background image

[

键入文字

 
 
 
 
 
 
 

 

 

15

 / 54   

c)

 

Configurations 
 

 

 

Configurations

 

Field Name 

Explanation 

Export Configurations 

Save the equipment configuration to a txt or xml file. Please  right click on 

the choice and then choose “Save Link As.” 

Import Configurations 

Find the config file, and press 

Update

 to load it to the equipment.   

Reset to factory defaults 

I30  would  restore  to  factory  default  configuration  and  remove  all 

configuration information. 

 

d)

 

Upgrade

 

 

 

Upgrade

 

Field Name 

Explanation 

Software upgrade 

Find the firmware, and press Update to load it to the equipment. 

 

 

 

Summary of Contents for i30

Page 1: ... 键入文字 i30 IP Video Door Phone User Manual V3 0 ...

Page 2: ...Time V1 0 2 1 1 2545 Initial issue 20161117 V2 0 2 1 1 2909 Add FDMS video linkage function Changed default in passive mode to the electric lock 20170726 V3 0 2 1 1 2909 Change company address and add IP scan tool download address in QIG 20171027 ...

Page 3: ...nternal components produce condense water vapor please open power use it after waiting for this product is natural drying 4 Please do not let non technical staff to remove or repair Improper repair may cause electric shock fire malfunction etc It would lead to injury accident or cause damage to your product 5 Do not use fingers pins wire other metal objects or foreign body into the vents and gaps ...

Page 4: ... 3 Wiring instructions 9 2 Quick Setting 10 III Basic operation 11 1 Answer a call 11 2 Call 11 3 End call 11 4 Open the door 11 IV Page settings 12 1 Browser configuration 12 2 Password Configuration 12 3 Configuration via WEB 13 1 System 13 a Information 13 b Account 14 c Configurations 15 d Upgrade 15 e Auto Provision 16 f FDMS 18 g Tools 19 2 Network 20 a Basic 20 b VPN 22 3 Line 23 a SIP 23 b...

Page 5: ...Video 35 c MCAST 38 d Action URL 41 e Time Date 41 5 EGS Access 43 6 EGS Logs 45 7 Function Key 46 V Appendix 49 1 Technical parameters 49 2 Basic functions 50 3 Schematic diagram 50 VI Other instructions 51 1 Open door modes 51 2 Management of card 51 ...

Page 6: ...able performance it supports hands free with full duplex which voice is loud and clear I30 have generous appearance also solid durable easy for installation comfortable keypad and low power consumption I30 video door phone supports entrance guard control voice intercom ID card and keypad remote opening the door 1 Appearance of the product ...

Page 7: ... order to meet the needs of different occasions Induction zone RFID induction area Camera Video signal acquisition and transmission Lock status Door unlocking On Door locking Off Call Ring status Standby Off Talking On Ringing Blink every 1 second Network SIP Registration Network error Blink every 1 second Network running Off Registration failed Blink every 3 second Registration succeeded On ...

Page 8: ... CN7 1 2 3 4 5 6 7 12V VSS NC COM NO S_IN S_OUT 12V 1A DC Electric lock switch Indoor switch 2 Driving mode of electric lock Default in passive mode Note When the device is in active mode it can drive 12V 650mA switch output maximum maximally if the electric lock needs power supply over 12V 650mA it will ask the device in passive mode to get additional power to drive the lock switch on off When us...

Page 9: ... 54 3 Wiring instructions NO Normally Open Contact COM Common Contact NC Normally Close Contact Driving Mode Electric lock Jumper port Connections Active Passive No electricity when open When the power to open ...

Page 10: ...ion of the network hardware The product factory default network mode is DHCP Thus only connecting equipment with DHCP network environment would let system have network access automatically Press and hold key for 3 seconds the door phone would report the IP address by voice Or you can also use the iDoorPhoneNetworkScanner exe software to find the IP address of the device Download address http downl...

Page 11: ... remote password to open the door 3 Owner other equipment call the access control and enter the access code to open the door access code should be included in the list of access configuration and enabled for remote calls to open the door 4 Swipe the RFID cards to open the door 5 By means of indoor switch to open the door 6 Private access code to open the door Enable for local authentication and se...

Page 12: ...lly connected to the network you might enter the IP address of the device in the browser as http xxx xxx xxx xxx and you can see the login interface of the web page management Enter the user name and password and click the Logon button to enter the settings screen 2 Password Configuration There are two levels of access root level and general level A user with root level can browse and set all conf...

Page 13: ...Display equipment model hardware version software version uptime last uptime and meminfo Network Shows the configuration information of WAN port including connection mode of WAN port Static DHCP PPPoE MAC address IP address of WAN port SIP Accounts Shows the phone numbers and registration status of the 2 SIP LINES ...

Page 14: ...accounts depend on their needs or modify existed user accounts permission Account Field Name Explanation Change Web Authentication Password You can modify the login password of the account Add New User You can add new user User Accounts Show the existed user accounts information ...

Page 15: ...the choice and then choose Save Link As Import Configurations Find the config file and press Update to load it to the equipment Reset to factory defaults I30 would restore to factory default configuration and remove all configuration information d Upgrade Upgrade Field Name Explanation Software upgrade Find the firmware and press Update to load it to the equipment ...

Page 16: ... 键入文字 16 54 e Auto Provision ...

Page 17: ...mous access Authentication Password Password for configuration server It is used for FTP HTTP HTTPS Configuration File Encryption Key Encryption key for the configuration file General Configuration File Encryption Key Encryption key for common configuration file Save Auto Provision Information Save the auto provision username and password in the phone until the server url changed DHCP Option Optio...

Page 18: ...er reboot update only after reboot 3 Update at time period update at periodic update period TR069 Enable TR069 Enable Disable TR069 configuration ACS Server Type Select Common or CTC ACS Server Type ACS Server URL ACS Server URL ACS User User name of ACS ACS Password ACS Password TR069 Auto Login Enable Disable TR069 Auto Login INFORM Sending Period Time between transmissions of Inform the unit is...

Page 19: ...g information Level 0 emergency System is unusable This is the highest debug info level Level 1 alert Action must be taken immediately Level 2 critical System is probably working incorrectly Level 3 error System may not work correctly Level 4 warning System may work correctly but needs attention Level 5 notice It is normal but significant condition Level 6 Informational It is normal daily messages...

Page 20: ...e effective Clicking the Reboot button would lead to reboot immediately Note Be sure to save the configuration before rebooting 2 Network a Basic Field Name Explanation Network Status IP The current IP address of the equipment Subnet mask The current Subnet Mask Default gateway The current Gateway IP address MAC The MAC address of the equipment MAC Timestamp Get the MAC address of time Settings Se...

Page 21: ...ress was entered for the equipment it must be used to login to the phone after clicking the APPLY button Service Port Settings Web Server Type Specify Web Server Type HTTP or HTTPS HTTP Port Port for web browser access Default value is 80 To enhance security change this from the default Setting this port to 0 will disable HTTP access Example The IP address is 192 168 1 70 and the port value is 809...

Page 22: ...The device supports remote connection via VPN It supports both Layer 2 Tunneling Protocol L2TP and OpenVPN protocol This allows users at remote locations on the public network to make secure connections to local networks ...

Page 23: ...ctivated After the selection is made the configuration should be saved and the phone be rebooted Layer 2 Tunneling Protocol L2TP L2TP Server Address Set VPN L2TP Server IP address Authentication Name Set User Name access to VPN L2TP Server Authentication Password Set Password access to VPN L2TP Server Open VPN Files Upload or delete Open VPN Certification Files 3 Line a SIP You can configure a SIP...

Page 24: ... 键入文字 24 54 ...

Page 25: ... activated SIP Proxy Server Address Enter the IP or FQDN address of the SIP proxy server SIP Proxy Server Port Enter the SIP proxy server port default is 5060 Outbound proxy address Enter the IP or FQDN address of outbound proxy server provided by the service provider Outbound proxy port Enter the outbound proxy port default is 5060 Realm Enter the SIP domain if requested by the service provider C...

Page 26: ...there is voice message waiting on the server Voice Message Number Set the number for retrieving voice message Voice Message Subscribe Period Set the interval of voice message notification subscription Enable Hotline Enable hotline configuration the device will dial to the specific number immediately at audio channel opened by off hook handset or turn on hands free speaker or headphone Hotline Numb...

Page 27: ...ine to use STUN for NAT traversal Convert URI Convert not digit and alphabet characters to hh hex code DTMF Type Set the DTMF type to be used for the line DTMF SIP INFO Mode Set the SIP INFO mode to send and or 10 and 11 Transportation Protocol Set the line to use TCP or UDP for SIP transmission SIP Version Set the SIP version Caller ID Header Set the Caller ID Header Enable Strict Proxy Enables t...

Page 28: ...does not support subscription package the registered server and subscription server will be separated BLF List Number BLF List allows one BLF key to monitor the status of a group Multiple BLF lists are supported SIP Encryption Enable SIP encryption such that SIP transmission will be encrypted SIP Encryption Key Set the pass phrase for SIP encryption RTP Encryption Enable RTP encryption such that R...

Page 29: ...rt Default is 3478 Binding Period STUN blinding period STUN packets are sent at this interval to keep the NAT mapping active SIP Waiting Time Waiting time for SIP This will vary depending on the network TLS Certification File Upload or delete the TLS certification file used for encrypted SIP transmission Note the SIP STUN is used to achieve the SIP penetration of NAT is the realization of a servic...

Page 30: ...tch the exact match number the longest support of 30 bits also supports the use of x format and range of numbers Destination Configure the destination address and if configured as a point to point call write the peer IP address directly Can also be set to domain name by the device DNS server to resolve the specific IP address If it is not configured the IP address is 0 0 0 0 This is an optional co...

Page 31: ... called number 9T then rep 010 and then delete the length Set to 1 Then all users call the 9 at the beginning of the phone will be replaced with 010 number sent To facilitate the user to call the habit of thinking mode Call Mode Configuration selection of different signaling protocols SIP IAX2 Suffix Configure the suffix this is optional configuration items that is after the dial up number to add ...

Page 32: ...ds Enable Card Reader Enable or disable card reader for RFID cards Card Reader Working Mode Set ID card stats Normal This is the work mode after the slot card can to open the door Card Issuing This is the issuing mode after the slot card can to add ID cards Card Revoking This is the revoking mode after the slot card can to delete ID cards Limit Talk Duration If enabled calls would be forced ended ...

Page 33: ...tely Initial Value is 4 Basic Settings Enable DND DND might be disabled phone for all SIP lines or line for SIP individually But the outgoing calls will not be affected Ban Outgoing If enabled no outgoing calls can be made Enable Intercom Mute If enabled mutes incoming calls during an intercom call Enable Intercom Ringing If enabled plays intercom ring tone to alert to an intercom call Enable Auto...

Page 34: ...ing with 4 It would dial numbers beginning with 4 which are longer or shorter than 4 digits a Audio This page configures audio parameters such as voice codec speak volume mic volume and ringer volume Audio Setting Field Name Explanation First Codec The first codec choice G 711A U G 722 G 723 1 G 726 32 G 729AB Second Codec The second codec choice G 711A U G 722 G 723 1 G 726 32 G 729AB None Third ...

Page 35: ... are 5 3kb s or 6 3kb s Speakerphone Volume Set the speaker call volume level MIC Input Volume Set the MIC call volume level Broadcast Output Volume Set the broadcast output volume level Signal Tone Volume Set the audio signal output volume level Enable VAD Enable or disable Voice Activity Detection VAD If VAD is enabled G729 Payload length cannot be set greater than 20 msec b Video This page allo...

Page 36: ...ormat Based on the using power frequency common frequency is 50Hz Horizon Flip The video is flipped horizontally Brightness Adjust video brightness IRCUT Mode Day night Mode The camera automatically switches to black and white in Night Start Time and Night End Time under black and white mode you can see things in a dark environment Auto Mode IRCUT switches according to the actual ambient light lev...

Page 37: ...1 720 576 Frame Rate The larger the value is the more coherent the video would be got not recommend adjusted Bitrate Control CBR If the code rate bandwidth is insufficient it is preferred VBR Image quality is preferred not recommended Bitrate It is proportional to video file size not recommend adjusted I Frame Interval The greater the value is the worse the video quality would be otherwise the bet...

Page 38: ...e ordinary priority and enable page priority Priority In the drop down box to choose priority of ordinary calls if the priority of the incoming streams of multicast RTP lower precedence than the current common calls device would automatically ignore the group RTP streams If the priority of the incoming stream of multicast RTP is higher than the current common calls priority device would automatica...

Page 39: ...e would automatically ignore all receiving multicast RTP streams Web Settings The multicast ss priority is higher than that of ee ss has the highest priority Note when you press the multicast key for multicast session both multicast sender and receiver would beep Listener configuration Blue part name Group 1 Group 2 and Group 3 are your setting monitoring multicast name The group name would be dis...

Page 40: ... part Enable Page priority Set whether to open multicast comparison function multicast priority is pink part number Following explains how to use The purpose of setting monitoring multicast group 1 or group 3 is listening group of 1 or group 3 multicast call of multicast address The device has a path or multi path multicast calls such as listening to multicast information group 2 If multicast is a...

Page 41: ...4 d Action URL Action URL Event Settings URL for various actions performed by the phone These actions are recorded and sent as xml files to the server Sample format is http InternalServer FileName xml e Time Date ...

Page 42: ...t to secondary time server to get time synchronization Time zone Select the time zone Resync Period Time of re synchronization with time server Date Format Date Format Select the time date display format Daylight Saving Time Settings Location Select the user s time zone according to specific area DST Set Type Select automatic DST according to the preset rules of DST or you can manually input rules...

Page 43: ... The DST end hour Manual Time Settings The time might be set manually needed user to disable SNTP service first 5 EGS Access EGS Access Field Name Explanation Import Access Table Click the Browse to choose to import remote access list file access List csv and then clicking Update ...

Page 44: ...local door unlocking The private password format is Location Access Code Position Card holder s position Double Auth When the feature is enabled private password inputting and RFID reading must be matched simultaneously for door unlocking Type Host the door phone would answer all call automatically Guest the door phone would ring for incoming call if the auto answer is disabled Profile It is valid...

Page 45: ...d delete the admin card list of the selected ID cards Delete All Click Delete All to delete all admin card lists 6 EGS Logs According to open event log can record up to 20W open event after more than cover the old records Right click on the links to select save target as the door log can export CSV format Field Name Explanation Door Open Log Result Show the results of the open the door Succeeded o...

Page 46: ... access rules 3 Illegal Card Did not add information 7 Function Key Key Event You might set up the key type with the Key Event Type Subtype Usage Key Event None No responding Dial Dialing function Release Delete password input cancel dialing input and end call OK identification key Hot Key You might enter the phone number in the input box When you press the shortcut key equipment would dial preset...

Page 47: ... can receive and play it Using multicast functionality would make deliver voice one to many which are in the multicast group simply and conveniently The DSS Key multicast web configuration for calling party is as follow Type Number Subtype Usage Multicast Set the host IP address and port number they must be separated by a colon G 711A Narrowband speech coding 4Khz G 711U G 722 Wideband speech codi...

Page 48: ... 键入文字 48 54 calling configuration If the device is in calls or it is three way conference or initiated multicast communication the device would not be able to launch a new multicast call ...

Page 49: ...e Switched Output 12V 650mA DC WAN 10 100BASE TX s Auto MDIX RJ 45 Camera 1 4 color CMOS 1 megapixel wide angle RFID IC card reader EM4100 125Khz MIFARE One 13 56Mhz Power supply mode 12V 1A DC or PoE PoE PoE 802 3af Class 3 6 49 12 95W Cables CAT5 or better Shell Material Metal panel ABS face piece and back shell Working temperature 10 C to 60 C Working humidity 10 90 Storage temperature 40 C to ...

Page 50: ... Wall mounting Integrated RFID Card reader 1 indoor switch interface 1 electric lock relay External power supply Door phone opening methods call password RFID card indoor switch Protection level IP65 CE FCC 3 Schematic diagram MIC Numeric keypad password or dialing DSS key with LED Speaker Lock status Call and Ring status Network and Registration status RFID area Camera ...

Page 51: ...itors can call the owner via position speed dial or phone number After setting the speed dial key visitors can press it to call directly The owner answers the call and presses the key to unlock the door for visitors 2 Owner calls visitors Owner calls visitors via SIP phone SIP door phone answers the call automatically Owner inputs corresponding access codes via SIP phone keypad to unlock the door ...

Page 52: ...dd user cards Method 1 used to add cards for starters typically In web page EGS Setting Features Card Reader Working Mode option select Card Issuing Click Apply Card Reader would enter the issuing status Use new card to touch card reader induction area and then you might hear the confirmed indication tone from the device Repeat step can to add more cards In web page EGS Setting Features Card Reade...

Page 53: ...ew card to touch card reader induction area and you might hear the confirmed indication tone from the device Repeat step 2 to add more cards Use issuer admin card to touch card reader induction area again it would go back to normal working status Method 3 use to add few cards Input cards number in EGS Setting Add Access Rule ID page and then click Add Note you can also use the USB card reader conn...

Page 54: ...ould go back to the Normal status Method 2 used to batch add cards for intermediates Use revocation admin card to touch card reader induction area and it would enter revoking card status Use the cards you want to delete from system to touch card reader induction area and you might hear the card reader confirmed indication tone Repeat step 2 to delete cards Use revocation admin card to touch card r...

Reviews: