X7 Access Control

X7 Access Control
X7 Access Control
System User Manual
1.Equipment Installation
Wall mount installation
(1)Remove the screw on the
bottom of device.
(2)Take away the back cover.
(4)Fix the device to the back
cover.
(5)Fix the screw.
(3)Fix the back cover on the
wall according
to the
mounting paper.
2.Structure and Function
Access Control System Function:
(1)If a registered user verified, the device will
export the signal to unlock the door.
(2)Door sensor will detect the on-off state. If the
door is unexpected opened or improperly closed,
the alarm signal (digital value) will be triggered.
(3)If the device being illegally removed, the device
will export alarm signal.
(4)External exit button is supported; it is convenient
to open the door inside.
(5)External bell is supported.
1
3.Lock Connection
Warning: No operation when power on!
(1) The system supports NO LOCK and NC LOCK. For example the NO LOCK
(normally open at power on) is connected with’NO’ terminal, and the NC LOCK is
connected with ‘NC’ terminal.
(2) When the Electrical Lock is connected to the Access Control System, you need
to parallel one FR107 diode (equipped in the package) to prevent the
self-inductance EMF affect the system, do not reverse the polarities.
(I)Share power with the lock:
Device share power with the
lock:
ULOCK=12V,
I-ILOCK>1A…… 1
And the lock is near to the
device.
(II)Does not share power with the lock:
Device does not share power
with the lock:
A. ULOCK =12V
I-ILOCK
≤1A;
B. ULOCK ≠12V;
C. The lock is far apart from the
device.
I①: ‘I’: device output current, ‘ULOCK’: lock voltage,’ ILOCK’: lock current.
2
4.Connected
4.Connected
with
with
Other
Other
Parts:
Parts:
4.Connected
with
Other
Parts:
5.Connect
5.Connect
with
with
Power:
Power:
5.Connect
with
Power:
Input DC 12V, 500mA(50mA
standby)Positive is connected with
‘+12V’, negative is connected
with ’GND’ (do not reverse the
polarities).
Voltage output ≤ DC 12V for Alarm
3
Instructions
Recommended Procedure:
Step 1: Install the device and power on.
Step 2: After the administrator password is authenticated and changed, register
users' fingerprints, cards, or passwords.
Step 3: Configure access control parameters, including modifying eight
passwords for opening the door and configuring the unlocking duration,
authentication mode, stealth mode, door status sensor mode, and alarm.
Functions of the Device
∣―1.User Management
∣ ∣―1.1 Administrator Operations
∣ ∣ ∣― Authenticator the Administrator Password
∣ ∣ ∣― Change Administrator Password
∣ ∣ ∣― Open the Door by the Administrator Passwor
∣ ∣ ∣― Administrator Password Be Forgotten
∣ ∣―1.2 Add Users
∣ ∣ ∣― Add Users
∣ ∣ ∣― Register Cards in Batches
∣ ∣―1.3 Authentication Users
∣ ∣―1.4 Delete Users
∣ ∣ ∣― Delete a User
∣ ∣ ∣― Delete All Users
∣―2.Access Control Management
∣ ∣―2.1 Change Eight Passwords for Opening the Door
∣ ∣―2.2 Configure Unlocking Duration
∣ ∣―2.3 Configure Authentication Mode
∣ ∣―2.4 Configure Concealed Mode
∣ ∣―2.5 Configure Door Sensor Mode
∣ ∣―2.6 Configure Alarm
∣ ∣ ∣― Configure Alarm setting
∣ ∣ ∣― Configure Error Operation-Triggered Alarm
∣ ∣ ∣― Configure Tamper Alarm
4
∣
∣
∣―
Configure Alarm Delay for the Door Status Sensor
Operation Instructions
1.User Management
1.1 Administrator Operations
To ensure data security of the device, you can operate the device only after the
administrator password is authenticated.
Authenticator the Administrator Password
☺Note: The initial administrator password is 1234. You are advised to change the
initial password at the beginning.
Change Administrator Password
☺Note: Four-digit passwords are automatically verified. For passwords with less
than four digits, press # to enter the verification process.
Open the Door by Entering the Administrator Password
5
☺Note: This function can be used to open the door.
Administrator Password Be Forgotten
If the administrator password is forgotten, you can press the disassembly key
three times to reset the password to the initial administrator password 30 to 60
seconds after the device is disassembled from the wall or door. (There is a long
beep 30 seconds after the device is disassembled from the wall or door.)
1.2 Add Users
Register the fingerprint or card of a user or register cards in batches.
Add Users
1. The administrator
password is authenticated.
2. Press1.
(The indicator turns green
and makes a long beep.)
5. Exit.
(Press * to exit.)
3. Register fingerprints or
cards. (Press fingers three
times to get a fingerprint or
swipe the card once.)
Failed.
YES
(The indicator turns red
and makes three beeps.)
4. Adding Users is
successful.
(The indicator turns green
and makes a long beep.)
☺ Note:1. In the registration process, the user ID increases automatically. The
device automatically enters the process of registering the next user when a user is
successfully registered.
2. The registration process fails if the fingerprint is of poor quality or the
fingerprint or the card has been registered. After the device indicator turns green,
6
you can register the user again. Registered users must not be registered again.
Register Cards in Batches
☺ Note: 1. In the process of entering the total number of cards, three-digit
numbers are automatically verified. For numbers with less than three digits, press
# to enter the verification process.Press * to reenter the total number of cards.
2. You must clear all the registered users before registering cards in batches. IDs
of to-be-registered cards must be consecutive numbers.
1.3 Authentication Users
Authentication Users' Fingerprints/Cards/Passwords
After the device is powered on, it enters the authentication state for users to
unlock the door.
1. The device is in the
authentication state.
2. Press fingerprints, swipe
cards, or enter passwords. YES 3. The authentication is
Press # after entering a
successful.
password.
Failed.
(The indicator turns red
and makes three beeps.)
7
☺ Note: Press # after entering a password for authentication. The door opens if
the entered password is identical with one of the eight passwords for opening the
door. The initial eight passwords for opening the door are 8888. For how to
change passwords for opening the door, see2.1 Change Eight Passwords for
Opening the Door.
1.4 Delete Users
Delete a user whose fingerprint or card is registered, or delete all users.
Delete a User
1. The administrator
password is authenticated.
2. Press2.
(The indicator turns green
and makes a long beep.)
3. Enter a user ID, press the
fingerprint, or swipe the
card.
Failed.
(The indicator turns red
and makes three beeps.)
6. Exit.
(Press * or do not operate the
device within 20 seconds.)
YES
5. The user is deleted.
4. Determine whether the
user is authentic.
☺ Note: 1. In the process of entering user IDs, five-digit IDs are automatically
verified. For IDs with less than five digits, press # to enter the verification
process.
2. The device automatically enters the process of deleting the next user when a
user is deleted.
Delete All Users
8
☺Note: Press 9 for automatic confirmation. Other values are considered invalid.
If an invalid value is entered, the device indicator turns red, and the device makes
a long beep and exits the process.
2.Access Control Management
2.1 Change Eight Passwords for Opening the Door
☺Note: 1. If you set a password to an all-0 password after entering the password
ID, this password will be locked and you cannot use this password to open the
door.
2. If a password is successfully changed, enter the password ID of the
9
to-be-changed password to change the next password.
2.2 Configure Unlocking Duration
☺ Note: Three-digit values are automatically verified. For values with less than
three digits, press # to enter the verification process. Values greater than 254 are
considered invalid.
2.3 Configure Authentication Mode
☺Note: 1. Details about the authentication mode are as follows:
Authentication
Mode
type
Description
Mode 1(number1)
PW
Only password verification
Mode 2(number2)
RF
Only RF Card verification
Mode 3(number3)
FP
Only fingerprint verification
10
Mode 4(number4)
FP/PW/RF
fingerprint or password or RF verification
Mode 5(number5)
RF&PW
RF and password verification
Mode 6(number6)
FP&PW
fingerprint and password verification
2.4 Configure Concealed Mode
If the Concealed mode is enabled, the indicator is off when the Concealed mode
is in the sleep mode.
☺Note: An indicator blinks to indicate the status of this function when users are
authenticating their cards or fingerprints.
2.5 Configure Door Sensor Mode
The door sensor switch includes three modes:
NONE: The door sensor switch is not used.
NO: The lock is open as long as the door is open.
NC: The lock is closed after the door is closed.
11
☺Note: The door sensor mode configured here is used as the basis for the door
sensor alarm.
2.6 Configure Alarm
Note: If an alarm is triggered, the buzzer of the device generates an alarm. 30
seconds later, the alarm is switched to an alert. The alarm can be terminated after
the user is authenticated.
Configure Alarm setting
The defaute should be on, when it is set to be close, then Error
Operation-Triggered Alarm, Tamper Alarm, the Alarm Delay for the Door Status
Sensor will be disabled.
Configure Error Operation-Triggered Alarm
If this function is enabled, alarms are generated if a user fails the authentication
upon three attempts. The administrator authentication is not allowed within 20
seconds after an alarm is generated.
12
Configure Tamper Alarm
If this function is enabled, alarms are generated upon device disassembly.
Configure whether to enable the disassembly alarm.
Configure Alarm Delay for the Door Status Sensor
DSen. Delay (Door Sensor Delay): indicates the delay in checking the door
sensor after the door is open. If door sensor state is inconsistent with the normal
state set by the door sensor switch, an alarm will be generated, and this period of
time is regarded as the “door sensor delay”.
13
☺ Note: Three-digit values are automatically verified. For values with less than
three digits, press # to enter the verification process. Values greater than 254 are
considered invalid.
14
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement