Advertisement

Quick Links

Alarm Hub 2
User's Manual
ZHEJIANG DAHUA VISION TECHNOLOGY CO.LTD.
V1.1.2

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Alarm Hub 2 and is the answer not in the manual?

Questions and answers

Summary of Contents for Dahua Technology Alarm Hub 2

  • Page 1 Alarm Hub 2 User's Manual ZHEJIANG DAHUA VISION TECHNOLOGY CO.LTD. V1.1.2...
  • Page 2: Foreword

    User's Manual Foreword General This manual introduces the installation, functions and operations of the alarm hub 2 (hereinafter referred to as the "hub"). Read carefully before using the device, and keep the manual safe for future reference. Safety Instructions The following signal words might appear in the manual.
  • Page 3: About The Manual

    User's Manual About the Manual The manual is for reference only. Slight differences might be found between the manual and the ● product. We are not liable for losses incurred due to operating the product in ways that are not in ●...
  • Page 4: Important Safeguards And Warnings

    User's Manual Important Safeguards and Warnings This section introduces content covering the proper handling of the device, hazard prevention, and prevention of property damage. Read carefully before using the device, and comply with the guidelines when using it. Operation Requirements Make sure that the power supply of the device works properly before use.
  • Page 5: Table Of Contents

    User's Manual Table of Contents Foreword................................I Important Safeguards and Warnings......................III 1 Introduction..............................1 1.1 Overview..............................1 1.2 Technical Specifications........................1 1.3 Checklist..............................6 2 Design................................8 2.1 Appearance............................8 2.2 Dimensions.............................9 3 Startup................................10 3.1 Users..............................10 3.2 Operation Process..........................11 4 DMSS Operations for End Users........................
  • Page 6 User's Manual Appendix 3 Security Commitment and Recommendation................49...
  • Page 7: Introduction

    User's Manual 1 Introduction 1.1 Overview Alarm Hub is a central device in the security system, which controls the operation of all connected peripherals. If the security system detects the presence, entry, or attempted entry of an intruder into the armed area, the hub will receive the alarm signals from the detectors, and then alert users. 1.2 Technical Specifications This section contains technical specifications of the device.
  • Page 8 User's Manual Type Parameter Description Yes (up to 5 phone numbers) Only available on 4G models. Yes (up to 5 phone numbers) Phone Call Only available on 4G models. Video Linkage Offline Cache Stores up to 50 alarm messages. Arm and Disarm App, keyboard, remote control, card, scheduled arming and Method disarming.
  • Page 9 User's Manual Type Parameter Description Wi-Fi 2.4 G 4G models: Up to 7 languages are supported for SMS: ● English, Spanish (Latin America), French, Italian, Arabic, Turkish, and Danish. It is set as English by default. The alarm Language voice message feature and local speaker only support English.
  • Page 10 User's Manual Type Parameter Description Storage –10 °C to +55 °C (+14 °F to +131 °F) Temperature Storage Humidity 10%–90% (RH) 254 mm × 211 mm × 61 mm (10.00” × 8.31” × 2.40”) (L × W × H), standalone in the inner box Packaging Dimensions 524 mm ×...
  • Page 11 User's Manual Type Parameter Description Primary LAN /Wi-Fi (NO 50136-2) Transmission Path Secondary GPRS/4G Transmission Path C/E/F Notification Equipment B/E for DHI-ARC3800H-W2(868) Table 1-2 ATE category Reporting Communication Protocols Communication Devices Category Time Device to be Used PSTN 2G/3G The check marked 25 h Standard √...
  • Page 12: Checklist

    1.3 Checklist Check the package against the following list. If any of the items are damaged or missing, contact customer service. Figure 1-1 Checklist Table 1-3 Checklist Item Name Quantity Item Name Quantity Legal and regulatory Alarm Hub 2 information...
  • Page 13 User's Manual Item Name Quantity Item Name Quantity Cable Package of screws Adapter QR code Quick start guide — — —...
  • Page 14: Design

    User's Manual 2 Design 2.1 Appearance Figure 2-1 Appearance Table 2-1 Structure Name Description Flashes green slowly: Reduced sensitivity mode. ● Flashes green: The hub starts working. ● Solid yellow: Failed to connect to the cloud. ● Solid green: Disarming mode. ●...
  • Page 15: Dimensions

    User's Manual Name Description Slot for SIM 2 Install main card to the first slot, and standby card to the second slot. Support dual SIM cards and single standby. ● SIM cards allow the hub to use cellular data, and push alarm ●...
  • Page 16: Startup

