Dahua ASI8214Y(V2) Face Recognition Access Standalone User's manual

Add to My manuals
82 Pages

advertisement

Dahua ASI8214Y(V2) Face Recognition Access Standalone User's manual | Manualzz

Face Recognition Access Standalone

User ’s Manual

V1.0.0

Important Safeguards and Warnings

This Chapter describes the contents covering proper handling of the access standalone, hazard prevention, and prevention of property damage. Read these contents carefully before using the access standalone, comply with them when using, and keep it well for future reference.

Operation Requirement

Do not place or install the access standalone in a place exposed to sunlight or near the heat source.

Keep the access standalone away from dampness, dust or soot.

Keep the access standalone installed horizontally on the stable place to prevent it from falling.

Do not drop or splash liquid onto the access standalone, and make sure there is no object filled with liquid on the access standalone to prevent liquid from flowing into the access standalone.

Install the access standalone in a well-ventilated place, and do not block the ventilation of the access standalone.

Operate the access standalone within the rated range of power input and output.

Do not dissemble the access standalone.

Transport, use and store the access standalone under the allowed humidity and temperature conditions.

Electrical Safety

Improper battery use might result in fire, explosion, or inflammation.

When replacing battery, make sure the same model is used.

Use the recommended power cables in the region and conform to the rated power specification.

Use the power adapter provided with the access standalone; otherwise, it might result in people injury and device damage.

The power source shall conform to the requirement of the Safety Extra Low Voltage (SELV) standard, and supply power with rated voltage which conforms to Limited power Source requirement according to IEC60950-1. Please note that the power supply requirement is subject to the device label.

Connect the device (I-type structure) to the power socket with protective earthing.

The appliance coupler is a disconnection device. When using the coupler, keep the angle for easy operation.

Important Safeguards and Warnings

I

Foreword

General

Model

This manual introduces the installation and basic operation of the Face Recognition Access

Standalone (hereinafter referred to as “access standalone”).

Model

A

B

D

Function

Password and face unlock.

IC card, password, face and fingerprint unlock.

Password and face unlock; can be installed on turnstiles.

Safety Instructions

The following categorized signal words with defined meaning might appear in the manual.

Signal Words Meaning

NOTE

Provides additional information as the emphasis and supplement to the text.

Privacy Protection Notice

As the device user or data controller, you might collect personal data of others such as face, fingerprints, car plate number, Email address, phone number, GPS and so on. You need to be in compliance with the local privacy protection laws and regulations to protect the legitimate rights and interests of other people by implementing measures include but not limited to:

Providing clear and visible identification to inform data subject the existence of surveillance area and providing related contact.

About the Manual

The manual is for reference only. If there is inconsistency between the manual and the actual product, the actual product shall prevail.

We are not liable for any loss caused by the operations that do not comply with the manual.

The manual would be updated according to the latest laws and regulations of related regions. For detailed information, see the paper manual, CD-ROM, QR code or our official website. If there is inconsistency between paper manual and the electronic version, the electronic version shall prevail.

All the designs and software are subject to change without prior written notice. The product updates might cause some differences between the actual product and the manual. Please contact the customer service for the latest program and supplementary documentation.

Foreword II

There still might be deviation in technical data, functions and operations description, or errors in print. If there is any doubt or dispute, please refer to our final explanation.

Upgrade the reader software or try other mainstream reader software if the manual (in PDF format) cannot be opened.

All trademarks, registered trademarks and the company names in the manual are the properties of their respective owners.

Please visit our website, contact the supplier or customer service if there is any problem occurred when using the device.

If there is any uncertainty or controversy, please refer to our final explanation.

Foreword III

Table of Contents

Important Safeguards and Warnings ...................................................................................................... I

Foreword ................................................................................................................................................... II

1 Overview ................................................................................................................................................. 1

1.1

Introduction ................................................................................................................................... 1

1.2

Features ........................................................................................................................................ 1

1.3

Appearance ................................................................................................................................... 2

1.4

Application Scenario ..................................................................................................................... 3

2 Installation .............................................................................................................................................. 4

2.1

Installation Drawings ..................................................................................................................... 4

2.2

Cable Connections ........................................................................................................................ 5

2.3

Installation Method ........................................................................................................................ 8

2.3.1 Wall-mounted ...................................................................................................................... 8

2.3.1 Bracket-mounted ................................................................................................................ 9

3 System Operation ................................................................................................................................ 11

3.1

Button Description ........................................................................................................................ 11

3.2

Initialization .................................................................................................................................. 11

3.3

Standby Interface ........................................................................................................................ 12

3.4

Unlocking Methods ..................................................................................................................... 13

3.4.1 Swiping Cards ................................................................................................................... 13

3.4.2 Face Recognition .............................................................................................................. 13

3.4.3 Unlocking through User Passwords ................................................................................. 13

3.4.4 Unlocking through Super Password ................................................................................. 13

3.4.5 Unlocking through Bluetooth ............................................................................................ 14

3.5

Main Menu .................................................................................................................................. 14

3.6

User Management ...................................................................................................................... 16

3.6.1 Adding New Users ............................................................................................................ 16

3.6.2 User .................................................................................................................................. 18

3.6.3 Super Password ............................................................................................................... 19

3.7

Access Management ................................................................................................................... 19

3.7.1 Period Management ......................................................................................................... 19

3.7.2 Unlock Mode ..................................................................................................................... 21

3.7.3 Alarm Configuration .......................................................................................................... 24

3.7.4 Door Status ....................................................................................................................... 25

3.7.5 Lock Holding Time ............................................................................................................ 26

3.8

Network Connection .................................................................................................................... 26

3.8.1 Communication Configuration .......................................................................................... 26

3.8.2 Serial Port Settings ........................................................................................................... 27

3.8.3 Weigand Configuration ..................................................................................................... 28

3.9

System ........................................................................................................................................ 29

3.9.1 Time .................................................................................................................................. 29

3.9.2 Face Parameter ................................................................................................................ 29

Table of Contents IV

3.9.3 Fill Light Mode Setting ...................................................................................................... 30

3.9.4 Fill Light Brightness Setting .............................................................................................. 30

3.9.5 Volume Adjustment ........................................................................................................... 30

3.9.6 IR Light Brightness Adjustment ........................................................................................ 30

3.9.7 FP Parameter.................................................................................................................... 30

3.9.8 Restore Factory ................................................................................................................ 31

3.9.9 Reboot .............................................................................................................................. 31

3.10

USB ........................................................................................................................................... 31

3.10.1 USB Export ..................................................................................................................... 31

3.10.2 USB Import ..................................................................................................................... 32

3.10.3 USB Update .................................................................................................................... 33

3.11

Features .................................................................................................................................... 34

3.11.1 Function Setting .............................................................................................................. 34

3.11.2 Message Mode ............................................................................................................... 35

3.12

Record ....................................................................................................................................... 38

3.13

Auto Test.................................................................................................................................... 39

3.14

System Info ............................................................................................................................... 40

4 Web Operation ..................................................................................................................................... 41

4.1

Initialization ................................................................................................................................. 41

4.2

Login ............................................................................................................................................ 43

4.3

Reset the Password .................................................................................................................... 43

4.4

Alarm Linkage ............................................................................................................................. 45

4.4.1 Setting Alarm Linkage ....................................................................................................... 45

4.4.2 Alarm Log .......................................................................................................................... 47

4.5

Picture Management ................................................................................................................... 48

4.6

Video Setting ............................................................................................................................... 48

4.6.1 Data rate ........................................................................................................................... 48

4.6.2 Image ................................................................................................................................ 49

4.6.3 Exposure ........................................................................................................................... 50

4.6.4 Motion Detection ............................................................................................................... 51

4.7

Face Detect ................................................................................................................................. 52

4.8

Network Setting ........................................................................................................................... 54

4.8.1 TCP/IP .............................................................................................................................. 54

4.8.2 Port ................................................................................................................................... 55

4.8.3 Auto Register .................................................................................................................... 56

4.8.4 P2P ................................................................................................................................... 56

4.9

Security Management ................................................................................................................. 57

4.9.1 IP Authority ........................................................................................................................ 57

4.9.2 System .............................................................................................................................. 57

4.9.3 User Management ............................................................................................................ 57

4.9.4 Maintenance ..................................................................................................................... 58

4.9.5 Configuration Management .............................................................................................. 59

4.9.6 Version .............................................................................................................................. 59

4.9.7 Online User ....................................................................................................................... 59

4.10

System Log ............................................................................................................................... 59

4.10.1 Query Logs ..................................................................................................................... 60

4.10.2 Backup Logs ................................................................................................................... 60

Table of Contents V

4.11

Admin Log ................................................................................................................................. 60

4.12

Exit ............................................................................................................................................ 61

5 Software Configuration....................................................................................................................... 62

5.1

Login ............................................................................................................................................ 62

5.2

Add Devices ................................................................................................................................ 62

5.2.1 Auto Search ...................................................................................................................... 62

5.2.2 Manual Add ....................................................................................................................... 63

5.3

Add Users .................................................................................................................................... 64

5.3.1 Card Type Selection ......................................................................................................... 65

5.3.2 Add One User ................................................................................................................... 66

5.4

Add Door Group .......................................................................................................................... 67

5.5

Access Permission Configuration ............................................................................................... 69

5.5.1 Giving Permission by Door Group .................................................................................... 69

5.5.2 Giving Permission by User ID........................................................................................... 70

Appendix 1 Cybersecurity Recommendations ................................................................................... 73

Table of Contents VI

1

Overview

1.1

Introduction

The access standalone is an access control panel that supports unlock through faces, passwords, fingerprints, cards, bluetooth, and supports unlock through their combinations.

1.2

Features

10.1 inch LCD, touchscreen.

The largest face among faces that appear at the same time is recognized first.

Automatically-on fill light and manually adjusted fill light brightness supported with 2MP

WDR camera.

More than 360 features on human faces can be accurately analyzed.

Face images of users can be uploaded to record user information.

Face recognition accuracy reaches 99%. Face comparison time is less than 0.2 s per person.

Face images and face modules cannot be used to unlock the door.

Recognizes profiles, partly covered faces, blurred faces, faces with facial expressions in different ambient brightness.

Receives card information and face data sent by platform through TCP/IP and Wi-Fi network.

Can be logged in or can record faces and fingerprints remotely when connected to the network; can be operated as stand-alone machines when disconnected from the network.

Support watchdog” (a device that protects a system from software or hardware failures).

Support software development kit (SDK).

Overview 1

1.3

Appearance

Figure 1-1 Appearance and dimension of Model A (mm)

Figure 1-2 Appearance and dimension of Model B (mm)

Overview 2

Figure 1-3 Appearance and dimension of Model D (mm)

1.4

Application Scenario

Applicable to parks, scenic spots, schools, residential areas, office buildings and more. Faces can not only be imported into the access standalone, but also be sent from platforms to the

access standalone. See Figure 1-4.

Figure 1-4 Application scenario

Overview 3

2

Installation

2.1

Installation Drawings

Figure 2-1 Installation drawing of Model A (mm)

Figure 2-2 Installation drawing of Model B (mm)

Installation 4

Figure 2-3 Installation drawing of Model D (mm)

2.2

Cable Connections

The access standalone should be connected to devices like sirens, readers, and door contacts.

For cable connection, see Table 2-1 and Table 2-1.

Table 2-1 Port description of model A and B

Port

CON1

Cable color

Black

Red

Blue

White

Green

Brown

Yellow

Purple

Cable name

RD –

RD+

CASE

D1

D0

LED

B

A

Description

Negative electrode of external reader power supply.

Positive electrode of external reader power supply.

Tamper alarm input of the external reader.

Weigand D1 in (connected to external readers)/out

(connected to controllers).

Weigand D0 in (connected to external readers)/out

(connected to controllers).

Connected to external reader indicator.

RS-485 negative electrode in (connected to external reader)/output (connected to controller).

RS-485 positive electrode in (connected to external reader)/out (connected to controller).

CON2

White and red

ALARM1_NO Alarm 1 normally on output port.

Installation 5

Port

CON3

Black and gray

Black and green

Black and brown

Black and yellow

Black and purple

White and yellow

White and purple

Black and red

Black and orange

Black and blue

White and gray

White and green

White

Brown

Cable color

White and orange

White and blue

Cable name

ALARM2_NO

GND

ALARM1

GND

ALARM2

RX

TX

GND

SR1

PUSH1

DOOR1_COM

DOOR1_NO

DOOR1_NC

Description

ALARM1_COM Alarm 1 public output port.

Alarm 2 normally on output port.

ALARM2_COM Alarm 2 public output port.

Connected to the ground cable.

Alarm 1 input port.

Connected to the ground cable.

Alarm 2 input port.

RS-232 receiving port.

RS-232 receiving port.

Connected to the ground cable.

Connected to the door contact.

Connected to the exit button.

Connected to the controller to control door locks.

Connected to the controller to control door locks.

Connected to the controller to control door locks.

Installation 6

Port

CON1

CON2

CON3

Table 2-2 Port description of model D

Cable color

Cable name Description

Black

Red

Blue

White

Green

Brown

Yellow

Purple

RD

RD+

CASE

D1

D0

B

A

LED

Negative electrode of external reader power supply.

Positive electrode of external reader power supply.

Tamper alarm input of the external reader.

Weigand D1 in (connected to external reader)/out (connected to controller).

Weigand D0 in (connected to external reader)/out (connected to controller).

Connected to external reader indicator in

RS-485 negative electrode in (connected to external reader)/output (connected to controller).

RS-485 positive electrode in (connected to external reader)/out (connected to controller).

White and red

White and orange

White and blue

White and gray

White and green

White

Brown

White and yellow

White and purple

Black and red

Black and orange

Black and blue

Black and gray

Black and green

Black and brown

ALARM1_NO Alarm 1 normally on output port.

ALARM1_COM Alarm 1 public output port.

DOOR2_NO

DOOR2_COM

GND

ALARM1

GND

PUSH2

RX

TX

GND

SR1

PUSH1

DOOR1_COM

Connected to the controller to control door locks.

Connected to the controller to control door locks.

Connected to the ground cable.

Alarm 1 input port.

Connected to the ground cable.

Exit button of door No.2.

RS-232 receiving port.

RS-232 sending port.

Connected to the ground cable.

Used for door contact detection, this function is not available in model D.

Door open button of door No.1

Connected to the controller to control door locks.

Installation 7

Port

Cable color

Black and yellow

Black and purple

Cable name

DOOR1_NO

DOOR1_NC

2.3

Installation Method

The access standalone can be installed on a wall or on a bracket.

2.3.1 Wall-mounted

Description

Connected to the controller to control door locks.

Connected to the controller to control door locks.

Figure 2-4 Installation drawings

Figure 2-5 Wall-mounted (for Model A and B)

Installation 8

Installation procedure

Step 1 Drill seven holes (six bracket installation holes and one cable entry) in the wall according to holes in the bracket.

Step 2 Fix the bracket on the wall by installing the expansion screws into the six bracket installation holes.

Step 3 Connect cables for access standalone.

See “2.2 Cable Connections”.

Step 4 Hang the access standalone on the bracket hook.

Step 5 Tighten the screws at the bottom of the access standalone.

The installation is completed.

2.3.1 Bracket-mounted

Figure 2-6 Bracket-mounted

4

5

6

7

8

9

10

No.

1

2

3

Table 2-3 Component description

Name

Access standalone

Bracket

M4 screw

Bracket rear cover

M3 screw

Sealing ring

M5 screw

Bracket base cover

M3 screw

Turnstile cover

Installation 9

Installation procedure

Step 1 Fix the access standalone on the bracket with M4 screws, and thread cables through the bracket.

Step 2 Put the cables into the groove of the bracket, and then fix the bracket rear cover with

M3 screws.

Step 3 Thread cables through the sealing ring, and then fix the sealing ring on the turnstile cover.

Step 4 Adjust the angle of the bracket, and then install the bracket on the turnstile cover with

M5 screws.

Step 5 Apply glue to the sealing ring to do waterproof operations.

Step 6 Fix the fixing plate (to fix the access standalone) on the bracket.

Step 7 Fix the base cover of the bracket on the bracket to cover the cables.

Installation 10

3

System Operation

3.1

Button Description

Button Description

Go to the first page.

Table 3-1 Button description

Go to the last page.

Go to the previous page.

Go to the next page.

Go to the previous menu.

Go to the next menu.

3.2

Initialization

Administrator password and an email should be set the first time the access standalone is turned on; otherwise the access standalone cannot be used.

Figure 3-1 Initialization

System Operation 11

Administrator and password set on this interface are used to login the Web management platform.

The administrator password can be reset through the email address you entered if the administrator forgets the administrator password.

The password should consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special character

(excluding ' " ; : &).

3.3

Standby Interface

You can unlock the door through cards, fingerprints, faces, and passwords. See Table 3-2.

The interface will go to the standby interface if there are no operations in 30 seconds.

Figure 3-2 Standby interface

System Operation 12

Name

Status bar

Table 3-2 Standby interface description

Description

Displays the status of Wi-Fi, wired network, and flash drive.

Door unlocking methods Displays the methods of unlocking the door.

Face recognition area Human faces can be recognized in this area.

PWD Unlock icon You can unlock the door by entering passwords and super passwords.

Tap the icon, and then you can enter the main menu.

Main menu icon

Date & Time

Only the administrator can enter the main menu.

Displays the current date and time.

3.4

Unlocking Methods

You can unlock the door through cards, passwords, fingerprints, face recognition.

All models support bluetooth; unlock methods vary with different models.

 Model A and D: Support passwords and face recognition.

 Model B: Support passwords, face recognition, cards, and fingerprints.

3.4.1 Cards

Put the card at the card swiping area to unlock the door.

3.4.2 Face Recognition

Make sure that your face is centered on the face recognition frame, and then you can unlock the door.

3.4.3 User Passwords

Enter the user passwords, and then you can unlock the door.

Step 1 Tap the PWD Unlock icon on the standby interface.

A PWD Unlock icon and a Super PWD Unlock icon are displayed.

Step 2 Tap the PWD Unlock icon.

Step 3 Enter the User ID, tap OK, and then tap .

Step 4 Enter the User password, tap OK, and then tap .

The door is unlocked.

3.4.4 Super Password

Enter the super passwords, and then you can unlock the door. There is only one super password for one access standalone. The super password can unlock the door without being subject to user levels, unlock modes, periods, holiday plans, and anti-passback.

Step 1 Tap PWD Unlock icon on the main interface.

System Operation 13

A PWD Unlock icon and a Super PWD Unlock icon are displayed.

Step 2 Tap the Super PWD Unlock icon.

Step 3 Enter the super password, tap OK , and then tap .

The door is unlocked.

3.4.5 Bluetooth

You can use bluetooth unlock through the phone APP and the management platform.

Step 1 Login the phone APP, and then enable the bluetooth.

Step 2 Add a door access card on the management platform.

Step 3 Tap the QR code icon on the management platform.

The QR code interface is displayed.

Step 4 To get the door access card information, make the APP in your phone scan the QR code.

Step 5 The access standalones are displayed on the APP.

Step 6 Select an access standalone. Tap the Unlock icon, and then the door will be unlocked.

3.5

Main Menu

Administrators can add users of different levels, set access-related parameters, do network configuration, view access records and system information, and more in the main menu.

Step 1 Tap on the standby interface.

The Administrator Login interface is displayed.

Different modes support different unlock methods, and the actual interface shall prevail.

System Operation 14

Figure 3-3 Administrator Login

Step 2 Select a main menu entering method.

The main menu interface is displayed.

System Operation 15

Figure 3-4 Main Menu

3.6

User Management

You can add new users, view user lists, admin lists, and modify the super password on the User interface.

3.6.1 Adding New Users

You can add new users by entering user IDs, names, importing fingerprints, face images, cards, passwords, selecting user levels, and more.

The following figures are for reference only, and the actual interface shall prevail.

Step 1 Select User > New User .

The New User Info

interface is displayed. See Figure 3-5.

System Operation 16

Figure 3-5 New User Info

Step 2

Configure parameters on the interface. See Table 3-3.

Table 3-3 New user parameter description

Parameter Description

User ID

Name

You can enter user IDs. The IDs can only be numbers, and the maximum length of the ID digits is 8.

You can enter names with at most 32 characters (including numbers, symbols, and letters).

At most three fingerprints of one user can be recorded, and one fingerprints need to be verified three times.

You can enable the Duress FP function under each fingerprint, and only one of the three fingerprints can be the duress fingerprint. Alarms will be triggered if a duress fingerprint is used to unlock the door.

FP

 It is not recommended that you select the first fingerprint as the duress fingerprint.

 Only Model B support fingerprint unlock.

Make sure that your face is centered on the picture capturing frame and then tap

Face

to take a p icture of the new user’s face. For details, see the Quick Start

Guide.

System Operation 17

Parameter Description

Card

You can register five cards for each user. On the card registration interface, enter your card number or swipe your card, and then the card information will be read by the access standalone.

You can enable the Duress Card function on the card registration interface.

Alarms will be triggered if a duress card is used to unlock the door.

PWD

User Level

Only Model B supports card unlock.

The door unlocking password. The maximum length of the ID digits is 8.

You can select a user level for new users. There are two options:

 User: Users only have door unlock authority.

 Admin: Administrators can not only unlock the door but also have parameter configuration authority.

If there is an administrator in the access standalone, administrator identity authentication is needed.

Period

Holiday

You can set a period in which the user can unlock the door.

You can set a holiday plan in which the user can unlock the door.

Plan

Valid Date You can set a period during which the unlocking information of the user is valid.

User Level

Use Time

There are six levels:

 General: General users can unlock the door normally.

 Blacklist: When users in the blacklist unlock the door, service personnel will get a prompt.

 Guest: Guests are allowed to unlock the door certain times. Once they exceed the maximum times, they cannot unlock the door again.

 Patrol: Paroling users can get their attendance tracked, but they have no unlock authority.

 VIP: When VIP unlocks the door, service personnel will get a prompt.

 Disable: When the disabled unlock the door, there will be a delay of 5 seconds before the door is closed.

When the user level is Guest, you can set the maximum number of times that he or she can unlock the door.

Step 3 After you have configured all the parameters, tap to save the configuration.

3.6.2 User

You can add new users, view the user list, admin list, and modify the super password on the

User interface. You can also modify, query, and delete users on the User List interface and

Admin List.

System Operation 18

Icons displayed on the User list and Admin list means users and administrator can unlock doors through the following methods.

 : Face recognition.

: Fingerprint recognition.

: Card swiping.

 : Password.

3.6.3 Super Password

 There is only one super password for one access standalone. The super password can unlock the door without being subject to user levels, unlock modes, periods, holiday plans, and more.

 When unlocking the door through the super password, User ID is not needed.

Step 1 Select User > Super PWD .

The Super PWD interface is displayed.

Figure 3-6 Super Password

Step 2 Tap Super PWD , enter the super password, and then tap to save it.

Step 3 Enabling the Super PWD.

 means enabled.

 means not enabled.

3.7

Access Management

You can do management on period, unlock mode, alarm, door status, and lock holding time.

Tap Access to go to the access management interface.

3.7.1 Period Management

You can set periods, holiday periods, holiday plan periods, door normally on periods, door normally closed periods, and remote verification periods.

System Operation 19

3.7.1.1 Period Config

You can configure 127 periods (weeks) whose number range is 0 –127. You can set four periods on each day of a period (week). Users can only unlock the door in the periods that you set.

3.7.1.2 Holiday Group

You can group holidays, and then you can set plans for holiday groups. You can configure 127 groups whose number range is 0 –127. You can add 16 holidays into a group. Configure the start time and end time of a holiday group, and then users can only unlock the door in the periods that you set.

You can enter names with 32 characters (including numbers, symbols, and letters). Tap to save the holiday group name.

3.7.1.3 Holiday Plan

You can add holiday groups into holiday plans. You can use holiday plans to manage user access authority in different holiday groups. Users can only unlock the door in the period that you set.

3.7.1.4 NO Period

If a period is added to the NO period, then the door is normally open in that period.

The NO/NC period permissions are higher than permissions in other periods.

3.7.1.5 NC Period

If a period is added to the NC period, then the door is normally closed in that period. Users can not unlock the door in this period.

3.7.1.6 Remote Verification Period

If you configured the remote verification period, then the door can only be opened in this period.

To unlock the door in this period, a door unlock instruction sent by the management platform is needed.

You need to enable the Remote Verification Period.

 means enabled.

System Operation 20

 means not enabled.

3.7.2 Unlock Mode

There are three unlock modes: unlock mode, unlock by period, and group combination. Unlock modes vary with standalone access models, and the actual standalone access shall prevail.

3.7.2.1 Unlock Mode

When the Unlock Mode is on, users can unlock through cards, fingerprints, faces, passwords, or any one of all the unlocking methods.

Step 1 Select Assess > Unlock Mode > Unlock Mode .

The Element (Multiple Choice)

interface is displayed. See Figure 3-7.

Figure 3-7 Element (Multiple Choice)

Step 2 Select unlock mode(s).

Tap a selected unlock mode again, the unlock mode will be deleted.

Step 3 Select a combination mode.

 + And means “and”. For example, if you selected card + FP, it means, to unlock the

 door, you need to swipe your card first, and then get your fingerprint scanned.

/ Or means “or”. For example, if you selected card/FP, it means, to unlock the door, you can either swipe your card or get your fingerprints scanned.

System Operation 21

Step 4 Tap to save the settings.

And then the Unlock Mode interface is displayed.

Step 5 Enable the Unlock Mode .

 means enabled.

 means not enabled.

3.7.2.2 Unlock by Period

Doors can be unlocked through different unlock modes in different periods. For example, in period 1, the door can only be unlocked through card; and in period 2, doors can only be locked through fingerprints.

Step 1 Select Assess > Unlock Mode > Unlock by Period.

The Unlock Config by Period

interface is displayed. See Figure 3-8.

Figure 3-8 Unlock by period

Step 2 Set starting time and end time for a period, and then select a unlock mode.

Step 3 Tap to save the settings.

The Unlock Mode interface is displayed.

Step 4 Enable the Unlock by Period function.

System Operation 22

means enabled.

means not enabled.

3.7.2.3 Group Combination

Doors can only be unlocked by a group or groups that consist of more than two users if the

Group Combination is enabled.

Step 1 Select Assess > Unlock Mode > Group Combination .

The Group Combination Config

interface is displayed. See Figure 3-9.

Figure 3-9 Group Combination

Step 2 Tap to create a group.

The Add Group

interface is displayed. See Figure 3-10.

Figure 3-10 Add a group

System Operation 23

Parameter

User List

Table 3-4 Group parameter

Description

Add users to the newly created group.

1. Tap User List.

The User List interface is displayed.

2. Tap , and then enter a user ID.

Unlock Mode

Valid User

3. Tap to save the settings.

There are four options: Card, FP, PWD, and Face.

Valid users are the ones that have unlock authority. Doors can be unlocked only when the number of users to unlock the doors equals the valid user number.

 Valid users cannot exceed the total number of users in a group.

 If valid users equal total user numbers in a group, doors can only be unlocked by all the users in the group.

 If valid users are less than the total number of users in a group, doors can be unlocked by any users whose number equals the valid user number.

Step 3 Tap to go back to the previous interface.

Step 4 Tap to save the settings.

Step 5 Enable the Group Combination.

 means enabled.

 means not enabled.

3.7.3 Alarm Configuration

Administrators can manage visitors’ unlock authority through alarm configuration.

Model D only supports Anti-passback, Duress, and Illegal Card Exceeding Time.

Select Access > Alarm . The Alarm

interface is displayed. See Figure 3-11.

System Operation 24

Figure 3-11 Alarm

 means enabled.

 means not enabled.

Parameter

Anti-passback

Duress

Illegal Card

Exceeding

Time

Intrusion

Door Sensor

Timeout

Door Sensor

On

Table 3-5 Parameters on the Alarm interface

Description

If a person unlocks the door with his or her identity checked by the access standalone, but when he or she gets out without getting his or her identity checked by the access standalone, an alarm will be triggered and the person will have no authority to unlock the door any more.

An alarm will be triggered when a duress card, duress password, or duress fingerprint is used to unlock the door.

After an unauthorized card is used to unlock the door more than 5 times in

50 seconds, an alarm will be triggered.

An intrusion alarm will be triggered if a door is unlocked without having the door contact released.

A timeout alarm will be triggered if the time that a user takes to unlock the door exceeds the Door Sensor Timeout time.

The Door Sensor Timeout time range is 1 –9999 seconds.

Only when the Door Sensor On is enabled can the intrusion alarm and door sensor timeout alarm be triggered.

3.7.4 Door Status

There are three options: NO , NC , and Normal .

NO: If NO is selected, the door status is normally on, which means the door will never be closed.

NC: If NC is selected, the door status is normally closed, which means the door will not be

 unlocked.

Normal: If Normal is selected, the door will be unlocked and locked depending on your settings.

System Operation 25

3.7.5 Lock Holding Time

Lock Holding Time is the duration in which the lock is unlocked. If the lock has been unlocked for a period that exceeds the duration, the lock will be automatically locked.

The recommended duration for Model D is 1 second.

3.8

Network Connection

3.8.1 Communication Configuration

3.8.1.1 IP Configuration

Configure an IP address for the access standalone to make it be connected to the network. See

Figure 3-12 and Table 3-6.

Figure 3-12 IP address configuration

Parameter

DHCP

P2P

Table 3-6 IP configuration parameters

Description

The IP address, subnet mask, and gateway IP address should be on

IP Address/Subnet

Mask/Gateway IP

Address the same network segment. After configuration, tap to save the configurations.

DHCP (Dynamic Host Configuration Protocol).

When the DHCP is enabled, the IP address can be automatically acquired, and the IP address, subnet mask and gateway IP address cannot be manually configured.

P2P is a private network traversal technology which enables user to manage devices without requiring DDNS, port mapping or transit server.

System Operation 26

3.8.1.2 Active Register

By active registering, you can connect the access standalone to the management platform, and then you can manage the access standalone through the management platform.

Configurations you have made can be cleared on the managing platform, and the access standalone can be initialized, you need to protect the platform managing authority in case of data loss caused by misoperation.

For active register parameter, see Table 3-7.

Name

Server IP Address

Port

Device ID

Table 3-7 Active Register

Parameter

IP address of the managing platform.

Port number of the managing platform.

Subordinate device number on the managing platform.

3.8.1.3 Wi-Fi

You can connect the access standalone to the network through Wi-Fi.

3.8.2 Serial Port Settings

Select serial input or serial output according to the entering direction and exiting direction.

Select Connection > Serial Port , and then the Serial Port

interface is displayed. See Figure

3-13.

Figure 3-13 Serial port

 You should select Serial Input when external devices that are with face recognition, fingerprint recognition, card reading and writing functions are connected to the access standalone. Serial Input is selected to enable access card information to be sent to the access standalone and the management platform.

 As for Model D, when Serial Input is selected to make the access standalone be connected to the reader in the turnstile, you need to select Door 1 or Door 2 according to your requirements.

 Door 1: If Door 1 is selected, then the reader and access standalone control the same door opening direction. For example, both the reader and access standalone control the entering direction into a place or all control the exiting direction from a place.

System Operation 27

 Door 2: If Door 2 is selected, the reader and access standalone control different door opening directions. For example, the access standalone controls the entering direction into a place and the reader controls the exiting direction from a place.

 For access standalones with face recognition, fingerprint recognition, card reading and writing functions, if you select Serial Output, access standalone will send lock/unlock information to the access controller. There are two types of lock/unlock information:

 User ID

 Card No.

3.8.3 Weigand Configuration

Select Weigand Input or Weigand Output according to the entering direction and exiting direction.

Select Connection > Weigand

, and then the Weigand interface is displayed. See Figure 3-14.

Figure 3-14 Weigand

 Select Weigand Input when an external card swipe mechanism is connected to the access standalone.

 As for Model D, when Weigand Input is selected to make the access standalone be connected to the reader in the turnstile, you need to select Door 1 or Door 2 according to your requirements.

 Door 1: If Door 1 is selected, then the reader and access standalone control the same door opening direction. For example, both the reader and access standalone control the entering direction into a place or all control the exiting direction from a place.

 Door 2: If Door 2 is selected, the reader and access standalone control different door opening directions. For example, the access standalone controls the entering direction into a place and the reader controls the exiting direction from a place.

 Select Weigand Output when the access standalone works as a reader that can be

connected to the controller. See Table 3-8.

Parameter

Weigand output type

Pulse Width

Pulse Interval

Table 3-8 Weigand output

Description

The Weigand Output Type determines the card number or the digit of the number than can be recognized by the access standalone.

 Weigand26, three bytes, six digits.

 Weigand34, four bytes, eight digits.

 Weigand66, eight bytes, sixteen digits.

You can set pulse width and pulse interval.

System Operation 28

Parameter

Output Data Type

Description

You can select the types of output data.

 User ID: If User ID is selected, and then user ID will be output.

 Card No.: If Card No. is selected, and then card number will be output.

3.9

System

3.9.1 Time

You can do date format setting, date setting, time setting, DST setting, NTP check, time zone settings.

When you do Network Time Protocol (NTP), you need to configure the following parameters. You need to enable the NTP Check function first. Server IP Address: enter the

IP address of the time server, time of the access standalone will be synchronized with the time server.

Port: Enter the port number of the time server.

Interval (min): NPT check interval. Tap the save icon to save.

3.9.2 Face Parameter

Figure 3-15 Face parameter

Tap a parameter and do configuration, and then tap .

Name

Table 3-9 Face Parameter

Description

Face recognition accuracy can be adjusted. The larger the value is, the higher the accuracy will be.

Face Recognition

Threshold

For the sake of convenience, please set the Face Recognition

Threshold of Model C to 60.

System Operation 29

Name

Max. Angle of Face

Recognition

Recognition Timeout

Recognition Interval

Anti-fake Threshold

Description

You can set the control panel shooting angle of profiles. The larger the value is, the wider range of the profiles will be recognized.

When a person who does not have the access authority stands in front of the access standalone and gets the face recognized, the standalone will prompt that face recognition failed. The prompt interval is called recognition timeout.

When a person who has the access authority stands in front of the access standalone and gets the face recognized, the standalone will prompt that face recognition succeeded. The prompt interval is the recognition interval.

This function prevents people from unlocking by human face images or face models. The larger the value is, the more difficult face images can unlock the door. The recommended value range is above 80.

3.9.3 Fill Light Mode Setting

You can select fill light modes according to your needs.

There are three modes:

Auto: When human faces are detected, the fill light will be on automatically, and then be off in 10 seconds. When the photo sensor detects that the ambient environment is dark, the fill light is normally on.

NO: The fill light is normally on.

NC: The fill light is normally closed.

3.9.4 Fill Light Brightness Setting

You can select fill light brightness according to your needs.

3.9.5 Volume Adjustment

Tap or to adjust the volume.

3.9.6 IR Light Brightness Adjustment

The larger the value is, the clearer the images will be; otherwise the unclearer the images will be.

3.9.7 FP Parameter

Set the fingerprint accuracy level. The higher the level is, the lower the false recognition rate will be.

System Operation 30

3.9.8 Restore Factory

Data will be lost if you restore the access standalone to the factory settings.

You can select whether to retained user information and logs.

 You can select to restore the access standalone to the factory settings with all user information and device information deleted.

 You can select to restore the access standalone to the factory settings with user information and device information retained.

3.9.9 Reboot

Select Setting > Reboot , tap Reboot , and the access standalone will be rebooted.

3.10

USB

Make sure that the USB is inserted before exporting user information and updating. During exporting or updating, do not pull out the USB or do other operations; otherwise the exporting or updating will fail.

You need to import information from one access standalone to the USB before using USB to import information to another access standalone.

USB can also be used to update the program.

3.10.1 USB Export

You can export data from the access standalone to the USB after inserting the USB. The data exported is encrypted and cannot be edited.

Step 1 Select USB > USB Export .

The USB Export

interface is displayed. See Figure 3-16.

System Operation 31

Figure 3-16 USB Export

Step 2 Select the data type that you want to export.

Confirm to export is displayed.

Step 3 Tap OK .

Data exported will be saved in the USB.

3.10.2 USB Import

Only data in the USB that was exported from one access standalone can be imported into another access standalone.

Step 1 Select USB > USB Import .

The USB Import

interface is displayed. See Figure 3-17.

System Operation 32

Figure 3-17 USB Import

Step 2 Select the data type that you want to import.

Confirm to import is displayed.

Step 3 Tap OK .

Data in the USB will be imported into the access standalone.

3.10.3 USB Update

USB can be used to update the system.

Step 1 Rename the updating file name to “update.bin”, and save the “update.bin” file in the root directory of the USB.

Step 2 Select USB > USB Update .

Confirm to Update is displayed.

Step 3 Tap OK .

The update starts, and the access standalone reboots after the update is finished.

System Operation 33

3.11

Features

3.11.1 Function Setting

Figure 3-18 Features

Parameter

PWD Reset Enable

HTTPS

CGI

Table 3-10 Features

Description

If the PWD Reset Enable function is enabled, you can reset the password.

The PWD Reset function is enabled by default.

Hypertext Transfer Protocol Secure (HTTPS) is a protocol for secure communication over a computer network.

When HTTPS is enabled, HTTPS will be used to access CGI commands; otherwise HTTP will be used.

Common Gateway Interface (CGI) offers a standard protocol for web servers to execute programs that execute like console applications running on a server that generates web pages dynamically.

When CGI is enabled, CGI commands can be used. The CGI is enabled by default.

System Operation 34

Parameter

SSH

FP

Capture photo

Card No. Reverse

Description

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.

When SSH is enabled, SSH provides cryptographic service for the data transmission.

If you select OFF for Fingerprint (FP), users’ fingerprint information will not be displayed when they get their fingerprints recorded or when they use their fingerprints to unlock the door.

If you select ON, when a user unlocks the door, the user’s photo will be automatically taken. This function is ON by default.

When use Weigand output to access the third party device, the card number acquired will not be the same as the card number on the real car. You can select to enable this function or not.

Tap the icon, and you can delete all captured photos.

Clear all captured photos

When HTTPS is enabled, the access standalone will reboot automatically.

3.11.2 Message Mode

You can select a message mode as needed.

Message Mode 1

Figure 3-19 Message mode 1

System Operation 35

Message Mode 2

Figure 3-20 Message mode 2

System Operation 36

Message Mode 3

Figure 3-21 Message mode 3

System Operation 37

Message Mode 4

Figure 3-22 Message mode 4

3.12

Record

You can query all door unlocking records.

System Operation 38

Figure 3-23 Search punch records

3.13

Auto Test

When you use the access standalone for the first time or when the access standalone malfunctioned, you can use auto test function to check whether the access standalone can work normally. Do actions according to the prompts.

System Operation 39

Figure 3-24 Auto test

When do Auto Test on Model A and D, fingerprint test will be skipped over automatically.

When you select Auto Test , the access standalone will guide you to do all the auto tests.

3.14

System Info

You can view data capacity, device version, and firmware information of the access standalone on the System Info interface.

System Operation 40

4

Web Operation

The access standalone can be configured and operated on the web. Through the Web you can set parameters including network parameters, video parameters, and access standalone parameters; and you can also maintain and update the system.

4.1

Initialization

You need to initialize the web first before logging in the web for the first time or logging in the web after you have restored the access standalone to the factory settings.

Step 1 Open IE web browser, and enter the IP address (the default address is 192.168.1.108) of the access standalone in the address bar, and then press Enter.

The Initialization

interface is displayed. See Figure 4-1.

Use browser newer than IE 8, or you might not login the web.

Figure 4-1 Initialization

Step 2 Enter the new password, confirm password, enter an email address, and then tap Next .

For the sake of security, keep the password properly after initialization and change the password regularly.

The password should consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special character (excluding ' " ; : &). Set a password of high security level according to the password strength prompt.

Web Operation 41

 When you need to reset the administrator password by scanning the QR code, you need an email address to receive the security code.

Step 3 Click Next .

The Auto Check

interface is displayed. See Figure 4-2.

Figure 4-2 Auto Test

Step 4 You can decide whether to select Auto Check or not.

It is recommended that Auto Check be selected to get the latest program in time.

Step 5 Click Next .

The configuration is finished. See Figure 4-3.

Figure 4-3 Finished Configuration

Step 6 Click Complete , and the initialization is completed.

Web Operation 42

The web login interface is displayed.

4.2

Login

Step 1 Open IE web browser, and enter the IP address of the access standalone in the address bar and press Enter .

Figure 4-4 Login

Step 2 Enter the user name and password.

 The default administrator name is admin, and the password is the login password after initializing the access standalone. Modify the administrator regularly and keep it properly for the sake of security.

 If you forget the administrator login password, you can click Forgot password?

to reset it. See

“4.3 Reset the Password”.

Step 3 Click Login .

4.3

Reset the Password

When reset the password of the admin account, your email address will be needed.

Step 1 Click Forgot password?

on the login interface.

Web Operation 43

Figure 4-5 Tips

Step 2 Click OK .

The Reset Password interface is displayed.

Figure 4-6 Reset Password

Step 3 Scan the QR code on the interface, and you will get the security code.

At most two security codes will be generated by scanning the same QR code. To get more security code, refresh the QR code.

Please use the security code within 24 hours after you receive it. Otherwise, it will become invalid.

Web Operation 44

 If wrong security codes are entered for consecutive five times, the administrator will be frozen for five minutes.

Step 4 Enter the security code you have received.

Step 5 Click Next .

The Reset Password interface is displayed.

Step 6 Reset and confirm the new password.

The password should consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special character

(excluding ' " ; : &).

Step 7 Click OK , and the reset is completed.

4.4

Alarm Linkage

4.4.1 Setting Alarm Linkage

Alarm input devices can be connected to the access standalone, and you can modify the alarm linkage parameter according to your requirements.

Model D only supports one channel alarm input, and the actual access standalone shall prevail.

Step 1 Select Alarm Linkage .

The Alarm Linkage

interface is displayed. See Figure 4-7.

Figure 4-7 Alarm linkage

Step 2 Click , and then you can modify Alarm Linkage parameters.

Web Operation 45

Figure 4-8 Modifying alarm linkage parameter

Parameter

Alarm Input

Name

Table 4-1 Alarm linkage parameter description

Description

Enter an Alarm input number

Enter a zone name.

Alarm Input Type

Fire Link Enable

There are two options: NO and NC.

If alarm input type of the alarm device you purchased is NO, then you should select NO; otherwise you should select NC.

The access standalone will output alarms when fire alarms are triggered if the Fire Link is enabled. The alarm details will be displayed in the alarming record.

Alarm Output and Access Link are NO by default if Fire Link is enabled.

Alarm Output The relay can output alarm information (will be sent to the

Enable management platform) if the Alarm Output is enabled.

Duration (second) The alarm duration, and the range is 1 –300 seconds.

Alarm Output

Channel

Access Link

Enable

Channel Type

You can select an alarm output channel according to the alarming device that you have installed.

After the Access Link is enabled, the access standalone will be normally on or normally closed when there are input alarm signals.

There are two options: NO and NC.

If alarm input type of the alarm device you purchased is NO, then you should select NO; otherwise you should select NC.

Step 3 Click OK , and then the configuration is completed.

Web Operation 46

The configuration on the web will be synchronized with the configuration in the client if the access standalone is added to a client.

4.4.2 Alarm Log

You can view the alarm type and time range in the Alarm Log.

Step 1 Select Alarm Linkage > Alarm Log .

The Alarm Log

interface is displayed, see Figure 4-9.

Figure 4-9 Alarm log

Step 2 Select a time range and alarm type, and then click Query .

The query results are displayed. See Figure 4-10.

Web Operation 47

Figure 4-10 Query results

4.5

Picture Management

You can upload at most ten pictures to the access standalone, and then you can loop the pictures in standby mode.

You can only upload one picture at a time.

4.6

Video Setting

You can set parameters including data rate, image parameters (brightness, contrast, hue, saturation, etc.), and exposure on the Video Setting interface.

4.6.1 Data rate

For data rate descriptions, see Table 4-2.

Parameter

Main

Format

Extra

Format

Video

Format

Frame

Rate

Bit Rate

Table 4-2 Data rate parameter description

Description

There are four options: D1, VGA, 720P and 1080P.

The rate at which consecutive frames appear on a display. The frame rate range is 1 –25fps.

The number of bits that are conveyed or processed per unit of time.

Video

Format

There are three options: D1, VGA, and QVGA.

Web Operation 48

Parameter

Frame

Rate

Bit Rate

Description

The rate at which consecutive frames appear on a display. The frame rate range is 1 –25fps.

The number of bits that are conveyed or processed per unit of time.

4.6.2 Image

There are two channels, and you need to configure parameters for each channel.

Step 1 Select Video Setting > Video Setting > Image .

Figure 4-11 Image

Step 2 Select Wide Dynamic in the Backlight Mode.

Parameter

Brightness

Contrast

Hue

Table 4-3 Image parameter description

Description

The larger the value is, the brighter the images will be.

The larger the contrast value is, the greater the brightness contrast will be.

The larger the value is, the deeper the color will be.

The larger the value is, the brighter the colors will be.

Saturation

Scene Mode

The value does not change image brightness.

 Close: without modes.

 Auto: The system automatically adjusts scene modes.

 Sunny: In this mode, image hue will be reduced.

 Night: In this mode, image hue will be increased.

Day/Night Mode

Sunny is selected by default.

Day/Night mode decides the working status of the fill light.

 Auto: The system automatically adjusts the day/night modes.

 Colorful: In this mode, images are with colors.

 Black and white: In this mode. Images are in black and white.

Web Operation 49

Parameter

Back Light Mode

Mirror

Flip

Description

 Close: Without back light.

 BLC: Backlight compensation corrects regions with extremely high or low levels of light to maintain a normal and usable level of light for the object in focus.

 WDR: In the wide dynamic range mode, the system dims bright areas and compensates dark areas to ensure the definition of objects in the bright areas and dark areas.

When human faces are in the backlight, you need to enable the Wide

Dynamic.

 HLC: Highlight compensation is needed to compensate for overexposure of highlights or strong light sources like spotlights, headlights, porch lights, etc. to create an image that is usable and not overtaken by a bright light.

When the function is enabled, images will be displayed with left and right side reversed.

When this function is enabled, videos can be flipped over.

4.6.3 Exposure

For exposure parameter descriptions, see Table 4-4.

Parameter

Anti-flicker

Table 4-4 Exposure parameter description

Description

 50Hz: When the utility frequency of alternating current is 50Hz, the exposure is automatically adjusted to make sure that there are no stripes on images.

 60Hz: When the utility frequency of alternating current is 60Hz, the exposure is automatically adjusted to make sure that there are no stripes on images.

 Outdoor: When Outdoor is selected, the exposure mode can be switched.

Web Operation 50

Parameter Description

Exposure Mode

When you select Outdoor in the Anti-flicker drop-down list, you can select Shutter Priority as the exposure mode.

Exposure modes of different devices might vary, and the actual product shall prevail.

You can select from:

 Auto: The access standalone will automatically adjust brightness of images.

 Shutter Priority: The access standalone will adjust image brightness according to shutter exposure value range. If the image brightness is not enough and the shutter value has reached upper or lower limit, the access standalone will adjust gain value automatically to get ideal brightness.

 Manual: You can configure gain and shutter value manually to

Shutter adjust image brightness.

The larger the shutter value is and the shorter the exposure time is, the darker the images will be.

Shutter value range

If you select Customized Range , you can customize the shutter value range.

Gain value range When the Gain value range is set, video quality will be improved.

Exposure

Compensation

You can increase video brightness by adjusting exposure compensation value.

3D NR

Grade

When 3D Noise Reduction (RD) is enabled, video noise can be reduced, and high definition videos will be produced.

You can adjust the value of the 3D NR when 3D NR is enabled.

The larger the value is, the less the noise there will be.

4.6.4 Motion Detection

Set a range in which moving objects can be detected.

Step 1 Select Video Setting > Video Setting > Motion Detection .

The Motion Detection

interface is displayed. See Figure 4-12.

Web Operation 51

Figure 4-12 Motion Detection

Step 2 Press and hold the left mouse button, and then drag the mouse in the red area. The

Motion Detection

area is displayed. See Figure 4-13.

The red rectangles are motion detection area. The default motion detection range is all the rectangles.

To draw a motion detection area, you need to click Remove All first.

The motion detection area you draw will be a non-motion detection area if you draw in the default motion detection area.

Figure 4-13 Motion Detection area

Step 3 Click OK to finish the setting.

4.7

Face Detect

You can configure human face related parameters on this interface to increase the accuracy of the face recognition.

Step 1 Select Face Detect .

Web Operation 52

The Face Detect

interface is displayed, see Figure 4-14.

Figure 4-14 Face Detect

Step 2

Configure parameters. See Table 4-5.

Parameter

Face

Threshold

Recognition

Table 4-5 Face detect parameter description

Description

The larger the value is, the higher the accuracy will be.

Max. Angle of Face

Recognition

The larger the angle is, the wider range of the profiles will be recognized.

Anti-fake Threshold

This function prevents people from unlocking by human face images or human face models.

The larger the value is, the more difficult face images or human face models can unlock the door.

Fill Light Brightness

Setting

You can set fill light brightness.

Fill Light Mode Setting

Infrared Light

Enable Face Exposure

Recognition Timeout

Recognition Interval

There are three fill light modes.

 NO: Fill light is normally on.

 NC: Fill light is normally closed.

 Auto: Fill light will be automatically on when a motion detection event is triggered.

Adjust IR brightnees by dragging the scroll bar.

After face exposure is enabled, human face will be clearer when the access standalone is installed outdoors.

When a person who does not have the access authority stands in front of the access standalone and gets the face recognized, the standalone will prompt that face recognition failed. The prompt interval is called recognition timeout.

When a person who has the access authority stands in front of the access standalone and gets the face recognized, the standalone will

Web Operation 53

Parameter

Draw Target

Description prompt that face recognition succeeded. The prompt interval is the recognition interval.

Click Draw Target, and then you can draw the minimum face detection frame.

Click Remove All, and you can remove all the frames you drew.

Click Detect Region, move your mouse, and you can adjust the face

Detect Region detection region.

Click Remove All, and you can remove all the detection regions.

Step 3 Click OK to finish the setting.

4.8

Network Setting

4.8.1 TCP/IP

You need to configure IP address and DNS server to make sure that the access standalone can communicate with other devices.

Precondition

Make sure that the access standalone is connected to the network correctly

Step 1 Select Network Setting > TCP/IP .

Figure 4-15 TCP/IP

Step 2 Configure parameters.

Web Operation 54

Parameter

IP Version

MAC

Mode

Link-local address

IP Address

Table 4-6 TCP/IP

Description

There are two options: IPv4 and IPv6.

MAC address of the access standalone is displayed.

 Static

Set IP address, subnet mask, and gateway address manually.

 DHCP

 After DHCP is enabled, IP address, subnet mask, and gateway address cannot be configured.

 If DHCP is effective, IP address, subnet mask, and gateway address will be displayed automatically; if DHCP is not effective,

IP address, subnet mask, and gateway address will all be zero.

 If you want to see the default IP when DHCP is effective, you need to disable DHCP.

Link-local address is only available when IPv6 is selected in the IP version.

Unique link-local addresses will be assigned to network interface controller in each local area network to enable communications. The link-local address cannot be modified.

Enter IP address, and then configure subnet mask and gateway address.

Subnet Mask

Gateway

IP address and gateway address must be in the same network segment.

If you selected IPv6, subnet mask cannot be configured.

Preferred DNS

Server

Set IP address of the preferred DNS server.

Alternate DNS

Server

Set IP address of the alternate DNS server.

Step 3 Click OK to complete the setting.

4.8.2 Port

Set the maximum connections clients that the access standalone can be connected to and port numbers.

Step 1 Select Network Setting > Port .

The Port interface is displayed.

Step 2 Configure port numbers. See the following table.

Except max connection, you need to reboot the access standalone to make the configuration effective after modifying values.

Web Operation 55

Parameter

Table 4-7 Port description

Description

You can set the maximum connections of clients that the access standalone can be connected to.

Max connection

TCP Port

HTTP Port

Platform clients like Smartpss are not counted.

Default value is 37777.

Default value is 80. If other value is used as port number, you need to add this value behind the address when logging in through browsers.

Default value is 443. HTTPS Port

RTSP Port Default value is 554.

Step 3 Click OK to complete the setting.

4.8.3 Auto Register

When connected to external network, the access standalone will report its address to the server that is designated by the user so that clients can get access to the access standalone.

Step 1 Select Network Setting > Auto Register .

The Auto Register interface is displayed.

Step 2 Select Enable , and enter host IP, port, and sub device ID.

Parameter

Host IP

Port

Table 4-8 Auto register description

Description

Server IP address or server domain name.

Server port used for auto registeration.

Sub device ID Access standalone ID assigned by the server.

Step 3 Click OK to complete the setting.

4.8.4 P2P

Peer-to-peer computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Users can download mobile application by scanning QR code, and then register an account so that more than one access standalone can be managed on the mobile app. You do not need to apply dynamic domain name, do port mapping or do not need transit server.

If you are to use P2P, you must connect the access standalone to external network; otherwise the access standalone cannot be used.

Step 1 Select Network Setting > P2P.

The P2P interface is displayed.

Step 2 Select Enable to enable P2P function.

Step 3 Click OK to complete the setting.

Web Operation 56

4.9

Security Management

4.9.1 IP Authority

You can manage access authority by adding users’ IP addresses on the White List or Black List.

 When White List is enabled, only IP addresses on the White List can log in the Web page.

 When Black List is enabled, IP addresses on the Black List cannot log in the Web page.

Click , and you can select IP Address or IP Segment.

Table 4-9 IP parameter description

Parameter Description

IP Address

You need to enter the IP Addresses that you want to add to the White List or

Black List.

IP Segment

You need to enter the IP address range that you want to add to the White List or

Black List.

4.9.2 System

4.9.2.1 System Service

There are four options: SSH, PWD Reset Enable, CGI, and HTTPS. Refer to “3.11 Features” to

select one or more than one of them.

The system service configuration done on the Web page and the configuration on the Features interface of the access standalone will be synchronized.

4.9.2.2 Create Server Certificate

Click Create Server Certificate , enter needed information, click Save , and then the access standalone will reboot.

4.9.2.3 Download Root Certificate

Step 1 Click Download Root Certificate .

Select a path to save the Certificate on the Save File dialog box.

Step 2 Double-click on the Root Certificate that you have downloaded to install the Certificate.

Install the certificate by following the onscreen instructions.

4.9.3 User Management

You can add and delete users, modify users’ passwords, and enter an email address for resetting the password when you forget your password.

Web Operation 57

4.9.3.1 Add users

Click Add on the User Mgmt.

interface to add users, and then enter username, password, confirmed password, and remark. Click OK to complete the user adding.

4.9.3.2 Modify

You can modify user information by clicking on the User Mgmt.

interface. See Figure 4-16.

Figure 4-16 User management

4.9.4 Maintenance

You can make the access standalone reboot itself in idle time to improve the running speed of

the access standalone. See Figure 4-17.

Figure 4-17 Maintenance

Select the auto reboot date and time. The default reboot time is at 2 o’clock in the morning on

Tuesday. Click Reboot Device , the access standalone will reboot immediately. Click OK , the access standalone will reboot at 2 o’clock in the morning on every Tuesday.

Web Operation 58

4.9.5 Configuration Management

When more than one access standalone need the same configuration, you can configure

parameters for them by importing or exporting configuration files. See Figure 4-18.

Figure 4-18 Configuration management

4.9.6 Version

You can view information including version, model, MAC address, Serial number, Web version.

4.9.7 Online User

You can view username, IP address, and user login time on the Online User interface. See

Figure 4-19.

Figure 4-19 Online user

4.10

System Log

You can view and backup the system log on the System Log

interface. See Figure 4-20.

Web Operation 59

Figure 4-20 System log

4.10.1 Query Logs

Select a time range, type, click Query , and logs meet the conditions will be displayed.

4.10.2 Backup Logs

Click Backup to backup the logs displayed.

4.11

Admin Log

Enter Admin ID on the Admin Log interface, click Query , and then you will see the

administrator’s operation records. See Figure 4-21.

Web Operation 60

Figure 4-21 Admin log

Hover the mouse cursor over , and then you can see detailed information of the current user.

4.12

Exit

Click , click OK , and then you will log out the Web interface.

