Download Print this page

Advertisement

Quick Links

i60&i60K
User Manual
Version: T2.12 | Date: 2024.8.1

Advertisement

loading
Need help?

Need help?

Do you have a question about the i60 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Fanvil i60

  • Page 1 User Manual Version: T2.12 | Date: 2024.8.1...
  • Page 2: Table Of Contents

    Overview ..........................2 Specification Parameter ....................2 Appearance Overview ......................3 i60 Appearance ....................... 3 i60K Appearance ......................3 i60 Panel Overview ......................4 i60K Panel Overview ....................... 4 Installation Instruction ......................5 Product Installation Instruction ..................5 4.1.1 Installation Environment ................5 4.1.2...
  • Page 3 5.2.6 Tools ...................... 17 5.2.7 Reboot ....................17 Network ..........................17 5.3.1 Basic ...................... 17 5.3.2 Service Port ................... 19 5.3.3 VPN ....................... 19 5.3.4 Advanced ....................20 Line ..........................21 5.4.1 SIP ......................21 5.4.2 SIP Hostpot ................... 26 5.4.3 Dial Plan ....................28 5.4.4 Action Plan ....................
  • Page 4 Device Log ........................50 5.10 Security Settings ......................50 5.11 EGS Setting ........................53 5.11.1 Feature ....................53 5.11.2 Relay ......................54 5.11.3 Personnel Management ................55 5.11.4 Time Profile ................... 57 5.11.5 Logs ....................... 57 Troubleshooting ........................59 Obtain Device System Information ................59 Reboot ...........................
  • Page 5: Safety Instruction

    Safety Instruction 1.1 Safety Instruction Please read the following safety notices before installing or using this unit. They are crucial for the safe and reliable operation of the device. Please use the product-specified power adapter. If you need to use a power adapter ...
  • Page 6: Product Overview

    Product Overview 2.1 Overview The i60 and i60K are newly designed SIP audio and video intercoms from Fanvil. The products feature an all-aluminum alloy construction with an explosion-proof rating of IK07. The sleek and well-defined lines not only provide a luxurious and elegant appearance but also ensure robust protection.
  • Page 7: Appearance Overview

    Appearance Overview 3.1 i60 Appearance Six Views of the Product -i60 3.2 i60K Appearance Six Views of the Product -i60K...
  • Page 8: I60 Panel Overview

    3.3 i60 Panel Overview 3.4 i60K Panel Overview...
  • Page 9: Installation Instruction

    Installation Instruction 4.1 Product Installation Instruction Step 1: Installation Environment 4.1.1 Installation Environment Do not install the device in the following locations: direct sunlight, high temperatures,  low temperatures, corrosive chemicals, or excessive dust. Install the device at an appropriate visual height, with a recommended height of approximately 120-140 cm. If installing indoors, maintain at least 2 meters away from light sources and at least 3 ...
  • Page 10: Device Inventory

    4.1.2 Device Inventory Name Quantity Notes Device i60 or i60K Device Body Wall Bracket Mounting Bracket for the Device; Choose either the wall mount bracket or the rain cover for Rain Cover installation. 7-Pin Connecting Short-circuit Input, Wiegand Interface Cable...
  • Page 11: Installation Tool Preparation

    4.1.3 Installation Tool Preparation Name Specifications Phillips Screwdriver Ph2 or Ph3, preferably magnetic Impact Drill Recommended: 850W Impact Drill Drill Bit 8mm Impact Drill Bit RJ45 Crimping Tool Network Cables, RJ45 Connectors, Electrical Others Tape, or Terminal Blocks (as needed) 4.1.4 Product Installation 1.
  • Page 12: Terminal Connection And Terminal Description

    4.2 Terminal Connection and Terminal Description The i60 & i60K terminal connections and descriptions are shown below: Terminal Name Color Description Block DOORA Two sets of short-circuit input detection Black interfaces: used for connecting switches, infrared sensors, door magnets, vibration...
  • Page 13: Wiring Instruction

