen.
Step 2 Enter the password that you configured during initialization and tap OK.
Step 3 Select > Add device.
Step 4 Add devices.
● Add device one by one.
10
Figure 2-10 Add devices in batches
11
Device Type Parameter Description
Select main stream or sub stream.
● Main stream: Large stream has high definition, and
Stream Type occupies a large bandwidth. Used for local storage.
● Sub stream: Smooth image occupies a small
bandwidth. Used for low-bandwidth network
transmission.
Select the local protocol or ONVIF protocol depending
Protocol Type
on the IPC that you added.
The video is transferred in encryption when this function
Encryption
is turned on.
VTH supports displaying the image of connected IPC
Linkage
when VTS calls VTH if you turn on this function.
Step 5 Tap Save.
Procedure
Step 1 On the home screen, select Setting > > Project Settings.
Step 2 Enter the password that you configured during initialization, and then tap OK.
Step 3 Tap .
Step 4 Turn on Reset Password.
Step 5 Tap Bound Email to enter the e-mail address.
12
2.1.7.5 Debugging and Factory Defaults
Procedure
Step 1 On the home screen, select Setting > > Project Settings.
Step 2 Enter the password, and then tap OK.
Step 3 Tap , and then configure the functions.
2.1.8 Commissioning
2.1.8.1 Call
Call VTH
On the home screen of VTS, tap Phone, enter the number of VTH, and then tap .
13
If you use the gooseneck to talk, the recommended distance is between 5 cm to 10 cm.
14
Call history
On the home screen of VTS, tap Phone, and then tap to check all calls and missed calls.
● Tap the call on call history list to call back.
● : Check the snapshot files of the call.
● : Check the video files of the call.
Video files
Check or delete the video files that VTS recorded in monitoring or in the call.
15
Figure 2-16 Video files
Snapshot files
Check or delete the snapshot files that VTS recorded in monitoring or in the call.
2.1.8.3 Monitoring
Monitor VTO, fence station or IPC on VTS. The operations of monitoring IPC or fence stations are the
same with the operations of monitoring VTO. This section uses monitoring VTO as an example.
Prerequisites
Make sure that you have added VTO, fence station or IPC before you monitor them. For details, see
"2.1.7.3 Adding Devices".
16
Procedure
Step 1 On the home screen of VTS, tap Monitor.
Step 2 Tap the icon of VTO to monitor.
17
Icon Description
Call VTO and VTO directly receive the call without taping any icon.
Tap to start manual recording.
Tap to manually take snapshots.
Procedure
Step 1 Enter the IP address of VTS in a browser, and then press the Enter key.
Step 2 Enter the username and password.
● The default username of administrator is admin. The default password is the password
that you configured during initialization. We recommend you change the password on
a regular basis.
● If you forget the password, click Forgot password? to reset the password. For details,
see "2.2.2 Resetting Password".
Step 3 Click Login.
18
2.2.2 Resetting Password
Reset password through the e-mail address that you bound if you forget the password.
Procedure
Step 1 On the login page, click Forgot Password?
Step 2 Click OK on the pop-up window.
Step 3 Scan the QR code on the page, and then get the security code.
● Scan the same QR code, you can get at most two security codes. If you need to get the
security code again, refresh the QR code page.
● Receive the security code in e-mail. Use the security code in 24 hours to reset the
password, otherwise the security code is invalid.
● The account will be locked for 5 minutes if you enter the wrong security code 5 times in
a row.
Step 4 Enter the security code you received in the Security code text box.
Step 5 Click Next.
Step 6 Reset new password and confirm the new password.
The password must consist of 8 to 32 non-blank characters and contain at least two types
of characters among number, letter and common character (excluding space, ', ", ;, :, &).
Step 7 Click OK to reset password.
19
Figure 2-22 Home page
Procedure
Step 1 Log in to the webpage of the device.
Step 2 Select Network Settings > TCP/IP.
Step 3 Configure the parameters.
20
Figure 2-23 Configure the parameters
21
2.2.4.2 Configuring SIP Server
Configure the parameters of SIP server. Connect to VTO through SIP agreement to achieve video
intercom.
