background image

 

III 

Important Safeguards and Warnings 

This section introduces content covering the proper handling of the Device, hazard prevention, and 

prevention of property damage. Read carefully before using the Device, comply with the guidelines 

when using it, and keep the manual safe for future reference. 

Operation Requirements 

 

Change the default password after the switch is armed. 

 

Do not expose the switch to direct sunlight or near heat source. 

 

Do not expose the switch to dampness or dust. 

 

Install the switch horizontally or at a stable place to prevent it from falling. 

 

Do not drop or splash liquid onto the switch, or put anything filled with liquid onto the switch. 

 

Install the switch at a well-ventilated place, and do not block its vent. 

 

Use the switch within the rated range of power input and output. 

 

Do not dismantle the switch by yourself. 

 

Use the provided power supply. 

 

Before connecting cables, read and understand the structure first. See "2 Structure" for details. 

 

Before power on, make sure that all the cables are correctly connected. 

 

After powered on, if the POWER indicator is solid red, and RUN indicator flashes green, the 

switch is working properly. 

 

Before unplugging the power cable, make sure that the power switch is turned to "OFF". 

 

Do not stack the switches on one another. 

Power Requirements 

 

The switch must use electric wires that conform  to your local requirements and within their 

rated specifications. 

 

Use the power adapter provided with the switch; otherwise, it might result in people injury and 

device damage. 

 

Use power supply that meets ES1 but does not exceed PS2 limits defined in IEC 62368-1. For 
specific power supply requirements, refer to device labels. 

 

For type I devices, use a grounded power socket. 

 

The appliance coupler is a disconnection device. Keep a convenient angle when using it. 

Summary of Contents for DHI-VTNS1001B-2

Page 1: ...2 wire Switch User s manual V1 0 0...

Page 2: ...s incurred due to operating the product in ways that are not in compliance with the manual The manual will be updated according to the latest laws and regulations of related jurisdictions For detailed...

Page 3: ...II using the device If there is any uncertainty or controversy we reserve the right of final explanation...

Page 4: ...not dismantle the switch by yourself Use the provided power supply Before connecting cables read and understand the structure first See 2 Structure for details Before power on make sure that all the...

Page 5: ...afeguards and Warnings III 1 Introduction 1 Product Overview 1 Application 1 Cable Requirements 1 2 Structure 3 Front Panel 3 Rear Panel 4 3 Installation 5 Installing with Screws 5 Installing with a G...

Page 6: ...calls unlock doors and monitor Application A single 2 wire switch can connect at most 20 VTHs and 2 door stations VTOs Figure 1 1 Villa network diagram Cable Requirements See the instruction below whe...

Page 7: ...s and 2 VTOs 50 m between one switch and one VTH VTO 4 core cable Ethernet cable 12 VTHs and 2 VTOs 30 m between one switch and one VTH VTO Because each core in an Ethernet cable has a relatively larg...

Page 8: ...hat either the VTH or VTO that is properly connected to the switch Solid green All VTHs and VTOs are not properly connected Off The devices are powered off or malfunctioning 2 Network 2 RJ 45 ports 3...

Page 9: ...e description No Item Description 1 Screw holes Use four ST3 18 SUS to install the switch See 3 1 Installing with Screws 2 Rail Use a guide rail to install the switch See 3 2 Installing with Guide Rai...

Page 10: ...ail Installing with Screws Use screws to fix the switch at a proper location on the wall Install the switch with screws Installing with a Guide Rail Preparation Prepare a standard 35 mm guide rail The...

Page 11: ...nstall with a guide rail 1 Fix the upper hooks inside the slot of the guide rail Pull down the lower hook and press the switch close to the guide rail Let go of the lower hook Install with a guide rai...

Page 12: ...to device especially storage devices For example place the device in a special computer room and cabinet and implement well done access control permission and key management to prevent unauthorized p...

Page 13: ...thorization Check device log By viewing the logs you can know the IP addresses that were used to log in to your devices and their key operations 12 Network Log Due to the limited storage capacity of t...

Reviews: