Dahua 2-Wire Switch User Manual

Version: V1.0.0

Foreword

General

This manual introduces the structure and installation of the 2-wire switch (hereinafter referred to as the "switch").

Safety Instructions

The following categorized signal words with defined meaning might appear in the manual.

Signal WordsMeaning
❗ DANGERIndicates a high potential hazard which, if not avoided, will result in death or serious injury.
⚠️ WARNINGIndicates a medium or low potential hazard which, if not avoided, could result in slight or moderate injury.
❕ CAUTIONIndicates a potential risk which, if not avoided, could result in property damage, data loss, lower performance, or unpredictable result.
? TIPSProvides methods to help you solve a problem or save you time.
ℹ️ NOTEProvides additional information as the emphasis and supplement to the text.

Revision History

VersionRevision ContentRelease Time
V1.0.0First release.July 2021

About the Manual

Important Safeguards and Warnings

This section introduces content covering the proper handling of the Device, hazard prevention, and prevention of property damage. Read carefully before using the Device, comply with the guidelines when using it, and keep the manual safe for future reference.

Operation Requirements

Power Requirements

1 Introduction

1.1 Product Overview

The switch provides one 2-wire P port and one RJ-45 port. You can connect up to 22 devices into the network with one switch. When connected to network through the switch, 2-wire indoor monitors (VTH) can make calls, unlock doors and monitor.

1.2 Application

A single 2-wire switch can connect at most 20 VTHs and 2 door stations (VTOs).

Figure 1-1 Villa network diagram Description

The diagram illustrates a typical villa network configuration using the 2-wire switch. It shows the switch connected to a LAN port (likely for network connectivity). The switch has two main connection types: a 2-wire port (labeled 'UP' and numbered 1, 2, 21, 22) and an RJ-45 Ethernet port (labeled 'LAN'). The 2-wire port connects to multiple devices, including Door Stations (VTOs) and Indoor Monitors (VTHs). The diagram also indicates power input (DC IN), an ON/OFF switch, and labels for different cable types: Power cable (orange), Signal cable (yellow), and Ethernet cable (blue). The diagram emphasizes 'CAUTION: KEEP DRY. INDOOR USE ONLY.'

1.3 Cable Requirements

See the instruction below when choosing the right signal cables for the amount of devices you have:

R (total resistance) = 6V / (the number of VTHs / 0.1A) (the average current for each VTH)

For example, the total resistance of the cables for 5 VTHs must be less than 6V / 5 / 0.1A = 12Ω.

Table 1-1 Description of using different cables

Cable Type for CascadingSupported Quantity DeviceMaximum Distance
2-core cable20 VTHs and 2 VTOs.50 m between one switch and one VTH/VTO.
4-core cable30 m between one switch and one VTH/VTO.
Ethernet cable12 VTHs and 2 VTOs.Because each core in an Ethernet cable has a relatively large impedance, we recommend that the cable should not be longer than 30 m.

The cable between 1 switch and one VTO/VTH must be longer than 1 m.

2 Structure

2.1 Front Panel

Figure 2-1 Front panel structure Description

The front panel of the 2-wire switch features indicator lights, UP directional arrows, a DC IN power input port, an OUT port, and an ON/OFF power switch. A prominent warning label reads 'CAUTION: KEEP DRY. INDOOR USE ONLY.'

Table 2-1 Structure description

No.ItemDescription
1IndicatorFrom left to right:
POWER. ?: Powered on. ⚪: No power.
P. ? flashes: Received PLC signal that either the VTH or VTO that is properly connected to the switch.
? Solid green: All VTHs and VTOs are not properly connected.
⚪ Off: The devices are powered off or malfunctioning.
2Network2 RJ-45 ports.
3Power inputUse 48 VDC power supply.
4OFF/ONPower switch.
52-wire portsConnect up to 20 VTHs and 2 VTOs with no positive or negative poles.

Before connecting cables, power off the switch first to avoid damaging it.

2.2 Rear Panel

Figure 2-2 Rear panel structure Description

The rear panel of the 2-wire switch is designed for mounting. It includes four screw holes for direct wall mounting, a central rail mechanism for guide rail installation, and a lower hook that secures the device when mounted on a guide rail.

Table 2-2 Structure description

No.ItemDescription
1Screw holesUse four ST3 × 18-SUS to install the switch. See "3.1 Installing with Screws".
2RailUse a guide rail to install the switch. See "3.2 Installing with Guide Rail".
3Lower hookFix the switch when installing with a guide rail.

3 Installation

The chapter introduces how to install the switch on the wall with screws or a guide rail.

3.1 Installing with Screws

Use screws to fix the switch at a proper location on the wall.

Figure 3-1 Install the switch with screws Description

This illustration depicts the process of installing the 2-wire switch onto a wall using screws. It shows the switch being affixed to the wall with four ST3 x 18-SUS self-tapping screws, utilizing expansion bolts in the wall for secure mounting.

3.2 Installing with a Guide Rail

Preparation

Procedure

  1. Fix the guide rail at a proper location on the wall.
  2. Fix the upper hooks inside the slot of the guide rail.
  3. Pull down the lower hook and press the switch close to the guide rail.
  4. Let go of the lower hook.

Figure 3-2 Install with a guide rail (1) Description

This diagram shows the initial step of attaching the switch to a guide rail mounted on the wall. The switch is positioned near the guide rail, with its upper hooks ready to engage with the rail's slot.

