Foreword General This document mainly introduces structure, installation, wiring and menu operations of the analog 4-wire video intercom. Model VTH1020J, and VTH1020J-T Safety Instructions The following categorized signal words with defined meaning might appear in the manual. Signal Words Meaning Indicates a high potential hazard which, if not avoided, will result in death or serious injury.
Page 3
All the designs and software are subject to change without prior written notice. The product updates might cause some differences between the actual product and the manual. Please contact the customer service for the latest program and supplementary documentation. There still might be deviation in technical data, functions and operations description, or errors ...
Important Safeguards and Warnings The following description is the correct application method of the device. Please read the manual carefully before use, in order to prevent danger and property loss. Strictly conform to the manual during application and keep it properly after reading. Operating Requirements Do not expose the device to direct sunlight or heat source.
Structure Introduction The analog 4-wire video intercom consists of a door station ("VTO") and an indoor monitor ("VTH"). It is applicable to buildings, such as residential buildings, for people to do voice and video calls. The VTO is installed outdoors and VTH is installed indoors. Features Real-time video/voice communication ...
Page 7
Table 1-1 Front panel Icon Description Microphone. – Press to hang up the incoming call. Take snapshots during monitoring (only supported by VTH1020J-T). Wake up the screen, and bring up the menu. For how to operate the menu, see "4 Menu Operations". When someone is calling from the VTO: Press once to do voice communication with the person.
Rear Panel Rear panel Table 1-2 Rear panel Description Description Analog camera port 1. VTH cascading port 1. VTO port 1. VTH cascading port 2. VTO port 2. VTO hanging slot. Power input. Wires. Analog camera port 2. – –...
Installation Fix the bracket on the wall by screws, hang the VTH on the bracket, and then apply silicone sealant to the gap between the device and the wall. VTH installation Install the VTO bracket on the wall, and then hang the VTO on the bracket; or install the VTO cover on the wall, and then hang the VTO on the cover.
Page 10
Apply silicone sealant to the gap between the device and the wall...
Wiring At most 2 VTOs and 3 VTHs can be wired in one communication system. Preparations 3.1.1 Port Connection Rules Port connection rules Port A of an VTH can be connected to Port C of another VTH to do data communication. ...
3.1.2 Cord Specification Depending on the distance between the VTO and VTH, you need to select RVV4 cords of different specifications. Table 3-1 Cord specification Transmission Distance (TD) RVV4 Cord Specification TD ≤ 10 m RVV4 × 0.3 mm² 10 m < TD ≤ 30 m RVV4 ×...
Menu Operations You can configure the functions of the VTH, such as volume, brightness, and more. Only VTH1020J-T supports the Snapshots and Time functions. All configurations will be saved after you exit the menu. Menu Table 4-1 Menu operations Icon Function Used to confirm your operation when you are...
Page 16
The VTH can store up to 200 snapshots. If storage is full, the earlier ones will be overwritten. Taking Snapshots During monitoring. Press to go to the monitoring image that you want. , and then Successful will appear on the screen. Press , and then Successful will appear on the When a VTO is calling or in a call with a VTO, press...
Viewing a snapshot Press to view the previous or next snapshot. Or you can press to go back to the list of snapshots, and then select the one that you need. , Detele? will appear on the screen, and then press To delete a snapshot, press confirm.
Page 18
Confirm your operation Press , and then the device will restart.
Cybersecurity Recommendations Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks.
Page 20
Enable HTTPS We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel. MAC Address Binding We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing the risk of ARP spoofing.
Need help?
Do you have a question about the DHI-KTA02 and is the answer not in the manual?
Questions and answers