Procedure
Step 1 Log in to the webpage of VTS.
Step 2 Select Network Settings > SIP Server.
Step 3 Configure the parameters.
22
Log in to the webpage of VTS, and then select Network Settings > Basic Services.
● CGI: Used to transmit data between external applications and web servers. Turn on CGI to use CGI
commands.
● ONVIF: Turn on or turn off ONVIF protocol.
● Private Protocol Authentication Mode: Select Security Mode (Recommended) or Compatibility
Mode.
● ADB Debugging: Only used by testers.
Procedure
Step 1 Log in to the webpage of VTS.
Step 2 Select Network Settings > Auto Registration.
Step 3 Turn on Enable. Enter the server address, port number and sub-device ID.
23
Parameter Description
Port Port number that the server automatically registers.
The server distributes an ID for the device. Keep consistent with the ID
Sub-Device ID
registered on the server.
Procedure
Step 1 Log in to the webpage of VTS.
Step 2 Select System > General.
Step 3 Configure the parameters.
● You can configure the number from 101 to 999.
● Turn on the Building No. and Unit No. as needed.
Background Information
Procedure
Step 1 Log in to the webpage of VTS.
Step 2 Select System > Video.
Step 3 Configure the parameters.
24
Figure 2-28 Video parameters
25
2.2.5.3.1 Adding User
You are admin user by default. You can add users. Newly added users can only log in to the webpage
of VTS.
Procedure
Step 1 Log in to the webpage of VTS.
Step 2 Select System > Account.
Step 3 Click Add.
Step 4 Configure the parameters.
Related Operations
● Modify user information. Click to edit password, group of the added user.
26
For admin account, you can only edit the password.
● Delete user. Click to delete the added user.
Reset password through the e-mail address that you bound if you forget the password.
Procedure
Step 1 Log in to the webpage of VTS.
Step 2 Select System > Account.
Step 3 Click to enable Password Reset.
Step 4 Enter the email address and configure the password expiry period.
Password expires in x days: User-defined. If you select Never, the system does not remind
you to change the password.
You can add, delete ONVIF user, and change their passwords. The default ONVIF user is admin.
Procedure
Step 1 Log in to the webpage of VTS.
Step 2 Select System > Account > ONVIF User.
Step 3 Click Add.
Step 4 Configure the parameters.
27
Figure 2-31 Add ONVIF user
Related Operations
● Modify user information. Click to edit password, group of the added user.
28
Figure 2-32 Online user
Procedure
Step 1 Log in to the webpage of VTS.
Step 2 Select System > Time.
Step 3 Configure the parameters.
29
2.2.5.6 Configuring Maintenance
Configure the auto restarting time so that the VTS can restart automatically to improve the running
speed.
Procedure
Step 1 Log in to the webpage of VTS.
Step 2 Select System > Maintenance.
Step 3 Configure Restart Time.
Related Operations
Click Restart to restart VTS.
30
2.2.5.7.1 Import/Export Configuration File
Import or export the system configuration file. Use configuration backup file when many devices
need the same parameters configuration.
This function will restore the device to default configuration or factory settings. The data will be lost.
Operate it carefully.
● Factory Defaults: All the configurations are restored to factory settings. Device information and
user information will be cleared.
● Restore to Default (Except for User Info and Logs): All the configurations except user
information and logs are recovered to default.
2.2.5.8 Updating
Background Information
● Do not power off the device or the network, restart of turn off the device.
● If wrong upgrade file has been used, restart the device; otherwise some functions might not work
properly.
● Degrade has potential security risks. Operate it carefully.
Procedure
Step 1 Log in to the webpage of VTS.
Step 2 Select System > Update.
Step 3 Select the updating mode as needed.
● File update
1. Click Browse, and then upload updating file. The updating file should be a .bin file.
2. Click Update.
● Online update
Get the new version through auto check or manual check. Click Update Now.
31
◇ Auto check: Click Auto Check. The system automatically checks the new version
once everyday, and remind you if there is a new version.
We will collect IP address, device name, hardware version, device serial number and
other device information to inform you update in time. The information collected
are only used for verification of the device legitimacy and for notification of the
updating.
