Advertisement

Quick Links

Alarm Hub 2
User's Manual
ZHEJIANG DAHUA VISION TECHNOLOGY CO.LTD.
V1.1.0

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the ARC3800H-FW2 and is the answer not in the manual?

Questions and answers

Summarization of Contents

Foreword
Safety Instructions
Explains signal words used in the manual.
Privacy Protection Notice
Outlines data handling responsibilities and compliance.
About the Manual
Notes on manual usage and liability.
Important Safeguards and Warnings
Operation Requirements
Guidelines for device operation.
Installation Requirements
Guidelines for device installation.
1 Introduction
1.1 Overview
Describes the Alarm Hub as a central security device.
1.2 Technical Specifications
Lists technical details of the device.
2 Design
2.1 Appearance
Describes the physical components and indicators of the hub.
3 Startup
3.1 Users
Explains user creation and access levels on the DMSS app.
Business Flow
Illustrates the process for sharing and entrusting devices.
Operation Process
Power On
Details the procedure for connecting and powering the hub.
Adding Devices
Instructions for adding the hub to the DMSS app.
Configuring the Hub
Arming the Alarm System
Explains how to arm the system using various methods.
4 DMSS Operations for End Users
4.1 Logging in to DMSS
Step-by-step guide to log into the DMSS application.
4.2 Adding Devices
4.2.1 Adding the Hub
Detailed procedure to add the hub to the DMSS app.
Device Identification and Configuration
Device Identification
Steps for scanning or manually entering device SN and selecting type.
Device Configuration
Setting device name, username, password, and network.
Adding Peripherals and IPCs
4.2.2 Adding Peripheral
Process for adding peripherals to the hub.
4.2.3 Adding IPC
Steps to add IP cameras (IPCs) to the hub.
IPC Adding Methods
Manually Add IPC
How to manually add an IPC by entering its details.
Online Search IPC
How to search for and add IPCs on the network.
IPC Configuration
Details for configuring IPC settings.
4.3 Configuring Alarm Linkage Video
Prerequisites
Conditions needed before configuring alarm linkage.
Procedure
Steps to link video clips to alarm events.
Hub Status and Configuration
4.4.1 Viewing Hub Status
How to check the hub's status indicators.
4.4.2 Configuring the Hub
Steps to view and edit general hub information.
User Manager
Adding, modifying, or deleting keypad users.
Hub Settings Details
App SOS Alarm Type
Configuring different types of SOS alarms.
Global Arming/Disarming
Arming/disarming all detectors simultaneously.
Schedule Arming/Disarming
Setting up scheduled arming and disarming.
Ringtone Setting
Configuring alarm and event sounds.
Advanced Hub Settings
Intercom Service
Setting up intercom functionality.
Phone Number Management
Managing phone numbers for SMS and calls.
Test Mode
Testing peripheral connectivity.
Hub Communication and Integrity
Heartbeat
Configuring detector ping intervals and connection failure detection.
Link Siren for Tamper
Linking siren sounds to tamper events.
System Integrity Check
Checking detector status before arming.
CMS
Registering the hub with DSS Pro or Converter.
Alarm Receive Central Configuration
Alarm Receive Central
Configuring connection to Alarm Receiving Centers.
4.5 Network Configuration
4.5.1 Wired Network Configuration
Steps for configuring wired network connections.
Wireless Network Configuration
4.5.2 Wi-Fi Network Configuration
Steps for connecting to a Wi-Fi network.
4.5.3 Cellular Configuration
Steps for configuring cellular network parameters.
4.6 Managing Users
4.6.1 Adding User
Process for adding general users and installers.
4.6.1.1 Adding DMSS General User
Detailed steps to share devices with general users.
Installer Management
4.6.1.2 Adding Installer
Process for entrusting devices to installers.
4.6.1.2.1 Entrusting Devices in Batches
How to entrust multiple devices to an enterprise.
4.6.1.2.2 Entrusting Device One by One
How to entrust a single device to an installer.
User Deletion
4.6.2 Deleting User
Methods for deleting users.
4.6.2.1 Canceling Device Sharing
Steps to stop sharing devices with a user.
Application and Device Management
4.6.2.2 Canceling Entrusting the Application
How to cancel an installer's entrusting application.
4.6.2.3 Deleting Device
How to delete devices and associated users.
5 General Operations
Prerequisites
Conditions needed before performing operations.
Procedure
Steps to add peripherals and arm/disarm.
5.1 Single Arming and Disarming
How to arm and disarm in a single area.
Arming and Disarming Operations
5.2 Global Arming and Disarming
How to arm and disarm in all areas.
5.3 Manual Arming and Disarming
Arming/disarming via app or keyfob.
5.4 Scheduled Arming and Disarming
Setting up scheduled arming plans.

Table of Contents

Save PDF