TVT TD-E3110-IC/PE/WF User manual

Video Doorbell
User Manual
Please read this instruction carefully before operating the unit and keep it for further
reference

Safety Instruction
The following symbols or words may be found in this manual.
Symbols/Words
Description
Warning
Indicates a medium or low potential hazardous situation which ,
if not avoided, will or could result in slight or moderate injury
Caution
Indicates a potential risk which, if not avoided, will or could
result in device damage, data loss, lower performance or
unexpected results
☞Note
Provides additional information to emphasize or supplement
important points of the text.
About the Manual
This manual is suitable for many models. All examples, screenshots, figures, charts, and
illustrations used in the manual are for reference purpose, and actual products may be
different with this Manual.
Please read this user manual carefully to ensure that you can use the device correctly
and safely.
Within the maximum scope permitted by the law, the products described in this Manual
(including hardware, software, firmware, etc.) are provided “AS IS”. The information in
this document (including URL and other Internet site reference data) is subject to
change without notice. This Manual may contain technical incorrect places or printing
errors. This information will be periodically updated, and these changes will be added
into the latest version of this Manual without prior notice.
Use of the Product
This product should not be used for illegal purposes.
The company does not allow anyone to use the Company's products to infringe the
privacy, personal information, and portrait rights of others. The user shall not use this
product for any illegal use or any prohibited use under these terms, conditions, and
declarations. When using this product, the user shall not damage, disable, overload or
obstruct any of the hardware of this product in any way, or interfere with the use of this
product by any other users. Also, the user should not attempt to use the product or the
software, by hacking, stealing the password, or any other means.
Electrical Safety
This product is intended to be supplied by a Listed Power Unit, marked with 'Limited

Power Source', 'LPS' on unit, output rated minimum 12V/2 Aor POE 48V/ 350mA or
AC24V (depending on models), no more than 2000m altitude of operation and Tma=60
Deg.C.
As for the modes with PoE function, the function of the ITE being investigated to IEC
60950-1 standard is considered not likely to require connection to an Ethernet network
with outside plant routing, including campus environment and the ITE is to be
connected only to PoE networks without routing to the outside plant.
Improper handling and/or installation could run the risk of fire or electrical shock.
The product must be grounded to reduce the risk of electric shock.
Warning: Wear anti-static gloves or discharge static electricity before removing the
bubble or cover of the camera.
Caution: Do not provide two power supply sources at the same time for the device
unless otherwise specified; it may result in device damage!
Environment
Heavy stress, violent vibration or exposure to water is not allowed during transportation,
storage and installation.
Avoid aiming the camera directly towards extremely bright objects, such as, sun, as this
may damage the image sensor.
Keep away from heat sources such as radiators, heat registers, stove, etc.
Do not expose the product to the direct airflow from an air conditioner.
Do not place the device in a damp, dusty extremely hot or cold environment, or the
locations with strong electromagnetic radiation or unstable lighting.
Make sure that no reflective surface is too close to the camera lens. The IR light from
the camera may reflect back into the lens, resulting in image blur.
Operation and Daily Maintenance
There are no user-serviceable parts inside. Please contact the nearest service center if the
product does not work properly.
Please shut down the device and then unplug the power cable before you begin any
maintenance work.
Warning: All the examination and repair work should be done by qualified
personnel.
Do not touch the CMOS sensor optic component. You can use a blower to clean the dust
on the lens surface.
Always use the dry soft cloth to clean the device. If there is too much dust, use a cloth
cleaning (such as using cloth) may result in poor IR functionality and/or IR reflection.
Dome cover is an optical device, please don't touch or wipe the cover surface directly
during installation and use. For dust, use oil-free soft brush or hair dryer to remove it
gently; for grease or finger print, use oil-free cotton cloth or paper soaked with detergent
to wipe from the lens center outward. Change the cloth and wipe several times if it is
not clean enough.