◇ Manual check: Click Manual Check to manually check the new version of the
system.
Procedure
Step 1 Log in to the webpage of VTS.
Step 2 Select Device Setting > IPC Info.
Step 3 Click to configure the parameters of IPC.
32
Figure 2-36 Configure IPC
33
2.2.6.2 Adding VTO or Fence Station
Procedure
Step 1 Log in to the webpage of VTS.
Step 2 Select Device Setting > Device Setting > All.
Step 3 Click Add.
Step 4 Configure the parameters.
You can select door station or fence station.
Related Operations
● Export: Export the device information.
● Import: Import the file to the current device to add devices in batches. The file must be exported
from the device in the same model.
2.2.7 Log
Procedure
Step 1 Log in to the webpage of VTS.
Step 2 Select Log > Log.
Step 3 Select the log type, configure the time range, and then click .
34
● Click Export to export the log to the local computer. If you select Encrypt Log Backup,
enter the encryption password, and then export the log.
● Click to view the log information.
Procedure
Step 1 Log in to the webpage of VTS.
Step 2 Select Log > Call History.
Step 3 (Optional) Click Export to export the call history to local computer.
Procedure
Step 1 Log in to the webpage of VTS.
Step 2 Select Log > Log.
Step 3 Select the log type, configure the time range, and then click .
2.2.8 Security
35
Figure 2-39 Security status
Hover over the detection item to view the configuration of the current detection.
Background Information
Create a certificate or upload an authenticated certificate, and then you can log in through HTTPS
with your PC. The HTTPS can protect page authenticity on all types of websites, secure accounts, and
keep user communications, identity, and web browsing private.
We recommend you enable the HTTPS. Otherwise, the device data may be leaked.
Procedure
Step 1 Log in to the webpage of VTS.
Step 2 Select Security > System Service.
Step 3 Click to enable HTTPS.
36
If you turn on Compatible with TLSv1.1 and earlier versions, there might be security
risks. Please select carefully.
Step 4 Select the certificate.
If there is no certificate in the list, click Certificate Management at the left navigation bar.
For details, see "2.2.8.4 Installing Device Certificate".
Result
Enter https://IPaddress: https port in the browser.
● If you have already installed the certificate, the normal login page will be displayed.
● If you have not installed the certificate, the browser displays a certificate error message.
Procedure
Step 1 Log in to the webpage of VTS.
Step 2 Select Security > Attack Defense > Firewall.
Step 3 Click to enable the firewall function.
37
Step 4 Select Allowlist or Blocklist as the mode.
● Allowlist: Only when the IP/MAC address of your PC is in the allowlist, can you access
VTS. Ports are the same.
● Blocklist: When the IP/MAC address of your PC is in the blocklist, you cannot access VTS.
Ports are the same.
Step 5 Click Add to add the host IP/MAC address to Allowlist or Blocklist, and then click OK.
Related Operations
● Click to edit the host information.
● Click to delete the host information.
If you consecutively enter a wrong password more than the configured value, the account will be
locked.
Procedure
Step 1 Log in to the webpage of VTS.
Step 2 Select Security > Attack Defense > Account Lockout.
38
Step 3 Configure the login attempt and lock time for device account and ONVIF user.
● Login attempt: Upper limit of login attempts. If you consecutively enter a wrong
password more than the defined value, the account will be locked.
● Lock time: The period during which you cannot log in after the login attempts reaches
upper limit.
You can enable SYN Flood Attack Defense and ICMP Flood Attack Defense to defend the device
against DoS (Denial of Service) attack.
Procedure
Step 1 Log in to the webpage of VTS.
Step 2 Select Security > Attack Defense > Anti-DoS Attack.
Step 3 Select SYN Flood Attack Defense or ICMP Flood Attack Defense to defend the device
against DoS (Denial of Service) attack.
39
Figure 2-44 Anti-DoS Attack
Procedure
Step 1 Log in to the webpage of VTS.
Step 2 Select Security > CA Certificate > Device Certificate.
Step 3 Click Install Device Certificate.
Step 4 Select Create Certificate, and then click Next.
Step 5 Enter the certificate information.
IP or domain name of the device is automatically entered in IP/Domain Name.