    4.3 Wiring Instruction NO: Normally Open Contact COM: Common Contact NC: Normally Close Contact Driving Mode Electric-lock Mode Connections Electricity Passive electricity when open when open √ √ √ √ √ √ Note: 1. For DC power, indoor switches, and door lock cables, it is recommended to use RVV2*0.5.
  • Page 14: Device Configuration

    Searching Door Phone Method 1: Obtain Device IP using a Scanning Tool: 1. Connect the computer and i60/i60K to the same local network and install Device Manager on the PC. 2. Open the IP scanning tool (Device Manager), and click "Scan" to obtain the IP address of the i60/i60K devices on the local network.
  • Page 15: System

    and can only be accessed again after 5 minutes. Specific details are as follows: (1) If a single IP address attempts to log in with different usernames more than the specified number of times, it will be locked. (2) If a single username is used to log in from different IP addresses more than the specified number of times, it will also be locked.
  • Page 16: Upgrade

    page, and can also restore the device to factory settings. Export Configurations  Right-click and select "Save As" to download the device's configuration file, with a .txt extension. (Note: Exporting configuration files requires admin privileges) Import Configurations  Import a previously saved configuration file. Clear Configuration ...
  • Page 17 Upgrade Server Upgrade Server Enter the address of the primary upgrade server (HTTP server). Address 1 Upgrade Server Enter the address of the backup upgrade server (HTTP server). Address 2 The backup server will be used if the primary server is unavailable. Software Version Information Current Software Displays the current device software version number.
  • Page 18: Auto Provision

    5.2.5 Auto Provision The terminal supports four methods for automatic deployment: SIP Plug-and-Play, DHCP Option Parameters, Static Deployment Server, and TR069. Supported transmission protocols include: FTP, TFTP, HTTP, and HTTPS. Auto Provision Parameters Description Basic Settings CPE Serial Displays the current device serial number. Number Configures the username for the FTP server;...
  • Page 19 If the terminal uses Digest authentication to match configuration file Enable Server content, the terminal will update and download if the configuration Digest on the server changes or does not match the terminal configuration. DHCP Option Configures DHCP option. DHCP option supports DHCP custom option, DHCP option 66, and DHCP option 43 for obtaining Option Value automatic deployment application parameters.
  • Page 20 Server Port Configures the PnP port. Transport Configures the PnP transmission protocol. Protocol Update Interval Configures the PnP timeout period, in hours. Static Provisioning Server Configures the FTP server address. The server address can be in IP form (e.g., 192.168.1.1) or domain name form (e.g., ftp.domain.com).
  • Page 21: Tools

    Warning Tone If auto-login is selected, the device will not prompt for a username TLS Version and password upon restart but will use the previously entered correct username and password to connect to the ACS server. INFORM Sending Configures the interval for sending notifications, in seconds. Valid Period range: 1 to 999999.
  • Page 22 Default Gateway Current preset gateway IP Displays the device’s MAC address IPv4 Settings The device's network connection method should be selected based on the actual network environment. The device offers three network modes: If your ISP provides a fixed IP address, select this option. You must enter the static IP address, subnet mask, gateway, and DNS Static IP information.
  • Page 23: Service Port

    5.3.2 Service Port This page provides settings for web login protocols, protocol ports, and RTP ports. Parameters Description Web Server Type The settings will take effect after a restart. You can choose between HTTP/HTTPS for web login. Web Logon Timeout The default timeout is 15 minutes, after which the login page will automatically log out, and you will need to log in again.
  • Page 24: Advanced

    If users require data encryption, please use the OpenVPN feature instead. Users must log into the device's web interface and navigate to Network >> VPN to establish an L2TP connection. In VPN mode, check the "Enable VPN" option, select "L2TP," and then fill in the L2TP server address, L2TP authentication username, and password.
  • Page 25: Line

