all | frequencies |
|
|
|
|
|
exhibits | applications |
---|---|---|---|---|---|---|---|---|
manual | photos | label |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 2 |
|
User Manual | Users Manual | 3.68 MiB | July 26 2022 | |||
1 2 |
|
Internal photo | Internal Photos | 2.52 MiB | July 26 2022 | |||
1 2 |
|
Applicant Declaration Letter | External Photos | 217.60 KiB | July 26 2022 | |||
1 2 |
|
External photo | External Photos | 1.25 MiB | July 26 2022 | |||
1 2 |
|
Label | ID Label/Location Info | 145.85 KiB | July 26 2022 | |||
1 2 |
|
Auth letter | Cover Letter(s) | 155.65 KiB | July 26 2022 | |||
1 2 | Block diagram RF | Block Diagram | July 26 2022 | confidential | ||||
1 2 | Bolck diagram unit | Block Diagram | July 26 2022 | confidential | ||||
1 2 |
|
Confidentiality FCC | Cover Letter(s) | 111.46 KiB | July 26 2022 | |||
1 2 |
|
MCL | Cover Letter(s) | 142.87 KiB | July 26 2022 | |||
1 2 |
|
MPE | RF Exposure Info | 691.36 KiB | July 26 2022 | |||
1 2 | Operational description | Operational Description | July 26 2022 | confidential | ||||
1 2 | Schematics RF | Schematics | July 26 2022 | confidential | ||||
1 2 | Schematics unit | Schematics | July 26 2022 | confidential | ||||
1 2 |
|
Setup photo | Test Setup Photos | 1.14 MiB | July 26 2022 | |||
1 2 | Test Report | July 26 2022 | ||||||
1 2 |
|
Test report | Test Report | 1.39 MiB | July 26 2022 |
1 2 | User Manual | Users Manual | 3.68 MiB | July 26 2022 |
Face Recognition Access Controller User's Manual Foreword General This manual introduces the functions and operations of the Face Recognition Access Controller
(hereinafter referred to as the "Access Controller"). Read carefully before using the device, and keep the manual safe for future reference. Safety Instructions The following signal words might appear in the manual. Signal Words Meaning Indicates a high potential hazard which, if not avoided, will result in death or serious injury. Indicates a medium or low potential hazard which, if not avoided, could result in slight or moderate injury. Indicates a potential risk which, if not avoided, could result in property damage, data loss, reductions in performance, or unpredictable results. Provides methods to help you solve a problem or save time. Provides additional information as a supplement to the text. Revision History Version V1.0.0 Privacy Protection Notice Revision Content Release Time First Release. June 2022 As the device user or data controller, you might collect the personal data of others such as their face, fingerprints, and license plate number. You need to be in compliance with your local privacy protection laws and regulations to protect the legitimate rights and interests of other people by implementing measures which include but are not limited: Providing clear and visible identification to inform people of the existence of the surveillance area and provide required contact information. About the Manual product. The manual is for reference only. Slight differences might be found between the manual and the We are not liable for losses incurred due to operating the product in ways that are not in compliance with the manual. The manual will be updated according to the latest laws and regulations of related jurisdictions. For detailed information, see the paper users manual, use our CD-ROM, scan the QR code or visit our official website. The manual is for reference only. Slight differences might be found between the electronic version and the paper version. All designs and software are subject to change without prior written notice. Product updates I might result in some differences appearing between the actual product and the manual. Please contact customer service for the latest program and supplementary documentation. There might be errors in the print or deviations in the description of the functions, operations and technical data. If there is any doubt or dispute, we reserve the right of final explanation. Upgrade the reader software or try other mainstream reader software if the manual (in PDF All trademarks, registered trademarks and company names in the manual are properties of their format) cannot be opened. respective owners. Please visit our website, contact the supplier or customer service if any problems occur while using the device. If there is any uncertainty or controversy, we reserve the right of final explanation. II Important Safeguards and Warnings This section introduces content covering the proper handling of the Access Controller, hazard prevention, and prevention of property damage. Read carefully before using the Access Controller, and comply with the guidelines when using it. Transport, use and store the Access Controller under allowed humidity and temperature conditions. Store the Access Controller under allowed humidity and temperature conditions. Transportation Requirement Storage Requirement Installation Requirements Do not connect the power adapter to the Access Controller while the adapter is powered on. Strictly comply with the local electric safety code and standards. Make sure the ambient voltage is stable and meets the power supply requirements of the Access Controller. Do not connect the Access Controller to two or more kinds of power supplies, to avoid damage to the Access Controller. Improper use of the battery might result in a fire or explosion. Personnel working at heights must take all necessary measures to ensure personal safety including wearing a helmet and safety belts. Do not place the Access Controller in a place exposed to sunlight or near heat sources. Keep the Access Controller away from dampness, dust, and soot. Use an adapter or cabinet power supply provided by the manufacturer. Use the power cords that are recommended for the region and conform to the rated power Install the Access Controller on a stable surface to prevent it from falling. Install the Access Controller in a well-ventilated place, and do not block its ventilation. specifications. Controller label. The power supply must conform to the requirements of ES1 in IEC 62368-1 standard and be no higher than PS2. Please note that the power supply requirements are subject to the Access The Access Controller is a class I electrical appliance. Make sure that the power supply of the Access Controller is connected to a power socket with protective earthing. Operation Requirements Check whether the power supply is correct before use. Do not unplug the power cord on the side of the Access Controller while the adapter is powered III on. Operate the Access Controller within the rated range of power input and output. Use the Access Controller under allowed humidity and temperature conditions. Do not drop or splash liquid onto the Access Controller, and make sure that there is no object filled with liquid on the Access Controller to prevent liquid from flowing into it. Do not disassemble the Access Controller without professional instruction. This product is professional equipment. IV Table of Contents Foreword ........................................................................................................................................................................................................I Important Safeguards and Warnings ............................................................................................................................................ III 1 Overview ................................................................................................................................................................................................... 1 1.1 Introduction ................................................................................................................................................................................. 1 1.2 Features .......................................................................................................................................................................................... 1 1.3 Application.................................................................................................................................................................................... 2 2 Local Operations ................................................................................................................................................................................... 3 2.1 Basic Configuration Procedure ........................................................................................................................................... 3 2.2 Common Icons ............................................................................................................................................................................. 3 2.3 Standby Screen ........................................................................................................................................................................... 3 2.4 Initialization ................................................................................................................................................................................. 4 2.5 Logging In...................................................................................................................................................................................... 5 2.6 Network Communication ...................................................................................................................................................... 5 2.6.1 Configuring IP................................................................................................................................................................... 5 2.6.2 Active Register ................................................................................................................................................................. 6 2.6.3 Configuring Wi-Fi ............................................................................................................................................................ 7 2.6.4 Configuring Serial Port ................................................................................................................................................ 7 2.6.5 Configuring Wiegand ................................................................................................................................................... 8 2.7 User Management ..................................................................................................................................................................... 9 2.7.1 Adding New Users .......................................................................................................................................................... 9 2.7.2 Viewing User Information ........................................................................................................................................ 11 2.7.3 Configuring Administrator Password ................................................................................................................ 11 2.8 Access Management .............................................................................................................................................................. 12 2.8.1 Configuring Unlock Combinations ...................................................................................................................... 12 2.8.2 Configuring Alarm ........................................................................................................................................................ 13 2.8.3 Configuring Door Status ........................................................................................................................................... 14 2.8.4 Configuring Lock Holding Time ............................................................................................................................ 14 2.9 Attendance Management .................................................................................................................................................... 14 2.10 System ........................................................................................................................................................................................ 17 2.10.1 Configuring Time ....................................................................................................................................................... 17 2.10.2 Configuring Face Parameters .............................................................................................................................. 18 2.10.3 Setting Volume............................................................................................................................................................ 20 2.10.4 (Optional) Configuring Fingerprint Parameters ........................................................................................ 20 2.10.5 Screen Settings ............................................................................................................................................................ 20 2.10.6 Restoring Factory Defaults .................................................................................................................................... 20 V 2.10.7 Restart the Device ...................................................................................................................................................... 21 2.10.8 Configuring the Language .................................................................................................................................... 21 2.11 USB Management ................................................................................................................................................................. 21 2.11.1 Exporting to USB ........................................................................................................................................................ 21 2.11.2 Importing From USB ................................................................................................................................................. 22 2.11.3 Updating System ........................................................................................................................................................ 22 2.12 Configuring Features .......................................................................................................................................................... 23 2.13 Unlocking the Door .............................................................................................................................................................. 24 2.13.1 Unlocking by Cards ................................................................................................................................................... 25 2.13.2 Unlocking by Face ...................................................................................................................................................... 25 2.13.3 Unlocking by User Password ................................................................................................................................ 25 2.13.4 Unlocking by Administrator Password ........................................................................................................... 25 2.13.5 Unlocking by QR code .............................................................................................................................................. 25 2.13.6 Unlocking by Fingerprint ....................................................................................................................................... 25 2.14 Viewing Unlock Logs ........................................................................................................................................................... 26 2.15 System Information ............................................................................................................................................................. 26 2.15.1 Viewing Data Capacity ............................................................................................................................................ 26 2.15.2 Viewing Device Version .......................................................................................................................................... 26 3 Web Operations ................................................................................................................................................................................... 27 3.1 Initialization ............................................................................................................................................................................... 27 3.2 Logging In.................................................................................................................................................................................... 27 3.3 Resetting the Password ........................................................................................................................................................ 28 3.4 Configuring Door Parameter ............................................................................................................................................. 29 3.5 Intercom Configuration ........................................................................................................................................................ 32 3.5.1 Configuring SIP Server ............................................................................................................................................... 32 3.5.2 Configuring Basic Parameters ................................................................................................................................ 35 3.5.3 Adding the VTO ............................................................................................................................................................. 37 3.5.4 Adding the VTH.............................................................................................................................................................. 37 3.5.5 Adding the VTS .............................................................................................................................................................. 39 3.5.6 Viewing Device Status ................................................................................................................................................ 40 3.5.7 Viewing Call Logs .......................................................................................................................................................... 40 3.6 Configuring Time Sections .................................................................................................................................................. 40 3.6.1 Configuring Time Sections ....................................................................................................................................... 40 3.6.2 Configuring Holiday Groups ................................................................................................................................... 41 3.6.3 Configuring Holiday Plans ....................................................................................................................................... 42 3.7 Data Capacity ............................................................................................................................................................................. 42 3.8 Configuring Video and Image ........................................................................................................................................... 43 3.8.1 Configuring Video ........................................................................................................................................................ 43 VI 3.8.1.1 Configuring Channel 1 .................................................................................................................................... 43 3.8.1.2 Configuring Channel 2 .................................................................................................................................... 47 3.8.2 Setting Volume .............................................................................................................................................................. 49 3.9 Configuring Face Detection................................................................................................................................................ 49 3.10 Configuring Network .......................................................................................................................................................... 52 3.10.1 Configuring TCP/IP .................................................................................................................................................... 52 3.10.2 Configuring Port ......................................................................................................................................................... 53 3.10.3 Configuring Automatic Registration ................................................................................................................ 54 3.10.4 Configuring Cloud Service ..................................................................................................................................... 54 3.10.5 Configuring Serial Port............................................................................................................................................ 55 3.10.6 Configuring Wiegand ............................................................................................................................................... 56 3.11 Safety Management ............................................................................................................................................................ 57 3.11.1 Configuring IP Authority ........................................................................................................................................ 57 3.11.1.1 Network Access ................................................................................................................................................ 57 3.11.1.2 Prohibit PING ..................................................................................................................................................... 58 3.11.1.3 Anti Half Connection ..................................................................................................................................... 59 3.11.2 Configuring System .................................................................................................................................................. 59 3.11.2.1 Creating Server Certificate ......................................................................................................................... 60 3.11.2.2 Downloading Root Certificate .................................................................................................................. 61 3.12 User Management ................................................................................................................................................................ 64 3.12.1 Adding Users ................................................................................................................................................................ 64 3.12.2 Adding ONVIF Users ................................................................................................................................................. 64 3.12.3 Viewing Online Users ............................................................................................................................................... 65 3.13 Configuring Voice Prompts.............................................................................................................................................. 65 3.14 Maintenance ............................................................................................................................................................................ 65 3.15 Configuration Management ............................................................................................................................................ 66 3.15.1 Exporting/Importing Configuration Files ...................................................................................................... 66 3.15.2 Restoring Factory Defaults .................................................................................................................................... 67 3.16 Upgrading System ................................................................................................................................................................ 67 3.16.1 File Update .................................................................................................................................................................... 67 3.16.2 Online Update .............................................................................................................................................................. 67 3.17 Viewing Version Information .......................................................................................................................................... 68 3.18 Viewing Logs ........................................................................................................................................................................... 68 3.18.1 System Logs .................................................................................................................................................................. 68 3.18.2 Admin Logs ................................................................................................................................................................... 68 3.18.3 Unlocking Logs ............................................................................................................................................................ 68 3.18.4 Alarm Logs ..................................................................................................................................................................... 68 4 Smart PSS Lite Configuration ....................................................................................................................................................... 69 VII 4.1 Installing and Logging In ..................................................................................................................................................... 69 4.2 Adding Devices ......................................................................................................................................................................... 69 4.2.1 Adding Individually ..................................................................................................................................................... 69 4.2.2 Adding in Batches ......................................................................................................................................................... 70 4.3 User Management ................................................................................................................................................................... 71 4.3.1 Configuring Card Type ............................................................................................................................................... 71 4.3.2 Adding Users ................................................................................................................................................................... 72 4.3.2.1 Adding Individually .......................................................................................................................................... 72 4.3.2.2 Adding in Batches .............................................................................................................................................. 73 4.3.3 Assigning Access Permission .................................................................................................................................. 74 4.4 Access Management .............................................................................................................................................................. 76 4.4.1 Remotely Opening and Closing Door ................................................................................................................. 76 4.4.2 Setting Always Open and Always Close ............................................................................................................ 77 4.4.3 Monitoring Door Status ............................................................................................................................................. 77 Appendix 1 Important Points of Intercom Operation.......................................................................................................... 79 Appendix 2 Important Points of QR Code Scanning ............................................................................................................. 80 Appendix 3 Important Points of Fingerprint Registration Instructions ..................................................................... 81 Appendix 4 Important Points of Face Registration ............................................................................................................... 83 Appendix 5 Cybersecurity Recommendations ........................................................................................................................ 86 VIII 1 Overview 1.1 Introduction 1.2 Features The access controller is an access control panel that supports unlock through faces, passwords, fingerprint, cards, QR code, and their combinations. Based on the deep-learning algorithm, it features faster recognition and higher accuracy. It can work with management platform which meets various needs of customers. The housing is built of PC and ABS material, making it ideal for use indoors. 4.3 inch glass touch screen with a resolution of 480 272. 2-MP wide-angle dual-lens camera with IR illumination and DWDR. Multiple unlock methods including fingerprint, face, IC card and password. You can also combine them to create your own personal unlock methods. Supports mask detection. Supports visitor QR code with DSS Pro Platform. Recognizes faces 0.3 m to 1.5 m away (0.98 ft-4.92 ft), and detects persons between the height of 1.1 m and 2.0 m (3.61 ft-6.56 ft) when the camera is installed at 1.4 m (4.5 ft). Supports 3,000 users, 3,000 faces, 3,000 passwords, 5,000 cards, 5,000 fingerprints, 50 Liveness detection has a face recognition accuracy rate of 99.9% and the 1:N comparison time is administrators, and 300,000 records. 0.2 s per person. Supports an RS-485 card reader, Wiegand card reader (26, 34, 66), exit button, door status detector, and a 100 Mbps Ethernet port. Up to 128 periods can be configured, along with 128 holiday plans, normally open period, normally closed periods, remote unlock periods, and first user unlock periods. Offers multiple types of alarms such as duress, tamper, intrusion, unlock timeout, and excessive use of illegal card. Supports general users, patrol users, blocklist users, VIP users, guest users, and the other users Features anti-passback, multiple verification methods, remote unlock, first user unlock, and supports videos being viewed on the platform. For improved security and to protect against the device being forcefully opened, security module expansion is supported. TCP/IP and Wi-Fi connection, auto registration, P2P registration, and DHCP. Supports making video calls and using the app to receive alarm notifications, remotely unlock doors and to perform other tasks. Supports customization of voice prompts. Online update and update through USB. Works while offline, and communicates with the management platform when connected to a network. Supports watchdog to protect the system from software and hardware failures. 1 Supports SDK. Connects to DSS Pro and SmartPSS Lite. 1.3 Application It is widely used in parks, communities, business centers and factories, and ideal for places such as office buildings, government buildings, schools and stadiums. Figure 1-1 Networking 2 2 Local Operations 2.1 Basic Configuration Procedure Figure 2-1 Basic configuration procedure 2.2 Common Icons Icon or or Table 2-1 Description of icons Description Main menu icon. Confirm icon. Turn to the first page of the list. Turn to the last page of the list. Turn to the previous page of the list. Turn to the next page of the list. Return to the previous menu. Turned on. Turned off. Delete Search 2.3 Standby Screen You can unlock the door through faces, passwords, and QR code. You can also make calls through the intercom function. 3 If there is no operation in 30 seconds, the Access Controller will go to the standby mode. This manual is for reference only. Slight differences might be found between the standby screen in this manual and the actual device. Figure 2-2 Homepage Table 2-2 Home screen description No. Name Description 1 2 3 4 5 6 Status display Displays status of Wi-Fi, network and USB, and more. Date and time Displays the current date and time. Verification methods Displays available verification methods. Password QR code Intercom Enter user password or administrator password to unlock the door. Tap the QR code icon and scan QR code to unlock the door. When the Access Controller functions as a server, it can call the VTO and VTH. When the DSS functions as a server, The Access Controller can call the VTO, VTS and DSS. Tap the icon, enter the room number to call the home owner. 2.4 Initialization For the first-time use or after restoring factory defaults, you need to select a language on Access Controller, and then set the password and email address for the admin account. You can use the admin account to log in to the main menu of the Access Controller and the webpage. 4 If you forget the administrator password, send a reset request to your registered e-mail address. The password must consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special character (excluding ' " ; : &). 2.5 Logging In Log in to the main menu to configure the Access Controller. Only admin account and administrator account can enter the main menu of the Access Controller. For the first-time use, use the admin account to enter the main menu screen and then you can create the other administrator accounts. admin account: Can log in to the main menu screen of the Access Controller, but has no door Administration account: Can log in to the main menu of the Access Controller and has door access permission. access permissions. Step 1 Press and hold the standby screen for 3 seconds. Step 2 select a verification method to enter the main menu. Face: Enter the main menu by face recognition. Fingerprint: Enter the main menu by using fingerprint. Fingerprint function is only available for the fingerprint model of Access Controller. Card Punch: Enter the main menu by swiping card. Card Punch function is only available for the card swiping model of Access Controller. PWD: Enter the user ID and password of the administrator account. admin: Enter the admin password to enter the main menu. 2.6 Network Communication Configure the network, serial port and Wiegand port to connect the Access Controller to the The serial port and the wiegand port might differ depending on models of Access Controller. network. 2.6.1 Configuring IP Set IP address for the Access Controller to connect it to the network. After that, you can log in to the webpage and the management platform to manage the Access Controller. Step 1 On the Main Menu, select Connection > Network > IP Address. Step 2 Configure IP Address. 5 Figure 2-3 IP address configuration Table 2-3 IP configuration parameters Parameter Description IP Address/Subnet Mask/Gateway Address The IP address, subnet mask, and gateway IP address must be on the same network segment. It stands for Dynamic Host Configuration Protocol. When DHCP is turned on, the Access Controller will automatically be assigned with IP address, subnet mask, and gateway. P2P (peer-to-peer) technology enables users to manage devices without applying for DDNS, setting port mapping or deploying transit server. You can turn on the automatic registration function to access the Access Controller through the The management platform can clear all personnel configurations and initialize the Access Controller. To avoid data loss, keep the management platform permissions properly. Step 1 On the Main Menu, select Connection > Network > Active Register. DHCP P2P 2.6.2 Active Register management platform. 6 Figure 2-4 Auto register Step 2 Turn on the automatic registration function and set the parameters. Parameter Server Address Port Table 2-4 Auto registration Description The IP address of the management platform. The port No. of the management platform. Enter the device ID (user defined). Device ID When you add the Access Controller to the management platform, the device ID on the management platform must conform to the defined device ID on the Access Controller. Step 3 Enable the active register function. 2.6.3 Configuring Wi-Fi You can connect the Access Controller to the network through Wi-Fi network. Wi-Fi function is only available for certain models of the Access Controller. Step 1 On the Main Menu, select Connection > Network > WiFi. Step 2 Turn on Wi-Fi. Step 3 Step 4 Step 5 to search available wireless networks. Tap Select a wireless network and enter the password. If no Wi-Fi is searched, tap SSID to enter the name of Wi-Fi. Tap
. 2.6.4 Configuring Serial Port Step 1 On the Main Menu, select Connection > Serial Port. Step 2 Select a port type. 7 Select Reader when the Access Controller connects to a card reader. Select Controller when the Access Controller functions as a card reader, and the Access Controller will send data to the Access Controller to control access. Output Data type:
Card: Outputs data based on card number when users swipe card to unlock door;
outputs data based on user's first card number when they use other unlock methods. No.: Outputs data based on the user ID. Select Reader (OSDP) when the Access Controller is connected to a card reader based Security Module: When a security module is connected, the exit button, lock will be not on OSDP protocol. effective. 2.6.5 Configuring Wiegand The access controller allows for both Wiegand input and Output mode. Step 1 On the Main Menu, select Connection > Wiegand. Step 2 Select a Wiegand. Select Wiegand Input when you connect an external card reader to the Access Controller. Select Wiegand Output when the Access Controller functions as a card reader, and you need to connect it to a controller or another access terminal. Figure 2-5 Wiegand output Table 2-5 Description of Wiegand output Parameter Description Wiegand Output Type Select a Wiegand format to read card numbers or ID numbers. Wiegand26: Reads three bytes or six digits. Wiegand34: Reads four bytes or eight digits. Wiegand66: Reads eight bytes or sixteen digits. Pulse Width Enter the pulse width and pulse interval of Wiegand output. 8 Description Parameter Pulse Interval Output Data Type Select the type of output data. User ID: Outputs data based on user ID. Card No.: Outputs data based on user's first card number, and the data format is hexadecimal or decimal. 2.7 User Management You can add new users, view user/admin list and edit user information. The pictures in this manual are for reference only, and might differ from the actual product. 2.7.1 Adding New Users Step 1 On the Main Menu, select User > New User. Step 2 Configure the parameters on the interface. Figure 2-6 New user (1) Figure 2-7 New user (2) 9 Table 2-6 Description of new user parameters Parameter Description User ID Name FP Face Card PWD User Level Enter user IDs. The IDs can be numbers, letters, and their combinations, and the maximum length of the ID is 32 characters. Each ID is unique. Enter name with at most 32 characters (including numbers, symbols, and letters). Register fingerprints. A user can register up to 3 fingerprints, and you can set a fingerprint to the duress fingerprint. An alarm will be triggered when the duress fingerprint is used to unlock the door. Only certain models support fingerprint unlock. Make sure that your face is centered on the image capturing frame, and an image of the face will be captured and analyzed automatically. A user can register five cards at most. Enter your card number or swipe your card, and then the card information will be read by the access controller. You can enable the Duress Card function. An alarm will be triggered if a duress card is used to unlock the door. Only certain models support card unlock. Enter the user password. The maximum length of the password is 8 digits. You can select a user level for new users. User: Users only have door access permission. Admin: Administrators can unlock the door and configure the access controller. Period People can unlock the door only during the defined period. Holiday Plan People can unlock the door only during the defined holiday plan. Valid Date Set a date on which the access permissions of the person will be expired. General: General users can unlock the door. Blocklist: When users in the blocklist unlock the door, service personnel will receive a notification. Guest: Guests can unlock the door within a defined period or for certain amount of times. After the defined period expires or the unlocking times runs out, they cannot unlock the door. User Type Patrol: Patrol users will have their attendance tracked, but they have no unlocking permissions. VIP: When VIP unlock the door, service personnel will receive a Others: When they unlock the door, the door will stay unlocked for Step 3 Tap
. Custom User 1/Custom User 2: Same with general users. notice. 5 more seconds. 10 2.7.2 Viewing User Information You can view user/admin list and edit user information. Step 1 On the Main Menu, select User > User List, or select User > Admin List. Step 2 View all added users and admin accounts. Figure 2-8 Admin list
: Unlock through password.
: Unlock through swiping card.
: Unlock through face recognition.
: Unlock through fingerprint. Related Operations On the User screen, you can manage the added users. Search for users: Tap Edit users: Tap the user to edit user information. Delete users and then enter the username. Delete individually: Select a user, and then tap . Delete in batches:
. On the User List screen, tap On the Admin List screen, tap to delete all users. to delete all admin users. 2.7.3 Configuring Administrator Password You can unlock the door by only entering the admin password. Admin password is not limited by user types. Only one admin password is allowed for one device. Step 1 On the Main Menu screen, select User > Administrator PWD. 11 Figure 2-9 Set admin password Step 2 Step 3 Tap Administrator PWD, and then enter the administrator password. Tap
. Step 4 Turn on the administrator function. 2.8 Access Management You can configure door access parameters, such as unlocking modes, alarm linkage, door schedules. 2.8.1 Configuring Unlock Combinations Use card, fingerprint, face or password or their combinations to unlock the door. Unlock modes might differ depending on the actual product. Step 1 Select Access > Unlock Mode > Unlock Mode. Select unlocking methods. Step 2 Step 3 To cancel your selection, tap the selected method again. Tap +And or /Or to configure combinations.
+And: Verify all the selected unlocking methods to open the door.
/Or: Verify one of the selected unlocking methods to open the door. 12 Figure 2-10 Element (multiple choice) Step 4 Tap to save changes. 2.8.2 Configuring Alarm An alarm will be triggered when abnormal access events occur. Step 1 Step 2 Select Access > Alarm. Enable the alarm type. Figure 2-11 Alarm 13 Table 2-7 Description of alarm parameters Parameter Description Users need to verify their identities both for entry and exit; otherwise an alarm will be triggered. It helps prevents a card holder from passing an access card back to another person so they gain entry. When anti-
passback is enabled, the card holder must leave the secured area through an exit reader before system will grant another entry. If a person enters after authorization and exits without authorization, an alarm will be triggered when they attempt to enter again, and access is denied at the same time. If a person enters without authorization and exits after authorization, an alarm will be triggered when the they attempt to enter again, and access is denied at the same time. An alarm will be triggered when a duress card, duress password or duress fingerprint is used to unlock the door. When door sensor is enabled, an intrusion alarm will be triggered if the door is opened abnormally. Anti-passback Duress Intrusion Door Sensor Timeout A timeout alarm will be triggered if the door remains unlocked longer than the defined door sensor timeout, which ranges from 1 to 9999 seconds. Door Sensor On Intrusion and timeout alarms can be triggered only after door sensor is enabled. 2.8.3 Configuring Door Status Step 1 On the Main Menu screen, select Access > Door Status. Step 2 Set door status. NO: The door remains unlocked all the time. NC: The door remains locked all the time. Normal: If Normal is selected, the door will be unlocked and locked according to your settings. 2.8.4 Configuring Lock Holding Time After a person is granted access, the door will remain unlocked for a defined time for them to pass through. Step 1 On the Main Menu, select Access > Lock Holding Time. Step 2 Enter the unlock duration. Step 3 Tap to save changes. 2.9 Attendance Management You can turn on the time attendance function, and employee can make their attendance tracked by 14 the Access Controller at the same time when they unlock the door. On the main menu screen, tap Attendance, and then turn on the time & attendance function. Prerequisites Procedure Step 1 On the main menu screen, select Attendance > Mode Set. Figure 2-12 Attendance mode Parameter Description Table 2-8 Attendance mode Auto/Manual Mode Auto Mode Manual Mode Fixed Mode After you punch in/out, you can manfully select the attendance status or the screen displays the time attendance status automatically. The screen displays attendance status automatically after you punch in/out. Punch in/out and then tap Attendance status to manfully select the attendance status. When you punch in/out, the screen will displays the pre-configured attendance status all the time. Step 2 Step 3 Select an attendance mode. Configure the parameters for the attendance mode. 15 Figure 2-13 Auto Mode/manual mode Figure 2-14 Fixed mode Table 2-9 Attendance mode parameters Parameters Description Check In Break Out Break In Check Out OT-In OT-Out Punch in when your normal workday starts. Punch out when your leave of absence ends. Punch in when your leave of absence starts. Punch out when your normal workday starts. Punch-in when your overtime working hours starts. Punch out when your overtime working hours ends. 16 2.10 System 2.10.1 Configuring Time Configure system time, such as date, time, and NTP. Step 1 On the Main Menu, select System > Time. Step 2 Configure system time. Figure 2-15 Time Parameter 24-hour System Date Setting Time Date Format DST Setting Table 2-10 Description of time parameters Description The time is displayed in 24-hour format. Set up the date. Set up the time. Select a date format. 1. Tap DST Setting 2. Enable DST. 3. Select Date or Week from the DST Type list. 4. Enter start time and end time. 5. tap
. 17 Parameter Description NTP Check A network time protocol (NTP) server is a machine dedicated as the time sync server for all client computers. If your computer is set to sync with a time server on the network, your clock will show the same time as the server. When the administrator changes the time (for daylight savings), all client machines on the network will also update. 1. Tap NTP Check. 2. Turn on the NTP check function and configure parameters. Server IP Address: Enter the IP address of the NTP server, and the Access Controller will automatically sync time with NTP server. Port: Enter the port of the NTP server. Interval (min): Enter the time synchronization interval. Time Zone Select the time zone. 2.10.2 Configuring Face Parameters Step 1 On the main menu, select System > Face Parameter. Configure the face parameters, and then tap Step 2
