Security
  • 11 Dec 2023
  • Dark
    Light
  • PDF

Security

  • Dark
    Light
  • PDF

Article summary

Tamper Alarm Setting

The tamper alarm function prevents anyone from removing the devices without permission. It does this by setting off the tamper alarm and making calls to a designated location when the device detects a change in its gravity value from the original one.

Configure Tamper Alarm on the Device

The tamper alarm and gravity sensor can be easily set up on the door phone.

To configure the tamper alarm, go to Setting > Security > Tamper Proof.

tamper proof.png

Configure Tamper Alarm on the Web Interface

You can also enable the tamper alarm function on the web interface.

To configure on the web System > Security > Tamper Alarm interface.

image.png

Lock Security

The door phone can work with other door locks and sensors to keep the lock secure. It will sound the alarm to alert users if the door sensor finds the door open or not fully closed.

On the device, go to Security > Lock for the setting.

lock.png

magnetism type.png

Parameter Set-up:

  • Lock Type: select Positive for the lock that unlocks when the power is on and select Negative for the lock that unlocks when the power is off.
  • Lock Delay: select door unlocks delay time after you are granted door access. The delay time range is from 0-10 seconds.
  • Magnetism Type: select OFF if you want to disable the door sensor and alarm. To set the alarm trigger type, you must select ON-ALARM and OFF_ALARM according to the type of lock you applied. Select ON_ALARM for a positive lock, while select OFF_ALARM for a negative lock.
  • Magnetism Delay: select the alarm delay time after its being triggered. The delay range is from 10-120 seconds.

Motion Detection

Motion Detection is a feature that allows unattended video surveillance and automatic alarms. It detects any changes in the image captured by the camera, such as someone walking by or the lens being moved, and activates the system to perform the appropriate action.

Configure Motion Detection on the Device

You can turn on the motion detection and set up the motion detection interval on the device Advanced Setting > Surveillance > Motion screen.

motion.png

Parameter Set-up:

  • Interval: the absolute triggering interval is 3 seconds. If you select a number greater than 3 seconds, then it requires a second triggering interval to trigger the alarm. For example, if you select 3 seconds, then the alarm will be triggered when a moving object is detected one time from 0 to 3 seconds (triggered any time from 0 to 3 seconds). However, for example, if you select 5 seconds (greater than 3), then the alarm will not be triggered until a moving object is detected for the second time from 3 to 5 seconds (triggered any time from 3 to 5 seconds). The default interval is 10 seconds.

Configure Motion Detection on the Web Interface

You can adjust various motion detection settings on the device web interface, such as the time interval, the sensitivity level, the notification method when motion is detected, and more.

To configure it on the web Surveillance > Motion > Motion Detection Options interface.

image.png

Parameter Set-up:

  • Suspicious Moving Object Detection: select from Disabled, Video Detection, Radar Detection, and Video + Radar.
  • Time Interval: set the time interval in the same way as you do on the device.
  • Detection Range: set the radar detection range (1-3 meters). The default detection range is 3 meters.
  • Detection Accuracy: set the detection accuracy for the detection sensitivity (0-6). The higher value, the greater sensitivity. The default detection accuracy value is 3.

After you set up the interval, you can set up the action you need.

image.png

Parameter Set-up:

  • Action To execute: select the method to carry out the action: FTP, Email, HTTP, TFTP, SIP Call. For example, if you select Email, then an Email will be sent to you after the motion detection alarm is triggered.
  • Action HTTP URL: enter the HTTP command that will be sent to a third-party server to carry out the predefined action.
  • Action Relay: select one of the door phone relays to carry the predefined action.

Scroll down and you can also set the motion detection time schedule.

image.png

Security Notification Setting

Email Notification Setting

Set up email notification to receive screenshots of unusual motion from the door phone.

Navigate to Setting > Action > Email Notification interface.

image.png

Parameter Set-up:

  • SMTP User Name: enter the SMTP user name, which is usually the same as the sender’s email address.
  • SMTP Password: configure the password of the SMTP service, which is the same as the sender’s email address.

FTP Notification Setting

To get notifications through FTP server, you need to set up the FTP settings. The door phone will upload a screenshot to the specified FTP folder if it senses any unusual motion.

Go to Setting > Action > FTP Notification interface.

image.png

Parameter Set-up:

  • FTP Path: enter the folder name you created in the FTP server.

TFTP Notification Setting

To receive security notifications via TFTP server, you need to enter the TFTP server address. 

Go to Setting > Action > TFTP Notification interface.

image.png

SIP Call Notification

You can enter the SIP number to receive the notification.

Go to Setting > Action > SIP Call Notification interface.

图片.png

Web Interface Automatic Log-out

You can set up the web interface's automatic log-out timing, requiring re-login by entering the user name and the passwords for security purposes or for the convenience of operation.

To configure on the web System > Security > Session Time Out interface.

image.png

Parameter Set-up:

  • Session Time Out Value: set the automatic web interface log-out timing ranging from 60 seconds to 14400 seconds. The default value is 300.

Action URL

You can use the device to send specific HTTP URL commands to the HTTP server for certain actions. These actions will be triggered when the relay status, input status, PIN code, or RF card access changes.

Akuvox Action URL:

No

Event

Parameter format

Example

 1

 Make Call

 $remote

Http://server ip/ Callnumber=$remote

 2

 Hang Up

 $remote

Http://server ip/ Callnumber=$remote

3

Relay Triggered

 $relay1status

Http://server ip/ relaytrigger=$relay1status

 4

 Relay Closed

 $relay1status

Http://server ip/

relayclose=$relay1status

 5

 Input Triggered

 $input1status

Http://server ip/

inputtrigger=$input1status

 6

 Input Closed

 $input1status

Http://server ip/

inputclose=$input1status

 7

 Valid Code Entered

 $code

Http://server ip/

validcode=$code

 8

 Invalid Code Entered

 $code

Http://server ip/

invalidcode=$code

 9

 Valid Card Entered

 $card_sn

Http://server ip/

validcard=$card_sn

 10

 Invalid Card Entered

 $card_sn

Http://server ip/

invalidcard=$card_sn

11

Tamper Alarm Triggered

$alarm status

Http://server ip/tampertrigger=$alarm status

For example: http://192.168.16.118/help.xml? mac=$mac:ip=$ip:model=$model:firmware=$firmware:card_sn=$card_sn

You can navigate to Settings > Actions URL.

图片.png

Virtual PIN

The virtual PIN allows you to protect your PIN code from being leaked to someone.

To enable the virtual PIN feature, navigate to Access Control > PIN Setting > Virtual PIN.

image.png

Parameter Set-up:

  • Enabled: if enabled, you are allowed to put fake numbers on both ends of the PIN code for PIN code protection. For example, if your password is 1234567 you can put 99 and 88 on both ends (99123456788). And the virtual password is matched to the users by the number of digits that are matched. For example, if user A has a greater number of digits that are matched with the virtual password entered than user B, then it will be regarded as user A’s password. However, when double authentication is applied, then the virtual password will be matched with the users who pass the first level of authentication, for example, Face + PIN.
Note
  • This feature is not used for Public PIN and Apartment+PIN.

Client Certificate Setting

Certificates ensure communication integrity and privacy. To use the SSL protocol, you need to upload the right certificates for verification.

Web Server Certificate

It is a certificate sent to the client for authentication when the client requests an SSL connection with the Akuvox door phone. Please upload the certificates in accepted formats.

To upload a Web Server certificate on the device web System > Certificate > Web Server Certificate.

image.png

Client Certificate

This certificate verifies the server to the Akuvox door phone when they want to connect using SSL. The door phone verifies the server's certificate against its client certificate list.

To upload and configure client certificates on the same page.

image.png

Parameter Set-up:

  • Index: select the desired value from the drop-down list of Index. If you select Auto value, the uploaded certificate will be displayed in numeric order. If you select the value from 1 to 10, the uploaded certificate will be displayed according to the value that the user selected.
  • Client Certificate Upload: locate and upload the desired certificate (*.pem only).
  • Only Accept Trusted Certificates: if you select Enabled, as long as the authentication success, the phone will verify the server certificate based on the client certificate list. If you select Disabled, the phone will not verify the server certificate no matter whether the certificate is valid or not.

High Security Mode

High security mode is designed to enhance the security. It employs encryption across various facets, including the communication process, door opening commands, password storage methods, and more.

To configure it on the web System > Security > High Security Mode interface.

图片.png

Important Notes

1. The High Security mode is off by default when you upgrade the device from a version without the mode to one with it. But if you reset the device to its factory settings, the mode is on by default.

2. This mode makes the old version tools incompatible. You need to upgrade them to the following versions or higher to use them.

·PC Manager: 1.2.0.0

·IP Scanner: 2.2.0.0

·Upgrade Tool: 4.1.0.0

·SDMC: 6.0.0.34

3. The supported HTTP format for relay triggering varies depending on whether high secure mode is enabled or disabled.

If the mode is on, the device only accepts the new HTTP formats below for door opening.

  • l http://username:password@deviceIP/fcgi/OpenDoor?action=OpenDoor&DoorNum=1
  • l http://deviceIP/fcgi/OpenDoor?action=OpenDoor&DoorNum=1

If the mode is off, the device can use both the new formats above and the old format below:

  • l http://deviceIP/fcgi/do?action=OpenDoor&UserName=username&Password=password&DoorNum=1

4. It is not allowed to import/export configuration files in tgz. format between a device with the high security mode and another one without it. For assistance with file transfer, please contact Akuvox technical support.


Was this article helpful?