40
Figure 2-45 Certificate Information (1)
Related Operations
● Click Enter Edit Mode to edit the custom name of the certificate.
● Click to download the certificate.
● Click to delete the certificate.
Procedure
Step 1 Log in to the webpage of VTS.
Step 2 Select Security > CA Certificate > Device Certificate.
Step 3 Click Install Device Certificate.
Step 4 Select Apply for CA Certificate and Import (Recommended), and then click Next.
Step 5 Enter the certificate information.
IP or domain name of the device is automatically entered in IP/Domain Name.
41
Figure 2-46 Certificate information (2)
42
● Click Import Later to import the certificate next time.
Related Operations
● Click Enter Edit Mode to edit the custom name of the certificate.
● Click to download the certificate.
● Click to delete the certificate.
Import the existing third-party certificate to the device. When apply for the third-party certificate,
you also need to apply for the private key file and private key password.
Procedure
Step 1 Log in to the webpage of VTS.
Step 2 Select Security > CA Certificate > Device Certificate.
Step 3 Click Install Device Certificate.
Step 4 Select Install Existing Certificate, and then click Next.
Step 5 Click Browse to select the certificate and private key file.
Enter the private key password if the private key file is encrypted.
Related Operations
● Click Enter Edit Mode to edit the custom name of the certificate.
● Click to download the certificate.
● Click to delete the certificate.
43
2.2.8.5 Installing Trusted CA Certificate
CA certificate is a digital certificate for the legal identity of the camera. For example, when the
camera accesses the LAN through 802.1x, the CA certificate is required.
Procedure
Step 1 Log in to the webpage of VTS.
Step 2 Select Security > CA Certificate > Trusted CA Certificate.
Step 3 Click Install Trusted Certificate.
Related Operations
● Click Enter Edit Mode to edit the custom name of the certificate.
● Click to download the certificate.
● Click to delete the certificate.
Background Information
We recommend you enable video encryption function. There might be safety risk if this function is
disabled.
Procedure
Step 1 Log in to the webpage of VTS.
Step 2 Select Security > Video Encryption.
Step 3 Configure the parameters.
44
Figure 2-50 Video encryption
45
3 Industrial Scenes
46
No. Description
Tap to lock the screen.
4
If you select Setting > Display Settings, and turn on Lock Screen, you need
to enter the default password 123456 to unlock the screen when you lock it
after the configuration.
5 The connection status of the network, the SIP server, and the SD card.
Procedure
Step 1 Select Settings > > Project Setting on the home screen.
Step 2 Enter the password, and then tap OK.
Step 3 Tap , and then configure the parameters.
47
3.1.3.2 Configuring Protocols
Procedure
Step 1 Select Settings > > Project Setting on the home screen.
Step 2 Enter the password, and then tap OK.
Step 3 Tap , and then configure the parameters.
● If VTS does not need the platform to connect, select Private Protocol.
● If VTS is connected to the platform through SIP agreement, select SIP Server, and then
configure the parameters.
3.1.4 Commissioning
3.1.4.1 Broadcasting
Play the voice or manual broadcasting on part of terminal devices or all terminal devices.
Procedure
Step 1 Tap Broadcast on the home screen of VTS.
Step 2 Select the terminal devices, and then tap OK.
48
Figure 3-2 Select the terminal devices
49
Figure 3-4 Manual broadcasting
Procedure
Step 1 Tap Broadcast on the home screen of VTS.
Step 2 Tap Select All Devices.
Step 3 Select Broadcast Type, and then start broadcast.
● Audio File: Select the audio in the audio file list, and then tap Start Broadcast to play
the audio.
● Manual Broadcast: Tap Start Broadcast, and then tap to broadcast.
3.1.4.2 Record
Check the call history, the missed call records, video files and snapshot files.
Call History
● Tap the call on call history list to call back.
● : Check the snapshot files of the call.
● : Check the video files of the call.
50
Figure 3-5 Call history
Video
Figure 3-6 Video files
51
Snapshot
Figure 3-7 Snapshot files
3.1.4.3 Monitoring
● VTS as the lower-level VTS: You can monitor and call VTA. IPC and VTA receive the call.
● VTS as the upper-level VTS: You can monitor and call VTA.
Use monitoring VTA as an example.
Tap Monitor on the home screen of VTS, and then tap the icon of VTA.
52
Table 3-4 Monitoring image description
Icon Description
Tap to view the monitoring image in 4 windows.
Tap to convert to monitoring image of other terminal devices if VTS
connects more than one terminal devices.
Tap to receive the audio from VTA.
Talk with the peer device.
Tap to start manual recording.
Tap to manually snapshot.
Control the alarm indicator of VTA.
● : The alarm indicator is on.
● : The alarm indicator is off.
Procedure
Step 1 Log in to the webpage of the device.
Step 2 Select System > General.
Step 3 Configure the parameters.
53
Table 3-5 Description of the device role parameters
Parameter Description
Select from lower-level VTS, upper-level VTS and platform client. The
information saved on the device will be cleared after you change the
device role.
● Lower-level VTS: Used as the lower-level VTS if there is no platform.
It has the management permission of the device.
Device role
● Upper-level VTS: Used as the upper-level VTS if there is no platform.
It has permissions to add lower-level VTS. It does not have
permission to manage organizational structure.
● Platform client: Used as the platform client if there is the platform. It
does not have the management permission of the device.
Device name You can configure the name that distinguishes the device.
Device No. You can configure the number from 101 to 999.
Step 4 Click Apply.
Procedure
Step 1 Log in to the webpage.
Step 2 Select Network Settings > FTP.
Step 3 Turn on Enable, and then configure the parameters.
Step 4 Click Apply.
Procedure
Step 1 Log in to the webpage of VTS.
Step 2 Select Device Setting > Terminal Management.
Step 3 Click Add, and then configure the parameters.
54
Figure 3-10 Add VTA
55
3.2.3.2 Adding Lower-level VTS
Procedure
Step 1 Log in to the webpage of the device.
Step 2 Select Device Setting > Terminal Management.
Step 3 Click Add.
Step 4 Enter IP address, username and password of the VTS.
Procedure
Step 1 Log in to the webpage.
Step 2 Select Device Setting > Call Forwarding > Forwarding.
Step 3 Click Add.
Step 4 Configure the parameters.
56
Figure 3-12 Add the VTS for forwarding the call
Procedure
Step 1 Log in to the webpage.
Step 2 Select Device Setting > Call Forwarding > Receiving.
Step 3 Click Add.
Step 4 Enter the IP address, username and password of other VTS.
Step 5 Click OK.
57
Appendix 1 Cybersecurity Recommendations
58
the risk of ARP spoofing.
8. Assign Accounts and Privileges Reasonably
According to business and management requirements, reasonably add users and assign a
minimum set of permissions to them.
9. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to
reduce risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to the
following services:
● SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.
● SMTP: Choose TLS to access mailbox server.
● FTP: Choose SFTP, and set up strong passwords.
● AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords.
10. Audio and Video Encrypted Transmission
If your audio and video data contents are very important or sensitive, we recommend that you
use encrypted transmission function, to reduce the risk of audio and video data being stolen
during transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.
11. Secure Auditing
● Check online users: we suggest that you check online users regularly to see if the device is
logged in without authorization.
● Check device log: By viewing the logs, you can know the IP addresses that were used to log in
to your devices and their key operations.
12. Network Log
Due to the limited storage capacity of the device, the stored log is limited. If you need to save the
log for a long time, it is recommended that you enable the network log function to ensure that
the critical logs are synchronized to the network log server for tracing.
13. Construct a Safe Network Environment
In order to better ensure the safety of device and reduce potential cyber risks, we recommend:
● Disable the port mapping function of the router to avoid direct access to the intranet devices
from external network.
● The network should be partitioned and isolated according to the actual network needs. If
there are no communication requirements between two sub networks, it is suggested to use
VLAN, network GAP and other technologies to partition the network, so as to achieve the
network isolation effect.
● Establish the 802.1x access authentication system to reduce the risk of unauthorized access to
private networks.
● Enable IP/MAC address filtering function to limit the range of hosts allowed to access the
device.
59