Privacy Protection
When installing cameras in public areas, a warning notice shall be given in a reasonable
and effective manner and clarify the monitoring range.
As the device user or data controller, you might collect the personal data of others, such as
face, car plate number, etc. As a result, you shall implement reasonable and necessary
measures to protect the legitimate rights and interests of other people, avoiding data leakage,
improper use, including but not limited to, setting up access control, providing clear and
visible notice to inform people of the existence of the surveillance area, providing required
contact information and so on.
Disclaimer
With regard to the product with internet access, the use of product shall be wholly at your
own risks. Our company shall be irresponsible for abnormal operation, privacy leakage or
other damages resulting from cyber attack, hacker attack, virus inspection, or other internet
security risks; however, Our company will provide timely technical support if necessary.
Surveillance laws vary from country to country. Check all laws in your local region before
using this product for surveillance purposes. We shall not take the responsibility for any
consequences resulting from illegal operations.
Cybersecurity Recommendations
Use a strong password. At least 8 characters or a combination of characters, numbers, and
upper and lower case letters should be used in your password.
Regularly change the passwords of your devices to ensure that only authorized users can
access the system (recommended time is 90 days).
It is recommended to change the service default ports (like HTTP-80, HTTPS-443, etc.) to
reduce the risk of outsiders being able to access.
It is recommended to set the firewall of your router. But note that some important ports
cannot be closed (like HTTP port, HTTPS port, Data Port).
It is not recommended to expose the device to the public network. When it is necessary to
be exposed to the public network, please set the external hardware firewall and the
corresponding firewall policy.
It is not recommended to use the v1 and v2 functions of SNMP.
In order to enhance the security of WEB client access, please create a TLS certificate to
enable HTTPS.
Use black and white list to filter the IP address. This will prevent everyone, except those
specified IP addresses from accessing the system.
If you add multiple users, please limit functions of guest accounts.
If you enable UPnP, it will automatically try to forward ports in your router or modem. It

is really very convenient for users, but this will increase the risk of data leakage when the
system automatically forwards ports. Disabling UPnP is recommended when the function is
not used in real applications.
Check the log. If you want to know whether your device has been accessed by
unauthorized users or not, you can check the log. The system log will show you which IP
addresses were used to log in your system and what was accessed.
Regulatory Information
FCC Information
Please take attention that changes or modification not expressly approved by the party
responsible for compliance could void the user’s authority to operate the equipment.
1. FCC compliance
This equipment has been tested and found to comply with the limits for a Class B digital
device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference in a residential installation. This equipment generates,
uses, and can radiate radio frequency energy, and if not installed and used in accordance with
the instructions, may cause harmful interference to radio communications. However, there is
no guarantee that interference will not occur in a particular installation. If this equipment does
cause harmful interference to radio or television reception, which can be determined by
turning the equipment off and on, the user is encouraged to try to correct the interference by
one or more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
2. FCC conditions:
This device complies with part 15 of the FCC Rules. Operation of this product is
subject the following two conditions:
This device may not cause harmful interface.
This device must accept any interference received, including interference that may
cause undesired operation.
RoHS
The products have been designed and manufactured in accordance with Directive EU RoHS
Directive 2011/65/EU and its amendment Directive EU 2015/863 on the restriction of the use
of certain hazardous substances in electrical and electronic equipment.

2012/19/EU (WEEE directive): The Directive on waste electrical and electronic
equipment (WEEE Directive). To improve the environmental management of
WEEE, the improvement of collection, treatment and recycling of electronics at
the end of their life is essential. Therefore, the product marked with this symbol
must be disposed of in a responsible manner.
Directive 94/62/EC: The Directive aims at the management of packaging and packaging
waste and environmental protection. The packaging and packaging waste of the product in
this manual refers to must be disposed of at designated collection points for proper recycling
and environmental protection.
REACH(EC1907/2006): REACH concerns the Registration, Evaluation, Authorization and
Restriction of Chemicals, which aims to ensure a high level of protection of human health and
the environment through better and earlier identification of the intrinsic properties of chemical
substances. The product in this manual refers to conforms to the rules and regulations of
REACH. For more information of REACH, please refer to DG GROWTH or ECHA websites.

Table of Contents
1Introduction.....................................................................................................................1
2Network Connection .......................................................................................................2
2.1 APP Connection.................................................................................................2
2.2 Wired Network Connection...............................................................................3
2.2.1 Access through IP-Tool ..............................................................................3
2.2.2 Wi-Fi Connection .......................................................................................6
2.2.3 WAN...........................................................................................................7
3Configuration via APP....................................................................................................9
3.1 Live View via APP ............................................................................................9
3.2 Receive/Reject a Call or Open the Door via APP..............................................9
3.3 Remote Playback via APP...............................................................................10
3.4 Disable Push Notifications via APP ................................................................11
3.5 Device Settings via APP..................................................................................11
3.6 Unbind the Doorbell from the APP .................................................................12
4Live View via Web.........................................................................................................13
5Configuration via Web..................................................................................................15
5.1 Face Detection Settings...................................................................................15
5.2 People Management ........................................................................................16
5.3 Access Control System Settings ......................................................................17
5.4 Door Lock Settings..........................................................................................18
5.5 Door Contact Settings .....................................................................................19
5.6 Wiegand Settings.............................................................................................20
5.7 Tampering Alarm Settings...............................................................................20
5.8 System Settings ...............................................................................................21
5.8.1 Basic Information .....................................................................................21
5.8.2 Date and Time...........................................................................................21
5.8.3 Local Config.............................................................................................22
5.8.4 Storage......................................................................................................23
5.9 Image Configuration........................................................................................25
5.9.1 Display Configuration...............................................................................25
5.9.2 Video / Audio Configuration ....................................................................27
5.9.3 OSD Configuration...................................................................................29
5.9.4 White Light Control..................................................................................29
5.10 Alarm Configuration......................................................................................30
5.10.1 Video Exception Detection .....................................................................30
5.10.2 Alarm In..................................................................................................31
5.11 Network Configuration..................................................................................32
5.11.1 TCP/IP.....................................................................................................32

Video Doorbell User Manual
5.11.2 Port..........................................................................................................33
5.11.3 Server Configuration...............................................................................33
5.11.4 Onvif.......................................................................................................34
5.11.5 DDNS......................................................................................................35
5.11.6 802.1x .....................................................................................................36
5.11.7 RTSP.......................................................................................................36
5.11.8 UPnP.......................................................................................................37
5.11.9 Email.......................................................................................................38
5.11.10 FTP........................................................................................................39
5.11.11 HTTPS ..................................................................................................39
5.11.12 P2P........................................................................................................40
5.11.13 QoS .......................................................................................................41
5.11.14 Wi-Fi Settings .......................................................................................41
5.12 Security Configuration ..................................................................................42
5.12.1 User Configuration .................................................................................42
5.12.2 Online User.............................................................................................44
5.12.3 Block and Allow Lists.............................................................................45
5.12.4 Security Management .............................................................................45
5.13 Maintenance Configuration...........................................................................46
5.13.1 Backup and Restore ................................................................................46
5.13.2 Reboot.....................................................................................................47
5.13.3 Upgrade...................................................................................................47
5.13.4 Operation Log.........................................................................................47
6Search.............................................................................................................................49
6.1 Image Search...................................................................................................49
6.2 Video Search....................................................................................................51
6.2.1 Local Video Search...................................................................................51
6.2.2 SD Card Video Search ..............................................................................52
Appendix................................................................................................................................54
Appendix 1 Troubleshooting.............................................................................................54

1
Video Doorbell User Manual
1Introduction
Main Features
Max. resolution: 2MP (1920×1080)
Wide field of view achieving doorway security monitoring
Access control function
Noise suppression and echo cancellation
Visual intercom function: two-way remote communication between the doorbell and
mobile APP
Support door opening by swiping card or mobile APP
Support IR and white LED lights
Support tampering alarm and door contact alarm
2.4G Wi-Fi
Built-in micro SD card slot, up to 256GB
Intelligent Analysis: video exception detection, face detection, face capture, etc.

2
Video Doorbell User Manual
2Network Connection
2.1 APPConnection
Enable Wi-Fi network of your phone. Then scan the QR Code of the APP in the QSG
(Quick Start Guide) or open your phone’s APP store and search “Superlive Plus”. Then install
the mobile APP (Superlive Plus) in your phone.
Run the mobile APP and then log in your account of the APP (if you don’t register, please
register and log in first). Then enter the server list interface of the APP.
Power on your video doorbell. Then tap “Add Device”in the server list interface of the
APP. Scan the QR Code attached on the back of the video doorbell or the QR Code of the
video doorbell in the QSG. After that, go to the Wi-Fi configuration interface by tapping
“Add”. When the indicator of the doorbell is blue, check “Confirmed that…” and tap “Next
Step”.
Enter the key (or password) of the Wi-Fi network. Tap “Next Step”. Then join the Wi-Fi
network by tapping “Join”as shown below.
After that, the doorbell will be automatically added to the server list.

3
Video Doorbell User Manual
Note: 1. When configuring the Wi-Fi network via the APP, (a). DO NOT connect the network
cable to the Ethernet connector of the device; (b). your mobile phone must be connected to the
Wi-Fi network; (c). the doorbell must be within the mobile phone signal covering area. DO
NOT move your phone too far away with the doorbell.
2. After the Wi-Fi of the doorbell is successfully connected, you can use Wi-Fi or mobile
web in your mobile phone as needed. However, if you want to remotely view the doorbell
video via mobile web, please make sure the wireless router/AP connected the doorbell has
been connected to the Ethernet.
2.2 Wired Network Connection
Here we take device access via Web browser for example.
Web browser: IE (plug-in required)/ Firefox/Edge/Safari/Google Chrome
It is recommended to use the latest version of these web browsers.
The menu display and operation of the camera may be slightly different by using the browser
with plug-in or without plug-in. Installing plug-in will display more functions of the camera.
Connect IP-Cam via LAN or WAN. Here only take IE browser for example. The details are as
follows:
2.2.1 Access through IP-Tool
Network connection:
①Make sure the PC and device are connected to the same local network and the IP-Tool is

4
Video Doorbell User Manual
installed in the PC from the supplier.
②Double click the IP-Tool icon on the desktop to run this software as shown below:
If there are many devices, please find your device via its MAC address.
③Double click the IP address and then the system will pop up the IE browser to connect
IP-CAM. After you read the privacy statement, check and click “Already Read”. Then
activate the device.
Please self-define the password of admin according to the tip.
If “Activate Onvif User”is enabled, the ONVIF user can be activated simultanously. When
you connect the camera through the ONVIF protocol in the third-party platform, you can use
the default username and the password set above to connect.
After that, follow directions to download, install and run the Active X control if prompted.
Re-connect your camera via IE browser and then a login box will appear.

5
Video Doorbell User Manual
Please enter the user name (admin) and password. Then select the stream type and language
as needed.
The security questions must be set after you click “Login”button. It is very important for you
to reset your password. Please remember these answers.
If you forget the admin password, you can reset the password by clicking Forget Password
on the login page. Then you can reset the password by the security questions and answers you
set.
You can set the account security question during the activation, or you can go to
ConfigSecurityUser, click Safety Question, select the security questions and input your
answers.
After that, you can add your device to the APP. The steps are as follows:
1) Scan the QR Code of the APP in the QSG (Quick Start Guide) or open your phone’s APP
store and search “Superlive Plus”. Then install the mobile APP (Superlive Plus) in your
phone.
2) Run the mobile APP and then log in your account of the APP (if you don’t register,
please register and log in first). Then enter the server list interface of the APP.
3) Tap “Add Device”in the server list interface of the APP. Scan the QR Code (log in via

6
Video Doorbell User Manual
web and then go to ConfigBasic Information interface) to directly add the
device to the server list of the APP.
2.2.2 Wi-Fi Connection
Use the network cable to connect the device and wireless router or AP.
Connect to the above wireless network with your PC. Then run the IP-Tool on your PC
and then find the device via its MAC address. Then double click it. This will bring you to
the login interface of the camera. Enter the default username and password to log in. (See
2.2.1 for details)
③Click ConfigNetworkWIFI to go to the following interface. Enable WI-FI, select the
desired router, enter the key and select encryption type.
After that, select “Obtain an IP address automatically” or manually enter the IP address by
clicking “Use the following IP address”. Then click “Save” to save the settings.

7
Video Doorbell User Manual
④Pull the network cable out of the camera.
⑤Run the IP-Tool and find the camera through IP address or MAC address. Then double
click it listed in the IP-Tool or enter the IP address of the camera in the address bar of the web
browser to access the camera.
After that, you can also use the downloaded APP to scan the QR code of the device to directly
add it to the server list of the APP.
2.2.3 WAN
To remotely access the device via Web, the setting steps are as follows:
①Make sure the camera is well connected via LAN and then log in the camera via LAN and
go to ConfigNetworkPort menu to set the port number.
Port Setup
②Go to Config NetworkTCP/IP menu to modify the IP address.

8
Video Doorbell User Manual
IP Setup
③Go to the router’s management interface through IE browser to forward the IP address and
port of the camera in the “Virtual Server”.
Router Setup
④Open the IE browser and enter its WAN IP and http port to access. (for example, if the http
port is changed to 81, please enter “192.198.1.201:81” in the address bar of web browser to
access).

9
Video Doorbell User Manual
3Configuration via APP
3.1 Live View via APP
After the device is added to the APP, tap in the server list interface to view the
video.
Tap the video and then multiple icons will be displayed. You can do the above-mentioned
operations as needed (like take a snapshot, record, switch definition).
Note: You can add the device to the APP by directly scanning the QR Code of the device,
or connect the device to the Ethernet via the wired/wireless network connection first and
then scan the QR Code of the device to add it via the APP.
3.2 Receive/Reject a Call or Open the Door via APP
You can receive or reject a call when the APP window is opened or closed.
1. When the APP is opened,

10
Video Doorbell User Manual
Press the Call button of the doorbell, and then a calling interface will be shown in the
APP. Now, you can answer or hang up the call, or choose to remotely open the door as
needed.
2. When the APP is closed,
Press the Call button of the doorbell, and then a message will pop up on the top of the
page. Tap this message within 60s to enter to the calling interface.
Note: You must enable the notification function of the APP in your phone first, or no
message will be received.
3.3 Remote Playback via APP
You can remotely play back the recorded files stored on the SD card via the APP. In the
live view interface of the APP, select the video doorbell channel and then tap to
remotely play back the video. You can select the playback time on the timescale.

11
Video Doorbell User Manual
In the remote playback interface, tap to select the detailed date and time as needed.
3.4 Disable Push Notifications via APP
If you don’t want to receive the doorbell information, you can disable the relevant push
notifications via APP.
Tap Main MenuPush Setting. Select the doorbell channel name to enter. Disabling
“Message Subscription”will turn off all intelligent alarm notifications of the device. You
can also disable one more items listed on the interface as needed.
3.5 Device Settings via APP
In the server list interface, tap under the doorbell name. This will take you to the
device information interface as shown below.

12
Video Doorbell User Manual
In the device information page, you can view basic information, SD card information,
Wi-Fi information of the device. There is also an option to enable or disable “Dismantle
Alarm”(Tampering alarm).
Note: If your SD card has been used in other devices before it is inserted in this device,
you need to format it first.
3.6 Unbind the Doorbell from theAPP
In the server list interface of the APP, tap under the video doorbell name to unbind
it.
Note that the device also can be unbound from the APP via Web
(ConfigSystemBasic Information). See Basic Information section for details.
Table of contents