You are on page 1of 23

Emergency Phone Tower

User's Manual

V2.0.0
Foreword

General
This manual introduces the installation, functions and operations of the emergency phone tower.
Read carefully before using the device, and keep the manual safe for future reference.

Safety Instructions
The following signal words might appear in the manual.
Signal Words Meaning

Indicates a high potential hazard which, if not avoided, will result in


DANGER death or serious injury.

Indicates a medium or low potential hazard which, if not avoided,


WARNING could result in slight or moderate injury.

Indicates a potential risk which, if not avoided, could result in


property damage, data loss, reductions in performance, or
CAUTION unpredictable results.

TIPS Provides methods to help you solve a problem or save time.

NOTE Provides additional information as a supplement to the text.

Revision History
Version Revision Content Release Time
● Updated images of external alternating current
connecting.
V2.0.0 February 2022
● Updated user management.
● Optimized language.
V1.0.0 First release. October 2020

Privacy Protection Notice


As the device user or data controller, you might collect the personal data of others such as their face,
fingerprints, and license plate number. You need to be in compliance with your local privacy
protection laws and regulations to protect the legitimate rights and interests of other people by
implementing measures which include but are not limited: Providing clear and visible identification
to inform people of the existence of the surveillance area and provide required contact information.

About the Manual


● The manual is for reference only. Slight differences might be found between the manual and the
product.
● We are not liable for losses incurred due to operating the product in ways that are not in
compliance with the manual.

I
● The manual will be updated according to the latest laws and regulations of related jurisdictions.
For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or visit
our official website. The manual is for reference only. Slight differences might be found between
the electronic version and the paper version.
● All designs and software are subject to change without prior written notice. Product updates
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
● There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation.
● Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
● All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
● Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
● If there is any uncertainty or controversy, we reserve the right of final explanation.

II
Important Safeguards and Warnings

This section introduces content covering the proper handling of the device, hazard prevention, and
prevention of property damage. Read carefully before using the device, and comply with the
guidelines when using it.

Operation Requirements

● Make sure that the power supply of the device works properly before use.
● Do not pull out the power cable of the device while it is powered on.
● Only use the device within the rated power range.
● Transport, use and store the device under allowed humidity and temperature conditions.
● Prevent liquids from splashing or dripping on the device. Make sure that there are no objects
filled with liquid on top of the device to avoid liquids flowing into it.
● Do not disassemble the device.

Installation Requirements

● Connect the device to the adapter before power on.


● Strictly abide by local electrical safety standards, and make sure that the voltage in the area is
steady and conforms to the power requirements of the device.
● Do not connect the device to more than one power supply. Otherwise, the device might become
damaged.

● Observe all safety procedures and wear required protective device provided for your use while
working at heights.
● Do not expose the device to direct sunlight or heat sources.
● Do not install the device in humid, dusty or smoky places.
● Install the device in a well-ventilated place, and do not block the ventilator of the device.
● Use the power adapter or case power supply provided by the device manufacturer.
● Connect class I electrical appliances to a power socket with protective earthing.

III
Table of Contents
Foreword ........................................................................................................................................................................................................I
Important Safeguards and Warnings............................................................................................................................................ III
1 Overview ................................................................................................................................................................................................... 1
2 Structure ................................................................................................................................................................................................... 2
2.1 Front Panel.................................................................................................................................................................................... 2
2.2 Rear Panel ...................................................................................................................................................................................... 3
3 Network Diagram ................................................................................................................................................................................. 4
4 Installation ............................................................................................................................................................................................... 5
4.1 Bolt Specification ....................................................................................................................................................................... 5
4.2 Dimensions ................................................................................................................................................................................... 5
4.3 Installation Procedures........................................................................................................................................................... 5
5 Wiring ......................................................................................................................................................................................................... 7
6 Web Configurations ............................................................................................................................................................................ 9
6.1 System Login and Logout ...................................................................................................................................................... 9
6.1.1 System Login..................................................................................................................................................................... 9
6.1.2 System Logout ...............................................................................................................................................................10
6.2 System Configurations .........................................................................................................................................................10
6.2.1 Local Configurations ...................................................................................................................................................10
6.2.1.1 Local..........................................................................................................................................................................10
6.2.1.2 System Time .........................................................................................................................................................11
6.2.1.3 Manager.................................................................................................................................................................. 11
6.2.2 Alarm Configurations .................................................................................................................................................12
6.2.3 Network Configuration ..............................................................................................................................................12
6.2.4 Configuring Videos ......................................................................................................................................................12
6.2.4.1 Video ........................................................................................................................................................................12
6.2.4.2 Audio ........................................................................................................................................................................14
6.2.5 User Management ........................................................................................................................................................14
Appendix 1 Technical Specification ..............................................................................................................................................16
Appendix 2 Cybersecurity Recommendations ........................................................................................................................17

IV
1 Overview

The emergency phone tower can be connected to the DSS platform, and configured on the web
interface.
● 1 button with an indicator that supports panic alarm.
● The platform can take videos, snapshots and monitor the alarm terminal.
● The platform can broadcast to multiple alarm terminals simultaneously.
● Swipe card during tour and patrol.
● Supports expanding its functions by connecting with the IPC, speed dome and snapshot camera.
● Dot matrix display can be connected to show information.
● Measure speed with its built-in radar (only applicable to some models).
● Remote unlock (customizable) and local unlock with key.

1
2 Structure

2.1 Front Panel


Figure 2-1 Front panel

Table 2-1 Front panel component description


No. Component Description
1 Alarm light Indicates when an alarm is triggered.
2 Camera Captures visual images in front of the alarm terminal.
3 Illuminator Provides IR light for dark environments.
Provides lighting for front panel, in order to facilitate operation
4 Flash light
at night.
5 Speaker Audio output.
Supports IC card recognition. Tour or patrol personnel can swipe
6 Card swiping area
their cards here.
7 Microphone Audio input.
Press the button to call the management center in an
8 Alarm button
emergency.

2
2.2 Rear Panel
Figure 2-2 Rear panel

Table 2-2 Rear panel component description


No. Component Description
Open the maintenance compartment to perform
1 Maintenance compartment
maintenance on the internal device.
2 Tool compartment Store tools.

3
3 Network Diagram

Following is a network diagram of the emergency phone tower and DSS platform.

Figure 3-1 Network diagram

4
4 Installation

● Do not install the emergency phone tower in bad environment with condensation, high
temperature, stain, dust and chemical corrosion.
● Installation and debugging must be done by professional teams. Do not dismantle or repair the
device by yourself to avoid damaging the device.

4.1 Bolt Specification


Use 4 × M20 bolt to install the emergency phone tower.

4.2 Dimensions
Before installation, make sure you know the dimensions of the pedestal and the space between the
screw holes.

Each screw hole is 24 mm in diameter, so the reinforced steel bar going through the hole must be 20
mm in diameter.

Figure 4-1 Dimensions (unit: mm)

4.3 Installation Procedures

We recommend you follow the industry standards when installing the emergency phone tower.
Step 1 Select the installation location of the emergency phone tower according to the

5
construction drawings.

During selection, we recommend you consider conditions, such as wiring, drainage and
ventilation.
Step 2 Dig a groove.
Step 3 Embed the pipes.
Step 4 Build the foundation.

Figure 4-2 Build the foundation (unit: mm)

1) At the bottom of the foundation, lay gravel down to about 100 mm high.
2) Fill in C25 cement. The length, height and width of the cement must not be lower than
800 mm.

The length, width and depth of the foundation must be adjusted to meet the
requirements of the texture of the soil. 800 mm is just for your reference.
3) On C25 concrete, insert four 20 mm reinforced steel bars according to the spacing of
the screw holes.
4) Guide the reinforced steel bars through the 8 mm steel plate and attach them.

Make sure to drill holes in advance according to the positions of the screw holes.
Step 5 Lay cables.
Step 6 Carry out insulation test.
Step 7 Install the emergency phone tower.
Guide the 20 mm reinforced steel bars through the 4 holes on the pedestal, and then
tighten and attach them with the M20 bolts.

6
5 Wiring

Internal modules were connected to the device before it left the factory. If you need to add a speed
dome, radar or display modules, you need to select a proper power supply in the terminal and
connect the network cable. For the basic type of emergency phone tower, you only need to connect
external alternating current and an external network. This section uses wiring of the basic type as an
example.
Step 1 Connect external alternating current.

Before wiring, make sure that the air switch is OFF. After the device has been correctly
wired, turn on the air switch, and the emergency phone tower will be powered on.
Connect municipal power to number 1 and 2. The number 11 earthing line must be
connected. For details, see Figure 5-1.

Number 3 and 4 were connected with the lightning arrester before leaving the factory.

Figure 5-1 Connect external alternating current

Step 2 Connect external network.


● Wired connection: For the wired connection, connect the external network with IN port
(number 4) in Figure 5-1. Then lead a network cable from OUT port (number 7) in Figure
5-1 to gigabit port (number 2) in Figure 5-2.
● Fiber connection: If an optical fiber is laid, connect the external network to the optical
fiber port (number 3) in Figure 5-2.

The emergency phone tower supports optical fiber input. At both ends of the optical

7
fiber, you need to match the bandwidth of the optical modules with the waveband that
sends and receives signals. Otherwise, network will go wrong.

Figure 5-2 Network input port

Table 5-1 Network input port description


No. Component Description
Internal switch port, which is maximum 100 M.
1 100 M network port The intercom and dome modules were connected to the 100 M
port before the device left the factory.
2 1000 M network port External wired network input port. Supports 1000 M.
External optical fiber network input port.
Optical fiber Supports connection with single fiber and dual fiber optical
3
indicator module. The external optical fiber and optical module port is LC
port. For details, see Figure 5-3.
4 Network indicator Flashes green when optical fiber communication is normal.
5 Power indicator Solid green when the device is power on.

Figure 5-3 Single fiber or dual fiber optical module port

8
6 Web Configurations

This section introduces the parameters of the emergency phone tower and how to configure them
on the web page.

Some operations of the emergency phone tower are available on the platform. For platform
operations, see the corresponding user’s manual of the platform.

6.1 System Login and Logout

6.1.1 System Login

Before you log in, make sure that the computer and the emergency phone tower are on the same
network.
Step 1 Open the browser, enter the default IP address of the emergency phone tower in the
address bar, and then press the Enter key.

Figure 6-1 Login

For IP address configuration, see "6.2.3 Network Configuration".


Step 2 Enter the username and password.
Step 3 Click Login.

The factory default IP address is 192.168.1.110, and default username and password is
admin and admin. When logging in for the first time, you need to modify the password. For
details, see "6.2.5 User Management".

9
6.1.2 System Logout
On the System Logout page, you can restart the emergency phone tower or log out. Click Logout,
and then the system will go back to the Login page.
Click Logout, and then the system will go back to the Login page.

6.2 System Configurations

6.2.1 Local Configurations


On the Local Config page, you can configure local parameters, system time and manager.

6.2.1.1 Local
Select System Config > Local Config > Local Config, and then you can configure the parameters
such as sensor, illuminator brightness and restart date.

Figure 6-2 Local config

Table 6-1 Local config parameter


Parameter Description
Sensor Turn on the illuminator when it is relatively dark.
The brightness of the illuminator can be adjusted from 0 to 5.
Brightness of fill light 0 means the illuminator is turned off. The larger the number is, the
brighter the illuminator becomes.
Set the auto reboot time of the device. It is 2 a.m. on Tuesday by
Reboot Date
default.
Version Info Display software version number.
Device Name Set the device name.
Click Default, number on the System Config > Local Config > Local
Default
Config page will restore default values.
Refresh Click Refresh to refresh information on the present page.
OK Click OK to confirm modifications on the present page.

10
6.2.1.2 System Time
Select System Config > Local Config > System Time, and then you can set date format, time
format and system time.

Figure 6-3 System time

Table 6-2 System time parameter


Parameter Description
Select the date display format from Year-Month-Day, Month-Day-
Date Format
Year and Day-Month-Year.
Select the time display format from 12-Hour Standard or 24-Hour
Time Format
Standard.
System Time Set the system display time.
Click Sync PC to synchronize the system time and the local computer
Sync time
time.
Refresh Click Refresh to refresh information on the present page.
OK Click OK to confirm modifications on the present page.

6.2.1.3 Manager
Select System Config > Local Config > Config Manager, and then you can export and import files,
and restore the device to its factory settings.

Figure 6-4 Configure manager

11
Table 6-3 Manager parameters
Parameter Description
Click Export Config to export configuration files and save them to the
Export Config local device. Once exported, you can restore the configurations or export
them to other devices.
Click Import Config to import the configuration files to the device. Once
Import Config
imported, you can restore or synchronize data.
Click Factory Default. All configurations will be restored to factory
Default All
defaults.

6.2.2 Alarm Configurations


Select System Config > Alarm Device Config, and then you can configure speed measure limit and
speed upper limit if the emergency phone tower has a built-in radar to measure speed.
You can configure the 1st row and 2nd row of the display when the dot matrix display is connected.

6.2.3 Network Configuration


Select System Config > Network Config, and then you can configure IP address, subnet mask,
gateway and DNS address.

6.2.4 Configuring Videos


Video settings include configuring videos and audios.

6.2.4.1 Video
Select System Config > Video Set > Video Set, and then you can configure the brightness, contrast,
hue, saturation and scene mode of the surveillance video from the camera.

Figure 6-5 Video

If the plug-in has not been installed, follow the on-screen instructions to install it.

12
Table 6-4 Video parameter description
Parameter Description
Adjust the resolution of videos, including 720P,
Video Format
WVGA, D1 and QVGA.
Main Format
Adjust the image transmission speed. You can select
Format Rate
from Split 25 and 30 frame.
Adjust the resolution of videos, including WVGA, D1
Video Format
and QVGA.
Adjust the image transmission speed. You can select
Frame Rate
Extra Format from 25 and 30 frame.
Select according to the actual access network. You
Bitrate can select from 256 kbps, 1 Mbps, 2 Mbps, and 3
Mbps.
Brightness Adjust the brightness of video.
Contrast Adjust the brightness ratio from light to dark.
Hue Adjust the video image hue.
Saturation Adjust the image saturation.
Adjust the brightness of the video. Configuring the
Gain Auto gain limit to be too high will result in the image
having too much noise.
Set the weather mode of the device to Automatic,
Scene Mode
Sunny, Night or Disabled.
Set the day and night mode of the device to
Day/Night Mode
Automatic, Black and White, or Colorful.
There are four types:
● Backlight: Increase the brightness of the entire
image.
● Wide dynamic: Reduce the lighting of areas are
too bright, and increase the lighting of areas that
Backlight Mode
are too dark.
● Backlight compensation: Reduces the
brightness of areas to make the image clearer,
without affecting dark parts.
● Disabled: No backlight.
Select On, and then the image will be turned
Mirror
horizontally.
Select On, and then the image will be turned
Flip
vertically.
Select On, and then the video window displays the
Display Time
date and time.
Click Default. All the parameters on the Video Set
Default
page will be restored to their defaults.

13
6.2.4.2 Audio
Select System Config > Video Set > Audio Set, and then you can adjust the microphone and beep
volume with the slider.

Figure 6-6 Audio

6.2.5 User Management


You can add and delete users or modify user's password as needed.

Procedure
Step 1 Select System Config > User Manager.
Step 2 Click Add User.
The Add User window is displayed.
Step 3 Configure the parameters.
At present, the system supports two types of user groups: admin and user. With higher
authority, admin can view, edit and delete system configuration. User has authority to view
system configuration only.

Figure 6-7 Add a user

Step 4 Click OK.

14
Figure 6-8 Added user successfully

Related Operations
● Delete a user
Click to delete the user.
● Modify the password
Click , select Change Password, and then enter the old and new password to modify the
password.

15
Appendix 1 Technical Specification

Appendix Table 1-1 Technical specification


Parameter Description
Operating system Embedded LINUX operating system.
1 alarm light is normally on at night. It flashes when
Alarm light
Alarm an alarm is triggered.
light/siren Optional. 1 siren works with alarm light to release an
Siren
alarm sound.
Alarm input 2-ch, realize alarm linkage.
Alarm
Alarm output 2-ch, realize alarm linkage.
Camera 1.3 MP CMOS HD camera.
Lens Pinhole, higher Vandal-proof level.
Weak light Automatic weak light compensation. Illumination
compensation distance is no lower than 0.5 m.
Video
DNR (digital noise reduction), WDR (wide dynamic
Video optimization
range) and backlight compensation.
Overlay the channel name or network name onto the
Character overlay
video.
Mode Bilateral video intercom.
Input Omni-directional microphone.
Audio Built-in high-quality speaker, able to connect to the
Output
external active sound box and speaker.
Audio enhancement Echo suppression and DNR (digital noise reduction)
Material 2 mm high-strength SGCC cold rolled steel plate.
Vandal-proof IK 10
Waterproof and
IP65
dustproof
Protection Tamper resistant Yes
Performance
Burglary-resisting Yes
Damp-proof Yes
Lightning protection Yes
Power supply 176-264 VAC@47-63 Hz
VTA8111A: 80 W
Power consumption
Specification With speed dome: 40 W (6-inch speed dome)
Working Temperature: –40 °C to +60 °C
environment Humidity: 10%–95% (RH)

16
Appendix 2 Cybersecurity Recommendations

Mandatory actions to be taken for basic device network security:


1. Use Strong Passwords
Please refer to the following suggestions to set passwords:
● The length should not be less than 8 characters.
● Include at least two types of characters; character types include upper and lower case letters,
numbers and symbols.
● Do not contain the account name or the account name in reverse order.
● Do not use continuous characters, such as 123, abc, etc.
● Do not use overlapped characters, such as 111, aaa, etc.
2. Update Firmware and Client Software in Time
● According to the standard procedure in Tech-industry, we recommend to keep your device
(such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is equipped with
the latest security patches and fixes. When the device is connected to the public network, it is
recommended to enable the “auto-check for updates” function to obtain timely information
of firmware updates released by the manufacturer.
● We suggest that you download and use the latest version of client software.
"Nice to have" recommendations to improve your device network security:
1. Physical Protection
We suggest that you perform physical protection to device, especially storage devices. For
example, place the device in a special computer room and cabinet, and implement well-done
access control permission and key management to prevent unauthorized personnel from
carrying out physical contacts such as damaging hardware, unauthorized connection of
removable device (such as USB flash disk, serial port), etc.
2. Change Passwords Regularly
We suggest that you change passwords regularly to reduce the risk of being guessed or cracked.
3. Set and Update Passwords Reset Information Timely
The device supports password reset function. Please set up related information for password
reset in time, including the end user’s mailbox and password protection questions. If the
information changes, please modify it in time. When setting password protection questions, it is
suggested not to use those that can be easily guessed.
4. Enable Account Lock
The account lock feature is enabled by default, and we recommend you to keep it on to
guarantee the account security. If an attacker attempts to log in with the wrong password several
times, the corresponding account and the source IP address will be locked.
5. Change Default HTTP and Other Service Ports
We suggest you to change default HTTP and other service ports into any set of numbers between
1024–65535, reducing the risk of outsiders being able to guess which ports you are using.
6. Enable HTTPS
We suggest you to enable HTTPS, so that you visit Web service through a secure communication
channel.
7. MAC Address Binding
We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing

17
the risk of ARP spoofing.
8. Assign Accounts and Privileges Reasonably
According to business and management requirements, reasonably add users and assign a
minimum set of permissions to them.
9. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to
reduce risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to the
following services:
● SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.
● SMTP: Choose TLS to access mailbox server.
● FTP: Choose SFTP, and set up strong passwords.
● AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords.
10. Audio and Video Encrypted Transmission
If your audio and video data contents are very important or sensitive, we recommend that you
use encrypted transmission function, to reduce the risk of audio and video data being stolen
during transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.
11. Secure Auditing
● Check online users: we suggest that you check online users regularly to see if the device is
logged in without authorization.
● Check device log: By viewing the logs, you can know the IP addresses that were used to log in
to your devices and their key operations.
12. Network Log
Due to the limited storage capacity of the device, the stored log is limited. If you need to save the
log for a long time, it is recommended that you enable the network log function to ensure that
the critical logs are synchronized to the network log server for tracing.
13. Construct a Safe Network Environment
In order to better ensure the safety of device and reduce potential cyber risks, we recommend:
● Disable the port mapping function of the router to avoid direct access to the intranet devices
from external network.
● The network should be partitioned and isolated according to the actual network needs. If
there are no communication requirements between two sub networks, it is suggested to use
VLAN, network GAP and other technologies to partition the network, so as to achieve the
network isolation effect.
● Establish the 802.1x access authentication system to reduce the risk of unauthorized access to
private networks.
● Enable IP/MAC address filtering function to limit the range of hosts allowed to access the
device.

18

You might also like