Deployment Manual Foreword Safety Instructions The following categorized signal words with defined meaning might appear in the Guide. Signal Words Meaning Indicates a high potential hazard which, if not avoided, will result DANGER in death or serious injury. Indicates a medium or low potential hazard which, if not WARNING avoided, could result in slight or moderate injury.
Page 3
Deployment Manual All the designs and software are subject to change without prior written notice. The product updates might cause some differences between the actual product and the manual. Please contact the customer service for the latest program and supplementary documentation. There still might be deviation in technical data, functions and operations description, or ...
Deployment Manual Important Safeguards and Warnings Electrical Safety All installation and operation should conform to your local electrical safety codes. The power source shall conform to the Safety Extra Low Voltage (SELV) standard, and supply power with rated voltage which conforms to Limited power Source requirement according to IEC60950-1.
Page 5
Deployment Manual It is recommended to ground the device to enhance reliability. Do not touch the image sensor (CMOS) directly. Dust and dirt could be removed with air blower, or you can wipe the lens gently with soft cloth that moistened with alcohol. Device body can be cleaned with soft dry cloth, which can also be used to remove ...
Deployment Manual Overview The solution aims at body temperature monitoring and alarm at various checkpoints such as railway stations, airports and community entrances, quick temperature recognition rate, easy installation and high cost performance. In this solution, face recognition terminals measure human body temperature and recognize faces (hereinafter referred to as TPC), and then upload the measurement results attached with face and identification information to NVR, or the central platform Express, or mobile App DMSS, so as to notify inspectors and provide evidences.
Deployment Manual Network Diagram There are three combinations of products. See the topologies below. Face Recognition Terminal – Express Face recognition terminal and Express server are connected to the network switch. The turnstile connects to the terminal through RS–485 or Weigand. Images and videos are stored in the disks of Express server.
Page 10
Deployment Manual Figure 2-2 Face Recognition Terminal–NVR NVR5-I Switch/Router Magnetic Lock RS485/ Exit Button Weigand Reader Face Recognition Face Recognition Terminal Face Recognition Terminal Terminal (Standing) (Turnstile) (Wall Mounted) Face Recognition Terminal – DMSS Face recognition terminal is connected to the network switch. DMSS is installed on the mobile devices such as phone.
Page 11
Deployment Manual Figure 2-3 Face Recognition Terminal–DMSS DMSS Wireless Magnetic Lock RS485/ Exit Button Weigand Reader Face Recognition Terminal Face Recognition Terminal Face Recognition Terminal (Standing) (Turnstile) (Wall Mounted)
Deployment Manual Deployment Process Before deployment, confirm whether all the devices work properly, and then you can start deployment and configuration. You can install all the devices with the provided manual or guide. Step 1 Confirm the device models and device quantity. For details, see the material list of the solution.
Page 13
Deployment Manual Figure 3-3 Match installation position Step 4 Mark the installation positions on the corresponding packing boxes as planned, and then install them to proper locations. See Figure 3-4 and "4 Installation." Figure 3-4 Mark installation position Step 5 Make sure that all the devices are properly connected, and then power up all the devices.
Deployment Manual Installation Follow the product manuals to install and connect the products. Pay attention to the following considerations. 4.1 Installing Express 4.1.1 Installing Express Service Follow this table to prepare a server for installing Express service. Table 4-1 Server configuration requirement DSS Server Configuration Requirement CPU: Intel®...
Page 15
Deployment Manual Figure 4-1 Select installation path Step 3 Click Browse and select installation path, click Install. The system displays installation progress, the whole installation needs 5-10 minutes. See Figure 4-2 after installation is completed. The server starts automatically after installation.
Deployment Manual Figure 4-2 Installation completed Step 4 Click Run. The network card selection interface is displayed. Step 5 Select a network card, and then click Next. The security setting interface is displayed. Step 6 Enable or disable TLS1.0 protocol as needed. If TLS1.0 is disabled on Express, to use the platform, you need to enable TLS1.1 and TLS1.2 on the browser.
Page 17
Deployment Manual Step 1 Enter server IP address into browser, and then click Enter. Figure 4-3 Download client Step 2 Double-click , run or download client according to interface prompt. Table 4-3 Download operation Operation Description Download temporary file, you can install after it is checked. Save Download installation package to IE default path.
Page 18
Deployment Manual Figure 4-4 Confirm agreement Step 4 Select I have read and agree the DSS agreement, and then click Next. Figure 4-5 Select installation path Step 5 Click Browse and select installation path, click Install. The system displays installation progress, and the installation takes about 2-3 minutes. The interface is shown after installation is completed.
Deployment Manual Do not select Generate Shortcuts if it is not necessary. Figure 4-6 Installation completed 4.1.3 Logging in to Express You can configure and manage the system remotely by using the client. Step 1 Double-click the shortcut icon on the server desktop, or click Run on the program interface after the program installation is completed.
Page 20
Deployment Manual Step 6 Log in client again, enter license configuration interface, and make sure the License is the same as applied.
Deployment Manual 4.2 Installing Face Recognition Terminal Installation site and installation type are essential to the final performance, and this section introduces how to select proper installation site and installation type. The face recognition terminal can be applied to industrial park, scenic area, school, residential community and office building etc.
Here we introduce how to initialize NVR with ConfigTool. 5.1.1 Initializing NVR with ConfigTool Initialize your NVR with ConfigTool for first-time use. To acquire the tool, go to Dahua official website, and then select Support > Download Center > ToolBox, follow the on-screen instructions to download and install the tool.
Deployment Manual Figure 5-1 Password setting Step 6 Set and confirm the password, then enter a valid email address, and then click Next. Password can be modified or reset in System Settings. Step 7 Select the options according to your needs, and then click OK. Click the success icon ( ) or the failure icon ( ) for the details.
Deployment Manual Figure 5-2 Modify IP Address Step 3 Select Static mode, and then enter start IP, subnet mask, and gateway. All the IP addresses will be modified sequentially from the start IP. If DHCP server is available in the network, devices will automatically obtain IP addresses from DHCP server when you select DHCP.
Page 26
Deployment Manual Figure 5-3 Update Step 3 Click Search setting. Figure 5-4 Search setting Step 4 Select the network segment for the target device. If the IP address of the target device is in the current network segment, select Current Segment Search, and then enter the user name and the password of the target camera.
Page 27
Deployment Manual Figure 5-5 Current segment search If the IP address of the target device is in other network segment, select Other Segment Search, then enter the start IP address and end IP address of the network segment you need, and then enter the user name and the password of the target camera.
Page 28
Deployment Manual Figure 5-7 Browse Step 8 Update the devices. Update the devices one by one: Click Upgrade, and the system starts updating. You can see the update progress. Update the devices in batches: Click OK, and the system starts updating. ...
ConfigTool Initialize your face recognition terminal with ACS ConfigTool for first-time use. To acquire the tool, go to Dahua official website, and then select Support > Download Center > ToolBox, follow the on-screen instructions to download and install the tool.
Page 30
Deployment Manual Figure 5-9 Modify IP Step 3 Click Search setting. Step 4 Enter the start IP address and end IP address of the network segment in which you want to search devices, and then click OK. All the devices found in the network segment are listed. Step 5 Select one or several devices with Status shows Uninitialized, and then click Initialize.
Deployment Manual Step 7 Set and confirm the password of the devices, then enter a valid email address, and then click Next. Password can be modified or reset in System Settings. Step 8 Select the options according to your needs, and then click OK. The Initialization interface is displayed after initialization is completed.
Deployment Manual 5.2.3 Updating System ACSConfig supports updating devices one by one or in batches. Updating devices one by one is ideal when few devices are involved, and login username and password of the devices are different. Updating devices in batches is recommended when multiple devices are involved, and login username and passwords of cameras are the same.
Page 33
Deployment Manual If the IP address of the target device is in other network segment, select Other Segment Search, then enter the start IP address and end IP address of the network segment you need, and then enter the user name and the password of the target camera.
Page 34
Deployment Manual Figure 5-16 Select update file Step 8 Update the devices. Update the devices one by one: Click Upgrade, and the system starts updating. You can see the update progress. Update the devices in batches: Click OK, and the system starts updating. Step 9 After restarting the device, click the refresh button to confirm the system version.
Deployment Manual Configuration and Commissioning Configure the basic settings, and then carry out commissioning to make sure that your configurations are correct. Skip irrelevant sections if you do not use the corresponding product. For example, if you do not use NVR, skip "6.2 Configuring NVR." 6.1 Configuring Face Recognition Terminal To achieve access control by face recognition, temperature monitoring and mask detection, you need to set and enable the relevant parameters, and create face database on the terminal.
Deployment Manual Figure 6-1 Unlock modes Step 3 Tap the mode you need. For example, Face, or Face and Card. Step 4 Tap to save the settings. 6.1.2 Creating Face Database Create a face database (by USB flash or by Express) to the face recognition terminal to let the terminal compare the detected faces against the face database for access control accordingly.
Page 37
Deployment Manual Figure 6-2 New User Info Tap Face, and then take a face picture. Make sure that your face is centered on the face frame and the access controller will automatically take a face picture. Perform 1) to 3) to collect face images of all the users you need to add. For example, collect face images of all the students.
Page 38
Deployment Manual Figure 6-3 USB Import Tap Face Feature Value, and then tap OK. Face images in the terminal will be exported into the USB disk. Figure 6-4 USB Import Step 3 Import the face database to other face recognition terminals one by one.
Deployment Manual Insert the USB disk that has the first face database into another face recognition terminal, and then perform the following steps to import the database. On the local interface, tap > to log in. Tap USB > USB Import. Figure 6-5 USB Import Tap Face Feature Value, and then tap OK.
Page 40
Deployment Manual Figure 6-6 Face parameter (local interface) Step 3 Set the following parameters. For the introduction to more parameters on the Face Parameter interface, see the user's manual. Table 6-1 Face detect parameter description Parameter Description Keep it off ( ) here.
Page 41
Deployment Manual Tap the that corresponds to Temperature Monitoring , and then set the following parameters. Temp Unit: Select a temperature unit between ° C and ° F. Temp Rect: Set whether to display the temperature monitoring box or not. ...
Deployment Manual 6.1.4 Commissioning 6.1.4.1 Face Recognition, Temperature Measurement Mask Detection Preparation Face recognition terminal is correctly installed and connected. Face recognition terminal is correctly initialized. Face database, face recognition parameters are correctly configured. Objectives The face recognition terminal can correctly recognize human face, measure face temperature, and detect mouth mask.
Page 43
Deployment Manual 6.1.4.2 Normal Body Temperature Preparation Face recognition terminal and turnstile are correctly installed and connected. Face recognition terminal is correctly initialized. Unlock mode, face database, face recognition parameters are correctly configured. Objectives The turnstile opens when a person with normal body temperature is recognized. Procedure For a person with normal temperature (within the temperature threshold, check how to set threshold value in "6.1.3 Configuring Face Recognition Parameters"), check whether the face...
Page 44
Deployment Manual 6.1.4.4 Mask Detection Preparation Face recognition terminal and turnstile are correctly installed and connected. Face recognition terminal is correctly initialized. Unlock mode, face database, face recognition parameters are correctly configured. Objectives The turnstile keeps closed, or the face recognition terminal gives a warning when a person is detected wearing no mouth mask.
Deployment Manual 6.2 Configuring NVR To monitor face recognition, temperature measurement and mouth mask, you need to add the face recognition terminal to NVR, and enable those functions. You cannot create face database on NVR. For the "face recognition terminal – NVR" solution, you need to create face database on the face recognition terminal.
Page 46
Deployment Manual Figure 6-10 Add face recognition terminal (2) Table 6-2 Parameter description Icon/Parameter Description Displays the channel No. on your NVR to which you connect the target Channel camera to. Click , or double-click the line corresponding to the device to modify Edit device information, such as channel, manufacturer, IP address, TCP port, user name, password, remote channel No., and decode buffer.
Page 47
Deployment Manual Click Manual Add. Figure 6-11 Manual add Set parameters. Table 6-3 Manual add parameters Parameter Description Displays the channel No. on your NVR to which you connect the target Channel device to. Select Private. Manufacturer Supported protocol might vary with different models, and the actual product shall prevail.
Deployment Manual 6.2.2 Enabling Temperature and Mask Monitoring Step 1 Log in to NVR, and then select AI > Parameters > Door Access Control. Step 2 Select the camera channel from the Channel drop-down list. Step 3 Click Temp.Not within Thresholds or Mask Warning. Figure 6-12 Set temperature or mask monitoring Step 4 Set the following parameters.