. Figure 2-16 Face parameter (01) 18 Figure 2-17 Face parameter (02) Table 2-11 Description of face parameters Name Description Face Threshold Adjust the face recognition accuracy. Higher threshold means higher accuracy. Max. Angle of Face Pupillary Distance Set the maximum face pose angle for face detection. Larger value means larger face angle range. If the face pose angle is out of the defined range, the face detection box will not appear. Face images require desired pixels between the eyes (called pupillary distance) for successful recognition. The default pixel is 45. The pixel changes according to the face size and the distance between faces and the lens. If an adult is 1.5 meters away from the lens, the pupillary distance can be 50 px-70 px. Recognition Timeout (S) If a person with access permission has their face successfully recognized, the Access Controller will prompt face recognition success. You can enter the prompt interval time. Invalid Face Prompt Interval (S) If a person without access permission attempts to unlock the door for several times in the defined interval, the Access Controller will prompt face recognition failure. You can enter the prompt interval time. Avoid false face recognition by using a photo, video, mask or a different substitute for an authorized person's face. Close: Turns off this function. General: Normal level of anti-spoofing detection means higher High: Higher level of anti-spoofing detection means higher accuracy and security. Extremely High: Extremely high level of anti-spoofing detection means extremely high accuracy and security. Anti-fake Threshold door access rate for people with face masks. BeautyEnable Beautify captured face images. 19 Description Mask mode:
Name Mask Parameters No detect: Mask is not detected during face recognition. Mask reminder: Mask is detected during face recognition. If the person is not wearing a mask, the system will remind them to wear masks, and access is allowed. Mask intercept: Mask is detected during face recognition. If a person is not wearing a mask, the system will remind them to wear masks, and access is denied. Mask Recognition Threshold: Higher threshold means higher mask detection accuracy. Supports detecting 4 face images at the same time, and the unlock combinations mode become invalid. The door is unlocked after any one of them gain access. Multi-face Recognition 2.10.3 Setting Volume You can adjust the volume of the speaker and microphone. Step 1 On the Main Menu, select System > Volume. Step 2 Select Beep Volume or Mic Volume, and then tap or to adjust the volume. 2.10.4 (Optional) Configuring Fingerprint Parameters Configure fingerprint detection accuracy. Higher value means that higher threshold of similarity and higher accuracy. This function is only available on Access Controller that supports fingerprint unlock.. Step 1 On the Main Menu, select System > FP Parameter. Step 2 to adjust the value. Tap or 2.10.5 Screen Settings Configure screen off time and logout time. Step 1 On the Main Menu, select System > Screen settings. Step 2 Tap Logout Time or Screen Off Timeout, and then tap or to adjust the time. 2.10.6 Restoring Factory Defaults Step 1 On the Main Menu, select System > Restore Factory. Step 2 Restore factory defaults if necessary. Restore Factory: Resets all configurations and data. Restore Factory (Save user & log): Resets configurations except for user information 20 and logs. 2.10.7 Restart the Device On the Main Menu, select System > Reboot, and the Access Controller will be restarted. 2.10.8 Configuring the Language Change the language on the Access Controller. On the Main Menu, select System > Language, select the language for the Access Controller. 2.11 USB Management You can use a USB to update the Access Controller, and export or import user information through USB. Make sure that a USB is inserted to the Access Controller before you export data or update the system. To avoid failure, do not pull out the USB or perform any operation of the Access Controller during the process. You have to use a USB to export the information from an Access Controller to other devices. Face images are not allowed to be imported through USB. 2.11.1 Exporting to USB You can export data from the Access Controller to a USB. The exported data is encrypted and cannot be edited. Step 1 On the Main Menu, select USB > USB Export. Step 2 Select the data type you want to export, and then tap OK. 21 Figure 2-18 USB export 2.11.2 Importing From USB You can import data from USB to the Access Controller. Step 1 On the Main Menu, select USB > USB Import. Step 2 Select the data type that you want to export, and then tap OK. Figure 2-19 USB import 2.11.3 Updating System Use a USB to update the system of the Access Controller. Step 1 Rename the update file to "update.bin", put it in the root directory of the USB, and then insert the USB to the Access Controller. Step 2 On the Main Menu, select USB > USB Update. Step 3 Tap OK. The Access Controller will restart when the updating completes. 22 2.12 Configuring Features On the Main Menu screen, select Features. Figure 2-20 Features Table 2-12 Description of features Parameter Description Private Setting PWD Reset Enable: You can enable this function to reset password. The PWD Reset function is enabled by default. HTTPS:
Hypertext Transfer Protocol Secure (HTTPS) is a protocol for secure communication over a computer network. When HTTPS is enabled, HTTPS will be used to access CGI commands; otherwise HTTP will be used. When HTTPS is enabled, the access controller will restart automatically. CGI: Common Gateway Interface (CGI) offers a standard protocol for web servers to execute programs similarly to console applications running on a server that dynamically generates web pages. The CG I is enabled by default. SSH: Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured Capture Photos: Face images will be captured automatically when people unlock the door. The function is enabled by default. Clear Captured Photos:Delete all automatically captured network. photos. 23 Parameter Card No. Reverse Door Sensor Result Feedback Description When the Access Terminal connects to a third-party device through Wiegand input, and the card number read by the Access Terminal is in the reserve order from the actual card number, you need to turn on the Card No. Reverse function. NC: When the door opens, the circuit of the door sensor circuit is closed. NO: When the door opens, the circuit of the door sensor circuit is open. Intrusion and overtime alarms are triggered only after door detector is turned on. Success/Failure: Only displays success or failure on the standby screen. Only Name: Displays user ID, name and authorization time after access granted; displays not authorized message and authorization time after access denied. Photo&Name: Displays user's registered face image, user ID, name and authorization time after access granted; displays not authorized message and authorization time after access denied. Photos&Name: Displays the captured face image and a registered face image of a user, user ID, name and authorization time after access granted; displays not authorized message and authorization time after access denied. Select identity verification methods on the standby screen. Password: The icon of the password unlock method is displayed on the standby screen. QR code: The icon of the QR code unlock method is displayed on the standby screen. Call: The icon of call function is displayed on the standby Call Room: Tap the call icon on the standby mode and enter the room number to make calls. Call Management Center: Tap the call icon on the standby mode, and then call the management center. Custom call room: Tap the call icon to call the defined room number. You need to define the number of room first on the Recognition shortcut screen. Recognition shortcut screen. Call Type:
2.13 Unlocking the Door You can unlock the door through faces, passwords, fingerprint, cards, and more. 24 2.13.1 Unlocking by Cards Place the card at the swiping area to unlock the door. 2.13.2 Unlocking by Face Verify the identity of an individual by detecting their faces. Make sure that the face is centered on the face detection frame. 2.13.3 Unlocking by User Password Enter the user ID and password to unlock the door. Step 1 Step 2 on the standby screen. Tap tap PWD Unlock, and then enter the user ID and password. Step 3 Tap Yes. 2.13.4 Unlocking by Administrator Password Enter only the administrator password to unlock the door. The access controller only allows for one administrator password. Using administrator password to unlock the door without being subject to user levels, unlock modes, periods, holiday plans, and anti-passback except for normally closed door. One device allows for only one admin password. Prerequisites Procedure The administrator password was configured. For details, see "2.7.3 Configuring Administrator Password". Administrator password cannot be used to unlock the door status is set to NC. Step 1 Step 2 Step 3 on the standby screen. Tap Tap Admin PWD, and then enter the admin password. Tap
. 2.13.5 Unlocking by QR code Step 1 On the standby screen, tap Step 2 Place your QR code in front of the lens. 2.13.6 Unlocking by Fingerprint Place you finger on the fingerprint scanner. This function is only available on the Access Controller 25 that supports fingerprint unlocking. 2.14 Viewing Unlock Logs View or search door unlocking logs. On the main menu, tap Record. 2.15 System Information You can view data capacity and device version. 2.15.1 Viewing Data Capacity On the Main Menu, select System Info > Data Capacity, you can view storage capacity of each data type. 2.15.2 Viewing Device Version On the Main Menu, select System Info > Data Capacity, you can view the device version, such as serial No., software version and more. 26 3 Web Operations On the webpage, you can also configure and update the Access Controller. Web configurations differ depending on models of the Access Controller. 3.1 Initialization Prerequisites Initialize the Access Controller when you log in to the webpage for the first time or after the Access Controller is restored to the factory defaults. Make sure that the computer used to log in to the webpage is on the same LAN as the Access Controller. Set a password and an email address before logging in to the webpage for the first time. Step 1 Open a browser, go to the IP address (the default address is 192.168.1.108) of the Access Controller. We recommend you use the latest version of Chrome or Firefox. Set the password and email address according to the screen instructions. Step 2 The password must consist of 8 to 32 non-blank characters and contain at least two types of the following characters: upper case, lower case, numbers, and special characters (excluding ' " ; : &). Set a high-security password by following the password Keep the password safe after initialization and change the password regularly to strength prompt. improve security. 3.2 Logging In Step 1 Open a browser, enter the IP address of the Access Controller in the address bar, and press the Enter key. 27 Figure 3-1 Login 28 Step 2 Enter the user name and password. The default administrator name is admin, and the password is the one you set up during initialization. We recommend you change the administrator password regularly to increase security. If you forget the administrator login password, you can click Forget password? For details, see "3.3 Resetting the Password". Step 3 Click Login. 3.3 Resetting the Password Reset the password through the linked e-mail when you forget the admin password. Step 1 On the login page, click Forgot password. Step 2 Read the on-screen prompt carefully, and then click OK. Scan the QR code, and you will get the security code. Step 3 Figure 3-2 Reset password Up to two security codes will be generated when the same QR code is scanned. If the security code becomes invalid, refresh the QR code and scan again. After you scan the QR code, you will receive a security code in your linked e-mail address. Use the security code within 24 hours after you receive it. Otherwise, it will become invalid. If the wrong security code is entered in a row, the administrator account will be frozen for 5 minutes. Step 4 Step 5 Step 6 Enter the security code. Click Next. Reset and confirm the new password. The password should consist of 8 to 32 non-blank characters and contain at least two of the following types of characters: upper case, lower case, number, and special character
(excluding ' " ; : &). Click OK. Step 7 3.4 Configuring Door Parameter Configure the access control parameters. Log in to the webpage. Step 1 Select Door Parameter. Step 2 29 Figure 3-3 Door parameter Opening Method Group Combination: The user can unlock the door only Parameter Name State Hold Time (Sec.) Normally Open Time Normally Close Time Timeout (Sec.) Open with remote verification Table 3-1 Description of door parameters Description Enter a name of the door. Set the door status. NO: The door remains unlocked all the time. NC: The door remains locked all the time. Normal: If Normal is selected, the door will be unlocked and locked according to your settings. Unlock by Period: Set different unlock methods for different periods. after defined users or user groups grant access. Unlock Mode: Set unlock combinations. After a person is granted access, the door will remain unlocked for a defined time for them to pass through. It ranges from 0.2 s to 600 s. The door remains open or closed during the defined period. A timeout alarm will be triggered if the door remains unlocked for longer time than this value. Set the remote verification door opening period. After users gain access on the Access Controller, they must also be granted access from the management platform before the door unlocks. 30 Parameter Duress Alarm Door Sensor Intrusion Alarm Overtime Alarm Anti-passback Alarm Description An alarm will be triggered when a duress card or duress password is used to unlock the door. Intrusion and overtime alarms can be triggered only after Door Sensor is enabled. When Door Sensor is enabled, an intrusion alarm will be triggered if the door is opened abnormally. A timeout alarm will be triggered if the door remains unlocked for longer time than the Timeout (Sec). Users need to verify their identities both for entry and exit;
otherwise an alarm will be triggered. It helps prevents a card holder from passing an access card back to another person so they gain entry. When anti-passback is enabled, the card holder must leave the secured area through an exit reader before system will grant another entry. If a person enters after authorization and exits without authorization, an alarm will be triggered when they attempt to enter again, and access is denied at the same time. If a person enters without authorization and exits after authorization, an alarm will be triggered when the they attempt to enter again, and access is denied at the same time. Step 3 Configure the opening method. Unlock by Period 1. In the Opening Method list, select Unlock by Period, and then click
. Figure 3-4 Time section parameter 2. Configure the time and the opening method for a time section. You can configure up to four time sections for a single day. 3. Select Apply to the whole week to copy the defined time to the rest of days. 1. In the Opening Method list, select Group Combination, and then click
. 3. Select an unlocking method in the Opening Method list., and enter the number of Group Combination 2. Click Add. valid users. If the number of valid users is 2, and there are 3 users in the defined user list. Two users in the list are required to grant access. 31 Figure 3-5 Group Combination 4. In the User List area, click Add User, enter the user ID of existing users. VIP, patrol, and blocklist users cannot be added. Valid users in all groups must verify their identities to grant access in the group order. 5. Click OK. Unlock mode 1. 2. 3. In the Opening Method list, select Group Combination, and then click
. In the Combination list, select Or or And. And means you must use all the selected methods to open the door. Or means you can open the door with any of the selected methods. In the Element list, select the unlock method. Step 4 Step 5 Configure other parameters. Click OK. 3.5 Intercom Configuration 3.5.1 Configuring SIP Server The Access Controller can function as a door station to realize video intercom function. When connected to the same SIP server, all VTOs and VTHs can call each other. You can use the Access Controller or other VTOs or the management platform as the SIP server. When the Access Controller functions as the SIP server, it can connect up to 500 access control devices and VTHs. Step 1 Step 2 Select Intercom > SIP Server. Select a server type. Use the Access Controller as the SIP server. 32 Turn on SIP Server and keep other parameters as default. Figure 3-6 Use the Access Controller as the SIP server Use another VTO as the SIP server:
1. Do not enable SIP server. Select VTO from the Server Type. 2. Configure the parameters, and then click Save. Figure 3-7 Use VTO as the SIP server Table 3-2 SIP server configuration Description IP address of the platform. 5060 by default when VTO work as SIP server. 5080 by default when the platform works as SIP server. Leave them as default. Parameter IP Address Port Username Password 33 Parameter SIP Domain Description VDP. SIP Server Username SIP Server Password The login username and password of the SIP server. Use the DSS Express or DSS pro as the SIP server. Do not enable SIP server. Select Express/DSS from the Server Type. Figure 3-8 Use DSS Express or DSS pro as the SIP server Table 3-3 SIP server configuration Description IP address of the platform. 5060 by default when VTO work as SIP server. 5080 by default when the platform works as SIP server. Leave them as default. Parameter IP Address Port Username Password SIP Domain Leave it as default. SIP Server Username SIP Server Password The login username and password of the platform. Alternate IP Addr. The alternate server will be used as the SIP server when DSS Express or DSS pro does not respond. We recommend you configure the alternate IP address. If you turn on the Alternate Server function, you will set the Access Controllers the alternate server. If you want another VTO to function as the alternate server, you need to enter the IP address, username, password of the VTO. Do not enable Alternate Server in this case. We recommend you set the main VTO as the alternate server. Alternate Username Alternate Password Used to log in to the alternate server. 34 Parameter Description Alternate VTS IP Addr. Step 3 Click OK. Enter the IP address of the alternate VTS. When the management platform does not respond, the alternate VTS will be activated to make sure VTO, VTH and VTS can still realize video intercom function. 3.5.2 Configuring Basic Parameters Configure the basic information of VTO, such as device type and device number. Step 1 Step 2 Select Talkback > Local. Configure the parameters. Use the Access Controller as the SIP server. Figure 3-9 Basic parameter Parameter Device Type VTO No. Group Call Centre Call No. Table 3-4 Basic parameter description Description Select Unit Door Station. The number of the VTO, which cannot be configured. When you turn on the group call function, the VTO calls the main VTH and the extensions at the same time. The default phone number is 888888+VTS No. when the VTO calls the VTS. You can check the number of the VTS from the Device screen of VTS. Transmission Mode Mode 1 is selected by default. Use other VTO as the SIP server. Figure 3-10 Basic parameter Table 3-5 Basic parameter description Parameter Device Type Description Select Unit Door Station. 35 Parameter Description The number of the VTO. VTO No. The number must have four digits. The first two digits are 80, and the last two digits start from 01. Take 8001 for example. If multiple VTOs exist in the one unit, the VTO No. cannot be repeated. Centre Call No. The default phone number for the management center is 888888. Keep it as default. Transmission Mode Mode 1 is selected by default. Use the Platform (DSS Express or DSS Pro) as the SIP Server. Figure 3-11 Basic parameter Table 3-6 Basic parameter description Parameter Description Device Type Select the device type based on the installation position. Select the checkbox and then enter the number of the building where the unit door station is installed. Select the checkbox and then enter the number of the unit where the unit door station is installed. The number of the unit door station. If multiple VTOs exist in the one unit, the VTO No. cannot be repeated. If building and unit are enabled on DSS, enter the building number and unit number on the web page. The building number, unit number and VTO number must conform to the configured parameters on DSS. Take room 1001, unit 2, and building 1 as an example. If building number is enabled on the DSS and the unit is not enabled, the room number is "1#1001". If building and unit are both enabled, the room number is "1#2#1001". If building is not enabled, and unit is not enabled either, the room number is "1001". For details, see the user manual of DSS. The default phone number is 888888 when the VTO calls the VTS. Keep it as default. Mode 1 is selected by default. Building No. Unit No. VTO No. Centre Call No. Transmission Mode Step 3 Click Confirm. 36 3.5.3 Adding the VTO When the Access Controller functions as the SIP Server and you have other VTOs, you need to add other VTOs to the SIP server to make sure they can call each other. Step 1 On the webpage of the Access Controller, select Talkback setting > VTO No. Management. Step 2 Click Add, and then configure the VTO. Figure 3-12 Add VTO Parameter Description Table 3-7 Add VTO configuration The number of the added VTO. You can check the number from the Device page on the webpage of the VTO. Keep it default. Cannot be configured. The IP address of the added VTO. The username and password used to log in to the webpage of the added VTO. Rec No. Registration Password Build No. Unit No. IP Address Username Password Step 3 Click OK. 3.5.4 Adding the VTH When the Access Controller functions as the SIP Server, you can add all VTHs in the same unit to the 37 SIP server to make sure they can call each other. Background Information When there are main VTH and extension, you need to turn on the group call function first and then add main VTH and extension on the VTH Management page. For how to turn on the group call function, refer to "3.5.2 Configuring Basic Parameters". Extension cannot be added when the main VTHs are not added. Step 1 On the home page, select Talkback setting > Room No. Management. Step 2 Add the VTH. Add individually 1. Click Add. 2. Configure parameters, and then click OK. Figure 3-13 Add individually 38 Table 3-8 Room information Parameter Description Enter the room number of the VTH. The room number consists of 1-5 digits, and must conform to the configured room number on the VTH. When there are main VTH and extensions, the room number of main VTH ends with -0 and the room number of extension ends with -1, -2 or -3. For example, the main VTH is 101-0, and the room number of the extension is 101-1, 101-2... If the group call function is not turned on, room number in the format of 9901-xx cannot be set. Enter the name of the VTH to help you differentiate VTHs. Room No. First Name Last Name Nick Name Register Type Keep them as defaults. Registered Password Add in batches 1. Click Batch Add 2. Configure the parameters. Figure 3-14 Batch add Parameter Description Table 3-9 Batch add Unit Layer Amount The number of floors of the building (ranging from 1-99). Room Amount in One Layer The number of rooms on each floor, which ranges from 1-99. First Floor Number The first room on the first floor. Second Floor Number The first room on the second floor, which equals the first room on the first floor plus the number of rooms on each floor. 3.5.5 Adding the VTS When the Access Controller functions as the SIP Server, you can add VTSs to the SIP server to make sure they can call each other. Step 1 On the Homepage, select Talkback setting > VTS Management. 39 Step 2 Click Add and set parameters. Figure 3-15 VTS management Step 3 Click OK. 3.5.6 Viewing Device Status When the Access Controller works as the SIP Server, you can view the status of devices that are connected the SIP server. On the Homepage, select Talkback setting > Status. 3.5.7 Viewing Call Logs View all the record of outgoing calls and incoming calls. On the Homepage, select Talkback setting > Call. 3.6 Configuring Time Sections Configure time sections and holiday plans, and then you can define when a user has the permissions to unlock doors. 3.6.1 Configuring Time Sections You can configure up to 128 groups (from No.0 through No.127) of time section. In each group, you need to configure door access schedules for a whole week. A user can only unlock the door during the scheduled time. Step 1 Log in to the webpage. Select Time Section > Time Section. Click Add. Step 2 Step 3 40 Figure 3-16 Time section parameters Step 4 Enter No. and name for the time section. No.: Enter a section number It ranges from 0 through 127. Name: Enter a name for each time section. You can enter a maximum of 32 characters
(contain number, special characters and English characters). Step 5 Configure time sections for each day. Step 6 Step 7 You can configure up to four time sections for a single day.