    network discovery. Packet Interval Set the interval for LLDP packets to be sent. Enable Learning Function Learn and store information about discovered devices on the device. Enable CDP Enable Cisco Discovery Protocol (CDP), set the interval for CDP packets to be sent. QoS Settings Enable DSCP Voice Quality Assurance (default disabled)
  • Page 26 Authentication Enter the authentication password for the service account. Password Realm Enter the SIP domain provided by the service provider. Server Name Enter the server name. SIP Server 1 Server Address Enter the SIP server address. Server Port Enter the SIP server port. Transport Protocol Set the SIP transport line to use TCP, UDP, or TLS.
  • Page 27 channel device will dial the configured number. Hotline Delay Set the delay time for dialing the hotline number. Hotline Number Set the hotline dialing number. Dial Without Allow outgoing calls without registration. Registered DTMF Type Set the DTMF type for the line. DTMF INFO Set the SIP INFO mode to send ‘*’...
  • Page 28 Call Waiting Off Dial the feature codes to the server. Code Send Anonymous Dial the feature codes to the server. On Code Send Anonymous Dial the feature codes to the server. Off Code Enable Session Enable call timing feature. If the call duration exceeds the Timer timeout before receiving the call conference time, the call will be ended.
  • Page 29 message. Use Tel Call Configure whether to enable the use of telephone calls. Configure to automatically use TCP protocol for transmission Auto TCP when the message body exceeds 1500 bytes; ensure the reliability of transmission. Enable Rport Configure the line to add the Rport SIP header. Enable PRACK Configure the line to support PRACK SIP messages.
  • Page 30: Sip Hostpot

    Enable Click To Talk Used with special servers; enable this to allow direct dialing by clicking. Enable ChangePort Whether to enable port updates Intercom Number Set intercom number Unregister On Boot Whether to enable the logout function Enable MAC Whether to include the MAC address in the SIP package during Header registration Enable...
  • Page 31 When a call is made to device A, all devices (A, B, and C) will ring. Answering the call on any one of these devices will stop the ringing on the others, preventing simultaneous answering. When devices B or C make an outbound call, it will be made using the SIP number registered on device A.
  • Page 32: Dial Plan

    To call internal extension numbers: Hotspot servers and clients can dial each other using extension numbers.  For example, extension 1 can call extension 0.  5.4.3 Dial Plan Call number rules allow users to enable/disable existing rules or add custom dialing rules to achieve their desired dialing effects.
  • Page 33 Add dialing rules: Parameters Description Dial Plan To add outbound numbers, you can set them up in two ways: 1. Exact Match: The device will use the mapped IP address or configuration only if the dialed number matches exactly. 2. Prefix Match: This functions like a PSTN area code prefix. The device will use the mapped IP address or configuration if the dialed number starts with the specified prefix.
  • Page 34 prefix. Note: Aliases come in four types and must be set with the replacement length: 1)Add: Prefix xxx to the number, which helps users reduce dialing length. 2)All: Replace the entire number with xxx, enabling quick dialing. 3)Delete: Remove the first n digits of the number, where n is set by the replacement length.
  • Page 35: Action Plan

    Example 3: Add Provide two examples. Scenario 1: Assume that when a user dials any 11-digit number starting with 131, the system will automatically prepend a '0' before sending the call. Scenario 2: Assume that when a user dials any 11-digit number starting with 135 to 139, the system will prepend a '0' before sending the call after receiving the full 11 digits.
  • Page 36: Basic Settings

    5.4.5 Basic Settings STUN (Session Traversal Utilities for NAT) is a network protocol used to establish peer-to-peer communication in VoIP and video communication. It helps two devices connect through NAT or firewalls, allowing users to connect to other users or endpoint devices via the Internet.
  • Page 37 Configure whether to enable automatic hang-up and return to Enable Auto On Hook standby after the call ends. Configure the automatic hang-up time; if in hands-free mode, the Auto HangUp Delay device will automatically return to standby after exceeding the auto hang-up time.
  • Page 38 server for a given phone. Line Display Format Customize line format, such as SIPn/SIPn: xxx/xxx@SIPn. Configure a special character '&'; if the other party's number is Call Number Filter 78&9, the '&' will be filtered out during the call. Auto Resume Current Automatically release HOLD if the current route changes.
  • Page 39 can set a custom tone for successful door opening. Disabled: No prompt tone after a door open failure. Open Failed Prompting Default: Uses the default prompt tone. Voice: Default built-in voice prompt, default is "Door open failed.” Supports custom door open failure prompt tone. After upgrading the ringtone file in System - Upgrade - Ringtones, you can set a custom tone for door open failure.
  • Page 40 Supports custom card deletion successful prompt tone. After upgrading the ringtone file in System - Upgrade - Ringtones, you can set a custom tone for successful card deletion. Revoke Failed Disabled: No prompt tone after card deletion failure. Prompting Default: Uses the default prompt tone. Voice: Default built-in voice prompt, default is "Card deletion failed."...
  • Page 41: Media Settings