    User's Manual 3 Startup 3.1 Users Users can only be created on the DMSS app. Classify the users into different roles so that they can have different access levels for operating the devices. For Certification IMQ-SISTEMI DI SICUREZZA is mandatory manage system with APP DMSS for access level 2, and DoLynK Care for access level 3.
  • Page 17: Operation Process

    User's Manual Figure 3-1 Business flow (DMSS user) Figure 3-2 Business flow (Installer) 3.2 Operation Process Follow the procedures below to turn on the wireless alarm system. Figure 3-3 Operation process Power On Connect the hub to the Ethernet, and power on the hub.
  • Page 18: Installing The Hub

    User's Manual Figure 3-4 Power on Adding Devices 1. Add the hub to the DMSS app. 2. Add the peripherals to the hub. Installing the Hub We recommend using expansion screws to install the hub. Do not place the hub in the following areas: Outdoors.
  • Page 19 User's Manual Figure 3-5 Installation Table 3-2 Installation items Item Name Item Name Mounting plate M3 × 8 mm countersunk head screw Expansion bolt ST4 × 25 mm self-tapping screw Wall 1. Confirm the position of the screw holes, and then drill them into the mounting plate. 2.
  • Page 20: Dmss Operations For End Users

    User's Manual 4 DMSS Operations for End Users DMSS app provides professional security surveillance services for end users. For DMSS admin users, you can share the hub with DMSS general users and entrust it to one enterprise. Peripherals that come with the hub can be shared and entrusted at the same time. To share and entrust the hub by yourself, you need to install the latest version of DMSS app.
  • Page 21 User's Manual Figure 4-1 Sign up Step 4 Go back to the Login screen, enter your email and password, and then tap Log In. Figure 4-2 Login...
  • Page 22: Adding Devices

    User's Manual You can modify the password on the Me > Account Management > Modify Password. 4.2 Adding Devices For end users, you can add alarm devices to DMSS app. 4.2.1 Adding the Hub Procedure On the Device screen, tap , and then select Scan QR Code.
  • Page 23: Adding Peripheral

    User's Manual Cellular: Configure the APN, Autho mode, username, password, dial number, roaming ● data for the SIM card. Wi-Fi: Select a Wi-Fi network, and then enter the password to connect to it. ● Figure 4-4 Configure network types 4.2.2 Adding Peripheral You can add multiple peripherals into the hub.
  • Page 24: Adding Ipc

    User's Manual Figure 4-5 Add peripheral Step 2 Scan the QR code at the bottom of the device, and then tap Next. Tap Next after the device has been found. Step 3 Follow the on-screen instructions and switch the device to on, and then tap Next. Step 4 Step 5 Wait for the pairing.
  • Page 25 User's Manual Figure 4-6 Add IPC Step 2 Add an IPC to the hub. Manually add: ● 1. Configure the device name, IP address of the IPC, port number, username and the password of the IPC, and select the area where the IPC is assigned to, and then tap...
  • Page 26 User's Manual Figure 4-7 Manually add 2. Select the channel of the IPC, and then tap OK. Online search: ● and select Search on LAN to search for the IPC in the same network 1. Tap segment.
  • Page 27 User's Manual Figure 4-8 Online search 2. Tap Next. 3. Enter the password of the IPC and select the area where the IPC is assigned to, and then tap OK. Figure 4-9 Enter password 4. Select the channel of the IPC, and then tap OK.
  • Page 28 User's Manual Related Operations You can configure the parameters of the added IPC. 1. Select Device Details of the IPC. Figure 4-10 Device details 2. Select Settings to configure the parameters of the IPC.
  • Page 29: Configuring Alarm Linkage Video

    User's Manual Figure 4-11 Configure parameters 4.3 Configuring Alarm Linkage Video Configure the alarm linkage for peripherals so that you can view video clips when the alarm is triggered. Prerequisites Make sure that the hub is armed before you configure the alarm-video linkage. ●...
  • Page 30: Hub General Settings

    User's Manual Figure 4-12 Linked channel 4.4 Hub General Settings You can view and edit basic device information. Procedure On hub screen, tap Settings to view device details. Step 1 Table 4-1 Parameter description Parameter Description View name, type, SN and device model of the hub. ●...
  • Page 31: Viewing Hub Status