(Optional) Click Apply to the whole week to copy the configuration to the rest of days. Step 8 Click OK. 3.6.2 Configuring Holiday Groups Set time sections for different holiday groups. You can configure up to 128 holiday groups (from No.0 through No.127). and up to 16 time sections for a single holiday group. Users can unlock doors in the defined time sections. Step 1 Log in to the web page. Select Time Section > Holiday Group > Config. Click Add. Step 2 Step 3 Figure 3-17 Add a holiday group Step 4 Set the name and the time for the holiday group. Holiday Name: Enter the name of the holiday group. Enter a name for each time 41 section. You can enter a maximum of 32 characters (contain numbers, special characters and English characters). Time Section: Select the start time and end time of the holiday. Click OK. Step 5 You can add multiple holidays in a holiday group. Click OK. Step 6 3.6.3 Configuring Holiday Plans defined time in the holiday plan. Log in to the webpage. Step 1 Select Time Section > Holiday Plan Config. Click Add. Step 2 Step 3 Figure 3-18 Add holiday plan Assign the configured holiday groups to the holiday plan. Users can only unlock the door in the Step 4 Enter a number and name for the holiday plan. No.: Enter a section number. It ranges from 0 through 127. Name: Enter a name for each time section. You can enter a maximum of 32 characters
(contain numbers, special characters and English characters). Step 5 In the Holiday Group No. list, select the number of the defined holiday group. Select 255 if you do not want to select a holiday group. In the Holiday Period area, configure time sections in the holiday group. You can configure up to four time sections. Click OK. Step 6 Step 7 3.7 Data Capacity You can see how many users, cards and face images that the Access Controller can store. 42 Log in to the webpage and select Data Capacity. 3.8 Configuring Video and Image Configure video and image parameters, such as stream and brightness. We recommend you use the default parameters in this section. 3.8.1 Configuring Video On the home page, select Video Setting, and then configure the video stream, status, image and exposure. Video Standard: Select NTSC. Channel Id: Channel 1 is for configurations of visible light image. Channel 2 is for configurations of infrared light image. Default: Restore to defaults settings. Capture: Take a snapshot of the current image. PAL video standard is 25 fps and the NTSC video standard is 30 fps. 3.8.1.1 Configuring Channel 1 Step 1 Step 2 Step 3 Select Video Setting > Video Setting. Select 1 from the Channel No. list. Configure the date rate. Figure 3-19 Date rate 43 Table 3-11 Date rate description Parameter Main Format Sub Stream Video Format Frame Rate Bitrate Video Format Frame Rate Bitrate Description When the Access Controller functions as the a VTO and connects the VTH, the acquired stream limit of VTH is 720p.When resolution is changed to 1080p, the call and monitor function might be affected. The number of frames (or images) per second. The frame rate range is 125 fps. It indicates the amount of data transmitted over an internet connection in a given amount of time. Select a proper bandwidth based on your network speed. The sub-stream supports D1, VGA and QVGA. The number of frames (or images) per second. The frame rate range is 125 fps. It indicates the amount of data transmitted over an internet connection in a given amount of time. Step 4 Configure the image. Figure 3-20 Image 44 Table 3-12 Image description Parameter Description Contrast Hue Saturation Scene Mode Day/Night Backlight Mode Contrast is the difference in the luminance or color that makes an object distinguishable. The larger the contrast value is, the greater the color contrast will be. Refers to the strength or saturation of a color. It describes the color intensity, or how pure it is. Color saturation indicates the intensity of color in an image. As the saturation increases, the appear stronger, for example being more red or more blue. The saturation value does not change image brightness. The image hue is different in different scene mode. Close: Scene mode function is turned off. Auto: The system automatically adjusts the scene mode based on the photographic sensitivity. Sunny: In this mode, image hue will be reduced. Night: In this mode, image hue will be increased. Day/Night mode affects light compensation in different situations. Auto: The system automatically adjusts the day/night mode based on the photographic sensitivity. Colorful: In this mode, images are colorful. Black and white: In this mode, images are in black and white. Close: Backlight compensation is turned off. Backlight: Backlight compensation automatically brings more light to darker areas of an image when bright light shining from behind obscures it. Wide dynamic: The system dims bright areas and compensates for dark areas to create a balance to improve the overall image quality. Inhibition: Highlight compensation (HLC) is a technology used in CCTV/IP security cameras to deal with images that are exposed to lights like headlights or spotlights. The image sensor of the camera detects strong lights in the video and reduces exposure in these spots to enhance the overall quality of the image. When the function is turned on, images will be displayed with the left and right side reversed. When this function is turned on, images can be flipped over. Mirror Flip Step 5 Configure the exposure parameters. 45 Figure 3-21 Exposure Table 3-13 Exposure parameter description Parameter Description Anti-flicker Set anti-flicker to reduce flicker and decrease or reduce uneven colors or exposure. 50Hz: When the mains power supply is 50 Hz, the exposure is automatically adjusted to prevent the appearance of horizontal lines. 60Hz: When the mains power supply is 60 Hz, the exposure is automatically adjusted to reduce the appearance of horizontal lines. Outdoor: When Outdoor is selected, the exposure mode can be You can set the exposure to adjust image brightness. Auto: The Access Controller automatically adjusts the brightness of switched. images. Shutter Priority: The Access Terminal will adjust image brightness according to shutter exposure range. If the image brightness is not enough and the shutter value has reached its upper or lower limit, the Access Controller will adjust the gain value automatically for adjust image brightness. When you select Outdoor from the Anti-flicker list, you can select Shutter Priority as the exposure mode. Exposure mode might differ depending on different models of Access Controller. 46 Exposure Mode ideal brightness level. Manual: You can configure gain and shutter value manually to Parameter Description Shutter is a component that allows light to pass for a determined period. The higher the shutter speed, the shorter the exposure time, and the darker the image. When the gain value range is set, video quality will be improved. Exposure Compensation You can make a photo brighter or darker by adjusting exposure compensation value. When 3D Noise Reduction (RD) is turned on, video noise can be reduced to ensure high definition videos. You can set its grade when this function is turned on. Shutter Gain 3D NR Grade 3.8.1.2 Configuring Channel 2 Step 1 Select Video Setting > Video Setting. Step 2 Step 3 Select 2 from the Channel No.. Configure the video status. We recommend you turn on the WDR function when the face is in back-lighting. Figure 3-22 Image Parameter Brightness Contrast Table 3-14 Image description Description Brightness is the relative lightness or darkness of a particular color. The larger the value is, the brighter the image will be. Contrast is the difference in the luminance or color that makes an object distinguishable. The larger the contrast value is, the greater the color contrast will be. 47 Parameter Description Backlight Mode Close: Back-light compensation is turned off. Backlight: Black-light compensation automatically brings more light to darker areas of an image when bright light shining from behind obscures it. Wide dynamic: The system dims bright areas and compensates for dark areas to ensure to create a balance to improve the overall image quality. Inhibition: Highlight compensation (HLC) is a technology used in CCTV/IP security cameras to deal with images that are exposed to lights like headlights or spotlights. The image sensor of the camera detects strong lights in the video and reduce exposure in these spots to enhance the overall quality of the image. Step 4 Configure the exposure parameters. Figure 3-23 Exposure parameter Table 3-15 Exposure parameter description Parameter Description Anti-flicker horizontal lines. Set anti-flicker to reduce flicker and decrease or eliminate uneven colors or exposure. 50Hz: When the mains power supply is 50 Hz, the exposure is automatically adjusted to prevent the appearance of 60 Hz: When the mains power supply is 60 Hz, the exposure is automatically adjusted to reduce the appearance of horizontal lines. Outdoor: When Outdoor is selected, the exposure mode can be switched. 48 Parameter Description You can set the exposure to adjust image brightness. Auto: The Access Controller automatically adjusts the brightness of images. Shutter Priority: The Access Terminal will adjust image brightness according to shutter exposure range. If the image brightness is not enough and the shutter value has reached its upper or lower limit, the Access Controller will adjust the gain value automatically for ideal brightness level. Manual: You can configure gain and shutter value manually to adjust image brightness. When you select Outdoor from the Anti-flicker list, you can select Shutter Priority as the exposure mode. Exposure model might differ depending on different models of Access Controller. Shutter is a device that allows light to pass for a determined period. The higher the shutter speed, the shorter the exposure time, and the darker the image. When the gain value range is set, video quality will be improved. Exposure Mode Shutter Gain 3D NR Grade Exposure Compensation You can make a photo brighter or darker by adjusting exposure compensation value. When 3D Noise Reduction (RD) is turned on, video noise can be reduced to ensure high definition videos. You can set its grade when this function is turned on. 3.8.2 Setting Volume You can adjust the volume of the speaker. Log in to the webpage. Step 1 Select Video Setting > Volume Setting. Step 2 Step 3 Drag the slider the adjust the volume. Step 4 Click OK. 3.9 Configuring Face Detection You can configure human face related parameters on this interface to increase the accuracy of the face recognition. Step 1 Step 2 Log in to the webpage. Select Face Detect. 49 Figure 3-24 Face detect Step 3 Configure the parameters. Table 3-16 Description of face detection parameters Parameter Description Face Threshold Max. Angle of Face Anti-fake Threshold Recognition Timeout (S) Adjust the face recognition accuracy. Higher threshold means higher accuracy. Set the maximum face pose angle for face detection. Larger value means larger face angle range. If the face pose angle is out of the defined range, the face detection box will not appear. Avoid false face recognition by using a photo, video, mask or a different substitute for an authorized person's face. Close: Turns off this function. General: Normal level of anti-spoofing detection means higher door access rate for people with face masks. High: Higher level of anti-spoofing detection means higher accuracy and security. Extremely High: Extremely high level of anti-spoofing detection means extremely high accuracy and security. If a person with access permission has their face successfully recognized, the Access Controller will prompt face recognition success. You can enter the prompt interval time. 50 Parameter Description Invalid Face Prompt Interval (S) Face Target Brightness The default value is 50. Adjust the brightness as needed. If a person without access permission attempts to unlock the door for several times in the defined interval, the Access Controller will prompt face recognition failure. You can enter the prompt interval time. Face images require desired pixels between the eyes (called pupillary distance) for successful recognition. The default pixel is 45. The pixel changes according to the face size and the distance between faces and the lens. If an adult is 1.5 meters away from the lens, the pupillary distance can be 50 px-70 px. 1 is for the white light camera and 2 is for the IR light camera. After face exposure is enabled, human faces will be clearer when the Access Controller is installed outdoors. After a face is detected, the Access Controller will give out light to illuminate the face, and the Access Controller will not give out light again until the interval you set has passed. No detect: Mask is not detected during face recognition. Mask reminder: Mask is detected during face recognition. If the person does not wear a mask, the system will give them a reminder to wear masks, and access is allowed. Mask intercept: Mask is detected during face recognition. If a person is not wearing a mask, the system will give them a reminder to wear masks, and access is denied. When the Access Controller is installed outdoors, the QR code will be clearer based on the defined QR code brightness when you scan it. After a QR code is scanned, the Access Controller will give out light to illuminate the QR code, and the Access Controller will not give out light again until the defined exposure time has passed. Supports detecting 4 face images at the same time, and the unlock combinations mode become invalid. The door is unlocked after any one of them gain access. Pupillary Distance Channel Id Exposure (Face) Exposure Time Mask Mode Exposure (QR code) QR code Brightness Exposure Time (QR code) (S) Multi-face Recognition Step 4 Draw the face detection area. 1. Click Detect Region, 2. Right-click to draw the detection area, and then release the left button of the mouse to complete drawing. The face in the defined area will be detected. Step 5 Draw the target size. 1) Click Draw target 2) Right-click to draw the face recognition box to define the minimum size of detected face. 51 Only when the size of the face is larger than the defined size, the face can be detected by the Access Controller. Step 6 Click OK. 3.10 Configuring Network 3.10.1 Configuring TCP/IP You need to configure IP address of Access Controller to make sure that it can communicate with other devices. Step 1 Step 2 Select Network Setting > TCP/IP. Configure parameters. Figure 3-25 TCP/IP Parameter IP Version MAC Address Mode IP Address Subnet Mask Table 3-17 Description of TCP/IP Description IPv4 MAC address of the Access Controller. Static: Manually enter IP address, subnet mask, and gateway. DHCP It stands for Dynamic Host Configuration Protocol. When DHCP is turned on, the Access Controller will automatically be assigned with IP address, subnet mask, and If you select static mode, configure the IP address, subnet mask and gateway. gateway. 52 Description IP address and gateway must be on the same network segment. Set IP address of the preferred DNS server. Set IP address of the alternate DNS server. Parameter Default Gateway Preferred DNS Alternate DNS Step 3 Click OK. 3.10.2 Configuring Port You can limit access to the Access Controller at the same through web, desktop client and phone. Step 1 Step 2 Select Network Setting > Port. Configure port numbers. Figure 3-26 Configure ports Except Max Connection and RTSP Port, you need to restart the Access Controller to make the configurations effective after you change other parameters. Parameter Description Table 3-18 Description of ports Max Connection TCP Port HTTP Port HTTPS Port RTSP Port You can set the maximum number of clients (such as web, desktop client and phone) that can access the Access Controller at the same time. Default value is 37777. Default value is 80. If you want to change the port number, add the new port number after the IP address when you log in to the webpage. Default value is 443. Default value is 554. 53 Step 3 Click OK. 3.10.3 Configuring Automatic Registration The Access Controller reports its address to the designated server so that you can get access to the Access Controller through the management platform. Step 1 On the home page, select Network Setting > Register. Step 2 Enable the automatic registration function and configure the parameters. Figure 3-27 Register Table 3-19 Automatic registration description Parameter Description Host IP Port The IP address or the domain name of the server. The port of the server used for automatic registration. Enter the sub-device ID (user defined). Sub-Device ID When you add the Access Controller to the management platform, the sub-device ID on the management platform must conform to the defined sub-device ID on the Access Controller. Step 3 Click Apply. 3.10.4 Configuring Cloud Service The cloud service provides a NAT penetration service. Users can manage multiple devices through DMSS. You do not have to apply for dynamic domain name, configuring port mapping or deploying server. Procedure Step 1 On the home page, select Network Setting > Cloud Service. Step 2 Turn on the cloud service function. 54 Figure 3-28 Cloud service Step 3 Click OK. Related Operations Download DMSS and sign up, you can scan the QR code through DMSS to add the Access Controller to it. 3.10.5 Configuring Serial Port Step 1 On the home page, select Network Setting > Wiegand serial port setting. Step 2 Select a port type. Figure 3-29 Serial port Select Reader when the Access Controller connects to a card reader. Select Controller when the Access Controller functions as a card reader, and the Access 55 Controller will send data to the Access Controller to control access. Output Data type:
Card: Outputs data based on card number when users swipe card to unlock door;
outputs data based on user's first card number when they use other unlock methods. No.: Outputs data based on the user ID. Select Reader (OSDP) when the Access Controller is connected to a card reader based Security Module: When a security module is connected, the exit button, lock will be not on OSDP protocol. effective. 3.10.6 Configuring Wiegand The Access Controller allows for both Wiegand input and Output mode. Step 1 On the Main Menu, select Connection > Wiegand. Step 2 Select a Wiegand. Figure 3-30 Wiegand output Select Wiegand Input when you connect an external card reader to the Access Controller. Select Wiegand Output when the Access Controller functions as a card reader, and you need to connect it to a controller or another access terminal. Table 3-20 Description of Wiegand output Parameter Description Wiegand Output Type Pulse Width Pulse Interval Output Data Type Select a Wiegand format to read card numbers or ID numbers. Wiegand26: Reads three bytes or six digits. Wiegand34: Reads four bytes or eight digits. Wiegand66: Reads eight bytes or sixteen digits. Enter the pulse width and pulse interval of Wiegand output. Select the type of output data. No.: Outputs data based on user ID. Card No.: Outputs data based on user's first card number. 56 3.11 Safety Management 3.11.1 Configuring IP Authority Step 1 Step 2 Step 3 Log in to the webpage. Click Safety Mgmt. > IP Authority. Select a cybersecurity mode from the Type list. Network Access: Set allowlist and blocklist to control access to the access controller. Prohibit PING: Enable PING prohibited function, and the access controller will not respond to the Ping request. Anti Half Connection: Enable Anti Half Connection function, and the access controller can still function properly under half connection attack. 3.11.1.1 Network Access Step 1 Step 2 Select Network Access from the Type list. Select the Enable check box. Figure 3-31 Network access Step 3 Step 4 Select Allow List or Block List. Click Add. 57 Figure 3-32 Add IP 58 Step 5 Configure parameters. Table 3-21 Description of adding IP parameters Description IPv4 by default. Select the address type from the Type list. Select All Ports check box, and your settings will apply to all ports. If you clear All Ports check box, set the device start port and device end port. Parameter Type IP Version All Ports Device Start Port Device End Port Step 7 Click OK. Click Click Step 6 Click Save, and the IP Authority interface is displayed. to edit the allowlist or blocklist. to delete the allowlist or blocklist 3.11.1.2 Prohibit PING Step 1 Step 2 Select Prohibit PING from the Type list. Select the Enable check box. Figure 3-33 Prohibit PING Step 3 Click OK. 3.11.1.3 Anti Half Connection Step 1 Step 2 Select the Anti Half Connection from the Type list. Select the Enable check box. Step 3 Click OK. 3.11.2 Configuring System Step 1 Step 2 Step 3 Log in to the web interface. Select Safety Mgmt. > System Service. Enable or disable the system services as needed. Figure 3-34 System service 59 Table 3-22 Description of system service Parameter Description Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. When SSH is enabled, SSH provides cryptographic service for the data transmission. PWD Reset Enable If enabled, you can reset the password. This function is enabled by default. Common Gateway Interface (CGI) offers a standard protocol for web servers to execute programs similarly to console applications running on a server that dynamically generates web pages. When CGI is enabled, CGI commands can be used. The CGI is enabled by default. Enable other devices to pull the video stream of the VTO via the ONVIF protocol. If this function is enabled, audio and video transmission is automatically encrypted. If this function is enabled, audio and video transmission is encrypted via THE RTSP protocol. Hypertext Transfer Protocol Secure (HTTPS) is a protocol for secure communication over a computer network. When HTTPS is enabled, HTTPS will be used to access CGI commands;
otherwise HTTP will be used. Enable this function if your browser is using TLS V1.1 or earlier versions. Enable it for faults analysis and maintenance. We recommend you select the security mode . SSH CGI ONVIF Audio and Video Transmission Encryption RTSP Over TLS HTTPS Compatible with TLSv1.1 and earlier versions Emergency Maintenance Auth Method Step 4 Click OK. to the it. 3.11.2.1 Creating Server Certificate Configure HTTPS server to improve your website security with server certificate. If you use HTTPS for the first time or the IP address of the Access Controller is changed, create a server certificate and install a root certificate. If you use another computer to log in to the webpage of the Access Controller, you need to download and install the root certificate again on the new computer or copy the root certificate Step 1 On the System Service page, click Create Server Certificate. Step 2 Enter information and click OK. The Access Controller will restart. 60 Figure 3-35 Create Server Certificate 3.11.2.2 Downloading Root Certificate Step 1 On the System Service page, click Download Root Certificate. Step 2 Double-click the file that you have downloaded, and then click Open. Figure 3-36 File download Step 3 Click Install Certificate. 61 Figure 3-37 Certificate information Step 4 Select Current User or Local Machine, and then click Next. Figure 3-38 Certificate import wizard (1) Step 5 Select the appropriate storage location. 1) Select Place all certificates in the following store. 62 2) Click Browse to import the certificate to the Trusted Root Certification Authorities store, and then click Next. Figure 3-39 Certificate Import Wizard (2) Step 6 Click Finish. Figure 3-40 Certificate import wizard (3) 63 3.12 User Management You can add or delete users, change users' passwords, and enter an email address for resetting the password when you forget your password. 3.12.1 Adding Users You can add new users and then they can log in to the webpage of the Access Controller. Procedure Step 1 On the home page, select User Mgmt. > User Mgmt.. Click Add, and enter the user information. Step 2 The username cannot be the same with existing account. The username consists of up to 31 characters and only allows for numbers, letters, underscores, midlines, dots, or @. The password must consist of 8 to 32 non-blank characters and contain at least two types of the following characters: Upper case, lower case, numbers, and special characters (excluding ' " ; : &). Set a high-security password by following the password strength prompt. Figure 3-41 Add user Step 3 Click OK. Only admin account can change password and admin account cannot be deleted. 3.12.2 Adding ONVIF Users Open Network Video Interface Forum (ONVIF), a global and open industry forum that is established for the development of a global open standard for the interface of physical IP-based security products, which allows the compatibility from different manufactures. ONVIF users have their 64 identities verified through ONVIF protocol. The default ONVIF user is admin. Procedure Step 1 On the home page, select User Mgmt. > Onvif User. Step 2 Click Add and then configure parameters. Figure 3-42 Add ONVIF user Step 3 Click OK. 3.12.3 Viewing Online Users You can view online users who currently log in to the webpage. On the home page, select Online User. 3.13 Configuring Voice Prompts Set voice prompts during identity verification. Step 1 On the home page, select Audio Custom. Step 2 Select a prompt message from the Type list Step 3 Click Browse to select an audio file, and then click Upload. 3.14 Maintenance You can regularly restart the Access Controller during the idle time to improve its performance. Step 1 Log in to the webpage. Select Maintenance. Step 2 65 Figure 3-43 Maintenance Step 3 Step 4 Set the time, and then click OK.
(Optional) Click Reboot Device, the Access Controller will restart immediately. 3.15 Configuration Management When more than one Access Controller need the same configurations, you can configure parameters for them by importing or exporting configuration files. 3.15.1 Exporting/Importing Configuration Files You can import or export the configuration file of the Access Controller. When you want to apply the same configurations to multiple devices, you can import the configuration file to them. Step 1 Step 2 Log in to the webpage. Select Config Mgmt. > Config Mgmt.. Figure 3-44 Configuration management Step 3 Export or import configuration files. Export configuration file. Click Export Configuration to download the file to the local. IP will not be exported. Import configuration file. 1. Click Browse to select the configuration file. 2. Click Import configuration. 66 Configuration file can only be imported to the device with the same model. 3.15.2 Restoring Factory Defaults Restoring the Access Controller to default configurations will cause data loss. Please be advised. Step 1 Step 2 Select Config Mgmt. > Default Restore factory defaults if necessary. Restore Factory: Resets configurations of the Access Controller and delete all data. Restore Factory (Save user & log): Resets configurations of the Access Controller and deletes all data except for user information and logs. 3.16 Upgrading System during the update. 3.16.1 File Update Use the correct update file. Make sure you get the correct update file from the technical support. Do not disconnect the power supply or network, or restart or shut down the Access Controller Step 1 On the home page, select Upgrade. Step 2 In the File Upgrade area, click Browse, and then upload the update file. Step 3 The upgrade file should be a .bin file. Click Update. The Access Controller will restart after update completes. 3.16.2 Online Update Step 1 On the home page, select Upgrade. Step 2 In the Online Upgrade area, select an update method. Select Auto Check, the Access Controller will automatically check whether the its latest Select Manual Check, and you can immediately check whether the latest version is version is available. available. Step 3 Update the Access Controller when the latest version is available. 67 3.17 Viewing Version Information On the home page, select Version Info, and you can view version information, such as device model, serial number, hardware version, legal information and more. 3.18 Viewing Logs 3.18.1 System Logs View logs such as system logs, admin logs, and unlock records. View and search for system logs. Log in to the webpage. Step 1 Select System Log > System Log. Select the time range and the log type, and then click Query. Step 3 Step 2 Click Backup to download the system log. 3.18.2 Admin Logs Search for admin logs by using admin ID. Log in to the webpage. Step 1 Select System Log > Admin Log. Enter the admin ID, and then click Query. Step 3 Step 2 3.18.3 Unlocking Logs Search for unlock records and export them. Log in to the webpage. Select System Log > Search Records. Step 1 Step 2 Step 3 Select the time range and the log type, and then click Query. You can click Export Data to download the log. 3.18.4 Alarm Logs View alarm logs. On the home page, select System Log > Alarm Log. 68 4 Smart PSS Lite Configuration This section introduces how to manage and configure the Access Controller through Smart PSS Lite. You can also configure time attendance rules on the platform, such as shifts, modes, schedules and more. For details, see the user's manual of Smart PSS Lite. 4.1 Installing and Logging In Install and log in to Smart PSS Lite. For details, see the user manual of Smart PSS Lite. Step 1 Get the software package of the Smart PSS Lite from the technical support, and then install Step 2 and run the software according to instructions. Initialize Smart PSS Lite when you log in for the first time, including setting password and security questions. Set the password is for the first-time use, and then set security questions to reset your password when you forgot it. Enter your username and password to log in to Smart PSS Lite. Step 3 4.2 Adding Devices 4.2.1 Adding Individually You need to add the Access Controller to Smart PSS Lite. You can add them in batches or individually. You can add Access Controller individually by entering their IP addresses or domain names. Step 1 Log in to Smart PSS Lite. Click Device Manager and click Add. Enter the device information. Step 2 Step 3 69 Figure 4-1 Device information Table 4-1 Device parameters Description Parameter Description Device Name Enter a name of the Access Controller. We recommend you name it after its installation area. Method to add Select IP to add the Access Terminal by entering its IP Address. IP Port Enter IP address of the Access Controller. The port number is 37777 by default. User Name/Password Enter the username and password of the Access Terminal. Step 4 Click Add. The added Access Controller displays on the Devices page. You can click Add and Continue to add more Access Controllers. 4.2.2 Adding in Batches We recommend you use the auto-search function when you add want to Access Controllers in batches. Make sure the Access Controllers you add must be on the same network segment. Step 1 Step 2 Log in to Smart PSS Lite. Click Device Manager and search for devices. Click Auto Search, to search for devices on the same LAN. Enter the network segment range, and then click Search. 70 Figure 4-2 Auto search A device list will be displayed. Select a device, and then click Modify IP to modify its IP address. Step 3 Step 4 Select the Access Controller that you want to add to Smart PSS Lite, and then click Add. Enter the username and the password of the Access Controller. You can view the added Access Controller on the Devices page. The Access Controller automatically logs in to Smart PSS Lite after being added. Online is displayed after successful login. 4.3 User Management Add users, assign cards to them, and configure their access permissions. 4.3.1 Configuring Card Type Set the card type before you assign cards to users. For example, if the assigned card is an ID card, set card type to ID card. Step 1 Step 2 Log in to Smart PSS Lite. Click Access Solution > Personnel Manager > User. Step 3 On the Card Issuing Type and then select a card type. Make sure that the card type is same to the actually assigned card; otherwise, the card number cannot be read. Click OK. Step 4 71 4.3.2 Adding Users 4.3.2.1 Adding Individually You can add users individually. Step 1 Step 2 Step 3 Log in to Smart PSS Lite. Click Access Solution > Personnel Manger > User > Add. Click Basic Info tab, and enter the basic information of the user, and then import the face image. Figure 4-3 Add basic information Step 4 Click the Certification tab to add certification information of the user. Configure password: The password must consist of 68 digits. Configure card: The card number can be read automatically or entered manually. To read the card number automatically, select a card reader, and then place the card on the card reader. 1. On the Card area, click 2. Click Add, swipe a card on the card reader. and select Card issuer, and then click OK. The card number is displayed. 3. Click OK. After adding a card, you can set the card to main card or duress card, or replace the card with a new one, or delete the card. 72 Configure fingerprint. OK. 1. On the Fingerprint area, click and select Fingerprint Scanner, and then click 2. Click Add Fingerprint, press your finger on the scanner three times in a row. Figure 4-4 Add password, card, and fingerprint Configure permissions for the user. For details, see "4.3.3 Assigning Access Permission". Click Finish. Step 5 Step 6 4.3.2.2 Adding in Batches You can add users in batches. Step 1 Log in to Smart PSS Lite. Click Personnel Manger > User > Batch Add. Select Card issuer from the Device list, and then configure the parameters. Step 2 Step 3 73 Figure 4-5 Add users in batches Parameter Start No. Quantity Department Table 4-2 Add users in batches parameters Description The user ID starts with the number you defined. The number of users you want to add. Select the department that the user belongs to. Effective Time/Expired Time The users can unlock the door within the defined period. Step 4 Step 5 Click Issue. The card number will be read automatically. Click OK. Step 6 On the User page, click to complete user information. 4.3.3 Assigning Access Permission Create a permission group that is a collection of door access permissions, and then associate users with the group so that users can unlock corresponding doors. Step 1 Log in to the Smart PSS Lite. 74 Step 2 Step 3 Step 4 Step 5 Step 6 Click Access Solution > Personnel Manger > Permission configuration. Click Enter the group name, remarks (optional), and select a time template. Select the access control device. Click OK. Figure 4-6 Create a permission group Step 7 Step 8 of the permission group you added. Click Select users to associate them with the permission group. 75 Figure 4-7 Add users to a permission group Step 9 Click OK. Users in the permission group can unlock the door after valid identity verification. 4.4 Access Management 4.4.1 Remotely Opening and Closing Door You can remotely monitor and control door through Smart PSS Lite. For example, you can remotely open or close the door. Procedure Step 1 Step 2 Click Access Solution > Access Manager on the Home page. Remotely control the door. Select the door, right click and select Open or Close. 76 Figure 4-8 Open door Click or to open or close the door. Related Operations Event filtering: Select the event type in the Event Info, and the event list displays the selected event type, such as alarm events and abnormal events. Event refresh locking: Click to lock the event list, and then event list will stop refreshing. Click to unlock. Event deleting: Click to clear all events in the event list. 4.4.2 Setting Always Open and Always Close After setting always open or always close, the door remains open or closed all the time. Step 1 Step 2 Click Access Solution > Access Manager on the Home page. Click Always Open or Always Close to open or close the door. Figure 4-9 Always open or close The door will remain open or closed all the time. You can click Normal to restore the access control to normal status, and then the door will be open or closed based on the configured verification methods. 4.4.3 Monitoring Door Status Step 1 Step 2 Click Access Solution > Access Manager on the Home page. Select the Access Controller in the device tree, and right click the Access Terminal and then select Start Real-time Event Monitoring. Real-time access control events will display in the event list. 77 Click Stop Monitor, real-time access control events will not display. Figure 4-10 Monitor door status Show All Door: Displays all doors controlled by the Access Controller. Reboot: Restart the Access Controller. Details: View the device details, such as IP address, model, and status. 78 Appendix 1 Important Points of Intercom Operation The Access Controller can function as VTO to realize intercom function. The intercom function is configured on the Access Controller and VTO. Prerequisites Procedure Step 1 On the standby screen, tap Step 2 Enter the room No, and then tap
. 79 Appendix 2 Important Points of QR Code Scanning Access Controller (with QR code scanning module): Place the QR code on your phone at a distance of 3 cm - 5 cm away from the QR code scanning lens. It supports QR code that is larger than 30 mm 30 mm - 5 cm 5 cm and less than 100 bytes in size. QR code detection distance differs depending on the bytes and size of QR code. Appendix Figure 2-1 QR code scanning 80 Appendix 3 Important Points of Fingerprint Registration Instructions When you register the fingerprint, pay attention to the following points:
Make sure that your fingers and the scanner surface are clean and dry. Press your finger on the center of the fingerprint scanner. Do not put the fingerprint sensor in a place with intense light, high temperature, and high humidity. If your fingerprints are unclear, use other unlocking methods. Fingers Recommended Forefingers, middle fingers, and ring fingers are recommended. Thumbs and little fingers cannot be put at the recording center easily. Appendix Figure 3-1 Recommended fingers 81 How to Press Your Fingerprint on the Scanner Appendix Figure 3-2 Correct placement Appendix Figure 3-3 Wrong placement 82 Appendix 4 Important Points of Face Registration Before Registration Glasses, hats, and beards might influence face recognition performance. Do not cover your eyebrows when wearing hats. Do not change your beard style greatly if you use the access controller; otherwise face recognition might fail. Keep your face clean. Keep the access controller at least two meters away from light source and at least three meters away from windows or doors; otherwise backlight and direct sunlight might influence face recognition performance of the access controller. You can register faces through the Access Controller or through the platform. For registration through the platform, see the platform user manual. Make your head center on the photo capture frame. The face image will be captured During Registration automatically. Face Position Do not shake your head or body, otherwise the registration might fail. Avoid two faces appear in the capture frame at the same time. If your face is not at the appropriate position, face recognition accuracy might be affected. 83 Appendix Figure 4-1 Appropriate face position Requirements of Faces Make sure that the face is clean and forehead is not covered by hair. Do not wear glasses, hats, heavy beards, or other face ornaments that influence face image With eyes open, without facial expressions, and make your face toward the center of camera. When recording your face or during face recognition, do not keep your face too close to or too recording. far from the camera. 84 Appendix Figure 4-2 Head position Appendix Figure 4-3 Face distance When importing face images through the management platform, make sure that image resolution is within the range 150 300 pixels600 1200 pixels; image pixels are more than 500 500 pixels; image size is less than 100 KB, and image name and person ID are the same. Make sure that the face takes up more than 1/3 but no more than 2/3 of the whole image area, and the aspect ratio does not exceed 1:2. 85 Appendix 5 Cybersecurity Recommendations Mandatory actions to be taken for basic device network security:
1. Use Strong Passwords Please refer to the following suggestions to set passwords:
The length should not be less than 8 characters. Include at least two types of characters; character types include upper and lower case letters, numbers and symbols. Do not contain the account name or the account name in reverse order. Do not use continuous characters, such as 123, abc, etc. Do not use overlapped characters, such as 111, aaa, etc. 2. Update Firmware and Client Software in Time According to the standard procedure in Tech-industry, we recommend to keep your device
(such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is equipped with the latest security patches and fixes. When the device is connected to the public network, it is recommended to enable the auto-check for updates function to obtain timely information of firmware updates released by the manufacturer. We suggest that you download and use the latest version of client software.