Web Operation 61

5

Software Configuration

You can do access permission configuration to a single door or door groups through the Smart

PSS client. For detailed configurations, see the Smart PSS user manual.

Smart PSS interfaces might vary with versions, and the actual interface shall prevail.

5.1

Login

Install the Smart PSS (the default username is admin, and the default password is admin123), double-click to operate it. Follow the instructions to finish the initialization and login.

5.2

Add Devices

You need to add access standalones to the Smart PSS. You can click Auto Search to add and click Add to manually add.

5.2.1 Auto Search

You can search and add access standalones at the same network segment to the Smart PSS.

See Figure 5-1 and Figure 5-2.

Figure 5-1 Devices

Software Configuration 62

Figure 5-2 Auto search

Step 1 Click Auto Search , enter the network segment, and then click Search . A list will be displayed.

Step 2 Select access standalones that you want to add to the Smart PSS, and then click Add , the Login information dialog box will be displayed.

Step 3 Enter the username and the login password to login.

You can see the added access standalone on the Devices interface.

Select an access standalone, click Modify IP , and you can modify the access standalone’s IP address. For details about IP address modification, see Smart PSS user manual.

5.2.2 Manual Add

You need to know IP addresses and domain names of access standalones that you want to add.

See Figure 5-3 and Figure 5-4.

Figure 5-3 Devices

Software Configuration 63

Figure 5-4 Manual add

Step 1 Click Add on the Devices interface, and the Manual Add interface will be displayed.

Step 2 Enter the Device Name, select a Method to add, enter the IP/Domain Name, Port number (37777 by default), Group Name, User Name, and Password.

Step 3 Click Add , and then you can see the added access standalone on the Devices interface.

5.3

Add Users

Users are bound with cards. After you have added users to the Smart PSS, you can configure users access permissions on the New > Access

. See Figure 5-5.

Software Configuration 64

Figure 5-5 New

5.3.1 Card Type Selection

Card types must be the same as card issuer types, otherwise card numbers cannot be read.

On the Access interface, click , then click , and then select a card type. There are

two options: ID Card and IC Card. See Figure 5-6 and Figure 5-7.

Software Configuration 65

Figure 5-6 Access

Figure 5-7 Setting card type

5.3.2 Add One User

You can add users one by one.

On the Access interface, click , then click , and then enter user’s information. Click

Finish

to complete the user adding. See Figure 5-8 and Figure 5-9.

Software Configuration 66

Figure 5-8 Access

Figure 5-9 Add user

5.4

Add Door Group

You can manage doors by grouping doors.

Software Configuration 67

On the Access interface, click , click Add , enter door group name, select a time zone.

Click Finish

to complete the user adding. See Figure 5-10 and Figure 5-11.

Figure 5-10 Access

Figure 5-11 Add door group

Software Configuration 68

5.5

Access Permission Configuration

You can do access permission configuration. There are two options: door group access permission and user access permission. Information of users who are given access permission in the Smart PSS and access standalones will be synchronized.

5.5.1 Giving Permission by Door Group

Select a door group, add users to the door list, and then users on the door list get access

permissions of all doors on the door list. See Figure 5-12 and Figure 5-13.

Figure 5-12 Access

Software Configuration 69

Figure 5-13 User select

Step 1 On the Access interface, click , click Add , click Door Group Permission .

Step 2 Click . Select user department in the Dropdown list , or enter user ID/Name, and then search users. Select users from the users you searched.

Step 3 Click Finish to complete the configuration.

Users without user ID cannot be searched.

5.5.2 Giving Permission by User ID

You can give access permission to a user by selecting a user, and then select door groups for

the user. See Figure 5-14 and Figure 5-15.

Software Configuration 70

Figure 5-14 Access

Figure 5-15 Select door group

Step 1 On the Access interface, click .

Step 2 Click . The Select Door Group interface is displayed.

Step 3 Select user department in the Dropdown list , or enter user ID/Name, and then select a

Software Configuration 71

door list.

Step 4 Click Finish to complete the configuration.

Software Configuration 72

Appendix 1 Cybersecurity Recommendations

Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks. Below are some tips and recommendations on how to create a more secured security system.

Mandatory actions to be taken for basic equipment network security:

1. Use Strong Passwords

Please refer to the following suggestions to set passwords:

 The length should not be less than 8 characters;

Include at least two types of characters; character types include upper and lower case letters, numbers and symbols;

Do not contain the account name or the account name in reverse order;

Do not use continuous characters, such as 123, abc, etc.;

Do not use overlapped characters, such as 111, aaa, etc.;

2. Update Firmware and Client Software in Time

 According to the standard procedure in Tech-industry, we recommend to keep your equipment (such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the

 system is equipped with the latest security patches and fixes. When the equipment is connected to the public network, it is recommended to enable the “auto-check for updates” function to obtain timely information of firmware updates released by the manufacturer.

We suggest that you download and use the latest version of client software.

“ Nice to have” recommendations to improve your equipment network security:

1. Physical Protection

We suggest that you perform physical protection to equipment, especially storage devices.

For example, place the equipment in a special computer room and cabinet, and implement well-done access control permission and key management to prevent unauthorized personnel from carrying out physical contacts such as damaging hardware, unauthorized connection of removable equipment (such as USB flash disk, serial port), etc.

2. Change Passwords Regularly

We suggest that you change passwords regularly to reduce the risk of being guessed or cracked.

3. Set and Update Passwords Reset Information Timely

The equipment supports password reset function. Please set up related information for password reset in time, including the end user’s mailbox and password protection questions. If the information changes, please modify it in time. When setting password protection questions, it is suggested not to use those that can be easily guessed.

4. Enable Account Lock

The account lock feature is enabled by default, and we recommend you to keep it on to guarantee the account security. If an attacker attempts to log in with the wrong password several times, the corresponding account and the source IP address will be locked.

Cybersecurity Recommendations 73

5. Change Default HTTP and Other Service Ports

We suggest you to change default HTTP and other service ports into any set of numbers between 1024~65535, reducing the risk of outsiders being able to guess which ports you are using.

6. Enable HTTPS

We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel.

7. Enable Whitelist

We suggest you to enable whitelist function to prevent everyone, except those with specified IP addresses, from accessing the system. Therefore, please be sure to add your computer’s IP address and the accompanying equipment’s IP address to the whitelist.

8. MAC Address Binding

We recommend you to bind the IP and MAC address of the gateway to the equipment, thus reducing the risk of ARP spoofing.

9. Assign Accounts and Privileges Reasonably

According to business and management requirements, reasonably add users and assign a minimum set of permissions to them.

10. Disable Unnecessary Services and Choose Secure Modes

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to reduce risks.

If necessary, it is highly recommended that you use safe modes, including but not limited to the following services:

 SNMP :

 passwords.

SMTP : Choose TLS to access mailbox server.

FTP : Choose SFTP, and set up strong passwords.

AP hotspot : Choose WPA2-PSK encryption mode, and set up strong passwords.

11. Audio and Video Encrypted Transmission

If your audio and video data contents are very important or sensitive, we recommend that you use encrypted transmission function, to reduce the risk of audio and video data being stolen during transmission.

Reminder: encrypted transmission will cause some loss in transmission efficiency.

12. Secure Auditing

 Check online users: we suggest that you check online users regularly to see if the

 device is logged in without authorization.

Check equipment log: By viewing the logs, you can know the IP addresses that were used to log in to your devices and their key operations.

13. Network Log

Due to the limited storage capacity of the equipment, the stored log is limited. If you need to save the log for a long time, it is recommended that you enable the network log function to ensure that the critical logs are synchronized to the network log server for tracing.

14. Construct a Safe Network Environment

In order to better ensure the safety of equipment and reduce potential cyber risks, we recommend:

 Disable the port mapping function of the router to avoid direct access to the intranet devices from external network.

Cybersecurity Recommendations 74

The network should be partitioned and isolated according to the actual network needs.

If there are no communication requirements between two sub networks, it is suggested to use VLAN, network GAP and other technologies to partition the network, so as to achieve the network isolation effect.

Establish the 802.1x access authentication system to reduce the risk of unauthorized access to private networks.

Cybersecurity Recommendations 75

advertisement

Related manuals

advertisement

Table of contents