    5.5.2 Media Settings Parameters Description Codecs Settings Choose to enable or disable the following audio codecs: G.711A/U,G.722,G.729,ILBC,opus,G.726,G.723.1 Media Settings Default Ring Type Configure preset ringtones. If no special ringtone is set for the incoming number, the default ringtone will be used. 设置免提音量,音量为...
  • Page 42: Camera Settings

    RTP Control Protocol(RTCP)Settings CNAME user Set the CNAME user. CNAME host Set the CNAME host. RTP Settings RTP Keep Alive While holding a call, send a packet every 30 seconds when enabled. Alert Info Ring Settings(alert-info) Value Set the value for the specified ringtone type for incoming calls.
  • Page 43 Natural Light Mode: Provides accurate color reproduction under natural sunlight, suitable for outdoor shooting with a wide range of uses. Fluorescent Lamp Mode: Compensates for the color tone of fluorescent light sources (e.g., daylight lamps, energy-saving lamps) Auto Mode: The camera automatically sets the exposure parameters without manual adjustment.
  • Page 44 between light and dark. Auto Mode: The camera automatically adjusts the saturation based Saturation on the environment, requiring no manual input from the operator. Mode Manual Mode: The saturation level is manually set by the operator. Saturation adjusts color intensity. Higher values exaggerate colors, Saturation while lower values reduce them.
  • Page 45 Type Osd Settings OSD Time Enable/disable the date display on the camera image interface. OSD Text Enable/disable the text display on the camera image interface. Video Codecs 编码格式 支持H.264编码格式 VBR: Adapts the bit rate during video calls for better video quality. Bitrate Control CBR: Maintains a fixed bit rate based on the set value during video calls.
  • Page 46: Mcast

    Set the method for saving snapshot images, including: "Server," Snapshot "Storage Card," or "Server and Storage Card." The SD card supports Save up to 128GB. When selecting SD card, ensure that the SD card is inserted. Server Url Enter the server address. Username Enter the username.
  • Page 47: Action

    After configuration, click Apply.  On the receiving device’s webpage, go to [Intercom Settings] >> [MCAST], set  the multicast name, host, and port. Press the configured DSS key for multicast.  The receiver will receive the multicast call and automatically play it. ...
  • Page 48: Time Plan

    12-hour clock Set the 12-hour time display mode. Time/Date Format Select the date/time display format. Daylight Saving Time Settings Location Select your location. DST Set Type Set the DST (Daylight Saving Time) type Fixed Type The DST rule is based on either a specific date or a relative rule for date calculation.
  • Page 49: Tone

    range. Daily: Execute this action every day within the same time range. Weekly: Execute this action on specific weekdays within the specified time range. Monthly: Execute this action on specific dates within the specified time range. Effective Time Set the time period for execution 5.5.8 Tone Users can configure the device’s alert tones on this page.
  • Page 50: Web Dial

    It functions similarly to a blacklist. By adding a number to the blacklist, users will no longer receive calls from that number until they remove it from the list. Users can add specific numbers to the blacklist or add specific prefixes to block calls from all numbers with those prefixes.
  • Page 51 device, such as making calls or opening doors. MCAST Listening In standby mode, pressing the function key will make the device listen to the multicast if the RTP of that multicast is detected. Speed Dial: Press to initiate a call and talk; release to end the call. Intercom: Press to start intercom communication;...
  • Page 52: Security

    Number 1 to Number 2 Call Transfer Mode Selection. <Main-Secondary>: If the first number is not answered within the set time, the call automatically switches to the second number. Dial Mode Select <Time Period>: The system automatically detects the current time during a call.
  • Page 53: Firewall

    upload and delete the uploaded certificates. 5.8.4 Firewall This page allows you to enable or disable the input and output firewalls, as well as configure the firewall's input and output rules. These settings can help prevent malicious network access or restrict internal users from accessing certain external network resources, thereby enhancing security.
  • Page 54: Device Log

    segment. For the source address mask. When set to 255.255.255.255, it indicates a specific host. When set to a subnet mask like Dst Mask 255.255.255.0, it indicates that the filter applies to a network segment. 5.9 Device Log On this page, you can capture device logs. In case of any issues, the logs can be sent to technical support for troubleshooting.
  • Page 55 Triggered Enable or disable the input port's ability to send messages to the Action: server. Send SMS Select the time after the input port is triggered, including options for Event door sensors, switches, and Dsskey. Triggered Supports ringtone selection. Ringtone Output Settings Enable Logs Enable or disable the log.
  • Page 56 Reset Message sent after resetting the output port. Message Enable or disable SMS triggering. Trigger By When a command `ALERT = [command]` is sent from a remote device or server, if it is correct, the corresponding output port will be triggered or reset.
  • Page 57: Egs Setting

    Triggered Enable or disable the input port's ability to send messages to the Action: server. Send SMS Key Event Set to `dsskey1` for making calls, default is `none`. Tamper Alarm Settings Enable or disable tamper detection. If the terminal is forcibly removed, Enable tamper detection will be triggered, and the configured alarm ringtone Tamper Alarm...
  • Page 58: Relay

    Relay1 Open 单稳态模式有效,门禁开门时间,超时后自动关闭。默认 5 秒 Duration Wiegand Format 支持的韦根门禁卡的格式 Wiegand Mode 韦根模式可选 in 和 out 两种模式,默认为 in Wiegand Type 支持韦根 26 和 34 两种 Card Reader Normal: 刷卡后可以打开门禁; Working Mode Card Issuing: 这个状态下刷卡可以把卡添加到数据库; Card Revoking: 这个状态下刷卡可以把卡从数据库中删除。 Relay Open Mode 继电器打开方式可选读卡器、密码、蓝牙。配合APP使用蓝牙开门时, 在此处必须打开蓝牙...
  • Page 59: Personnel Management

    Relay Execute a door lock operation to open or close the door. Action Perform the open/close action. Mode Once: Executes the open action; the door will automatically close after a timeout. Always: Executes the open action without automatic closure; manual closure is required.
  • Page 60 If configuring the access card number on the web interface, you will need to swipe the card on the device once. Then, check the card number in the access log page and copy it here. Password Type Local: This is the local door access password. When in standby mode, enter the set password on the keypad to immediately unlock the door.
  • Page 61: Time Profile

    Note: Using the "Add Card Administrator Card" and "Delete Card Administrator Card" requires great caution. If you forget to switch the reader mode back to standard mode, it could damage user data and compromise access security. 5.11.4 Time Profile Parameters Description Import Profile List Click [Select] to choose the time list file `timeProfileList.csv`, then click [Update] to...
  • Page 62 Relay Door lock Result Displays the result of a single door opening attempt success or failure Name Name of the person who opened the door Source Displays the card number or password used to open the door Type Opening method including password, card swipe, etc. Reason Reason for door opening failure Time...
  • Page 63: Troubleshooting

    Troubleshooting When the device is not functioning properly, users can try the following methods to restore normal operation or collect relevant information to send a problem report to the technical support email. 6.1 Obtain Device System Information Users can obtain information through the device web page by navigating to [System] >> [Information].
  • Page 64: Obtain Log Information

    network data packets during this period will be saved in the file. Users can analyze the packets or send them to the technical support email. 6.5 Obtain Log Information When encountering issues, log information can be helpful. To obtain the device's log information, users can log in to the device's web page, go to [Syslog], click the [Apply] button, and follow the steps until the issue occurs.

This manual is also suitable for:

I60k