Technaxx® * User Manual Smart WiFi Video Door Phone TX-82 WiFi camera with door opener function for the entrance door The manufacturer Technaxx Deutschland GmbH & Co.KG hereby declares that this device, to which this user manual belongs, complies with the essential requirements of the standards referred to the Directive RED 2014/53/EU. The Declaration of Conformity you find here: www.technaxx.de/ (in bar at the bottom “Konformitätserklärung”).
5.1.1 Login .................................................................................................................................... 11 5.1.2 Logout.................................................................................................................................. 12 6. System Config........................................................................................................................... 12 6.1 Local Config...........................................................
11.1 Install My Secure Pro PC Client ............................................................................................ 36 11.2 Add a device ......................................................................................................................... 37 11.3 Monitor TX-82 ....................................................................................................................... 38 11.4 Set MGT Center...........................................................................
3.1 Front Panel Device front panel: figure 3-1 and chart 3-1 Figure 3-1 & Chart 3-1 No. 1 2 3 Port Name Microphone Camera Card Area 4 Indicator 5 6 Call Button Speaker Note Audio input It monitors corresponding door region Authorize RFID (NFC) to unlock (card issuing), swipe card to unlock In standby the blue ring lights steady. Network offline, blue light flashes when call ISM or MGT center. Notifications vial My Secure Pro App (or MGT center or ISM). Audio output.
3.2 Rear Panel Device rear panel: figure 3-2 and chart 3-2 Figure 3-2 & Chart 3-2 No. 1 Component Name Bracket position 2 Vandal-proof switch 3 Alarm input / output interface Note Bracket used to fix device and wall. When TX-82 is forced to leave wall, an alarm is triggered, which will be shown in the My Secure Pro APP (or MGT center). 1-Ch alarm input 4 RESET Key Press this key for 3–4 seconds to reset the WIFI configuration.
4. Basics, Installation and Debug 4.1 Basic Function Introduction TX-82 supports unlock by card and video talk with My Secure Pro App (or MGT center and ISM). In order to take full advantage of the functions of the device, you need the additional available TX-89 WiFi 7” Monitor (ISM). 4.1.1 Monitor Download mobile phone App (My Secure Pro) and view video of TX-82 remotely. Refer to chapter 6.4.3 P2P. (You can also watch live view local via ISM or MGT center.) 4.1.
4.1.4 Restore Backup Restore RFID (NFC) Info: If you encounter abnormality with card info or accidently restore default settings, you can restore card info with this function. Restore ISM Info: If ISM info is mistakenly changed, you can restore ISM info with this function. Note: Every half hour, SVD automatically saves card and ISM info in the system. If you want to restore card and/or ISM info, you must restore within half hour after your last operation that change these info. Please refer to chapter 6.1.
4.3 Device Wiring Figure 4-1 485 device Electric drop bolt Electric strike Door sensor Unlock button Press to exit 12V power DC power GND (Ground) Unlock Feedback NC (normally open) = Contact for opening NO (normally closed) = Contact for closing 12V Net (RJ45) = Network (RJ45) To connect an electric strike or an electric drop bolt use the NO or NC and the COM connection. Electric strike: Use the NO and the COM connection of the TX-82. COM has to be connected with the external power positive pole.
Door Sensor: You can install a door sensor and connect it with the TX-82. The function is to get an alarm when door is not closed. See chapter 6.1.2 A&C Manager “Door Sensor Check Time”. Connect to GND and Feedback Unlock button: You can install an unlock button on the inside of the house. By pressing manual unlock button you can exit. Connect to GND and Unlock. 485 Device: Developer Interface, no use for customer. 4.
Step 1. According to position of bracket, drill hole on installation surface (such as wall). Behind the device should be an installation box with the required connections DC voltage 12V/1A and LAN cable (RJ-45). Step 2. Insert expansion bolt in hole you just have drilled. Step 3. Fix bracket on designated position with screw. Step 4. Connect all necessary cables (power supply, door opener, LAN, etc.). Step 5. Fix TX-82 with a screw to the bracket. Step 6. Mount sealing element at rear of device.
Figure 4-4 Step 3. Enter username and password. Note: Default username is “admin”. Default password is “admin”. Please refer to chapter 6.4.1 TCP/IP for setup. After modification is finished, WEB page will restart and go to new IP address. 4.5.2 Installation via WiFi (My Secure Pro APP) For installing via My Secure Pro App go to chapter 9. My Secure Pro. 5. Web Interface The TX-82 can be configured via the WEB user interface. 5.1 WEB Login and Logout 5.1.1 Login Step 1.