"Nice to have" recommendations to improve your device network security:
1. Physical Protection We suggest that you perform physical protection to device, especially storage devices. For example, place the device in a special computer room and cabinet, and implement well-done access control permission and key management to prevent unauthorized personnel from carrying out physical contacts such as damaging hardware, unauthorized connection of removable device (such as USB flash disk, serial port), etc. 2. Change Passwords Regularly We suggest that you change passwords regularly to reduce the risk of being guessed or cracked. 3. Set and Update Passwords Reset Information Timely The device supports password reset function. Please set up related information for password reset in time, including the end users mailbox and password protection questions. If the information changes, please modify it in time. When setting password protection questions, it is suggested not to use those that can be easily guessed. 4. Enable Account Lock The account lock feature is enabled by default, and we recommend you to keep it on to guarantee the account security. If an attacker attempts to log in with the wrong password several times, the corresponding account and the source IP address will be locked. 5. Change Default HTTP and Other Service Ports We suggest you to change default HTTP and other service ports into any set of numbers between 102465535, reducing the risk of outsiders being able to guess which ports you are using. 6. Enable HTTPS 7. MAC Address Binding We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel. We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing the risk of ARP spoofing. 8. Assign Accounts and Privileges Reasonably According to business and management requirements, reasonably add users and assign a minimum set of permissions to them. 9. Disable Unnecessary Services and Choose Secure Modes If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to reduce risks. If necessary, it is highly recommended that you use safe modes, including but not limited to the following services:
86 SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication passwords. SMTP: Choose TLS to access mailbox server. FTP: Choose SFTP, and set up strong passwords. AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 10. Audio and Video Encrypted Transmission If your audio and video data contents are very important or sensitive, we recommend that you use encrypted transmission function, to reduce the risk of audio and video data being stolen during transmission. Reminder: encrypted transmission will cause some loss in transmission efficiency. 11. Secure Auditing Check online users: we suggest that you check online users regularly to see if the device is logged in without authorization. Check device log: By viewing the logs, you can know the IP addresses that were used to log in to your devices and their key operations. 12. Network Log Due to the limited storage capacity of the device, the stored log is limited. If you need to save the log for a long time, it is recommended that you enable the network log function to ensure that the critical logs are synchronized to the network log server for tracing. 13. Construct a Safe Network Environment In order to better ensure the safety of device and reduce potential cyber risks, we recommend:
Disable the port mapping function of the router to avoid direct access to the intranet devices from external network. The network should be partitioned and isolated according to the actual network needs. If there are no communication requirements between two sub networks, it is suggested to use VLAN, network GAP and other technologies to partition the network, so as to achieve the network isolation effect. Establish the 802.1x access authentication system to reduce the risk of unauthorized access to private networks. Enable IP/MAC address filtering function to limit the range of hosts allowed to access the device. 87 Legal and Regulatory I nformation 1 .2.51.32.1 52 10-001 V2.0.0 Legal Considerations o l u u l Vide lance can be repulated rve, s po pu aws ,n yo Check the r y l b ca regi lo r ses o aws that u s,ng th,s d p o ary from c r n before u ou v o u ntry t ct for s l l ccuntry ance rve, o
, Restricti o ns rdou v f Haza Directi o
(R e (EU) 2015/863 o of o its amending py o o A co of the original y g l Techn
. p o lo o The m st u be d declaration py o l o upp o arati ort/n f the signed EU Dec m/s o y m: www.dahuasec rit
.c nfonnity to date co s Substances aded fr wn o u o n of C HS) Directi v e 2011/65/EU and may be obtained a u from Dah nfonnity C) can o
(D tice/
CE-Elctromagnelic This digital Compalibitity ord l ass B acc liant p ment is com
(EMC) with C u eq p i o ing t EN 55032 Disclaimer 60950-1 or IEC/EN/UL 62368- 1 , Safety f Compliance o CE-Safety p pl u olo o This rod m ct c g n Techn Informati o y ies with IEC/EN/UL ment u Eq p i Declaration of Conformity CE
(Only for the product has RF function) o y u Hereby, Dahua Technol o Eq Radi u ment Directi pp f ccnformity is available p o u l u v g e1 ares that the radi i lo The f e (RED) 2014/53/EU. at the fol dec p i o www.dah asecunty.com/su tice/
o orl/n o l text wing internet ment is ccmJ"'ant with f the EU eclarati addess n o Compliance USA Regulatory FCC p o lo This dececcm wing tw fol o ns ccnd,t, o n v li with Part 15 o u f the FCC R p o erati les. O n is sub o j ect t the o u y p ice m
(1) This de y ice ma v l interference v recei p t ex o n n oid the ,ser's aot o l ed, inc interference uding interference p y o ressl R t cause harmfu p y op o t an
(2) This de st acce ma n erati ca,se ,ndesired o o o po o o l v l o n that changes Attenti dfficali r m p res m r c e f nsib d liance c
, ment. eq,i p u o p v l l with the m ct has been tested and foond to c rod te: This N p o l o o de ice, B digital imits are designed es. These f the FCC R,
,rsoant to Part 15 o o l in a residentia harmf,I interference n against rotecti t e nab l'a''"de reas o u ord o energ freq,ency
,ses, and can radiate radi n. This frod,ct ati ins l generates, y o o v o o ance with the instr t insta ed and "5ed in acc ns, ma cti and, if n ca"5e p o l l o o mmonicati radi
,arantee ns. H t ham,1interference er, there is n we c p o v l o o o es lati ar insta artic, ccor in a that interference t will n p u o o u o ti ision rece t n, w ich can be l interference ca"5e harmf e r te radi u l o o y o i the eq determined b{ turning ment try t t ser is encc,raged ff and on, the cceelthe in erference owing meas r m ne b v o v y p o ed b ro rity t o l l ass imits for a C l that p arty the erate the o n. If this o,ctd re of the fol res ply a y u o o o ing antenna p v o Reoent o arati Increase p el catethe recei p the se o nnect the eq,i o an o n btnthe eq,i ment and rece, er o v o C the recei o C ment int o l er er is c ns,11 the dea nnctd p r an ex erienced fTV technician o p o FCC SDOC Statement can be d p nty.com/s, httpsJ/,s.dahoasec, r he o wnl o rl/n tices/
from that t o f lp n a circ,it different which aded from o l et
,l o radi RF exposure warning p function) o
(Only for the product has RF communicat;on op l v u o u l l This equi ment must be insta led and rdance with erated in acc ided co l p p p sed for this transmitter l o o o o
ns and the antenna(s cti instr ed to m op o lo o o o ju o y o covide a se st n ns and m at east 20 cm fr distance aration m al t be ers p o u o v l u cated c r
n in c erating n with an ncti r transmitter. ther antenna pl o o o ided with antenna instal cti ati ns n instr co sers and installers must be End-
iance nditi m c erating and transmitter sure c op ll o ed and dy po ns for satisngRF ex ment should be insta r and y This equi between the radiat 20cm erated with a minimum distance u st be insta or b op p p o u o Canada Regulatory lCES--001 l ass B digita p l ap u mq pl This C pp u l Cet a n arei Canada v o p o erati pl o u m s c arat ies with Canadian o l nf asse B est c rme O la n ede la c o o ICES-003 u rme NMB-003 d o Canada licence-exem p t RSS standa rd
(s) and to the fol u not ca se interference, p This de O v o iesh Industry ns conditi l ice c m n is subject owing tw y ice ma
( 1 ) This de u v op u
(2) This de ice m st acce ndesired cause eration of the device p u o p o l pareil est c senta v u o exem areils rad, icence. L'ex ts de antes ns s nditi i p p pp l u o l age, et il de bro roduire as ne d
( 1 ) l'a it arei p pp o o l l u l u p p o l u l l ter t ut bui it acce arei d isate rde ti
(2)
'a m e d'en c tib re lage est e broui meme si p o x CNR d'lnd l p pp Le o a c u incl nforme a itati t any interference, y that ma ding interference ppl u o u o strie Canada a t n est a l u es aux icab x de risOe a x u u u l l e s ectriq la?erad o b,,
, uullefoncli nnement o o u o RF exposure
(Only for the product has RF communication warning function) o p po u Ind p ement d l d be insta ne distance o ou This equirment shou between he radiat r and y p Cet Oqui le radiateur s op ll o erated with a minim 20cm m distance ed and r b dy u l l a O et utilise ittre instal minima e de 20 cm entre et votre cor ly op u o u l pp p o u v erate n ns, this radi ati transmitter Under Industry Canada reg ma po u o o o r lesser) gain a e and maxim an antenna m (
f a ty ed for the transmitter ro y p ly l v u o o ou ce red b stry Canada. T ther users, the interference t tential radi p l u o o ical e and its gain sh tro ld be s ent is a i sen that the eq ch antenna ty o ccessfu re than that neceryfor s t m
.) is n wer (e.i.r. radiated communicati o p C n. p l u o l yp o u ou e areglementati n d'lnd strie Canada, nfomment p pou pp u u l l u d'
nner avec une antenne eut foncti n t
e et d'un gain mama o u l o l u strieCanada. Dans le b t deduireles risques nd a
'emette ve ro a p pu p u o l o yo n des autres age radilectrique de bro isateurs, ii fa t ch ti a l'intenti il
.,, p p v u l e n _gain de s e d'antenne a rte q et s ty issance is tro e ra o eq i
.i.r.e.) ne de se
'etablissement ire n as l'intensite c mmunication satisfaisante isir le u nn d'
l ente (
a entemetteuadi sing ne y o p u o l o o u inferieur) Japan Regulatory Compliance VCCI o o These prod Techn g y u p y p cts com l ment. Equ;
u w,th the req
;rements of VCCI Class B o l nformat, n Batter;es Correct d;sposal of batteries
;n th;s product o o oul o d n po smarking l t be dis sh u ife. Where marked, contains merc po 2006/66/EC v dis en ironment. Indicates o n the battery l ther househ sed of with y ov l o s the chemlca ead ab r m ry, cadmi u Directive can ca o In this f their w v l l that the battery p p o e s In Directive e the reference e y o u l erl If batteries t 2013/56/EU. ro are n r the th se harm to h man hea mbols Hg, Cd or Pb Indicate duct rking and ,ts amending sed of, these substances p o o r that the battenes ld waste at the end u CAUTION o o losl t according p o Risk f ex battenes pl Is re y aced b n If battery an Inc the Instructions o p p u e. Dis f ose o rrect ty sed u rod Safety p p o u The ct c m o g,ment -Saf Eo
/v, e 623 8-1, Audl y o Part 1: Safet p u y o o If the wers 8 l o u c nne Ing t o u mers are reiulred t st c re lrements S) ol o o p o n Techn iles with IEC/EN/UL 60950-1, Inf rmati p o o olo u o iles with IEC/EN/
Requirements;
r com Part1 : General y equi ment -
nicati g n techn
, lnf l p p ou o pp p o o u t ct Is from externa the J'rod ower ada o ed with t shi rod A Mains, an the ol torthat must f ad use the externa with t f u r, wer ada t the tage SELV an Limited requirements l ct Is n
(wer o nnatl for afety Extra L ffii Power Source n and comm o o t w V
) po u Waste Eloctrical and Electronic Equipment
(WEEE) statements Disposal and Recycling p p l u u o o ou o o l l you When this f its rod sefu ct has reached the end dis life, ose of it acc po o o u l o you o o ol n ab ns. F laws and regu ca r infoonati ati l p o l l lo o n p lecti th a ca r l ntact int, c c rity res y po l o enalties rdance with acc n, ati egis cal dis f this waste sa rdinq to l r nearest designa ed pp nsible
. In for waste disposa be a licable ma t o o for incorrect 0 1 02 03 04 o l o o v o v o y the device arbitrari t disassemble n p p o o id heavy stress. ibration. lent and s i port o rage. and 1nstallat1 n C ackage 1s nere00ryduring the lete m p v o o n ati ackage ry Use the fact D o Av st trans u ring d alent for trans o n rtati ring trans r the equi aking d po po u rtation. Wymogi dot. Bezpieczenstwa l o l ow bez ,eczenstwa ektryczneg e j icia ne i zg est'stabi l o ce e"!
gam, dne z wym PrzestrzegaJ rd l p nych standa ka r6d!ona zenia. o l o Intellectual o Dahua Technol died ,n the emb Property Rights p p u l p u o al ect gy reta,ns ro
,ntel c
,n th,s d roduct described l l a o o erty nghts relat,ng l ment o g techn o t y Equipment Modifications u v ment m p u p o u o u o This eq i st be insta po u o o i n. This eq cti instr ns enin the user d mentati c ment c pp pp l v o u l l l v l l l ser-servioea le com th nents. Una nzed equi ment changes r m s a ro ns and a ry certificati e reg licab idate a a in wil a l l ord o ed and used in stnct acc ance with the p u o o ntains n o dificati at ns o u Trademark Acknowledgments pp H VI , 1 m o u a r e registered o o o l o v r trademarks p p o trademark a hcab ns l ns.A nsd,cb
,n ther y p p v an com names and f their trademarks or registered res e com ect, an,es olo g f Dahua Techn are trademarks roducts ou an u s y o Regulatory Information European Directive Compliance
( E u Th,s rod standards. p ct com p hes w,th the a pp l e CE mark,ng d,recti licab v es and o w Voltage L o l ectr E p Com magnet,c
(LVD) Direcbve 2014/35/EU y at,b,ht
(EMC) D,recb v e 2014/30/EU u Notice Privacy Protection p o o l yo l o o pl p u u u o nal data f ers thers ect r data c ser er, ntml thedevice p p o l v lo l o o car ch as face, fingerpnnts, s mber, mail address, ate n mber, GPS ne n h o p op p o l n cal mp aws mtecti a7 be in c need t n iance with the n. Yo and so y p pl o u l u l v ov lati and reg ns t egil,mate nhts and interests mtect the e o other le b u o u o o meas t imited t
, res, inc b uding_ im emen_ting idingclear and e isib p o inform data s f s n t identificab ntact. c related m,nding l lancearea and i bject the existence u htcol o t n o u u o About the Manual u o o l p ing t ail with o n that d u The man o and the actua f"'d o y p l v nl nsistency
. If there is inc between the manual p o u l mduct sha ct, the actual re y l m t c sed by the operations oss ca o l o p u o o laws and regu ati the latest o er man n, refer t the pa p v o v l If there is inc nsisten between p ou ersi ectmnic re t between the act a for the al is for reference y l l t liab e for an We are n up ord oul u l the manua
. o l o ju dated acc d be a The man w ou o o sdicti ed informati ns.F r detai related p p o v l l r offcial website. de CD-ROM, QR c r u l o a n, the e ectronic er manua and the e ersi j p up u o u A b l the designs and software are s ect t p o l l u u o The md ct dates m tca se s me differences o pl o u ease c
. ct and the man d a r ntact the c l l o v o n ementary_documentati p gramand s pu p p o o o o data, f might be de
,at, here sti ncti n m technical y p o o dis ubt d nnt If there is an r ermrs in n, ti descn p o n. lanab f final ex o l ftware otryother mainstream grade the reader s manua
(in PDF format) cann p op ns ns and the te,we rese,ve l atest stomer se,vice ail l u notice nor written u any names in the man p and the com reader software if the o l f ns
, a o erati change with op l t be ened. p v registered l trademarks, trademarks A ppl o o l e owners ecti roferties of their res v l ier ease ,nsi our website, ntact the su c P o em occurnng when using the de rob y o r c If here ,s an lanati aethe p anr p ex o uncertainly ice ntmve,sy, we rese,ve the nght mer se,vice if there is l f fina r cust n sh n a l u u o o Support o u o l ou pl o l y u ou o u o ntact ,l ease c assistance, technica an require d y Sh u y y p p p u o u u yo o
, y r If d1slnb l esh 1mmed1alel t be answerad ns cann our q o yo yo re a ra ens l nale channels ro gh the af eries thro ur q aro f If u ara connected the lnleme, l u can o u o u o o p u o o n and software u ser d wnl mentati ad D c y p p p o o o hrase. r ct, category, d gr Search b ort l Re ro lems t Dahua su rt staff b p po u area. ppo a s ChathDah V1s1t Dahua Su p dates yo gging in to o nty c at www dahuasec p v ri ur u rtstaff. rt m/supp y o ou u o r Dah po 1stnb l id res a r w1II nse pport ate su Contact Information ZHEJIANG DAHLIA VISION TECHNOLOG o N Address:
o R
. 1 1 99, Bin'an ad, Bin CO , LTD o j Hangzh iang District, Y u, P.R. China ndgllls, kan medf0re Signalord Beskrlvelse v u FARE ADVARSEL is den ikke v o j p eh0 Angi m, h s risiko, o l lvo l ers nskade ig r er a d0d el v o v l l v p m, h risiko, s ler er middel e Angi is den ikke a o l kan medf0re ersonskade derat ettere til m v o o v p
, s ig risik er m m h Angi u l j res tere i skade e endom, tab af data, red l FORSIGTIG eller uforudsige tater. j m h l 0se et is den ikke erdig med at p p u l u u u l ige resu o l p ag, s fors lndeholder arertid elles o pp lndeh su l y der igere lder lerer teksten opl TIPS BEMASRK ndgas, kan l se ceret yde l em rob o o s ysninger, u m nderstreger g o u g i ning. ed drift. d Iii de tilladte o ov lgl po ol o Trans p rh f for s v for at sikre, Iii smfors o ktets tekniske Sikkerhedskrav p l l p l u ndingener stabil at s sikkerhed e e standardefo ka y p op v l ol u o o erensstemme se med rod ktets kra p p u u o u be ar ktet i henh imatiske k d r g rter, br g p v l o rod Se gtighed). g luftf r erat d (lem p v uftfugtighed g eratur tem ecifik u l l l u l o o PlacOr ikke roduktet et sled med fugt, sto
, strk y p l l v inge e er ektronisk stabile l dst
,f ld. rh v v l v l l ler ikke armeki i nrhedenaf en de, ss roouktet armeafgi er andre fyr e arat, et centra p o u v o Undga, at skeberind i rod ktet p l v u o l l ind endige k m nenter. l ler det et stabilt ler insta ktet d r e andret, Insta ler p l o l u der ned fa o l v ler Insta rod uftning, ktet et sted med god ud p u ati enti Adskil ikke rod o Undga srkttryk, kraftige ndgatdet u g bicker ikke rod pp Insta l armea v debrand. i ende enheder, specifikati rsagerskade nsninger. lde, stk o m en radiat for at undga arme el o g gennemb g dermed f u l er k sted for at ktets a de r, et ne op po po p p v o u v po be aing u trans rt. B, l l agen el g fabriksemba v ktet. o ll n. Prod g insta ati v l er tils o o u ner ibrali ktet skal v l u l odning under trans eret l refu dt embal po rt, nde arende Iii trans rten Batteri l o v l u ppo p lo v g far le, h qnften af realtidsuret sli ret til at nu p o l o o u
,ses en roouktets serve
, er gbeskeo i rt,n op ppo o er k el duktet, r t,I nss,derne rat, Se konfig at fa flere m serverra lysninger rten er ntakt ADVARSEL o p Cna,aaeMOCTHHTe CToapr,a anePHc,a6e, O O Han o T cTB nacHoc,,
,a 0 Ha "3HCKB038 O p yp p po O O O a Han a,ecn
,a K T OCTB Texccne"""'""""
c, CT po p p naaaTe " cbx ae yc, CT " ,eMne ar y Ha o OCTBOT n aaB H0THa p H O o po T
, n ocTHMO. p p O po p e>HMO,OTCOBa cHry
,rn cra6H p p op
;HBOHayc,
. o O arn, an oM aHcn y a""'
cn HO BJlH p p p O CbOTBerHTe p o O o a60TH8Mne a" BJ1H ary y p yp O o crne He n rn Ha MRCT orn cr o a, CbC CH H"HHCKa ,BMne c ar p o O o Mcrnc n MeHna y pO p p
CTBOT crrn He n c, y p o yro cT e,en,neH Har po O o
"36eHen y p o O MCTBOT c,a,e e yc, n He o p pO op O O BbT HTM. eWHMTe K Mn y O HTM CT ae x HCTBOT
"30HTanH p po po p O O o
,38JHenHe. MT O O HTM aeycr 6 OCTBOT H8 aer p po po o O O MCTBOT
"'""""TaHa YCTP p p O O He aorn 6rnycr TBOT n 3BOnH p p op p O HBT He,BM6 Ba 6BBeCH O o o aHMO"M aHe, cbx r,
, aHcn p p o o HanH na,
. n,aaOre,a , n aHcn H.n p aHea6 p en M M pr, O l HOHa BJlara, npax, MH b4HBHHO p OHH CO ene O O p p 38 reHe
, O O H3T04""'Ha rnnn,Ha, MCTB o oa n o CT,3a Hece n p TOP, a rnnnHa,,a oa naHOH T p e T O o
" m n o
,e craTeH8 CTa6H O MRCT
" He ae o p
, o p p a""" " HBM aHcn
, , o o na, Hara O o p KPHen aHe enBa ce p,, p eMe Ha a a,a """ n0a HOCTHae p aHB n 6ap p O p p BMB (RT BTOB0H TaBJl" Ha H,c,aM y p B n op o O Tpaoa e cHa,B OT40T8 Ha Cb p pO p oese ""
Cb06ee.3a n CH Ma"OTH y aHa n oo aHre38 HBCT cr
p O AK rae Hen aaH CMeHTecaM op XBbpJle "'3BHTe6are a,n p p po p HHHCT HTeHa n IIPE/IYDPE p O CbC CbaHnH 6are 6aTe n p O Romiinesc p O a60Ta C p O p eanH o o BHMKBB p p o 6are M BCKOB<nHB.K p p O O aHa n ooyaece n p Bb T4era Ha Cb rec e,na Ha Dah a"""ce CBb sra
,a;
a BTe a u p op nMeHa.HMa HCK OT e,c03"
p O bHa en HH a CbOTBeTCTBC MeCTHHTe H3TsHa 6are Hsra T Dahua. p Masuri de s i g u ranta s i Atentionari po recla a;s p o ol p ulu v
,t descne ,nd,cafole Acest ca po l u v isi col re i u ziti is p bhzaec ro distrugerii enirea u p de v ernrea l . re sii fo inaina aceste randuri l u v u z,t, lo rietatii.Cititi de siguranta lnstructiuni l e semne cateq are Umiat o o rit pot aparea in Ghid Signal Words Meaning
.&.PERICOL u po l ten\ia nrise v l a deces sau va duce u dicatcare, dan e tamgra lndi v e itat, v este o stc de: 310053 o P Tel+86-571-876888"3 Fax: +86-571-87688815 ov Email:
o atech.c erseas@dah m u u Website:
www.dahuasec rity.com English Important Safeguards and Wa rnings p o p p p o o v o v This Cha ntents c ter describes the c p o v u l ly f n ent, re ent, n, and re hazard y u l before
,ce, c m s,ng the de caefu ture reference for f p vering roperty w,th them when o p l ingof the dev,ce, ro p damage Read these contents ehand u s,ng, and kee l it wel Safety Instructions l w ord rized signa wing categ lo o s with defined pp meaning might a ear in the l The fol manua Polski Signal Words Meaning Indicates a high l l vo o wi oul u res po l tentia t a hazard which, if n ju o o ry. r seri lt in death us in p l u m or ow o o l r m ight Indicates a medi l vo d resu t in s ided, c a o l p p tentia Indicates a p u l y p p ert t in res ro u o o redictable rmance, r erf n l o o ov Pr em rob ds t y ou time rd haza derate in vo risk which, if not a lo damage, data l t. resu p ve a otential ides meth hel p yo u s ol o o l ides additi na o lement t the text. o informati p n as the em su ided, o which, if n t ju ry. ou ided, c o ss, l ld wer r save hasis and
& w
& CAl/11Cl,j m - Pro v pp tage is stable o t Safety Requirement vol u l l l o y upply p pl v o u o Abide b re that the safety standads ectrica l ens e ca po lo v o req irement f the de ower s and c m ies with the p po o o o l Trans re the de rt, use, and st ice under the al p p u v tem s ns. Refer to the c nditi nding technica rres c erature po p u o erature midity and h o v o o o ecificwokingtem de ice los o l o o o o l st, extreme hot ness, d dam sed t cati t place the de n ex ice in a l n D pl v l l o o ou r unstab ectronic n, ld, strong e r c ns condti e lighting radiati o v o o u n the de ice in a ace near the heat s v o v ice t de a ther heat generating r mace, f heater, po o the de ent liquid Pre ice to avoid damge t int l ly o o v l l o nents. c nta riz the de ice h Instal r instal p v l v falling. v the de Instal entilated l-
iina we ice the de o p v lace t re v entilati ice p wed humidity and ecificat, n the stable o o n lace, and d from flowing ent it fr o o ns id fire. t insta o t bl ck the n of D f m p m l o vo o o o internal rce, such as radiator, Battery p op po Low batterwower affects the p p o
. hen the battery needs re p p o o ct"s server re rt Fom r c ages ct's setu u o pp p l l o sing ii to reset at e n of the RTC. ca erati po o g message wi a l lacing. a n ab ut the servere rt o uppo re1nfonnat1 u u rod rod ery ear in the rt.see the ntact Dah wer-u a s po v u plo
& w 3 o pl ly o f ex Risk u ace n Re po a. Dah Dis se of used batteries o si n if the battery with an 1denlica p y l is incorrectl re battery laced or a battery l ca according o l ati regu lo to u manufact u o cti s instr ns o which 1s recommended y b ns r the battery y po Wane srodki ostronoscii ostrzeen i a o cozdzlal po zagern po o o o y po po o o s zenla,s k rzystanla _ z u b s plsuje wlasclwe o m.a takes by za s dzernu m,erna sz p l r,er,em koczystanla
;d kladnle 6w referencnych. doce e na u p b,egarna ozna z udzenlaza o rzyszl j ami i zach z tyml Nlnle6sz za Pedm7 informac legarna wa po s b y j j o j o lnstrukcje dot. bezpieczestwa p p j j gs o awlc s,nast u ijce s y o o po W p l drznlkum a nzatabe ol l ch znaczen,e e. wyJasrna mb Symbol ZAGROENIE STRZENIE UWAGAWSKAZOWKI o egpo u razami l p a, nyi sto wa n m i Znaczenie po o tencjalne za Oznacza goro wyo ki s i:en i e kt6rego nieunikni(;lcie utk a c s e m k w u b smierciq po l p tencja Oznacza ne zagroeniesredniego o po sto niskieg nia, kt6reg o l j y wa6 skutk mnie sz ub srednimi mi po l j Oznacza ne zagroenie,kl6rego tenc a u o p nie nik n cyie i m eskutk u p ch adkiem wyda d
, tratt:1. s n a u sk rzewidziane nie l j p Oznacza wskaz6wki a zwa ijce na rozwiijzanie wac zniszczeniem b miec inne nieuniknicie l ub e l u j nci mienia, tki po razami m o u o o u l em rob o u b l o szdncczasu p j e uzu j
. cetekst gl6wn e!nia y ID UWAGA Oznacza inf rmac Dansk yp STRZEZENIE p u u a dku niewlasciwej ak wymian W rz po l o u l u chem. b r na at m zast o u o y a emzalecanym przez HrrrDah p o l u o u ry nalez m at waczg u at centa a umu d r kCJam, instr y wac wyczn,etak,m sam o
,z dnie z o at ra m u l u l lo y y u zagroenie ra wystpuJe p u y m ty em l b inn u l j ami ac mi reg y kaln m l ub Vigtige sikkerhedsanvisninger og advarsler p ekthndterinaf o a eend m. isninger u u u y ndgelseaf risici ktel, rod g p l o u u bruer ggahgt, for d skap,t1et mh e Iii il g gem ka gen, nder br o v beskri er k v l o lseaf skader u ro uktet, le an erh g. Kapitlet p und J senere br v g ad ars er ld a p ov o o o e Sikkerhedsanvisninger l qende siqna Fo lo rd, med besk v elsekan forek o v l edninqen ej mme i Slgnalo,d I Besknvelse 05 06 07 08 Suomi Tarkeivarotoimenpiteitaja varoituksia u o u o l ataan 1a;tteen as;anm ka;nen kas;ttel ntaa jen t aar o o l v l ennen 1a;tteen 1e1l;sest;
L to hu j j h h ytii Sai eita, kunytiitlaitetta. e eet tu v vu l oj v u o Tassa ssa ku u ou ah;nk us ma,s j a n o en estam;nen. data niiitii e tiimii s;sa ia y v o u ndg.11s, yttiimist tae,tavarten. Turvallisuusohje o omi u u l t h okite l Seuraavat u l sanat kuvat u l a merkitykse l l l ii saattavat esiintyii M agyar v asetuss, l l y a la ta, ottamal ui yt hte Dahuanl keen u v Va, da o Hii VAROITUS O v v hdys l S parist aara,J p o a1seen parist ain saman t Ja akut arist 1kiiytetyt p l l uo u vrin asetetaan leen a1ka p l l v emaan parist n tai Dah on s,tte an s y l1sten miiiirii a1ka m1staJan a sten ta, o oo o heidenmuka,sesll Fontos 6vintezkedesek l l l l ly olv l l ek megelOt 6 keze en Feiezet eszO OsOI, a e leia az Eszkoz megfe o v o ata e ott ni karok megeloz.Az Eszk6z haszna 6beni hivatk ntartsa be, es 6rizze meg61J6 s v AJe a a hasznalata es figyelmeztetesek sIJara o agy v assa el figyelmesen, Biztons6gi utasitbok
Az Utmutat6ban az alabbi megharozott l j entessel e o bir6 kateg rizII Figyelmeztet VESZELY IGYELEM VIGYAzAT 0ITIPPEK y po N e Jelentes v l l l l yt j y, ha nem ke i
, o s cy ia am sz a t e i eoz e e g e n e l y u a
. l s It t nJ e z l g a s s s k o e v h po p v v j y elez, amel eszlyt tenclis kis ag es Koze o v l l y y ag he
, en i e nem keru o po o ly tenciisk za a c O illn rt v l t ni
, e a d k a ke
, r i lj y es ltmenyt te ag kiszam o ok zhat. l y O m y e sit, 0a1 m on l m6dszereket bizl e k a f l j y ft ka em rob ta a atvag r g id v l j me t eztz, a e
, ll atv cs a es s a e t, l an eredmen thatat f hoa e n m a ny b b yt mersekelt na meg l selest o agy dani a p e y v o y
, ha kozhat. egn itenek s, k l e ese v eg kieme zto bi ID MEGJEGYZESEK Tobbiinfomci6kat kiegzrte l sft a szo Biztonsgikovetelmyek zto l sltsa kat annak bi lSi es az eszkoz arame v l es homersek et nkret uzemi homek o y isz n l ok kozott etetes v y o o l yo nsagi szabvan Az. eszkozt a megengedett j a, es taro o m l a feszu p 6 legyen enek megfele lj o aratartalom a. A k y o l
, bizt i elestr Tartsa be a hel y v rdekben,h ts stabi g y etelmen ko l p lj itsa,hasznal szl oly aratartalmat megtala a az eszkoz mOszaki lelrasan. v l Ne tegye az eszkozt y me ag egnek nrisz o ly radiat l he re. o so alkalzek,rosodnak A be y y l fol h yozasa O A leesOsOnek u l ned re, ah ektronik ese p l ayokaak e A tzelke eseerdekenne te y ag v r, hosugarz6, v hidegnek, e. o l yj adek fo n az eszkbe. ekOben az ekI kemence, megakada an hel v an ki ol po g rd v v o ltse az eszkozt h6fors,mint mas hoterme l keIesee e l 6 eszkkoze l eldau ebenIVO yo rd ekbenakadal l e te izszintesen zza meg, itse, p v u esseinek, y ag g rzsnak, s s rnak, rendki uli l instabi p l p y y vag l l o l l l l stab,I hel re te e itse j j itse, es ne b e re te l okk lozt. a az eszkoz sze 6z6 he 61 sze AT. eszkozt y p l o lj l l szet az eszk6zt esen ne szerelJe Onken y y o o l t, eras bevete igen e a nag nkero ites s e itrolases te A szl v o o jo leera szuksg na telies Oztatost. ts s rezgI,az e an csomag Asz11i y y zg A szIish last ag mag rics azzal egyenekuthasznal n p ly o v y Elem l p o o ol elem tolt6ttsegi acson Az a l beka ask cs helyzetbe uzenete en,kmeg a termek szerverelentesen o infomci6kat gashoz m l szint hassa
. Arnik al v l ain, da talal a ternkbea l lisi p r ala ol lv l emet csernike r az e l an az RTC mukbdre,m,nden y l l, eg p v na lo l6 bbl A szerverelentes rduljo agy fo n a Dahua IGYELEM v u ly l l o v l o l u elore cser emet nem megfe
, ha az e bbanas R esze y ly v o l u ag emre Csak gyan emre cserlie a Oltal anl a Dah tte y l A haszntelemet a he k i el6s emg az e art6 mal l anitsa lyan e y ag Ma o tasisaiszerint 6 o nr a p c BalKHM n peAna3HM MepKM M npynpe>KA o o p Taa naea
,a n p BHHMH
'"n p o p o o
""",an ncaHc, p p O
,e a-rsHeHa nacH po
"""n 003" HHCT Ha yc;
"'3BOT O p aeHae,cnn p crrn " ,e H HJn a,a"HaYCT
,ailHHoe'"-
p n,eeYCT OHCTBOTO, cna3BaHoe a8'H. ucn T TO, Oc;eOTO, ""3anaa38 o O po CTB MHCTp"""38 6e3onacHOCT
'" - - nu- - -,.. , ... ,, ......
, ..... CHrnHHS)'MH 3uaseue o o O IIACHOCT 3B8BVICOKa nOTeH1..1111anHa CT, KOT nacH O n p He 6e 1o1a6erHarn, o 1-1 ce o O w,e A aHlHe p Ha p o e H cO a Jl a K M H C a M H L-1 n B
::i 6 lol l..l)l(
, K p a p H e e 6 e H r L-1a ara M
, O e OPE>llcN.IJF ne1MyMe aH eHM Ha O o H On a a
,Q a B o aH O cH e e A K O ff T O n K Jl o O O
,8K CMbpT MnVI O ,
,QCT HHMAHIIE
... C:LBETH Qi AEEJIEKA n Hee H8JlHHeTH, O o p O HT HU,aneHPCK, K O p
, aK pO 0Me nocO'-lsa n O H36eHMO)l(e ,Q p
-HHCKa n aary6a HHH,n y Hen CKyeM e3 maT. O O o O p po p p 0603Ha!BaHa4111Hlll, K IIIT M a BIii n a3 eMe 6.neM .,11., acneCT., e e.,Ten p O eaoCTa.Q o nlHIIITeilH8IIIH O nbJlHeHHeKbM 8KL.1eHT H O CH
,Q o BHITeKCT. rHaT O pMauK8T H3B0,QMTH CTMnH il3MCKBaHM 6e,onacHocT 1 0 1 1 1 2 Huomiosanat Merkitys VAARA VAROITUS UOMIO INKIT htaa u jo jo ka jo emaan tai po ienen l aiseen l po v l aaran, tentiaa isen uren u ou v v aan l s siei miseen, kkaant aka p jo u vaaran, l maisee s l ol ku v alleta l ren tai maisee keskisu l v l jo ntai kohta tta ie a tal a a jsoa vh eta
. i i t a s e s v o l l isen tilanteen, aaral maisee mahd l llisen u u o jo n, tiet mais htaa o o o u o n heikkenemiseen steh su tai rit l v jo a s siei teta. p v Tarj at a a a;kaa l mien ratkaisemiseen o jen menet miin tu svahink dottamatt tai saast o ua nge oo jo o ou ka tentiaalisen u miseen, kkaant y ka saattaa kseen, l oksiin, aJ! HUOMAUTUS Tarj rostaa tai denatekstia o o o aa lisatiet ka k jo a, y u v o o N Turvallisuusvaatimus v u u l l u uj v l v l armistaaksesi. sstandarda udata paika rvallis isia skot u u o u l l astaa akaa ja irtahtee aitteen n leasete j j p l l u o ta,kayta s-
ste issa k aitetta sallit yta a sai a lampiiti o Ka o laitteen entyinen kaytto am ste
-k aitteen s otilaa u u l l u o l o teknisistied ista. l vo k ssa se a paikkaan. e, piilrl ste tist j tet_ta le sahkatei olo ksia v suhteissa vastaa l j a si A
!la_lai l e, erittain j etta annite p v e tai e a l e akail imakkaa a vaatim ista K l a de ly ytiitehtaan astaavaa p akkaustai v o u lj u et steutta k p l Ja k u akkaamisen e lisen j etuksen l k aikana ksen. siiilytyksen Parisio p l u v o lo u l l l v o jo l o hainen A siaikakel ttaa t vaik a,ist ara n stas y p p lv o v v o o mest'I'{ tu la. L iesti i ki nnistyske,ra a ka kaise sen a a. Lisiitiet n kun past o ol po p l imintaan n (RTCcn) t n o a velin,a tteen saat tu ortista laten rtliin. tteen aihdetta e ,nra a o o 09 Cetina Signal Words
!LAVERTIZARE ATENTIE OO' SFATURI NOTA l Meaning p p l u o o mediu sa tpe ln ri uu n 1i n a d i e c o u v l u i est
, e e ta i t a d t a o e a c n ani ce d o derate m po t pe
, vita t e trde s a
, d c are aul lt en i isue dipca u n r ln e e d e ri riale i
, a e m e a t n a d p ce d a te a r o u u t p date, rman erf ltate rez e mai szutesa l v e izibi re im o szutcare, are sau n u u v p Ofera met de care sa o l emsausec rob o n pl in fo a rm ti i su imen la te t xt
. ufepl O s j ute sa rez a a misi1i tim p olv o t a i imentare ca accenti Bezpecnostni o pkame pokyny bsah o t o Yjll nas u l jici kateq ed o lo rie siqnlnich v s Sign61nf slova Vnam NEBEZPECi VAROVANi TIPY uj o e mn u o p eOI, ktere, o nebyl zamezen po OznaO nebez s!zavazh u o d by m k o l edek smrt neb nas po vnezranenL o zavazn0 neb e mnos!stledne ma u o p mu neb k eklere,
, zamezen o Us ne lehke neb OznaO nebez muem;t za nasledek v za anezranenL
, me m;t za uj p ylo d b lo y o p u
, ktere, m ok d b o l d edek sk
, muze mil za nas o y u u o nu neb o uj e mone,;z;k Oznac ylo zamezen neb u j na ma etk v o ne ka v v p dimelody, kte U o l o em neb b r anyvysledek po vam u u ii ou u o h o m am setlas o f dateOnO informace rm duraz u uj o e d Poskyt a d op lneni text UPOZORNNI
, zttudat, snen;vyk 1:1 POZNAMKA Bezpecnostnr potadavek Nebez eel vyb u Vym ou a. Dah pou fn ou v u s JIB
,d
,tobatene hk u p v ou o o pfl ado nes chu zeza t t v v ra bateni neb o P opo ou u batene bateni d r p p led n o po neb s y k y ladu s mistnim,
,s no vymOn y pol o ecn stl ny vyrobce batene. E Tl V L K a a o
, po
,. ,a DTE rrg E u
,oK A o a o E uoKEU o o i EUOKEU'"DTE,a 111,1avr1Kt<;aaiaEI<;Kai npoEli50TTOlljaEI<;
o KOV pO p U Ka/, ''6 X"p, rrVP"' "X6ev O pa 00,w
a ao av VWVKC, 6 0'"'KOTCOT m '"
X rro, ay m 0<6 ,a m O XPom KPOTOOTE m <a/,6 y, ov;-0<0XPn op p v a
, o
, ev rr v oo o K a a T op OyiAacpaEia u o av a a Kmy 1 K6 1
,. v l(ovr a 9 n o a o tva crr,, a S E m I o ovi,, pOS i v u a
,atva a ai 6 am u;
Ioaaia v t v u E a E O 8 a I NA T N O l:
)(V O m i I TTTTOT a uI a a m 1 p r K o E v v u V E 5 TTOn Y I I K u 6iE
,i UE f 5 5 p o a O
& rr p O E I A O II O I H l: H A u a o O
I n
,a m p
, v El v a 6
. v t uvav
, EAa a l K uV o 6 U T ar O;, Ie 8arr v oe
, x 6 u o o v E
, p l o aW S o a a o o a a
, ofp f
, on
, u p a a n a v a a x
, v ve a p e, 1 0
& rr p O l; O X H Oilf, :E T M BO T A E :E o v
,a E i rro a a
,a a
,E aE ia a O X P O TT ea
. a o a p a, 6 rrB
,p 0 V E E e a E OTTO
, 11rr aw a o U rr I o o 6 rr a t v u a rr v v a i 6 K a m
. e 0u
, x O 0 a p I E EV a0 W
. V ITTO o 6 rr O u v E o u
, o E om v o o O B V
xr m o p u6 a u va o rr pm o t v 6 x E a
, o cr 0 uu s i TT A n n a 6 v a vo ae, pv, TO n n f x
, KE i e i 0
. p o u
, O P O o vo v, w o p p E ia s, Baleriile u sa a bate,iei o u po l u u l u vo la reseta,ea nc\i arteaf te,ea red P na,ea RTC, delenninand p p p u u v u u l l ju serveru i
,ce, in ra
,e de inl fiecace c Cand bate,ia romire. aene j I p p po o u l u o l u u u a,ea un mesa a a i md de des te infoma\ii mai m
. Pentc ma ce u l ntacta i c s md ale nfigura,e de c aginile ta\i i, consu l servec ui sa ra a Dah asistenja u s rt rt u u o SAVERTIZARE plo lo u o o u u o u rise de ex este Tn zie dacii batecia cuiinc l o u l u iti numai c bate,ie c nl c identisa p u u u zate Tn c ncati bate,ii e emencile
,eg nfmmitate Ar l r rod nile u instruqi o rect rec ibateciei u bate,ie o t c o lo u mandatii de Dahua cale sa cu 1 3 1 5 1 6 Balerio u o j e f nu batene NkOnabitr v i v ngo u nr hodin ve sk p tecnOmsea z o Qs j e, bu 1 4 p u u r
, _ tlak dkym ll: H M EI Cl: H p p Aua,ra1saacpaAEias a o K o a a va o T 6wrr 6 rr
,e ro rnm E
,o
, e, K
, o.
U OUOK E KTP'"'
o<pa,l"
a uoWV
, a a v a v po o a a O a
,y,a
'e,,,,o"
;, rr
o
1 2 | Applicant Declaration Letter | External Photos | 217.60 KiB | July 26 2022 |
a) b) c) d) e) f) g) SGS North America Inc. 620 Old Peachtree Road SUITE 100 Suwanee, Georgia 30024 United States Applicant Declaration Applicant Legal Business Name Zhejiang Dahua Vision Technology Co., Ltd No.1199, Bin'an Road, Binjiang District, Hangzhou, 310053, P.R. China Address Grantee Code FCC ID Contact Email Contact Phone Authorized Contact Name Yolanda chen SVN SVN-ASI3214A-W chen_yunhuan@dahuatech.com 0571-28822025 I, the undersigned, certify that I am an authorized signatory for the Applicant and therefore declare;
in accordance with 47CFR2.911(d), all of the statements herein and the exhibits attached hereto are true and correct to the best of my knowledge and belief. in accepting a Grant of Equipment Authorization issued by a TCB, under the authority of the FCC, as a result of the representations made in this application, the Applicant is responsible for:
labeling the equipment with the exact FCC ID as specified in this application,
(1)
(2) compliance statement labeling pursuant to the applicable rules,
(3) compliance of the equipment with the applicable technical rules, if the Applicant is not the actual manufacturer of the equipment, appropriate arrangements have been made with the manufacturer to ensure that production units of this equipment will continue to comply with the FCCs technical requirements. in accordance with 47 CFR 2.909 and KDB394321, the Applicant has read, understood and agrees to accept that they are the responsible party and agree to abide by their responsibilities as specified under 47 CFR 2.909 and KDB394321. in accordance with ISO17065, FCC KDB641163, FCC KDB610077, KDB394321 and RSP-100, the Applicant has read, understood, accepts and agrees to abide by the post market surveillance requirements.
(1)
(2)
(3) the Applicant understands, accepts and agrees that a sample may be requested for surveillance testing. the Applicant shall make provisions to always have a production sample available upon request by SGS, FCC and/or ISED. the Applicant shall, upon request by SGS, at the Applicants expense, provide a production sample of the requested product to SGS, FCC and/or ISED as instructed. The sample shall include all support devices, cables, software, accessories or other hardware or software required for evaluation, review, certification and audit surveillance of products certified by SGS. neither the Applicant nor any party to the application is subject to a denial of Federal benefits, that includes FCC benefits, pursuant to Section 5301 of the Anti-Drug Abuse Act of 1988, 21 U.S.C. 862 because of a conviction for possession or distribution of a controlled substance. See 47CFR 1.2002(b) for the definition of a party for these purposes. the Applicant has read, understood, accepts and agrees to abide by the SGS North America, Inc.(TCB) terms and conditions. Link to CFRs: https://www.fcc.gov/wireless/bureau-divisions/technologies-systems-and-innovation-division/rules-regulations-title-47 Link to KDBs: https://apps.fcc.gov/oetcf/kdb/index.cfm Link to RSP-100: https://www.ic.gc.ca/eic/site/smt-gst.nsf/eng/sf01130.html Applicant Signature:
Date: 2022-07-09 Print Name:
Title:
Yolanda chen Certified Manager
*NOTE: This declaration cannot be signed by an Agent, it shall be signed by an authorized person listed in the FCC database Applicant Declaration Rev:0.0
1 2 | Label | ID Label/Location Info | 145.85 KiB | July 26 2022 |
Face Recognition Access Controller @hua DHI-ASI3214A-W sss HOO 12V ==,1.5A ORO PIN: 1.0.01.25.11699 ee ANA Oo SIN: 2M0024EPAG37159 FCC ID:SVN-ASB214A-W Et MADE IN CHINA FC
ZHEJIANG DAHUA VISION TECHNOLOGY CO.,LTD. This device complies with Part 15 of the FCC Rules, Operation is subject to the following two conditions:
(i)this device may not cause harmful interference, and
{2ithis device must accept ary interference received, including interference that may cause undesired operation.
1 2 | Auth letter | Cover Letter(s) | 155.65 KiB | July 26 2022 |
Zhejiang Dahua Vision Technology Co., Ltd TO:
Federal Communication Commission Equipment Authorization Branch 7435 Oakland Mills Road Columbia, MID 21046 Date: 2022-07-09 Regarding: SVN-ASI3214A-W To whom it may concern:
We, the undersigned, hereby authorize Parlam Zhan to act on our behalf in all manners relating to application for equipment authorization with respect to the FCC ID above, including signing of all documents relating to these matters. Any and all acts carried out by the agent on our behalf shall have the same effect as acts of our own. We, the undersigned, hereby certify that we are not subject to a denial of federal benefits, that includes FCC benefits, pursuant to Section 5301 of the Anti-Drug Abuse Act of 1988, 21 U.S.C. 853(a). Where our agent signs the application for certification on our behalf, I acknowledge that all responsibility for complying with the terms and conditions for Certification, as specified by SGS North America, Inc., still resides with Zhejiang Dahua Vision Technology Co., Ltd. This authorization is valid until further written notice from the applicant. Name (Printed): Yolanda chen Signature:
Title: Certified Manager On behalf of Company: Zhejiang Dahua Vision Technology Co., Ltd Telephone: 0571-28822025
1 2 | Confidentiality FCC | Cover Letter(s) | 111.46 KiB | July 26 2022 |
No.1199, Bin'an Road, Binjiang District, Hangzhou, 310052, P.R. China Confidentiality Request regarding application for FCC ID: SVN-ASI3214A-W SGS North America Inc. 620 Old Peachtree Road SUITE 100 Suwanee, Georgia United States Zhejiang Dahua Vision Technology Co., Ltd To:
From: Zhejiang Dahua Vision Technology Co., Ltd Regarding:
LONG TERM CONFIDENTIALITY Pursuant to 47 CFR Section 0.459 and 0.457 of the commissions rules, the applicant hereby request confidential treatment of the documents listed below, associated with the certification application referenced above. Schematic(s) Block Diagrams Operational Descriptions The documents above contain proprietary information not released to the public. Public disclosure of this information may prove harmful to the business of the applicant. Sincerely, Signature:
Printed Name (on file with the FCC associated with the Grantee Code): Yolanda chen Title: Certified Manager Company Name: Zhejiang Dahua Vision Technology Co., Ltd
1 2 | MCL | Cover Letter(s) | 142.87 KiB | July 26 2022 |
Zhejiang Dahua Vision Technology Co., Ltd Current Date 2022-07-09 To: SGS-CSTC Standards Technical Services (Shanghai) Co., Ltd. No. 588 West Jindu Road, Songjiang District, Shanghai, China. 201612 Dear Sir/Madam, Subject: Declaration Letter about Identity of Products
*WEZhejiang Dahua Vision Technology Co., LtdHEREBY DECLARED THAT Product Description:
Face Recognition Access Controller Model No.:
ASI3214A-W, DH-ASI3214A-W Manufacturers Name:
Zhejiang Dahua Vision Technology Co., Ltd Manufacturers Address:
No.1199, Bin'an Road, Binjiang District, Hangzhou, 310053, P.R. China
*Except that the model number and appearance deviation, are identical with the original product as follows:
Note: The definition of identical should be electrically identical. A device will be considered to be electrically identical if no changes are made to the devices schematics, board layouts, component layouts, chip sets, resistors and all other electrical aspects of the device are identical with the model(s) below which samples we chose to be tested by SGS Model No.:
DHI-ASI3214A-W Manufacturers Name:
Zhejiang Dahua Vision Technology Co., Ltd Manufacturers Address:
No.1199, Bin'an Road, Binjiang District, Hangzhou, 310053, P.R. China Sincerely, Signature:
Printed Name :
Yolanda chen Position/Title :
Certified Manager Contact Number:
0571-28822025
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2022-07-26 | 13.56 ~ 13.56 | DXX - Part 15 Low Power Communication Device Transmitter | Original Equipment |
2 | 2422 ~ 2452 | DTS - Digital Transmission System |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 2 | Effective |
2022-07-26
|
||||
1 2 | Applicant's complete, legal business name |
Zhejiang Dahua Vision Technology Co., Ltd
|
||||
1 2 | FCC Registration Number (FRN) |
0028432326
|
||||
1 2 | Physical Address |
No.1199, Bin'an Road, Binjiang District, Hangzhou, P.R. China
|
||||
1 2 |
No.1199, Bin'an Road, Binjiang District, Hangzhou
|
|||||
1 2 |
Hangzhou, N/A
|
|||||
1 2 |
China
|
|||||
app s | TCB Information | |||||
1 2 | TCB Application Email Address |
U******@SGS.COM
|
||||
1 2 | TCB Scope |
A1: Low Power Transmitters below 1 GHz (except Spread Spectrum), Unintentional Radiators, EAS (Part 11) & Consumer ISM devices
|
||||
1 2 |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
|||||
app s | FCC ID | |||||
1 2 | Grantee Code |
SVN
|
||||
1 2 | Equipment Product Code |
ASI3214A-W
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 2 | Name |
Y******** c********
|
||||
1 2 | Telephone Number |
0571-********
|
||||
1 2 | Fax Number |
0571-********
|
||||
1 2 |
c******@dahuatech.com
|
|||||
app s | Technical Contact | |||||
1 2 | Firm Name |
SGS-CSTC Standards Technical Services Co., Ltd.
|
||||
1 2 | Name |
P****** Z****
|
||||
1 2 | Physical Address |
588 West Jindu Road, Xinqiao, Songjiang
|
||||
1 2 |
ShangHai, 201612
|
|||||
1 2 |
China
|
|||||
1 2 | Telephone Number |
+8621********
|
||||
1 2 | Fax Number |
02161********
|
||||
1 2 |
P******@sgs.com
|
|||||
app s | Non Technical Contact | |||||
1 2 | Firm Name |
SGS-CSTC Standards Technical Services Co., Ltd.
|
||||
1 2 | Name |
P**** Z******
|
||||
1 2 | Physical Address |
588 West Jindu Road, Xinqiao, Songjiang
|
||||
1 2 |
ShangHai, 201612
|
|||||
1 2 |
China
|
|||||
1 2 | Telephone Number |
+8621********
|
||||
1 2 | Fax Number |
02161********
|
||||
1 2 |
P******@sgs.com
|
|||||
app s | Confidentiality (long or short term) | |||||
1 2 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 2 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 2 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 2 | Equipment Class | DXX - Part 15 Low Power Communication Device Transmitter | ||||
1 2 | DTS - Digital Transmission System | |||||
1 2 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | Face Recognition Access Controller | ||||
1 2 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 2 | Modular Equipment Type | Does not apply | ||||
1 2 | Purpose / Application is for | Original Equipment | ||||
1 2 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | Yes | ||||
1 2 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 2 | Grant Comments | conjunction with any other antenna or transmitter, except in accordance with FCC multi-transmitter evaluation procedures as documented in this filing. End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. This device has 20 MHz and 40MHz bandwidth mode. | ||||
1 2 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 2 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 2 | Firm Name |
SGS-CSTC Standards Technical Services Co., Ltd.
|
||||
1 2 | Name |
K****** Z******
|
||||
1 2 | Telephone Number |
13636********
|
||||
1 2 |
K******@sgs.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | CC | 13.56000000 | 13.56000000 | ||||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
2 | 1 | 15C | CC | 2412 | 2462 | 0.018 | |||||||||||||||||||||||||||||||||||
2 | 2 | 15C | CC | 2422 | 2452 | 0.009 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC