Amcrest HTR7213-B Thermal Body Temperature Monitoring Kiosk User Manual

Add to My manuals
62 Pages

advertisement

Amcrest HTR7213-B Thermal Body Temperature Monitoring Kiosk User Manual | Manualzz

HTR7213-B Thermal Kiosk Solution

User Manual

Version 1.0.0

June 19 th , 2020

Contents

Features ........................................................................................................................................... 3

What’s Included?.............................................................................................................................. 4

Application ........................................................................................................................................ 5

Dimension and Component ............................................................................................................. 5

Connection and Installation.............................................................................................................. 6

Installation ...................................................................................................................................... 11

System Operations......................................................................................................................... 13

Initialization .................................................................................................................................... 13

Standby Interface ........................................................................................................................... 14

Main Menu...................................................................................................................................... 15

Unlocking Methods......................................................................................................................... 16

Administrator Password ................................................................................................................. 16

Adding New Users ......................................................................................................................... 16

Access Management...................................................................................................................... 18

Unlock ............................................................................................................................................ 19

Serial Port Settings ........................................................................................................................ 24

System ........................................................................................................................................... 25

USB ................................................................................................................................................ 27

Features ......................................................................................................................................... 29

Record ............................................................................................................................................ 33

Auto Test ........................................................................................................................................ 34

System Info .................................................................................................................................... 35

Web Operations ............................................................................................................................. 35

Initialization .................................................................................................................................... 35

Login ............................................................................................................................................... 36

Alarm Linkage ................................................................................................................................ 38

Data Capacity ................................................................................................................................. 41

Video Settings ................................................................................................................................ 41

Motion Detection ............................................................................................................................ 44

Face Detection ............................................................................................................................... 46

Network Setting .............................................................................................................................. 48

Date Setting ................................................................................................................................... 51

Safety Management ....................................................................................................................... 52

User Management.......................................................................................................................... 53

Maintenance ................................................................................................................................... 54

Configuration Management............................................................................................................ 54

Upgrade.......................................................................................................................................... 55

Version Information ........................................................................................................................ 56

Online User .................................................................................................................................... 56

System Log .................................................................................................................................... 56

Exit ................................................................................................................................................. 57

FAQ ................................................................................................................................................ 57

Appendix 1 Notes of Temperature Monitoring ............................................................................... 58

Appendix 2 Notes of Face Recording/Comparison ....................................................................... 58

Appendix 3 Cybersecurity Recommendations ............................................................................... 60

FCC Statement .............................................................................................................................. 61

IC Warning Statement .................................................................................................................... 62

References & Contact Information ................................................................................................. 62

2

Welcome

Thank you for purchasing an Amcrest HTR7213-B Thermal Kiosk Solution.

This device is an access control panel that allows entry through the use of facial recognition, password cards, as well as a non-contact means of applying multi-objective, fast, and effective temperature readings which can help to lower the risk of illness or disease.

Important Safeguards and Warnings

This section of the manual will discuss the proper handling of the device, hazard prevention, and prevention of property damage. Please read these contents carefully before using the access controller, comply with them while in use.

Operation Requirement

● Do not place or install the device in an area expose to direct sunlight or near an extreme heat source.

● Keep the device away from damp areas or in areas prone to high levels of dust or soot.

● When installing the device, ensure the device is installed horizontally on a stable surface to prevent it from falling or being damaged.

● Do not drop or splash liquid on the device. Please keep all objects filled with liquid away from the device to prevent damage to the unit.

● Ensure the device is installed in a well-ventilated area. Do not block any vents on the device.

● Only use the device within the rated range of power inputs and output.

● Do not attempt to disassemble or repair the device.

● Do not transport, use, or store the device in environments that exceed the recommended humidity or temperature conditions.

● While installing the device, install the temperature monitoring unit in a windless, indoor environment with an ambient temperature of 59°F to 89.6°F (15°C to 32°C).

● Allow the device 20 minutes to power on when initially turning on the unit. This will allow the device to reach thermal equilibrium.

Electrical

Safety

● Be sure to handle batteries with care. Any improper use of the battery may result in a fire, explosion, or leakage.

● When replacing any batteries, please ensure the same model batteries are being used.

● Use the recommended power cables and conform to the recommended rated power specification.

● The power source shall conform to the requirement of the Safety Extra Low Voltage (SELV) standard, and supply power with rated voltage which conforms to the Limited Power Source requirement according to IEC60950-1. Please note, the power supply requirement should be found on the device label.

● Connect the device (I-type structure) to the power socket with the proper protective grounding.

● The appliance coupler is a disconnection device. Keep the coupler accessible for easy disconnection.

Features

● A 7-inch LCD display with a resolution of 1024 x 600.

● Supports facial recognition, IC card unlock, and password unlock, as well as provide unlock schedules.

● 2MP, wide-angle WDR lens with auto/manual illuminator.

3

● With its current face recognition algorithm, the device can recognize more than 360 positions of the human face.

● Face verification accuracy > 99.5%; low false recognition rate.

● Supports profile recognition with a profile angle is 0° - 90°.

● Supports motion detection.

● Supports abnormality alarms such as duress alarms, tamper alarms, intrusion alarms, door contact timeouts, and illegal card exceeding threshold alarms.

● Supports general users, patrol users, blacklist users, VIP users, guests, and special users.

● Various unlock status display modes protects user privacy.

● Supports body temperature monitoring through peripheral temperature monitoring.

What’s Included?

1. Vertical Bracket (Kiosk) 4. Module Bracket Joint 7. Access Control Terminal

2. Installation Manual 5. Screw Package 8. Module Terminal Bracket

3: Waterproof Case 6. Temperature Monitoring Module 9. Power Adapter

4

No. Item

1 1x HTR7213-B Access Controller

2 1x Thermal Temperature Sensor

3 1x CON1 – For Access Control

4 1x CON2 – For Access Control

5 1x CON3 – For Access Control

6 1x Power Connector

7 1x 10/100 Port

8 1x Gigabit Port

9 1x Power Supply and Power Cable

10 1x Regulatory Information

11 1x Set of Mounting Screws

12 1x Set of Mounting Screws

13 1x Internal Mounting Bracket

14 1x Allen Wrench

Application

The device is recommended for areas such as, parks, office buildings, schools, factories, residential areas, or other applicable areas. The identity is verified through face recognition to achieve passage without perception.

Note: This device can be used as a standalone device or can be accessed via a local network using the web user interface on a computer.

Dimension and Component

5

No. Name

1

2

Temperature monitoring unit

MIC

Connection and Installation

No.

3

4

Name

Dual cameras

Display

The device can be connected to devices such as sirens, readers, and door contacts. For more information on the cable connections, please see the table provided below.

Port Cable color Cable name Description

Black RD – Negative electrode of external card reader.

Red RD+ Positive electrode of external card reader.

Blue CASE Tamper alarm input of the external card reader.

CON1

White

Green

Brown

Yellow

Purple

D1

D0

LED

B

A

Wiegand D1 input (connected to external card reader)/output (connected to controller).

Wiegand D0 input (connected to external card reader)/output (connected to controller).

Connected to external reader indicator in

RS-485 negative electrode input (connected to external card reader)/output (connected to controller or connected to door control security module).

Note: If the security module is enabled, you will need to purchase an access control module separately. The security module will need a separate power supply to function.

Also, once the security module is enabled the exit button, lock control, and firefighting linkage will be disabled.

RS-485 positive electrode input (connected to external card reader)/output (connected to controller or connected to door control security module).

Note: If the security module is enabled, you will need to purchase an access control module separately. The security module will need a separate power supply to function.

Also, once the security module is enabled the exit button, lock control, and firefighting linkage will be disabled.

CON2

White and red

White and orange

White and blue

White and gray

ALARM1_N

O

ALARM1_C

OM

ALARM2_N

O

ALARM2_C

OM

White and green

GND

White Brown ALARM1

White and yellow

White and purple

GND

ALARM2

Alarm 1 normally open output port.

Alarm 1 common output port.

Alarm 2 normally open output port.

Alarm 2 common output port.

Connected to the common GND port.

Alarm 1 input port.

Connected to the common GND port.

Alarm 2 input port.

6

Port Cable color Cable name Description

Black and red

RX RS-232 receiving port.

Black and orange

Black and blue

TX

GND

RS-232 sending portk.

Connected to the common GND port.

CON3

Black and gray

Black and green

Black and brown

Black and yellow

Black and purple

SR1

PUSH1

DOOR1_CO

M

Used for door contact detection.

Door open button of door No.1

Lock control common port.

DOOR1_NO Lock control normally open port.

DOOR1_NC Lock control normally closed port.

Installation Notes

● If there is a light source 0.5 meters away from the device, the minimum illumination should be no less than 100 Lux.

● It is highly recommended to install the device indoors at least 3 meters away from any windows and 2 meters away from doors or lights.

● Avoid areas with extreme backlight or direct sunlight.

Temperature Monitoring Requirement

● It is highly recommended to install the device in an indoor, windless environment. If the device is being used outside, it should be setup in a relatively isolated area away from liquids or direct sunlight. The ambient temperature around the device should be between 59°F to 89.6°F (15°C to

32°C).

● Allow the device 20 minutes to warm up to allow the device to reach thermal equilibrium.

● If a suitable environment is not available, a temporary setup passage with stable ambient temperature can be used for temperature monitoring.

● Factors such as sunlight, wind, cold air, and air conditioning can easily affect the surface temperature of the human body and the working status of the device which can cause temperature deviation between the monitored temperature and the actual temperature.

● Influencing factors of temperature monitoring: o Wind: Wind will take away the heat from the forehead, which may affect the accuracy of temperature monitoring. o Sweating: Sweating is a way for the body to automatically cool down and dissipate heat.

When the body sweats, the temperature will also decrease. o Room Temperature: If the room temperature is low, the surface temperature of the human body will decrease. If the room temperature is too high, the human body will start to sweat which will affect the overall accuracy of temperature monitoring.

7

o The device is sensitive to light waves with a wavelength of 10um to 15um. Avoid using it in the sun, fluorescent light sources, air conditioning outlets, heating, cold air outlets, and glass surfaces.

Kiosk Stand Installation

Step 1: Remove the rear cover and base cover.

Step 2: Remove the vertical bracket from inside the stand.

Step 3: Run the cable of the temperature monitoring module through the module bracket joint and secure the temperature monitoring module to the module bracket joint using the provided mounting screws from the screw package.

8

Step 4: Run the cable of the temperature monitoring module through the top of the stand and secure the module bracket joint to the top of the stand using the provided mounting screws from the screw package.

Step 5: Place the vertical bracket on the back of the access control terminal and secure the unit to the vertical bracket. Place the access control terminal and vertical bracket into the stand and secure the vertical bracket to the stand. The access control terminal should be flush with the with the front of the stand.

9

Step 6: Connect the temperature monitoring module to the temperature monitoring port on the back of the access control terminal. Run the cabling of the access control terminal through the stand and feed it into the base of the stand.

Step 7: Connect the power adapter and applicable cabling inside the base of the stand and run the power cable through the base of the stand.

Step 8: Secure the rear cover and base cover to the stand and place the completed kiosk into a suitable area and plug the power cable into a wall outlet or applicable power source.

Kiosk Wall Mount Installation

The access control terminal can be installed on a wall or similar surface as well without using the kiosk stand. For more information on how to mount the access terminal, please refer to the information below.

10

Recommended Places

Recommended Places Not to Use

Installation

When installing the device, make sure the distance between the camera and ground is 4.59ft (1.4 meters).

Installation Procedures

11

Step 1: Place the temperature monitoring device to the bracket and secure it using the 3 smaller installation screws.

Step 2: Place the mounting bracket onto the mounting surface. Use a marker or similar tool to mark the installation holes on the bracket to the installation surface.

Step 3: Use a drill to drill the installation holes on the installation surface and place the included wall anchors into the holes.

Note: If running wires through a wall, an additional hole can be drilled into the wall and the wires of the device can be run through the mounting bracket and through the additional hole.

Step 4: Connect any applicable cabling as per the connections.

Step 5: Hang the device on the hook provided on the mounting bracket.

Step 6: Tighten the screws at the bottom of the device.

Step 7: Apply silicon sealant to the cable outlet of the device.

12

System Operations

Basic Configuration Procedure

Common Icons

Icon Description

Main menu icon

Confirm icon

Icon Description

Turn to the next page of the list.

Return to the previous menu.

Turn to the first page of the list. Enable

Turn to the last page of the list.

Disable

Turn to the previous page of the list

Initialization

An administrator password and an email should initially set in the device. A device initialization screen will be displayed upon powering on the device. If an administrator password and email are not initialized, the system cannot be used.

13

● The admin administrator username and password set in the interface can be used to access a web management platform using a web browser on a computer.

● The administrator password can be reset through the email address you entered in the interface.

● The password must consist of 8 to 32 characters and contain at least two types of characters, upper case, lower case, numbers, and special characters (excluding ‘ “ ; : &).

Standby Interface

If the device is idle for more than 30 seconds the interface will be placed into standby mode. The standby interface may vary version to version however, the overall function of the interface is the same.

14

5

6

No. Description

1

Unlock methods: Card, face and password.

Note : When a card, face, and password have been set in the system to unlock mode, the password icon will be displayed at the top left corner of the access controller.

2

3

Date & Time. Displays the current date and time.

Display the network status and USB status.

4

Main menu icon.

Note : Only users with administrator permissions can access the main menu.

Password unlock icon.

Administrator password unlock icon.

Main Menu

The main menu can only be accessed by people with administrator permissions. Administrators can add multiple users with specific access types, set access related parameters, network configuration, view and access records and system information and more via the main menu. For more information, regarding the main menu, please refer to the information provided below.

Step 1: While in standby mode, tap on the icon.

Step 2: Select a main menu access method.

Note: Different modes support different unlock methods. Choose a mode to access the main menu. Choose an access method to display the main menu.

15

Unlocking Methods

The main menu can be accessed using the following access methods: faces, passwords, and cards.

Cards

Insert an access card into the card reader and swipe to unlock the door.

Face

Ensure your face is centered in the face recognition frame. Once the system recognizes the face the door will unlock.

User Password

Enter the user password for the account. Once the password is recognized the door will unlock.

Step 1: Tap on the icon on the home page.

Step 2: Enter the user ID and tap on the icon.

Step 3: Enter the user password and tap on the icon.

The door will unlock.

Administrator Password

Only one administrator password can be set per device. The administrator password can unlock the door without being subject to user levels, unlock modes, periods, holiday plans, and anti-pass back.

Note: The administrator password cannot be used when NC is selected. For more information please refer to section NC Period .

User Management

User management allows administers to add new users, view user lists, admin lists, and modify the administrative password

Adding New Users

The administrator can add new users to the system by entering user IDs, names, face images, cards, passwords, selecting user levels, and more.

Note: The following images are for reference purposes only and may differ

Step 1: On the main menu, select, User > New User .

16

Step 2: Configuring parameters on the interface.

Parameter Description

User ID

Name

Face

Card

PWD

User Level

Period

Enter user IDs. The IDs can be numbers, letters, and their combinations, and the maximum length of the ID is 32 characters. Each ID is unique.

Enter names with at most 32 characters (including numbers, symbols, and letters).

Make sure that your face is centered on the picture capturing frame and the access controller will take a picture of the new user’s face automatically.

You can register five cards at most for each user. On the card registration interface, enter your card number or swipe your card, and then the card information will be read by the access controller.

You can enable the Duress Card function on the card registration interface.

Alarms will be triggered if a duress card is used to unlock the door.

Note: Only certain models support card unlock.

The door unlocking password. The maximum length of the password is 8 digits.

Note: If the device does not have a touch screen, the device will need to be hooked up to a peripheral card reader. There are buttons on the card reader.

You can select a user level for new users. There are two options:

User: Users only have door unlock permission.

Admin: Administrators can unlock the door and also have parameter configuration permission.

Note: Administor login credentials will be needed to authenticate this option.

You can set a period in which the user can unlock the door.

17

Parameter Description

Holiday Plan You can set a holiday plan in which the user can unlock the door.

Valid Date You can set a period during which the unlocking information of the user is valid.

User Level

Use Time

There are six levels:

General: General users can unlock the door normally.

Blacklist: When users in the blacklist unlock the door, service personnel will get a prompt.

Guest: Guests can unlock the door certain times. Once they exceed the maximum times, they cannot unlock the door again.

Patrol: Paroling users can get their attendance tracked, but they have no unlock permission.

VIP: When VIP unlocks the door, service personnel will get a prompt.

Special: When special people unlock the door, there will be a delay of 5 seconds before the door is closed.

When the user level is Guest, you can set the maximum number of times that the user can unlock the door.

Step 3: Tap the icon to save and the configuration.

Viewing User Information

All user information such as, user lists, admin lists, and administrator passwords can be accessed through the User interface.

Access Management

Access management allows the user to set periods, unlock modes, alarms, door statuses, lock holding times, etc. To open the access management interface, tap on the Access option.

Periods Management

This section allows you to set periods, holiday periods, holiday plan periods, door open/closed periods, and remote verification periods.

Period Configuration

The device can configure up to 128 periods (weeks) with number ranges from 0-127. The user can set up to four periods for each day of the week. Users can only unlock the door in the periods that were set by the user.

Holiday Groups

The user can group holidays in the system. This allows the user to configure up to 128 groups with numbers ranging from 0-127. The system can support up to 16 holidays in one group. Once a holiday group has been set, the door will only unlock on the specific start and end times set by the user in the system.

Note: You can enter names with up to 32 characters (including numbers, symbols, and letters).

Tap on the icon to save a holiday group name.

Holiday Plan

The user can add holiday groups into holiday plans. Holiday plans are used to manage user access permissions in different holiday groups. A user can only unlock the door in the period that was set by the user in the system.

NO Period

If a period is added to NO period, the door will only open during a set period.

Note: The NO/NC period permissions take higher priority than other periods set in the system.

18

NC Period

If a period is added to the NC period, the door will remain closed in a set period. Users can not unlock the door in these periods.

Remote Verification Period

When the remote verification period is set in the system, to unlock the door, remote verification will be required. To unlock the door in this set period, a door unlock instruction will need to be sent by the management platform.

Note: The user will need to enable the remote verification period open in the interface.

: The remote verification period option is enabled.

: The remote verification period option is disabled.

Unlock

The system has 3 unlock modes: unlock mode, unlock by period, and group combination. Unlock modes can vary model to model, however,

Unlock Mode

When the Unlock Mode is enabled, the user can unlock the system using a card, face recognition, passwords, or any one of the unlocking methods provided. For more information on how to configure unlock modes, please refer to the information provided below.

Step 1: On the interface, select Access > Unlock Mode > Unlock Mode.

19

Step 2: Select unlock mode(s)

Note: Tap a selected unlock mode again to delete an unlock mode.

Step 3: Select a combination mode

+ And means “and”. For example, if you select card + PWD, it means, to unlock the door you will need to swipe your card first and then enter a password.

/ Or means “or”. For example, if you select card/PWD, it means, to unlock the door you can either swipe the card to unlock the door or enter the password.

Step 4: Tap the icon to save the settings. This will display the Unlock Mode interface.

Step 5: Enable the Unlock Mode .

: The unlock mode is enabled.

: The unlock mode is disabled.

Unlock by Period

The doors can be unlocked through different unlock modes in different periods. For example, in period 1, a door can only be unlocked using a card, whereas, in period 2, doors can be locked using face recognition. For more information how to use unlock periods, please refer to the information provided below.

Step 1: Select Access > Unlock Mode > Unlock by Period .

Step 2: Set the starting time and end time for a period and select unlock mode from the dropdown menu.

20

Step 3: Tap the icon to save the settings to the system. Once saved, the unlock mode interface will be displayed.

Step 4: Enable the Unlock by Period function.

: The Unlock by Period option is enabled.

: The Unlock by Period option is disabled.

Group Combination

Doors can only be unlocked by a group or groups that consist of more than two users if the

Group combination is enabled. For more information on group combination, please refer to the information below.

Step 1: Select Access > Unlock Mode > Group Combination .

Step 2: Tap the icon to create a group.

Parameter

User List

Description

Add users to the newly created group.

1. Tap User List .

The User List interface is displayed.

2. Tap , and then enter a user ID.

Unlock Mode

3. Tap to save the settings.

There are three options: Card , PWD and Face .

Valid User

Valid users are the ones that have unlock permission. Doors can be unlocked only when the number of users to unlock the doors equals the valid user number.

Valid users cannot exceed the total number of users in a group.

If valid user’s equal total user numbers in a group, doors can only be unlocked by all the users in the group.

If valid users are less than the total number of users in a group, doors can be unlocked by any users whose number equals the valid user number.

Step 3: Tap the icon to go back to the previous interface.

21

Step 4: Tap the to save the settings to the system.

Step 5: Enable the Group Combination toggle switch.

: The Group Combination option is enabled.

: The Group Combination option is disabled.

Alarm Configuration

This option allows a dministrators to manage visitor unlock permissions through the alarm configuration interface.

Step 1: Select Access > Alarm to access the alarm configuration interface.

: An alarm configuration option is enabled.

: An alarm configuration option is disabled.

Parameter

Anti-passback

Duress

Description

After the anti-passback is enabled, users need to verify identities both for entry and exit; otherwise an alarm will be triggered.

If a person enters with the identity checked and exits without the identity checked, an alarm will be triggered when the person tries to enter again, and the person will have no permission to unlock the door anymore.

If a person enters without the identity checked, an alarm will be triggered when the person tries to exit with the identity checked, and the person will have no permission to unlock the door anymore.

An alarm will be triggered when a duress card or duress password is used to unlock the door.

Illegal Card

Exceeding

Time

After an unauthorized card is used to unlock the door more than 5 times in 50 seconds, an alarm will be triggered.

Intrusion

An intrusion alarm will be triggered if a door is unlocked without having the door contact released.

Door Sensor

Timeout

Door Sensor

On

Door Status

A timeout alarm will be triggered if the time that a user takes to unlock the door exceeds the Door Sensor Timeout time.

The Door Sensor Timeout time range is 1–9999 seconds.

Only when the Door Sensor On is enabled can the intrusion alarm and door sensor timeout alarm be triggered.

The system has three door status options: NO, NC , and Normal .

NO: If NO is selected, the door will remain unlocked.

NC: If NC is selected, the door will remain locked.

22

Normal: If Normal is selected, the door will be unlocked and locked depending on settings set by the user.

Lock Holding Time

The Lock Holding Time is the duration in which the lock is unlocked. If the lock has been unlocked for a set period that exceeds the duration, the lock will be automatically locked.

Network Communication

For optimum control of your device it is highly recommended to configure network parameters, serial ports, and Wiegand ports.

IP Configuration

Configuring an IP address allows the system to be connected to a local network.

Parameter

IP Address/Subnet

Mask/Gateway IP

Address

DHCP

P2P

Description

The IP address, subnet mask, and gateway IP address should be on the same network segment. After configuration, tap to save the configurations.

DHCP (Dynamic Host Configuration Protocol).

When the DHCP is enabled, the IP address can be automatically acquired, and the IP address, subnet mask and gateway IP address cannot be manually configured.

P2P is a private network traversal technology which enables user to manage devices without requiring DDNS, port mapping or transit server.

Note: Make sure the computer you are using is connected to the same network segment as the device. As a reminder, the 7-inch model X access controllers have dual NICs. The default management address for the 1000M network port is 192.168.1.108. The default management address for the 100M network port is 192.168.2.108.

Active Register

Actively registering the device allows the user to connect and manage the device from other management platforms.

Note: Any configurations made can be cleared on the management platform which allows the device to be initialized. It is highly recommended to protect the platform’s managing permissions to prevent data loss caused by any improper operation.

Name Parameter

Server IP Address

Port

Device ID

IP address of the managing platform.

Port number of the managing platform.

Subordinate device number on the managing platform.

23

Note: The device can connect via Wi-Fi if a Wi-Fi solution is available.

Serial Port Settings

The serial input and output settings should be set according for the use of any external devices.

To access the serial port settings interface, select Connection > Serial Port .

Select the Serial Input option when external devices such as card readers and writing functions are connected to the system. Serial Input is selected to enable access card information to be sent to the system and management platforms.

For systems with face recognition, card reading and writing functions, select Serial Output. This will send the lock/unlock information to the device. There are two types of lock/unlock information:

User ID

Card No.

Select OSDP Input when the card reader with an OSP protocol is connected to the device. The device can send card information to the management platform.

Wiegand Configuration

Wiegand refers to the technology used in card readers and sensors. This system is a wired communication interface that operates between a reader and a controller.

Typically, Wiegand technology is found in cards, fingerprint readers, or any other data-capturing devices .

To configure a Wiegand device, select Wiegand Input or Wiegand Output accordingly in the interface. To select a Wiegand device, select Connection > Wiegand , to display the Wiegand interface.

Select Wiegand Input if an external card reader is connected to the device. Select Wiegand

Output if the device functions as a reader. For more information, please refer to the table below.

Parameter Description

The Wiegand Output Type determines the card number or the digit of the number that can be recognized by the access controller.

Wiegand Output Type Wiegand26, three bytes, six digits.

Wiegand34, four bytes, eight digits.

Wiegand66, eight bytes, sixteen digits.

24

Parameter

Pulse Width

Pulse Interval

Description

You can set pulse width and pulse interval.

Output Data Type

You can select the types of output data.

User ID: If User ID is selected, and then user ID will be output.

Card No.: If Card No. is selected, and then card number will be output.

System

Time

The user can format date and time settings, DST settings, NTP check, and time zone settings.

Note : When the user selects Network Time Protocol (NTP) the user should enable the NTP

Check function first. Server IP Address : enter the IP address of the time server and allow the device to sync to the server. Port: enter the port number of the time server. Interval (min): NTP check interval. Tap the Save icon to save the settings to your device.

Face Parameter

The Face Parameter screen allows you to configure face recognition settings such as, face recognition thresholds, pupillary distance, etc.

Tap on the parameter you would like to configure and use the icon to save it to the system.

25

Name Description

Face Recognition

Threshold

Face recognition accuracy can be adjusted. The larger the value is, the higher the accuracy will be.

Max. Angle of Face

Recognition

Pupillary Distance

Recognition Timeout

Recognition Interval

Invalid Face Promp

Interval

Set the control panel shooting angle of profiles. The larger the value is, the wider range of the profiles will be recognized.

Pupillary distance is the pixel value of the image between the centers of the pupils in each eye. You need to set an appropriate value so that the access controller can recognize faces as needed.

The value changes according to the face sizes and the distance between faces and the lens. The closer the face is to the lens, the greater the value should be. If an adult is 1.5 meters away from the lens, the pupillary distance value can be within 50 to 70.

When a person who does not have the access permission stands in front of the access controller and gets the face recognized, the controller will prompt that face recognition failed. The prompt interval is called recognition timeout.

When a person who has the access permission stands in front of the access controller and gets the face recognized, the controller will prompt that face recognition succeeded. The prompt interval is the recognition interval.

When a face has no access permission stands in front of the access controller, the controller will prompt that the face is invalid. The prompt interval is invalid face prompt interval.

This function prevents people from unlocking by human face images

Anti-fake Threshold or face models. The larger the value is, the more difficult face images can unlock the door. The recommended value range is above 80.

Set whether to enable the body temperature monitoring.

Temp Unit: Select a temperature unit.

Temp Rectangle: Set whether to enable the temperature monitoring box or not.

Temp Monitoring Distance (cm): The value is 0 by default. Set other values to enable temperature monitoring within a defined distance. 80

Temperature

Monitoring cm is recommended.

Temp Threshold (°C): Set the temperature threshold. The monitored body temperature will be judged as high temperature if it is greater than or equal to the set value.

Temp Correction Value: This parameter is for testing. The difference of the temperature monitoring environment might cause the temperature deviation between the monitored temperature and the actual temperature. You can select multiple monitored samples for testing, and then correct the temperature deviation by this parameter according to the comparison between the monitored temperature and the actual temperature. For example, if the monitored temperature is

0.5°C lower than the actual temperature, the correction value is set to

0.5°C; if the monitored temperature is 0.5°C higher than the actual temperature, the correction value is set to -0.5°C.

Note: Devices with a temperature monitoring unit will support this function.

26

Name

Mask Mode

Description

No detect: Mask is not detected during face recognition.

Mask reminder: Mask is detected during face recognition. If the person is detected without wearing a mask, the system will prompt mask reminder and passage is allowed.

Mask intercept: Mask is detected during face recognition. If the person is detected without wearing a mask, the system will prompt mask reminder and passage is not allowed.

Image Mode

The system has 3 image mode options:

Indoor: Select Indoor if the device is installed indoors.

Outdoor: Select Outdoor if the device is installed outdoors.

Other: Select Other when the device is installed in areas with backlights or in corridors or hallways.

Fill Light Mode Setting

There are three light modes:

Auto: When the photo sensor detects that the ambient environment is not dark, the fill light is normally off; otherwise, the fill light option will be on.

NO: The fill light option will be enabled.

NC: The fill light is disabled.

Fill Light Brightness Setting

The fill brightness setting can be adjusted according to the environment it is being used.

Volume Adjustment

Tap the icon or icon to adjust the volume up or down.

IR Light Brightness Adjustment

Adjusting the IR brightness allows the device to have a much clearer image in darker environments. The lower the IR brightness the less clear the image will become.

Restore to Factory Settings

Restoring the device back it its factory settings will result in all saved data being lost. The device will revert to its original factory, default settings. However, please note, if you are restoring the device to its factory settings, the IP address for the device will not be changed.

The user can select whether to retain certain user information and logs. For instance, the user can select to restore the device to factory settings with all user and device information deleted, or all user and device information retained.

Reboot

To reboot the device, select Setting > Reboot and tap on Reboot . The device will reboot

USB

The USB options allow the user to export user information or to update the device. When using these options, ensure that a USB flash drive, or similar device is inserted into the device before exporting or updating occurs on the system.

Note: Do not remove the flash drive or use the device will exporting or updating is taking place.

Information from one device can be imported into another device using this method.

USB Export

27

The user can export data from the device to a USB flash drive after inserting it into a USB port on the device. The data that is exported is encrypted and cannot be edited.

Step 1: Select USB > USB Export to display the USB Export interface.

Step 2: Select the data type that you want to export from the system.

Step 3: Tap OK to export the data to the inserted USB flash drive.

USB Import

The system can only import data that have been exported from other access controllers. To import data into the system, please refer to the information provided below.

Step 1: Select USB > Import to display the USB Import interface.

28

Step 2: Select the data type that you want to import from the interface. The prompt Confirm to

Import should be displayed.

Step 3: Tap OK . The data from the USB flash drive will be imported into the device.

USB Update

The firmware for the device can be updated using a USB flash drive. For more information how to upgrade the firmware for your device, please refer to the information provided below.

Step 1: Obtain the firmware for your device from the manufacturer (if needed) and import it onto the USB flash drive. Rename the name to “update.bin” and save the file to a root directory inside the USB flash drive.

Note : Make sure that the computer that is being used is on the same network as the system. For devices with dual NIC cards, the IP address for the 1000M port is 192.168.1.108 and the 100M network port is 192.168.2.108.

Step 2: Select USB > USB Update . The prompt Confirm to Update will be displayed.

Step 3: Tap OK.

The update will start, and the device will reboot after the update is complete.

Features

The features menu allows users to adjust privacy settings, card number reversals, security modules, door sensor types, and result feedbacks.

29

Parameter Description

Privacy Setting See "Privacy Settings" for more details.

Card No. Reverse

Security Module

If the third party card reader needs to be connected to the access controller through the wiegand output port, you need to enable the

Card No. Reverse function; otherwise the communication between the access controller and the third party card reader might fail due to protocol discrepancy.

If the security module is enabled, you need to purchase access control security module separately. The security module needs separate power supply to provide power.

Once the security module is enabled, the exit button, lock control and firefighting linkage will be invalid.

Door Sensor Type There are two options: NO and NC .

Result Feedback Displays whether the unlock succeeded or failed.

Privacy Settings

This section allows the user to enable or disable password resets, set HTTPS, CGI, SSH, capture photos and clear all captured photos from the device.

30

Parameter

PWD Reset

Enable

HTTPS

CGI

SSH

Capture photo

Clear all captured photos

Description

If the PWD Reset Enable function is enabled, you can reset the password.

The PWD Reset function is enabled by default.

Hypertext Transfer Protocol Secure (HTTPS) is a protocol for secure communication over a computer network.

When HTTPS is enabled, HTTPS will be used to access CGI commands; otherwise HTTP will be used.

Note: When HTTPS is enabled, the device will automatically restart.

Common Gateway Interface (CGI) offers a standard protocol for web servers to execute programs that execute like console applications running on a server that generates web pages dynamically.

When CGI is enabled, CGI commands can be used. The CGI is enabled by default.

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.

When SSH is enabled, SSH provides cryptographic service for the data transmission.

If you select ON, when a user unlocks the door, the user’s photo will be automatically taken. This function is ON by default.

Tap the icon, and you can delete all captured photos.

31

Result Feedback

Result feedback allows the user to view authorized and unauthorized login attempts on the system. There are four result feedback modes available in the system.

Mode 1

Mode 2

32

Mode 3

Mode 4

Record

The record interface allows the user to search and query all unlocking records.

33

Auto Test

Auto tests are used to check the overall efficiency of the device. An auto test can of the device can be used when initially accessing the device or if the device has malfunctioned.

Note: Once an Auto Test is chosen, the system will guide the user through each test.

34

System Info

The System Info interface allows the user to view information such as data capacity, device version, and firmware information.

Web Operations

The device can be configured and used on the web using a web browser. The web interface allows the user to set network parameters, video parameters, and access controller parameters, as well as maintain and update the system via a web browser.

Note: When accessing the web user interface (web UI), it is highly recommended to use Internet

Explorer (IE). The web UI may have issues with other browsers.

Initialization

The device initialization will appear if the device has not been previously initialized. This menu allows you to set a password as well as an email address before logging into the system.

Step 1: Open the IE web browser and enter the IP address for your system. Please note, the device must be on the same network segment as your computer to access the web UI. The default IP address for the system is 192.168.1.108. Press Enter to access the interface.

Note: To avoid issues, use a browser version newer than IE 8. If the system features dual NICs, the default IP address for the 1000M port is 192.168.1.108 and the default IP address for the100M network port is 192.168.2.108.

Step 2: Enter a new password, confirm the password, and enter a valid email address. Please note, the email address entered in the system will be used to recover or reset the password in the system. Once all information has been entered, press the Next.

Note: The password must consist of 8 to 32, non-blank characters and contain at least two types of characters, upper and lower case, numbers, and special characters (e xcluding ‘ “ ; : &). It is highly recommended to set a password according to the password strength prompt provided in the interface. For security, it is highly recommended to update your password regularly.

Step 3: Click Next .

35

Step 4: Enable the Auto Check checkbox to allow the system to inform the user of the latest firmware upgrades.

Step 5: Click Next .

Step 6: Click Complete to complete initialization to display the web login interface.

Login

Step 1: Open the IE web browser and enter the IP address of the device in the address bar and press Enter .

Note: To avoid issues, use a browser version newer than IE 8. If the system features dual NICs, the default IP address for the 1000M port is 192.168.1.108 and the default IP address for the100M network port is 192.168.2.108.

36

Step 2: Enter the username and password for the device.

Note: The default administrator name is admin, and the password is the login password that was entered after initializing the device. For security purposes, it is highly recommended to modify the administrator password regularly. If you have forgotten the administrator login password, the user can click Forgot Password?

to begin the password reset process.

Step 3: Click Login to access the web interface.

Resetting the Password

When resetting the password of the admin account, the user email address will be required.

Step 1: Click Forgot Password?

on the login interface. The tips interface will be displayed.

37

Step 2 : Read the tips that are displayed in the prompt and click OK to display the Reset

Password interface.

Step 3: Scan the QR Code on the interface to display the security code.

Warnings

The system will generate up to 2 security codes by scanning the same QR code. If security codes become invalid, the QR code will need to be refreshed.

The security code is only valid for 24 hours after it is generated.

If the security code is entered incorrectly in the system five consecutive times, the device will be frozen for five minutes.

Step 4: Enter the security code just received into the Security Code field and click Next to display the Reset Password interface.

Step 5: Reset and confirm the new password.

Note: The password must consist of 8 to 32, non-blank characters and contain at least two types of characters, upper and lower case, numbers, and special characters (excluding ‘ “ ; : &). It is highly recommended to set a password according to the password strength prompt provided in the interface.

Step 6: Click OK to complete the password reset process.

Alarm Linkage

Setting Alarm Linkage

External alarm input devices can be connected to the system allowing the user the ability to modify the alarm linkage parameters as needed.

Step 1: Select Alarm Linkage from the navigation bar. The Alarm Linkage interface will be displayed.

38

Step 2: Click the icon to modify alarm linkage parameters.

Parameter

Alarm Input

Description

You cannot modify the value. Keep it default.

Name

Alarm Input Type

Enter a zone name.

There are two options: NO and NC.

If alarm input type of the alarm device you purchased is NO, then you should select NO; otherwise you should select NC.

39

Parameter

Fire Link Enable

Alarm Output

Enable

Duration (Sec.)

Alarm Output

Channel

Access Link

Enable

Channel Type

Description

If fire link is enabled the access controller will output alarms when fire alarms are triggered. The alarm details will be displayed in the alarm log.

Note: Alarm output and access links are NO by default if the fire link is enabled.

The relay can output alarm information (will be sent to the management platform) if the Alarm Output is enabled.

The alarm duration, and the range is 1–300 seconds.

You can select an alarm output channel according to the alarming device that you have installed. Each alarm device can be regarded as a channel.

After the Access Link is enabled, the access controller will be normally on or normally closed when there are input alarm signals.

There are two options: NO and NC.

Step 3: Click OK to complete alarm linkage configuration.

Note: The configuration on the web interface will be synchronized with the configuration in the client if the device is added to the client.

Alarm Log

The Alarm Log interface allows the user to view specific alarm types and date/time ranges retained in the system.

Step 1: Select Alarm Linkage > Alarm Log to access the Alarm Log interface.

Step 2: Select a date/time range and alarm type. Click Query to display the results.

40

Data Capacity

The Data Capacity interface allows user to see how many users, cards, and facial images are held on the system.

Video Settings

The Video Settings interface allows the user to set parameters such as, data rates, image parameters (brightness, contrast, hue, saturation, etc.) and exposure.

Data Rate

Parameter

Video Standard

Channel

Description

There are two options: NTSC and PAL. Select a standard according to the video standard of your region.

There are two options: 1 and 2. 1 is white light camera and 2 is IR light camera.

41

Parameter

Video

Format

Description

There are four options: D1, VGA, 720p and 1080p. Select an option according to the video quality you want.

Main

Format

Frame Rate

The rate at which consecutive frames appear on a display. The frame rate range is 1 –30fps.

Bit Rate

The number of bits that are conveyed or processed per unit of time. There are five options: 2Mbps, 4Mbps, 6Mbps, 8Mbps, and

10Mbps.

Video

Format

There are three options: D1, VGA, and QVGA.

Extra

Format

Frame Rate

The rate at which consecutive frames appear on a display. The frame rate range is 1 –30fps.

Bit Rate

The number of bits that are conveyed or processed per unit of time. There are options: 512Kbps, 640Kbps, 768Kbps, 896Kbps,

1024Kbps, 1.25Mbps, 1.5Mbps, 1.75Mbps, and 2Mbps.

Image

The system provides two channels in which the user will need to configure. To configure these channels, please refer to the information provided below.

Step 1: Select Video Setting > Video Setting > Image to access the Image interface.

Step 2: Select Wide Dynamic in the Backlight Mode drop down screen.

Parameter

Brightness

Contrast

Hue

Saturation

Description

The larger the value is, the brighter the images will be.

Contrast is the difference in luminance or color that makes an object distinguishable. The larger the contrast value is, the greater the brightness and color contrast will be.

The larger the value is, the deeper the color will be.

The larger the value is, the brighter the colors will be.

Note: The value does not change the image brightness.

42

Parameter

Scene Mode

Day/Night Mode

Back Light Mode

Mirror

Flip

Description

Close: Without modes.

Auto: The system automatically adjusts scene modes.

Sunny: In this mode, image hue will be reduced.

Night: In this mode, image hue will be increased.

Note: Sunny will be selected by default.

Day/Night mode decides the working status of the fill light.

Auto: The system automatically adjusts the day/night modes.

Colorful: In this mode, images are with colors.

Black and white: In this mode, images are in black and white.

Close: Without backlight compensation.

BLC: Backlight compensation corrects regions with extremely high or low levels of light to maintain a normal and usable level of light for the object in focus.

WDR: In the wide dynamic range mode, the system dims bright areas and compensates dark areas to ensure the definition of objects in the bright areas and dark areas.

Note: When human faces are in the backlight, the user will need to enable WDR.

HLC: Highlight compensation is needed to compensate for overexposure of highlights or strong light sources like spotlights, headlights, porch lights, etc. to create an image that is usable and not overtaken by a bright light.

When the function is enabled, images will be displayed with left and right side reversed.

When this function is enabled, images can be flipped over.

Exposure

Parameter

Anti-flicker

Exposure Mode

Shutter

Shutter Value

Range

Description

50Hz: When the utility frequency of alternating current is 50Hz, the exposure is automatically adjusted to make sure that there are no stripes on images.

60Hz: When the utility frequency of alternating current is 60Hz, the exposure is automatically adjusted to make sure that there are no stripes on images.

Outdoor: When Outdoor is selected, the exposure mode can be switched.

Note: When the user selects Outdoor from the Antiflicker drop-down menu, Shutter Priority can be selected.

You can select from:

Auto: The access controller will automatically adjust brightness of images.

Shutter Priority: The access controller will adjust image brightness according to shutter exposure value range. If the image brightness is not enough and the shutter value has reached upper or lower limit, the access controller will adjust gain value automatically to get ideal brightness.

Manual: You can configure gain and shutter value manually to adjust image brightness.

The larger the shutter value is and the shorter the exposure time is, the darker the images will be.

If you select Customized Range , you can customize the shutter value range.

43

Parameter Description

Gain Value Range When the gain value range is set, video quality will be improved.

Exposure

Compensation

3D NR

You can increase video brightness by adjusting exposure compensation value.

When 3D Noise Reduction (RD) is enabled, video noise can be reduced, and high definition videos will be produced.

Grade

You can adjust the value of the 3D NR when 3D NR is enabled.

The larger the value is, the less the noise there will be.

Motion Detection

This option allows the user to set ranges at which a moving object can be detected by the device.

Step 1: Select Video Setting > Video Setting > Motion Detection to display the Motion

Detection interface.

Step 2: Press and hold the left mouse button and drag the mouse to the red area. This motion detection area will be displayed.

Note: The red rectangles are the motion detection area. The default motion detection range are represented by all the rectangles in the interface. To draw a motion detection area, the user will need to click Remove All to begin. The motion detection area that is drawn by the user will be considered a non-motion detection area if the user draws in the default motion area.

44

Step 3: Set the sensitivity and threshold. For more information on sensitivity and threshold, please refer to the information provided below.

Sensitivity vs. Threshold

There is no clear-cut answer to sensitivity/threshold settings that can truly eliminate false positives, while maintaining that they trigger as desired, for all cases. The problem is simply that everyone's cameras will be looking at such drastically different scenes, that one person can have false positives on a very low sensitivity (due to snow) whereas the other can use the same settings and not even catch the movements of trees in the wind.

The best thing you can do is work out a configuration for each camera based specifically on what your cameras are likely to register as motion and customize your settings to your preference. To do this, it helps to understand a bit more about how sensitivity and threshold work.

Think about it this way: sensitivity is a measurement of the amount of change in a camera's field of view that qualifies as potential motion detection, and threshold is how much of that motion needs to occur in order to actually trigger the alarm. It can be thought of like this: for however long there is enough change to satisfy the sensitivity parameter, a threshold meter is silently being filled up until it hit's the trigger point.

Considering this, if you set your sensitivity to 1 and threshold to 100, it would be practically impossible to trigger a motion alert. Alternatively, if you set your sensitivity to 100 and your threshold to 1 or 0, this means that the slightest change could set off the trigger. The trick is to finding a healthy balance based on all the factors that stand to stimulate your motion detection sensors and doing your own personal testing.

A practical application of this would be, for example, a checkout line in a grocery store. People do not want every person walking in and out to trigger the alarm. But if, for some reason, one of these people starts dancing or attacking another person, the degree of movement and activity would trip the threshold meter. This feature exists to give users complete control and the ability to both fine tune and customize their motion detection settings.

Step 4: Click OK to complete setting up motion detection settings.

Volume Settings

The user can adjust the volume of the speaker on the device in this menu. Use the Beep Volume slider to adjust the volume on the device.

Image Mode

The system offers three different image modes: indoor, outdoor, and other. Select Indoor if the device is installed indoors. Select Outdoor if the device is installed outdoors. Select Other when the device is installed in aeras where backlights such as corridors and hallways are present.

45

Face Detection

The user can configure human faces related to parameters set in the interface which help to increase the accuracy of the face recognition. For more information, please refer to the information below.

Step 1: Select Face Detect in the interface.

46

Step 2: Configure the Face Detect parameters.

Parameter

Face Recognition Threshold

Max. Angle of Face Recognition

Anti-fake Threshold

Fill Light Brightness Setting

Fill Light Mode Setting

Infrared Light

Recognition Timeout

Invalid Face Prompt Interval

Pupillary Distance

Enable Face Exposure

Channel Id

Draw Target

Detect Region

Face Target Brightness

Face Exposure Interval

Description

The larger the value is, the higher the accuracy will be.

The larger the angle is, the wider range of the profiles will be recognized.

This function prevents people from unlocking by human face images or face models.

There are two options: Enable and Close .

You can set fill light brightness.

There are three fill light modes.

NO: Fill light is normally on.

NC: Fill light is normally closed.

Auto: Fill light will be automatically on when a motion detection event is triggered.

Note: When Auto is selected, the fill light option will not be enabled, even if the Infrared Light value is greater than 19.

Adjust IR brightnees by dragging the scroll bar.

When a person who does not have the access permission stands in front of the access controller and gets the face recognized, the controller will prompt that face recognition failed.

The prompt interval is called recognition timeout.

When a face has no access permission stands in front of the access controller, the controller will prompt that the face is invalid. The prompt interval is invalid face prompt interval.

Pupillary distance is the pixel value of the image between the centers of the pupils in each eye.

You need to set an appropriate value so that the access controller can recognize faces as needed. The value changes according to the face sizes and the distance between faces and the lens. The closer the face is to the lens, the greater the value should be. If an adult is 1.5 meters away from the lens, the pupillary distance value can be within 50 to 70.

After face exposure is enabled, human face will be clearer when the access controller is installed outdoors.

There are two options: 1 and 2. 1 is white light camera and 2 is IR light camera.

Click Draw Target , and then you can draw the minimum face detection frame.

Click Remove All , and you can remove all the frames you drew.

Click Detect Region , move your mouse, and you can adjust the face detection region.

Click Remove All , and you can remove all the detection regions.

The default value is 50. Adjust the brightness as needed.

After a face is detected, the access controller will give out light to illuminate the face, and the access

47

Parameter

Temperature Monitoring

Mask Mode

Description controller will not give out light again until the interval you set has passed.

Set whether to enable the body temperature monitoring.

Temp Unit: Select a temperature unit.

Temp Rect: Set whether to enable the temperature monitoring box or not.

Temp Monitoring Distance (cm): The value is 0 by default. Set other values to enable temperature monitoring within a defined distance. 80 cm is recommended.

Temp Threshold (°C): Set the temperature threshold. The monitored body temperature will be judged as high temperature if it is greater than or equal to the set value.

Temp Correction Value: This parameter is for testing. The difference of the temperature monitoring environment might cause the temperature deviation between the monitored temperature and the actual temperature. You can select multiple monitored samples for testing.

According to the comparison between the monitored temperature and the actual temperature, you can correct the temperature deviation by this parameter. For example, if the monitored temperature is 0.5°C lower than the actual temperature, the correction value is set to

0.5°C; if the monitored temperature is 0.5°C higher than the actual temperature, the correction value is set to -0.5°C.

Note: Only devices with a temperature monitoring unit will support this feature.

No detect: Mask is not detected during face recognition.

Mask reminder: Mask is detected during face recognition. If the person is detected without wearing a mask, the system will prompt mask reminder and passage is allowed.

Mask intercept: Mask is detected during face recognition. If the person is detected without wearing a mask, the system will prompt mask reminder and passage is not allowed.

Step 3: Click OK to complete setup.

Network Setting

TCP/IP

The IP address and DNS server should be configured to make sure the device can communicate with other devices. To generate this information, please ensure the device is connected to your local network before proceeding.

Step 1: Select Network Setting > TCP/IP

48

Step 2: Configure the TCP/IP settings.

Parameter

IP Version

MAC Address

Mode

Link-local address

Description

There is one option: IPv4.

MAC address of the access controller is displayed.

Static

Set IP address, subnet mask, and gateway address manually.

DHCP

 After DHCP is enabled, IP address, subnet mask, and gateway address cannot be configured.

 If DHCP is effective, IP address, subnet mask, and gateway address will be displayed automatically; if DHCP is not effective, IP address, subnet mask, and gateway address will all be zero.

 If you want to see the default IP when DHCP is effective, you need to disable DHCP.

Link-local address is only available when IPv6 is selected in the IP version. Unique link-local addresses will be assigned to network interface controller in each local area network to enable communications. The linklocal address cannot be modified.

IP Address

Subnet Mask

Enter IP address, and then configure subnet mask and gateway address

Note: The IP address and the gateway address must be in the same network segment.

Default Gateway

Preferred DNS

Server

Alternate DNS

Server

Set IP address of the preferred DNS server.

Set IP address of the alternate DNS server.

Port

The port menu allows the user to configure port connections for the device. When setting port values, please ensure that the port numbers do not conflict with each other.

Step 1: Select Network Setting > Port to display the Port interface.

Step 2: Configure the port numbers. For more information, please refer to the port parameters information provided below.

49

Note: The system will need to be reboot after any port changes have been made.

Parameter

Max

Connection

TCP Port

HTTP Port

HTTPS Port

RTSP Port

Description

The user can set the maximum connections of clients that the device can be connected to.

Default value is 37777.

Default value is 80. If other value is used as port number, you need to add this value behind the address when logging in through browsers.

Default value is 443.

Default value is 554.

Step 3: Click OK to complete port setup.

Register

This option allows the user to automatically register the device to a specified proxy. This allows others the gain access to the device.

Step 1: Select Network Setting > Auto Register to display the Auto Register interface.

Step 2: Select Enable and enter the host IP, port, and sub device ID.

Parameter

Host IP

Port

Sub Device ID

Description

Server IP address or server domain name.

Server port used for auto registeration.

Access controller ID assigned by the server.

Step 3: Click OK to complete the Auto Register setup.

P2P

P2P is a distribution application architecture that partitions tasks or workloads between peers.

Users can download a mobile application by scanning the provided QR code, and then register an account so that more than one device can be managed on the mobile app. You do not need to apply a dynamic domain name, do port mapping, or do not need transit server.

Note : The device must be connected to an external network if P2P is being used.

50

Step 1: Select Network Setting > P2P to display the P2P interface.

Step 2: Select Enable to enable the P2P function.

Step 3: Click OK to complete the setup.

Note: Scan the QR code displayed on the interface to import the serial number of the device.

Date Setting

This option allows the user to set date, time zones, time, DST, and NTP for the device. Please note, only certain models support this function.

Step 1: Select Date Setting to access the Date Setting interface.

Step 2 : Set the date and time parameters.

Parameter

Time Zone

System Time

DST

NTP Setting

Description

Select time zone as needed.

You can set system time manually, or you can click Sync with PC , to scynchronize access controller time with the computer time.

1. Enable DST.

2. Select Date or Week in Date Setting .

3. Set Starting Time and Ending Time .

1. Enable NTP Setting .

2. Configure parameters.

 Server: Enter domain name of the NTP server. The access controller time will be synchronized with the NTP server.

 Port: Enter port number of the NTP server.

 Update Cycle: Set an update cycle, and then access controller time will be updated accordingly.

3. Click OK .

51

Safety Management

The safety management section allows the user to configure IP and other network settings such as SSH, CGI, HTTPS, etc. Please note, the system service configuration performed in the web user interface and the configuration on the Features interface of the device will be synchronized.

IP Authority

This interface allows the user to select a cyber security mode or determine if a security mode is needed.

System Service

The device provides four system service options: SSH, PWD Reset Enable, CGI, and HTTPS.

For more information on these features, please refer to section “ Features ” .

52

Creating Server Certificate

Creating a server certificate allows the user to create and download a root certificate for a set security option. To create a server certificate, click on Create Server Certificate , enter the necessary information into the interface, and click Save.

The device will reboot, and the certificate will be created.

Downloading Root Certificate

Step 1: Click on Download Root Certificate and select the path to save the certificate to on the

Save File dialog box.

Step 2: Double-click on the Root Certificate that was downloaded to install the certificate.

Follow the on-screen instructions to complete the process.

User Management

The user management interface allows the user to add and delete users, modify user passwords, and enter an email address for resetting the password of the device.

Adding a User

To add a user to the device, click on Add in the user management interface and enter the username, password, confirmed password, and remark. Click OK to complete the process.

Modifying User Information

The user can modify user information by clicking on the icon in the user management interface.

ONVIF Users

This option allows the user to access Open Network Video Interface Forum (ONVIF), which is a global and open industry forum with the goal of facilitating the development and use of a global open standard for the interface of physical IP-based security products. When ONVIF is used, administrator, operator, and user have different permission of ONVIF server. Create ONVIF users as needed.

53

Maintenance

This interface allows the user to set and specific time and date for idle times or to reboot itself.

This helps to improve the running speed of the device.

The default reboot time of the device is 02:00 in the morning on Tuesday. This can be updated via the drop-down menu located in the Auto Reboot fields. Click Reboot Device to reboot the device immediately. A self-test of the device can be performed as well by clicking Self Test .

Configuration Management

This interface allows the user to manage configuration settings, unlock result feedback, Wiegand and serial numbers.

Config Mgmt.

This interface allows the user to import or export configurations. An exported configuration for one device can be applied to another device via this option.

54

Features

This feature allows the user to select feedback results, success, or failure. These can be enabled via the provided radio buttons in the interface.

Wiegand Serial Port Settings

This interface allows the user to select Wiegand input and output serial ports on the device.

Upgrade

This interface allows the user to view system version information, such as firmware, and allows them the opportunity to manually check or automatically check for new system firmware.

55

Version Information

This option provides the user with system information such as MAC address, serial number,

MCU version, web version, security baseline version, and system version.

Online User

This section allows the user to view username, IP address, and user login time.

System Log

The system log interface allows the user to view and backup system log information retained during the use of the device.

Querying Logs

This option allows the user to query log information, based on date and time ranges. To use this function, enter the date and time range, and type, then click Query to generate log information.

Backup Logs

The backup option allows the user to backup information. To backup log information, insert a

USB flash drive into the device and generate a log query. Click Backup to backup system logs.

56

Admin Log

The Admin Log interface allows the user to query Admin log information. To query this information, enter the Admin ID into the Admin ID field and click Query. This will generate a list of administrator’s operation records.

Note: The user can hover the mouse of the icon to see detailed information of the current user.

Exit

The exit icon allows you to logout of the interface. This will require you to log back into the interface to access the device. To logout, click OK to exit.

FAQ

1) The device does not turn on when attempting to boot.

Verify that the 12V power supply is connected properly to the device. Ensure to press the power button once proper voltage has been applied to the unit.

2) The device does not recognize faces after the device is powered on.

Ensure that the Face option is selected in the unlock mode option. For more information on unlock modes, please re fer to section “ Unlock ” on page 15 of this document.

Ensure that Face is selected as an unlock mode in Access > Unlock Mode > Group Combination.

For more information on group combinations, please refer to section, “ Group Combination ” on page 17.

3) There is no output signal when the device and its external controller are connected to the Wiegand port.

Verify that the ground (GND) cable of the device and the external controller are properly connected.

4) The device cannot be configured after the administrator and password are forgotten.

Delete the administrators through the platform and try again. If the problem persists, contact technical support for additional assistance. For more information on reaching technical support, please visit us at amcrest.com/contacts

57

5) User information and face images cannot be imported into the device.

Check whether names in the XML files and titles of tables were modified correctly as the system identifies files through their titles.

6) When a user’s face is recognized a different user’s information is being displayed.

Ensure that when importing human faces that there are no other faces in the image. Delete the original face image and import it again.

Appendix 1 Notes of Temperature Monitoring

Warm up the temperature monitoring unit for more than 20 minutes to ensure the temperature monitoring unit reaches thermal equilibrium.

Ensure that the temperature monitoring unit is installed indoors in a windless environment and that the ambient temperature is between 59°F (15°C) and 89.6°F (32°C).

Avoid using the temperature monitoring unit in areas with direct sunlight.

Do not install the temperature monitoring unit facing at a light source or glass.

Keep the temperature monitoring unit away from sources of thermal interference.

Factors such as sunlight, wind, cold air, air conditioning (cold and warm) may affect the surface temperature of the human body. This may cause temperature deviation between the monitored temperature and the actual temperature.

Sweat is also a way for the body to automatically cool down and dissipate heat. This may also cause temperature deviation between the monitored temperature and the actual temperature.

Maintain the temperature monitoring unit regularly (every 2 weeks). To clean the device, use a soft dust-free cloth to gently wipe the dust on the surface of the temperature sensor and the distance sensor.

Appendix 2 Notes of Face Recording/Comparison

Before Registration

Glasses, hats, and beards might influence face recognition performance.

Do not cover your eyebrows when wearing hats.

If a beard or other facial feature is changed the image will need to be updated in the system, otherwise, the system may not recognize the face.

Keep your face clean before use.

Keep the device at least two meters (6.5ft) away from a light source and at least 3 meters (9.8ft) away from windows or doors; otherwise backlight and direct sunlight might influence face recognition performance of the device.

During Registration

All face recognition information is registered through the device or via the platform.

When registering a face to the system, ensure our head is centered in the photo capture frame. A picture of your face will be captured automatically.

58

Note: Do not shake your head or body while registering a face otherwise it may fail. Avoid multiple faces in the captured frame as it may interfere with the facial recognition image.

Face Position

If your face is not in the appropriate position the face recognition effect may be influenced.

59

Note: When importing face images through the management platform, make sure the image resolution is within the range of 150 x 300-600 x 1200 image pixels; image pixels are more than

500 x 500; the image size is less than 75KB, and the image name and person ID are the same.

Also, ensure that the face does not take up more than 2/3 of the whole image area. The aspect ratio should not exceed 1:2.

Appendix 3 Cybersecurity Recommendations

Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks. Below are some tips and recommendations on how to create a more secured security system.

Mandatory actions to be taken for basic equipment network security:

1. Use Strong Passwords

Please refer to the following suggestions to set passwords:

The length should not be less than 8 characters.

Include at least two types of characters; character types include upper- and lower-case letters,

⚫ numbers, and symbols.

Do not contain the account name or the account name in reverse order;

Do not use continuous characters, such as 123, abc, etc.;

Do not use overlapped characters, such as 111, aaa, etc.;

2. Update Firmware and Client Software in Time

According to the standard procedure in Tech-industry, we recommend keeping your equipment

(such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is equipped with the latest security patches and fixes. When the equipment is connected to the public network, it is recommended to enable the “auto-check for updates” function to obtain timely information of firmware updates released by the manufacturer.

⚫ We suggest that you download and use the latest version of client software.

"Nice to have" recommendations to improve your equipment network security:

1. Physical Protection

We suggest that you perform physical protection to equipment, especially storage devices. For example, place the equipment in a special computer room and cabinet, and implement well-done access control permission and key management to prevent unauthorized personnel from carrying out physical contacts such as damaging hardware, unauthorized connection of removable equipment (such as USB flash disk, serial port), etc.

2. Change Passwords Regularly

We suggest that you change passwords regularly to reduce the risk of being guessed or cracked.

3. Set and Update Passwords Reset Information Timely

The equipment supports password reset function. Please set up related information for password reset in time, including the end user’s mailbox and password protection questions. If the information changes, please modify it in time. When setting password protection questions, it is suggested not to use those that can be easily guessed.

4. Enable Account Lock

The account lock feature is enabled by default, and we recommend the user to keep it on to guarantee the account security. If an attacker attempts to log in with the wrong password several times, the corresponding account and the source IP address will be locked.

5. Change Default HTTP and Other Service Ports

We suggest the user to change default HTTP and other service ports into any set of numbers between 1024~65535, reducing the risk of outsiders being able to guess which ports you are using.

6. Enable HTTPS

We suggest the user to enable HTTPS, so that you visit Web service through a secure communication channel.

7. Enable Whitelist

We recommend the user to enable whitelist function to prevent everyone, except those with specified IP addresses, from accessing the system. Therefore, please be sure to add your computer’s IP address and the accompanying equipment’s IP address to the whitelist.

60

8. MAC Address Binding

We recommend the user to bind the IP and MAC address of the gateway to the equipment, thus reducing the risk of ARP spoofing.

9. Assign Accounts and Privileges Reasonably

According to business and management requirements, reasonably add users and assign a minimum set of permissions to them.

10. Disable Unnecessary Services and Choose Secure Modes

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to reduce risks.

If necessary, it is highly recommended that you use safe modes, including but not limited to the following services:

SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication passwords.

SMTP: Choose TLS to access mailbox server.

FTP: Choose SFTP and set up strong passwords.

AP hotspot: Choose WPA2-PSK encryption mode and set up strong passwords.

11. Audio and Video Encrypted Transmission

If your audio and video data contents are very important or sensitive, we recommend that you use encrypted transmission function, to reduce the risk of audio and video data being stolen during transmission.

Reminder: encrypted transmission will cause some loss in transmission efficiency.

12. Secure Auditing

⚫ Check online users: we suggest that you check online users regularly to see if the device is logged

⚫ in without authorization.

Check equipment log: By viewing the logs, you can know the IP addresses that were used to log in to your devices and their key operations.

13. Network Log

Due to the limited storage capacity of the equipment, the stored log is limited. If you need to save the log for a long time, it is recommended that you enable the network log function to ensure that the critical logs are synchronized to the network log server for tracing.

14. Construct a Safe Network Environment

In order to better ensure the safety of equipment and reduce potential cyber risks, we recommend:

Disable the port mapping function of the router to avoid direct access to the intranet devices from

⚫ external network.

The network should be partitioned and isolated according to the actual network needs. If there are no communication requirements between two sub networks, it is suggested to use VLAN, network

GAP and other technologies to partition the network, so as to achieve the network isolation effect.

Establish the 802.1x access authentication system to reduce the risk of unauthorized access to private networks.

It is recommended that you enable your device's firewall or blacklist and whitelist feature to reduce the risk that your device might be attacked.

FCC Statement

1.

This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.

2.

The user’s manual or instruction manual for an intentional or unintentional radiator shall caution the user that changes, or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. In cases where the manual is provided only in a form other than paper, such as on a computer disk or over the

Internet, the information required by this section may be included in the manual in that alternative form, provided the user can reasonably be expected to have the capability to access information in that form.

3.

(b) For a Class B digital device or peripheral, the instructions furnished the user shall include the following or similar statement, placed in a prominent location in the text of the manual: NOTE: This equipment has been tested and found to comply with the limits for a

61

Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.

However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:

-- Reorient or relocate the receiving antenna.

-- Increase the separation between the equipment and receiver.

-- Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. -- Consult the dealer or an experienced radio/TV technician for help.

4.

RF exposure warning

This equipment must be installed and operated in accordance with provided instructions and the antenna(s) used for this transmitter must be installed to provide a separation distance of at least

20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance.

IC Warning Statement

This device complies with Industry Canada’s license-exempt RSSs. Operation is subject to the following two conditions:

(1) This device may not cause interference; and

(2) This device must accept any interference, including interference that may cause undesired operation of the device.

Le présent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radio exempts de licence. L'exploitation est autorisée aux deux conditions suivantes : (1) l'appareil ne doit pas produire de brouillage, et (2) l'utilisateur de l'appareil doit accepter tout brouillage radioélectrique subi, même si le brouillage est susceptible d'en compromettre le fonctionnement.

This equipment complies with IC RSS-102 radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum distance of 20cm between the radiator and any part of your body.

Pour se conformer aux exigences de conformité CNR 102 RF exposition, une distance de séparation d'au moins 20 cm doit être maintenue entre l'antenne de cet appareil ettoutes les personnes.

References & Contact Information

To view setup videos for many of the steps outlined in this guide, go to http://amcrest.com/videos

For more supplemental information, or to view articles related to your device visit http://amcrest.com/support

For contact information please visit us at https://amcrest.com/contacts or reach out to us directly at 1-888-212-7538.

Copyright Amcrest © 2020

62

advertisement

Related manuals