5.1.2 Logout Step 1. Select Logout´ Logout Logout. See figure 5-2. Figure 5-2 Step 2. Click Logout Logout. The system exits the WEB interface and returns to login Reboot Device Reboot Device interface, click Reboot interface. You can go to Logout Device to restart. 6. System Config 6.1 Local Config Under Local Config interface, you can view and set Local Config, A&C Manager, Talk Manager, System Time and Config Manager. 6.1.
Parameter Sensor Storage Point Device Type Reboot Date Version Info Dial Rule Language Default Refresh OK Note Set compensation light threshold. Light compensation will automatically turn on during monitoring, calling, or connecting status if there is not enough light in environment. The greater the value, the better the sensitivity of the fill light. Storage path of record and picture, you can select FTP or SD Card. Please refer to chapter 6.4.2 for FTP setup. Display device type.
Check Door Sensor to enable it. When door remains unlocked over set door sensor Signal Before Lock check time, it alarms via push notification. Auto Snapshot Select Enable, when you swipe card, it auto snapshot two pictures and upload them to FTP or MicroSD card. Upload Unlock Record Select Enable, upload unlock record. You can view in Info Search Unlock Record Unlock Record. Who and when has entered/unlocked the door.
6.1.3 Talk Manager Go to System Config Local Config Talk Manager, see figure 6-3. The device supports talk management and you can enable and disable upload of talk call record, message and auto snapshot. Figure 6-3 Parameter Auto Snapshot Leave Message Upload (Only usable with additional ISM) Note Select Enable, when it calls, auto snapshot two pictures and upload to FTP or SD card. (One snapshot when you answer the call and one picture when you hang up).
6.1.4 System Time Go to System Config Local Config System Time (6-4). Here you can set date format, time format (24-hour and 12-hour), and input system date and time. You can also click on Sync PC to synchronize system time with PC time. You also can set DST (summertime) start and end time. Figure 6-4 Parameter Date Format Time Format System Time Sync PC DST Enable DST Type Start Time End Time NTP Enable NTP Server Zone Port No. NTP Update Period Default Refresh OK Note Set system date fomat.
6.1.5 Config Manager Go to System Config Local Config configuration, or restore default setup. Config Manager (6-5). You can import and export Figure 6-5 Parameter Backup Note Check “card no.”, “ISM info”, and click ,so you can back up card no. and ISM info. Note: This button is just for saving the current settings. Restore Restore backup card info or ISM info.
6.2 LAN Config (Only usable with additional ISM) Note: ISM is an additional product that can be used to expand the function of TX-82. Settings on chapter 6.2 LAN Config can only set with ISM and TX-82 in the same network. LAN Config LAN Config, see figure 6-6. Here you can register Go to System Config TX-82 to MGT center. Enter IP of your PC the My Secure Pro PC Client Software (see chapter 11 My Secure Pro PC Client) is installed on. This PC will be the MGT center.
Parameter Group Call MGT Center IP Address Register to MGT Center MGT Port No. Call VTS Time Call VTS or Not Default Refresh Note Check “Group Call” box to call all ISMs, in this room. Enter IP address and port no. of MGT center (PC with My Secure Pro PC Client installed), check “Register to MGT center” box. Important: Don’t change the port! Set period of call button on device to call MGT center.
Parameter Family Name First Name Nick Name ISM Short No. IP Address Note Set username and nick name of ISM. Set ISM room no. Note: ISM short no. is composed of 4 digits of number. The first two digits have range of 01~99. The last two digits have range of 01~16. ISM IP address. Note: IP Address is not needed for TX-82 stand alone. Chart 6-7 Step 4. Click . System displays interface when ISM is added. See figure 6-8. Figure 6-8 6.3.2 Modify ISM Click , in pop-up modification page modify ISM info. 1.
6.3.3 View Card Info Card authorization you can find in chapter 6.1.2 A&C Manager. to view all authorized card under the ISM. See chart 6-8. Click Parameter Note Card ID Card Number Show RFID (NFC) number, username and ISM room no. Username Check “main card” box, set this RFID (NFC) to be main card. Note: Main Main Card card has card authorization function, and this device does not support. Report Loss When RFID (NFC) is lost, click to report loss. Lost RFID (NFC) cannot unlock door.
Parameter Connection IP Address Subnet Mask Default Gateway MAC Address DNS Address DHCP Default Interface Default Refresh OK Note LAN (Eth0): Connection via LAN (Ethernet) cable with router (wired). WiFi (Eth2): Connection via WiFi with router (wireless). Enter corresponding number to change IP address. According to actual condition, set subnet mask which prefix is number, enter 1~255,subnet mask prefix has a specific network link, which includes one layer structure in general.
Step 2. Configure parameters, see Chart 6-10. Parameter Note IP address of host where FTP server is installed. (Only IP address, IP Address without ftp://) Port No. Default is 21. Username Access FTP server username and password. Password Chart 6-10 Step 3. Click OK. 6.4.3 P2P The P2P connection simplifies the access to the TX-82 from home and everywhere in the world via your Smartphone. The Smartphone needs a stable Internet connection. Step 1. Go to System Config Network P2P interface. See figure 6-11.
6.5 Video Set 6.5.1 Video Set Video Set interface to set video and audio. You can go to System Config Step 1. Select System Config Video Set. Step 2. Adjust video parameter. See figure 6-12. Note: If you cannot see video in window, install the required plug-in first. Figure 6-12 Parameter Video Format Main Format Frame Rate Bit Rate Video Format Extra Format Frame Rate Bit Rate Brightness Note Adjust video resolution, includes 720P, WVGA and D1. 720P: 1280×720. WVGA: 800×480. D1: 720×576.
Parameter Note Contrast Adjust video image contrast, recommended value is 40~60, range is 0~100. Saturation Adjust color saturation, recommended value is 40~60, range is 0~100. Saturation Adjust color saturation, recommended value is 40~60, range is 0~100. Gain Scene Mode Day/Night Mode Gain limit of video basic parameter. Select mode: Disabled, Automatic, Sunny and Night. Include: colorful, Automatic and Black White.
6.6 User Manager You can add, delete user or modify user password. 6.6.1 Add User Step 1. Select System Config User Manager, system enters User Manager Interface. Step 2. Click Add. Step 3. Configure user info to add. See figure 6-14. Figure 6-14 Step 4. Click . See figure 6-15. Only when you are logged in as admin, you can add, modify, delete and view user info in User Manager Interface. Current system supports two types of user: Admin has higher right who can view, edit, delete configured right.
6.6.3 Modify User Step 1. Select user who you want to modify his/her password, click . See figure 6-16. Figure 6-16 Step 2. Check Change Password box. System shows Old Password, New Password and Confirm Password. Step 3. Configure interface parameter. Step 4. Click OK, for saving. Note: For your own safety we suggest to change the standard password of the Admin account immediately! Only possible in the WEB interface. If login data has changed it must be changed in the My Secure Pro APP also. 6.
6.8 WIFI Info To configure WIFI: Step 1. Go to System Config WIFI Info WIFI Info. Step 2. Click Open WiFi, the system searches and displays the available WiFi networks, see figure 6-18. Figure 6-18 Step 3. Click of WIFI you want to connect. System shows Connection interface (6-19). Figure 6-19 Step 4. Enter WIFI password (WiFi key of the router) and click OK to complete device WLAN connection. Now System Config Network Config TCP/IP interface shows WiFi (Eth2) connection.
7.2 Alarm Record (Only usable with additional ISM) Go to Info Search Alarm Record Alarm Record interface. See figure 7-2. You can search TX-82 alarm in Alarm Record interface, and it stores up to 1024 records. Figure 7-2 Click Export Record button to export villa TX-82 alarm record. 7.3 Unlock Record Go to Info Search Unlock Record Unlock Record. See figure 7-3 You can search TX-82 unlock records in Unlock Record interface, and it stores up to 1024 records.
8 Status Statistics Warning: If the added ISM is not online, then you go to Status Statistics ISM Status interface, view ISM connection status, monitor status port no. and etc. See figure 8-1. In ISM status, you can view ISM connection status. Status: Offline Connection between TX-82 and ISM is disconnected; you cannot call, monitor or talk. Online Connection between TX-82 and ISM is ready; you can call, monitor and talk. Unmom: ISM is not monitoring. Onmom: ISM is monitoring.
Tip: To add the Doorphone to your Smartphone when it is already configured use P2P. See chapter 9.1.2 P2P configuration. Figure 9-1 1. Choose WiFi configuration. 2. Interface display: Name, SN (QR code), username, password, push notifications, and Audio Only. See Figure 9-2. 3. Select a device name and enter it. 4. Click , scan QR code (on device rear side) and the picture will be like Figure 9-2 5. Enter username and password (Default: Username: admin; Password: admin).
8. Your Smartphone will use the WIFI connection you are currently connected to. Insert the password of your WIFI router like seen in figure 9-3. 9. Press “Next” button. 10. System auto configure (wait). Figure 9-3 11. If failed, then click “try again” or repeat the above steps. 12. All configurations are saved automatically, when correct. See figure 9-3. 13. Press “Start Live preview”. See figure 9-3. Figure 9-3 9.1.
Figure 9-4 Tip: If you want to see the Doorphone under camera with all your other cameras. Add the camera under Camera option of the App with P2P function and you can see the live view. 9.1.3 Function of the Button -> Live Preview (9-5) Accept/Reject a call Open the door Deactivate microphone Take a snapshot Start/Stop video recording Select between Main and Extra stream.
9.2 Local files Under local flies you see manual taken snapshots and records of the door phone. Figure 9-6 Tip: With the pencil on to top right corner you can modify snapshot or record. The options depend on the Smartphone you are using. Also you can delete the selected snapshot or record here. 9.3 Event List Here you can see the event list of calls. It shows different devices, date and time. 10. Quick Configuration Tool 10.
Figure 10-1 In the device list interface, you can view device IP address, port number, subnet mask, MAC address and etc. If you want to modify the device without logging into the device web interface, go to the configuration tool main interface to set . Please use the WEB interface! In the configuration tool search interface (Figure 10-2), select a device IP address and then double click it to open the login interface.
Figure 10-2 In Figure 10-2, you can see all the options that can be set. (Sometimes it is not possible because of safety issues to set all settings.) To set all options find out the IP of your device and enter it to the browser or press on (Figure 10-1) to open the WEB Interface in your browser. You are prompted to install the associated Plug-in. 11 PC Software (My Secure Pro PC Client) 11.
Figure 11-1 11.2 Add a device To add a device click on the device symbol shown in figure 11-1 first symbol bottom line. Press the refresh button to refresh the device list. See figure 11-2. When you have installed your TX-82 and connected it via LAN/WLAN with your router, it should show up in the device list. To add the TX-82 to your devices just double click on it. Note: If you do not see your device, adjust the IP range to the IP range of your router (Device Network Section).
After double clicking the TX-82 you can see that it is now added to the device list below. See figure 11-3. By clicking one of the symbols under Operation the added devices also can be modified, refreshed, logged out, deleted or change password. Figure 11-3 11.3 Monitor TX-82 After you have added the TX-82 to your devices you can go to Video Talk. See figure 11-1 last symbol of top row. In figure 11-4 on the right you can see the installed TX-82 device/s.
11.4 Set MGT Centre To get the calls of the TX-82 also on your PC, you have to insert and save the IP of your MGT centre in the following figure 11-5. For TX-82 as standalone we suggest to insert the PC with My Secure Pro PC Client installed. To get called, the PC must be online and My Secure Pro PC Client has to be in working mode with Video Talk opened. After you inserted the IP of your PC as VTS address go to chapter 6.
You also can see the live view when nobody is calling. Press on the microphone button and the live view window opens. See figure 11-7. Note: When you open the call from PC it is not possible to activate microphone or speakers. Figure 11-7 11.6 Smart Player With the Smart Player which is installed with My Secure Pro PC Client you can play the .dav files. These files are created when you leave a message (saved on FTP) or record a video (saved local or FTP).
12 Technical specifications System main process & OS Embedded: Micro-Controller & Linux OS H.264 video compression standard Video 1280x720 (720P) Video resolution Audio compression G.711 Audio (microphone, loudspeaker, 2-way-communication) WEB interface, My Secure Pro APP (iOS & Android), PC Door opening via… Client (Windows), RFID Chip (distance ~1–3cm) 1-ch unlock button Entrance 1-ch door sensor feedback 1 relay for main lock Outdoor control 1 megapixel Front camera 2.
Important Safeguards and Warnings Do not expose the device to lampblack, steam or dust. Otherwise it may cause fire or electric shock. Do not install the device at position exposed to sunlight or in high temperature. Temperature rise in device may cause fire. Do not expose the device to humid environment. Otherwise it may cause fire. The device must be installed on solid and flat surface in order to guarantee safety under load and earthquake. Otherwise, it may cause device to fall off or turnover.
This product includes software developed by third parties, including software which is released under the GNU General Public License Version 2 (GPL v2). This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software.
c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License.
4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5.
9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number.
HOW TO APPLY THESE TERMS TO YOUR NEW PROGRAMS (1) If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. (2) To do so, attach the following notices to the program.