Figure 3-3 Install with a guide rail (2) Description

This diagram provides a side view illustrating how the switch is secured to the guide rail. It shows the engagement of the 'Upper hook' and the 'Lower hook' with the guide rail, demonstrating the mechanism for mounting the device.

Appendix 1 Cybersecurity Recommendations

Cybersecurity is more than just a buzzword: it's something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks. Below are some tips and recommendations on how to create a more secured security system.

Mandatory actions to be taken for basic device network security:

1. Use Strong Passwords

Please refer to the following suggestions to set passwords:

2. Update Firmware and Client Software in Time

"Nice to have" recommendations to improve your device network security:

1. Physical Protection

We suggest that you perform physical protection to device, especially storage devices. For example, place the device in a special computer room and cabinet, and implement well-done access control permission and key management to prevent unauthorized personnel from carrying out physical contacts such as damaging hardware, unauthorized connection of removable device (such as USB flash disk, serial port), etc.

2. Change Passwords Regularly

We suggest that you change passwords regularly to reduce the risk of being guessed or cracked.

3. Set and Update Passwords Reset Information Timely

The device supports password reset function. Please set up related information for password reset in time, including the end user's mailbox and password protection questions. If the information changes, please modify it in time. When setting password protection questions, it is suggested not to use those that can be easily guessed.

4. Enable Account Lock

The account lock feature is enabled by default, and we recommend you to keep it on to guarantee the account security. If an attacker attempts to log in with the wrong password several times, the corresponding account and the source IP address will be locked.

5. Change Default HTTP and Other Service Ports

We suggest you to change default HTTP and other service ports into any set of numbers between 1024~65535, reducing the risk of outsiders being able to guess which ports you are using.

6. Enable HTTPS

We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel.

7. MAC Address Binding

We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing the risk of ARP spoofing.

8. Assign Accounts and Privileges Reasonably

According to business and management requirements, reasonably add users and assign a minimum set of permissions to them.

9. Disable Unnecessary Services and Choose Secure Modes

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to reduce risks.

If necessary, it is highly recommended that you use safe modes, including but not limited to the following services:

10. Audio and Video Encrypted Transmission

If your audio and video data contents are very important or sensitive, we recommend that you use encrypted transmission function, to reduce the risk of audio and video data being stolen during transmission.

Reminder: encrypted transmission will cause some loss in transmission efficiency.

11. Secure Auditing

12. Network Log

Due to the limited storage capacity of the device, the stored log is limited. If you need to save the log for a long time, it is recommended that you enable the network log function to ensure that the critical logs are synchronized to the network log server for tracing.

13. Construct a Safe Network Environment

In order to better ensure the safety of device and reduce potential cyber risks, we recommend:

Models: DHI-VTNS2003B-2, Two-wire Power Supply Switch, Power Supply Switch, Two-wire Switch, Supply Switch, Switch

File Info : application/pdf, 13 Pages, 375.68KB

PDF preview unavailable. Download the PDF instead.

2-wire Switch User s Manual V1.0.0 ctxtest02 Adobe PDF Library 21.5.90

Related Documents

Preview 2-Wire Hybrid Indoor Monitor User Manual
User manual for the 2-Wire Hybrid Indoor Monitor, detailing its structure, functions, operations, safety instructions, and network diagrams. Includes information on VTH operations, DMSS app integration, and cybersecurity recommendations.
Preview Dahua 2-Wire Hybrid Door Station User Manual: Installation and Operation Guide
Comprehensive user manual for the Dahua 2-Wire Hybrid Door Station. Learn about installation, wiring, configuration, and software functions for secure and efficient access control and communication.
Preview Dahua DHI-KTP10 Video Intercom Kit: Features, Specifications, and Application
A comprehensive overview of the Dahua DHI-KTP10 Video Intercom Kit, detailing its components (VTO, VTH, and Switch), technical specifications, features, and typical application scenarios. Includes model numbers DHI-VTO3311Q-WP, DHI-VTH2621GW-WP, and DH-PFS3006-4ET-36.
Preview Analog 4-Wire Video Intercom Quick Start Guide - Dahua
Comprehensive quick start guide for Dahua's Analog 4-Wire Video Intercom system, covering installation, wiring, menu operations, and cybersecurity recommendations. Features VTH and VTO models.
Preview Dahua Digital Door Station Quick Start Guide
Comprehensive quick start guide for the Dahua Digital Door Station (VTO6521K). Covers installation, network setup, web configuration, SIP server integration, user registration, and essential cybersecurity recommendations for secure operation.
Preview Dahua DH-IS4420-16GT-240: 20-Port Managed Industrial Gigabit PoE Switch
Explore the Dahua DH-IS4420-16GT-240, a robust 20-port managed industrial Gigabit switch featuring 16 PoE ports. This datasheet details its high performance, wide operating temperature range, advanced PoE capabilities including 90W per port and long-distance transmission, and comprehensive specifications for demanding environments.
Preview Dahua Analog 4-Wire Video Intercom Quick Start Guide
Quick start guide for Dahua's Analog 4-Wire Video Intercom system, covering installation, wiring, menu operations, and cybersecurity recommendations for VTH and VTO devices.
Preview Dahua 16/24-Port Gigabit Managed PoE Switch Quick Start Guide
This guide provides essential information for setting up and operating the Dahua 16/24-Port Gigabit Managed PoE Switch, including product features, installation steps, basic configuration, and cybersecurity best practices.