Professional Documents
Culture Documents
Emergency Phone Tower: User's Manual
Emergency Phone Tower: User's Manual
User's Manual
V2.0.0
Foreword
General
This manual introduces the installation, functions and operations of the emergency phone tower.
Read carefully before using the device, and keep the manual safe for future reference.
Safety Instructions
The following signal words might appear in the manual.
Signal Words Meaning
Revision History
Version Revision Content Release Time
● Updated images of external alternating current
connecting.
V2.0.0 February 2022
● Updated user management.
● Optimized language.
V1.0.0 First release. October 2020
I
● The manual will be updated according to the latest laws and regulations of related jurisdictions.
For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or visit
our official website. The manual is for reference only. Slight differences might be found between
the electronic version and the paper version.
● All designs and software are subject to change without prior written notice. Product updates
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
● There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation.
● Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
● All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
● Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
● If there is any uncertainty or controversy, we reserve the right of final explanation.
II
Important Safeguards and Warnings
This section introduces content covering the proper handling of the device, hazard prevention, and
prevention of property damage. Read carefully before using the device, and comply with the
guidelines when using it.
Operation Requirements
● Make sure that the power supply of the device works properly before use.
● Do not pull out the power cable of the device while it is powered on.
● Only use the device within the rated power range.
● Transport, use and store the device under allowed humidity and temperature conditions.
● Prevent liquids from splashing or dripping on the device. Make sure that there are no objects
filled with liquid on top of the device to avoid liquids flowing into it.
● Do not disassemble the device.
Installation Requirements
● Observe all safety procedures and wear required protective device provided for your use while
working at heights.
● Do not expose the device to direct sunlight or heat sources.
● Do not install the device in humid, dusty or smoky places.
● Install the device in a well-ventilated place, and do not block the ventilator of the device.
● Use the power adapter or case power supply provided by the device manufacturer.
● Connect class I electrical appliances to a power socket with protective earthing.
III
Table of Contents
Foreword ........................................................................................................................................................................................................I
Important Safeguards and Warnings............................................................................................................................................ III
1 Overview ................................................................................................................................................................................................... 1
2 Structure ................................................................................................................................................................................................... 2
2.1 Front Panel.................................................................................................................................................................................... 2
2.2 Rear Panel ...................................................................................................................................................................................... 3
3 Network Diagram ................................................................................................................................................................................. 4
4 Installation ............................................................................................................................................................................................... 5
4.1 Bolt Specification ....................................................................................................................................................................... 5
4.2 Dimensions ................................................................................................................................................................................... 5
4.3 Installation Procedures........................................................................................................................................................... 5
5 Wiring ......................................................................................................................................................................................................... 7
6 Web Configurations ............................................................................................................................................................................ 9
6.1 System Login and Logout ...................................................................................................................................................... 9
6.1.1 System Login..................................................................................................................................................................... 9
6.1.2 System Logout ...............................................................................................................................................................10
6.2 System Configurations .........................................................................................................................................................10
6.2.1 Local Configurations ...................................................................................................................................................10
6.2.1.1 Local..........................................................................................................................................................................10
6.2.1.2 System Time .........................................................................................................................................................11
6.2.1.3 Manager.................................................................................................................................................................. 11
6.2.2 Alarm Configurations .................................................................................................................................................12
6.2.3 Network Configuration ..............................................................................................................................................12
6.2.4 Configuring Videos ......................................................................................................................................................12
6.2.4.1 Video ........................................................................................................................................................................12
6.2.4.2 Audio ........................................................................................................................................................................14
6.2.5 User Management ........................................................................................................................................................14
Appendix 1 Technical Specification ..............................................................................................................................................16
Appendix 2 Cybersecurity Recommendations ........................................................................................................................17
IV
1 Overview
The emergency phone tower can be connected to the DSS platform, and configured on the web
interface.
● 1 button with an indicator that supports panic alarm.
● The platform can take videos, snapshots and monitor the alarm terminal.
● The platform can broadcast to multiple alarm terminals simultaneously.
● Swipe card during tour and patrol.
● Supports expanding its functions by connecting with the IPC, speed dome and snapshot camera.
● Dot matrix display can be connected to show information.
● Measure speed with its built-in radar (only applicable to some models).
● Remote unlock (customizable) and local unlock with key.
1
2 Structure
2
2.2 Rear Panel
Figure 2-2 Rear panel
3
3 Network Diagram
Following is a network diagram of the emergency phone tower and DSS platform.
4
4 Installation
● Do not install the emergency phone tower in bad environment with condensation, high
temperature, stain, dust and chemical corrosion.
● Installation and debugging must be done by professional teams. Do not dismantle or repair the
device by yourself to avoid damaging the device.
4.2 Dimensions
Before installation, make sure you know the dimensions of the pedestal and the space between the
screw holes.
Each screw hole is 24 mm in diameter, so the reinforced steel bar going through the hole must be 20
mm in diameter.
We recommend you follow the industry standards when installing the emergency phone tower.
Step 1 Select the installation location of the emergency phone tower according to the
5
construction drawings.
During selection, we recommend you consider conditions, such as wiring, drainage and
ventilation.
Step 2 Dig a groove.
Step 3 Embed the pipes.
Step 4 Build the foundation.
1) At the bottom of the foundation, lay gravel down to about 100 mm high.
2) Fill in C25 cement. The length, height and width of the cement must not be lower than
800 mm.
The length, width and depth of the foundation must be adjusted to meet the
requirements of the texture of the soil. 800 mm is just for your reference.
3) On C25 concrete, insert four 20 mm reinforced steel bars according to the spacing of
the screw holes.
4) Guide the reinforced steel bars through the 8 mm steel plate and attach them.
Make sure to drill holes in advance according to the positions of the screw holes.
Step 5 Lay cables.
Step 6 Carry out insulation test.
Step 7 Install the emergency phone tower.
Guide the 20 mm reinforced steel bars through the 4 holes on the pedestal, and then
tighten and attach them with the M20 bolts.
6
5 Wiring
Internal modules were connected to the device before it left the factory. If you need to add a speed
dome, radar or display modules, you need to select a proper power supply in the terminal and
connect the network cable. For the basic type of emergency phone tower, you only need to connect
external alternating current and an external network. This section uses wiring of the basic type as an
example.
Step 1 Connect external alternating current.
Before wiring, make sure that the air switch is OFF. After the device has been correctly
wired, turn on the air switch, and the emergency phone tower will be powered on.
Connect municipal power to number 1 and 2. The number 11 earthing line must be
connected. For details, see Figure 5-1.
Number 3 and 4 were connected with the lightning arrester before leaving the factory.
The emergency phone tower supports optical fiber input. At both ends of the optical
7
fiber, you need to match the bandwidth of the optical modules with the waveband that
sends and receives signals. Otherwise, network will go wrong.
8
6 Web Configurations
This section introduces the parameters of the emergency phone tower and how to configure them
on the web page.
Some operations of the emergency phone tower are available on the platform. For platform
operations, see the corresponding user’s manual of the platform.
Before you log in, make sure that the computer and the emergency phone tower are on the same
network.
Step 1 Open the browser, enter the default IP address of the emergency phone tower in the
address bar, and then press the Enter key.
The factory default IP address is 192.168.1.110, and default username and password is
admin and admin. When logging in for the first time, you need to modify the password. For
details, see "6.2.5 User Management".
9
6.1.2 System Logout
On the System Logout page, you can restart the emergency phone tower or log out. Click Logout,
and then the system will go back to the Login page.
Click Logout, and then the system will go back to the Login page.
6.2.1.1 Local
Select System Config > Local Config > Local Config, and then you can configure the parameters
such as sensor, illuminator brightness and restart date.
10
6.2.1.2 System Time
Select System Config > Local Config > System Time, and then you can set date format, time
format and system time.
6.2.1.3 Manager
Select System Config > Local Config > Config Manager, and then you can export and import files,
and restore the device to its factory settings.
11
Table 6-3 Manager parameters
Parameter Description
Click Export Config to export configuration files and save them to the
Export Config local device. Once exported, you can restore the configurations or export
them to other devices.
Click Import Config to import the configuration files to the device. Once
Import Config
imported, you can restore or synchronize data.
Click Factory Default. All configurations will be restored to factory
Default All
defaults.
6.2.4.1 Video
Select System Config > Video Set > Video Set, and then you can configure the brightness, contrast,
hue, saturation and scene mode of the surveillance video from the camera.
If the plug-in has not been installed, follow the on-screen instructions to install it.
12
Table 6-4 Video parameter description
Parameter Description
Adjust the resolution of videos, including 720P,
Video Format
WVGA, D1 and QVGA.
Main Format
Adjust the image transmission speed. You can select
Format Rate
from Split 25 and 30 frame.
Adjust the resolution of videos, including WVGA, D1
Video Format
and QVGA.
Adjust the image transmission speed. You can select
Frame Rate
Extra Format from 25 and 30 frame.
Select according to the actual access network. You
Bitrate can select from 256 kbps, 1 Mbps, 2 Mbps, and 3
Mbps.
Brightness Adjust the brightness of video.
Contrast Adjust the brightness ratio from light to dark.
Hue Adjust the video image hue.
Saturation Adjust the image saturation.
Adjust the brightness of the video. Configuring the
Gain Auto gain limit to be too high will result in the image
having too much noise.
Set the weather mode of the device to Automatic,
Scene Mode
Sunny, Night or Disabled.
Set the day and night mode of the device to
Day/Night Mode
Automatic, Black and White, or Colorful.
There are four types:
● Backlight: Increase the brightness of the entire
image.
● Wide dynamic: Reduce the lighting of areas are
too bright, and increase the lighting of areas that
Backlight Mode
are too dark.
● Backlight compensation: Reduces the
brightness of areas to make the image clearer,
without affecting dark parts.
● Disabled: No backlight.
Select On, and then the image will be turned
Mirror
horizontally.
Select On, and then the image will be turned
Flip
vertically.
Select On, and then the video window displays the
Display Time
date and time.
Click Default. All the parameters on the Video Set
Default
page will be restored to their defaults.
13
6.2.4.2 Audio
Select System Config > Video Set > Audio Set, and then you can adjust the microphone and beep
volume with the slider.
Procedure
Step 1 Select System Config > User Manager.
Step 2 Click Add User.
The Add User window is displayed.
Step 3 Configure the parameters.
At present, the system supports two types of user groups: admin and user. With higher
authority, admin can view, edit and delete system configuration. User has authority to view
system configuration only.
14
Figure 6-8 Added user successfully
Related Operations
● Delete a user
Click to delete the user.
● Modify the password
Click , select Change Password, and then enter the old and new password to modify the
password.
15
Appendix 1 Technical Specification
16
Appendix 2 Cybersecurity Recommendations
17
the risk of ARP spoofing.
8. Assign Accounts and Privileges Reasonably
According to business and management requirements, reasonably add users and assign a
minimum set of permissions to them.
9. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to
reduce risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to the
following services:
● SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.
● SMTP: Choose TLS to access mailbox server.
● FTP: Choose SFTP, and set up strong passwords.
● AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords.
10. Audio and Video Encrypted Transmission
If your audio and video data contents are very important or sensitive, we recommend that you
use encrypted transmission function, to reduce the risk of audio and video data being stolen
during transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.
11. Secure Auditing
● Check online users: we suggest that you check online users regularly to see if the device is
logged in without authorization.
● Check device log: By viewing the logs, you can know the IP addresses that were used to log in
to your devices and their key operations.
12. Network Log
Due to the limited storage capacity of the device, the stored log is limited. If you need to save the
log for a long time, it is recommended that you enable the network log function to ensure that
the critical logs are synchronized to the network log server for tracing.
13. Construct a Safe Network Environment
In order to better ensure the safety of device and reduce potential cyber risks, we recommend:
● Disable the port mapping function of the router to avoid direct access to the intranet devices
from external network.
● The network should be partitioned and isolated according to the actual network needs. If
there are no communication requirements between two sub networks, it is suggested to use
VLAN, network GAP and other technologies to partition the network, so as to achieve the
network isolation effect.
● Establish the 802.1x access authentication system to reduce the risk of unauthorized access to
private networks.
● Enable IP/MAC address filtering function to limit the range of hosts allowed to access the
device.
18