    User's Manual Parameter Description View device and app logs. Device log: Select View Logs > Device Log to view alarm logs of ● the device. You can also tap on the Device Log screen to send View Logs alarm logs to the linked email. App log: Select View Logs >...
  • Page 32: Configuring The Hub

    User's Manual Parameter Description Connection status of the SIM card. : SIM card 1 is active. ● SIM Card : SIM card 2 is active. ● : No SIM card. ● This status bar is only supported when there is a SIM card inserted into the hub.
  • Page 33 User's Manual Parameter Description Configure SOS alarm types, including panic alarm, link to siren, medical alarm, medical alarm and fire alarm. SOS Alarm After configuration, tap SOS on the Operation screen of the hub to trigger alarm. When multiple alarm types are selected, a pop-up window prompts to remind you select one alarm to trigger this time.
  • Page 34 User's Manual Parameter Description Enable Intercom Service to achieve the function. Intercom Time Limit: When an alarm is triggered, intercom services can be ● initiated within the configured time interval. Once the time goes expired, a new intercom session cannot be started again. The duration of every intercom session cannot be over 20 minutes.
  • Page 35 User's Manual Parameter Description Configure the hub-detector ping interval. The settings determine how frequently the hub communicates with the peripherals and how quickly the loss of connection is detected. Detector Ping Interval : The frequency of connected peripherals operated ● by the hub is configured in the range of 12 seconds to 300 seconds (60 seconds by default).
  • Page 36 User's Manual Parameter Description Select Alarm Receiving Center 1 or 2, and go to the respective configuration screen. Enable the function, and then configure parameters. Communication Protocol : Select from SIA-DC-09(SIA-DCS), SIA- ● DC-09(ADM-CID),SIA-DC-09(ADM-CID Mexico),Softguard and Private. Preferred IP Address/Domain Name : Enter the IP/domain address and ●...
  • Page 37: Network Configuration

    User's Manual 4.5 Network Configuration On the General Config of the Device Details screen, tap Network Configuration, and then you can select network for the hub: wired network, wireless network, or cellular network. 4.5.1 Wired Network Configuration Procedure Select Network Settings > Wired Network Config. Step 1 Step 2 Configure wired network connection parameters.
  • Page 38: Managing Devices

    User's Manual Parameter Description SIM 1 Supports dual SIM cards and single standby. ● SIM cards allow the hub to use cellular data, and push alarm ● SIM 2 notifications. The Access Point Name (APN) is the name of the settings your device reads to set up a connection for the gateway between your carrier's cellular network and the public Internet.
  • Page 39 User's Manual Figure 4-13 Entrust devices in batches 4.6.1.2 Entrusting Device One by One You can entrust a device to DoLynk Care users. You can configure the permission entrusting permissions. Prerequisites You have bound with a service provider. Procedure Step 1 On the Device screen, tap next to a device, and then tap Device Entrusting.
  • Page 40 User's Manual Permission Description Note You can request for the permissions of device configuration, live video and playback. Configuration permission: Including restart and ● upgrade the device, format SD card and Video Devices configuration plug-in. Live video and playback: View the live video, ●...
  • Page 41 User's Manual Figure 4-14 Entrust a device Results You can view entrusting status on device list screen. When successfully entrusted, the device status changes from Under Reviewing to Entrusting to ****. After an entrusting request has been successfully sent, a message will pop up on the Home screen. You need to wait for a response from the installer, which will be displayed on the Message >...
  • Page 42: Sharing Devices

    User's Manual 4.6.2 Sharing Devices Procedure On the Device screen, tap next to a device, and then tap Share Devices. Step 1 Figure 4-15 Share device On the Share Devices screen, share the device with the user by entering their DMSS Step 2 account or scanning their QR code.
  • Page 43 User's Manual Unbind with device password: If you have the device password, you can enter the ● device password to unbind the device. The device must be online. If you forgot the password or the password is incorrect, you can request to unbind the device.
  • Page 44: General Operations

    User's Manual 5 General Operations The user in level 2 or 3 has the permission to arm and disarm the system. This section uses end user's operation on DMSS as an example. Prerequisites Make sure that you have added a hub before performing configurations. ●...
  • Page 45: Global Arming And Disarming

    User's Manual Figure 5-1 Single arming and disarming 5.2 Global Arming and Disarming You can arm and disarm the detectors in all the areas. Prerequisites Make sure that you have enabled the Global Arming/Disarming function. Procedure On the Operation screen of the hub, select from Home, Away to global arm the Step 1 detectors.
  • Page 46: Manual Arming And Disarming

    User's Manual Figure 5-2 Global arming and disarming 5.3 Manual Arming and Disarming You can arm the security system through the DMSS app or keyfob. To arm and disarm the detectors in a single area or all the areas, see "5.1 Single Arming and ●...
  • Page 47: Scheduled Arming And Disarming

    User's Manual 5.4 Scheduled Arming and Disarming You can set a schedule to arm and disarm detectors. You can configure arming plans, including arming area, modes and periods. Procedure On the hub screen, select Device Details > Settings > Hub Setting. Step 1 Select Scheduled Arming/Disarming screen, tap Add, and then configure arming plans.
  • Page 48: Appendix 1 Arming Failure Events And Description

    User's Manual Appendix 1 Arming Failure Events and Description Appendix Table 1-1Arming failure events and description (peripherals) Reason Description ModuleLoss The peripheral was offline. No heartbeat packets have been sent for more than HeartError 18 minutes. Alarm Alarm (24 hours). Open The back cover of the device was open.
  • Page 49 User's Manual Reason Description NoGSM 2G/4G module errors was detected. ATS Fault Alarm transmission system fault was detected. Alarm transmission path fault (Cellular network Cellular Network ATP Fault failure) was detected. Wired Network/Wi-Fi ATP Alarm transmission path fault (Wireless or Wi-Fi Fault network failure) was detected.
  • Page 50: Appendix 2 Sia Event Codes And Description

    User's Manual Appendix 2 SIA Event Codes and Description Appendix Table 2-1SIA event codes and description Event Original Code SIA Code Description Medical Alarm Button Was Medical Alarm 1100 Pressed Medical Alarm Button Was Medical Alarm Stopped 3100 Restored Fire Alarm 1110 Fire Alarm Fire Alarm Stopped...
  • Page 51 User's Manual Event Original Code SIA Code Description Perimeter Alarm 1131 Tripwire Alarm Perimeter Alarm 3131 Tripwire Alarm Stopped Stopped Motion Detected Opening Action Detected External Contact Was Opened 24 Hour Alarm 1133 Glass Break Detected Tilt Detected Shock Detected Motion Stopped Closing Action Detected External Contact Was Closed...
  • Page 52 User's Manual Event Original Code SIA Code Description Lid Was Closed Lid Was Closed 3137 External Lid Was Closed Device Stopped Moving Expansion Module Was Camera Module Is 1143 Disconnected Connected Expansion Module Was Camera Module Was 3143 Connected Disconnected Masking Alarm 1149 Masking Alarm...
  • Page 53 User's Manual Event Original Code SIA Code Description ATS Fault ATS Fault 1350 Primary ATP Fault Secondary ATP Fault ATS Restored ATS Restored 3350 Primary ATP Restored Secondary ATP Restored Communication Failure 1354 RF-HD Connection Failed Communication 3354 RF-HD Connection Restored Restored Wireless Device Was 1355...
  • Page 54 User's Manual Event Original Code SIA Code Description Exit Error 1457 Unsuccessful Arming Device Locked 1501 Device Locked Device Unlocked 3501 Device Unlocked Deactivated Device 1502 Permanently Deactivated Peripheral Reactivated Reactivated Device 3502 Peripheral Disabled Tamper 1503 Permanently Deactivated Lid Enabled Tamper 3503 Enabled Lid...
  • Page 55: Appendix 3 Security Commitment And Recommendation

    User's Manual Appendix 3 Security Commitment and Recommendation Dahua Vision Technology Co., Ltd. (hereinafter referred to as "Dahua") attaches great importance to cybersecurity and privacy protection, and continues to invest special funds to comprehensively improve the security awareness and capabilities of Dahua employees and provide adequate security for products.
  • Page 56: Service Configuration

    User's Manual Service Configuration 1. Enable HTTPS It is recommended that you enable HTTPS to access Web services through secure channels. 2. Encrypted transmission of audio and video If your audio and video data contents are very important or sensitive, we recommend you to use encrypted transmission function in order to reduce the risk of your audio and video data being eavesdropped during transmission.
  • Page 57: Software Security

    User's Manual By viewing logs, you can learn about the IP addresses that attempt to log in to the device and key operations of the logged users. 3. Configure network log Due to the limited storage capacity of devices, the stored log is limited. If you need to save the log for a long time, it is recommended to enable the network log function to ensure that the critical logs are synchronized to the network log server for tracing.

Table of Contents