Deployment Manual 6.2.3 (Optional) Enabling Fahrenheit If you use Fahrenheit, you need to enable Fahrenheit both on the face recognition terminal and the NVR. For how to enable Fahrenheit on the face recognition terminal, see "6.1.3 Configuring Face Recognition Parameters." Step 1 Log in to the local interface of NVR.
Deployment Manual Objectives NVR displays the results of face recognition, temperature measurement and mask detection in real-time. Procedure On the local interface of NVR, go to the Live interface, and select the face recognition terminal channel. Stand in front of the terminal, and then check whether the NVR shows body temperature and mouth mask monitoring results.
Deployment Manual Figure 6-15 Storage manager Step 3 Click The system pops out the dialog of setting storage space size and type. Figure 6-16 Create storage space Step 4 Set storage space size, select storage space type and click Platform exclusive storage space is created on the disk. The exclusive storage space is displayed in the red box.
Page 52
Deployment Manual 6.3.2.1 Adding by Search Select this method when the device you are going to add can be detected on Express, thus you do not need to enter the device parameters. If you have multiple devices to add, and they have the same username and password, you can select this method to add them in batches.
Page 53
Deployment Manual Figure 6-20 Add Device Step 6 Enter login username and password, and then click OK. 6.3.2.2 Adding Manually Select this method when you add a single device, or the username and password of the devices are different, or the added device is not in the same segment. Step 1 Click Device on the client homepage.
Deployment Manual TCP protocol communication provides service port, and keeps it in Port accordance with added device. Organization Select organization node of added device. When register by IP address or ONVIF mode, set the IP address of added IP Address device.
Page 55
Deployment Manual 6.3.4 Configuring Video Recording Plan on Express Step 1 Log in to Express Client. Step 2 Click Config on the client homepage. Step 3 From the device tree on the left, select camera channel of the face recognition terminal, and then click Record Configuration.
Deployment Manual Figure 6-22 Record Step 4 Click The icon is switched to , enable record plan. Step 5 Set Position, Stream Type and Time Template. Select Store on Server for Position. Step 6 Click OK. Figure 6-23 Record info 6.3.5 Configuring People Information Register people information such as face image and card No.
Page 57
Deployment Manual Figure 6-24 Add a person Move the mouse cursor to the picture section, and then click Upload. Follow the instructions on the interface to upload a picture. If the PC comes with a camera, click Snapshot to take a face snapshot and upload it. Fill in personnel information as necessary.
Page 58
Deployment Manual Figure 6-25 Issue card by entering card No. Enter card number and click OK. The card is added. Figure 6-26 Added card By card reader Click Figure 6-27 Issue card by card reader Select Card Issuer or Device, and then click OK. If you select Card Issuer, make sure you have connected a card issuer.
Page 59
Deployment Manual Step 6 Add face images. Click Add next Face Comparison, and then select a face image. You can click Add again to upload one more face image for the person, a side face image for example, so as to increase recognition accuracy, Step 7 Click the Authorize tab.
Page 60
Deployment Manual Unzip the template, provide the face images, name them, and then fill people info in the template. When filling the template, confirm to the rules as descripted in the file. Zip the file again. Go back to Express, and then on the Import interface (see Figure 6-29), click Import File to upload the ZIP file.
Deployment Manual Figure 6-31 Add a door rule Name the rule, select the check boxes of the people you need to select, and then select the door groups you want to assign to them. Click OK. The selected people then have the right of access through the selected doors. 6.3.6 Configuring Door Unlock Method Set door unlock method, such as face recognition or face recognition + card.
Page 62
Deployment Manual Step 4 Select or or and from the Unlock Method drop-down list. Select or: The door can be opened by any of the selected methods. Select and: The door opens after all the selected methods are performed and passed.
Deployment Manual 6.3.7 Configuring Temperature and Mask Alarms Configure temperature and mask alarms. Otherwise you cannot receive the alarms on Express. Step 1 On the Homepage of Express, click Config. Step 2 Select the Door channel under the face recognition terminal, and then click Event Configuration.
Deployment Manual 6.3.8 Commissioning 6.3.8.1 Live Monitoring Preparation Face recognition terminal is correctly installed and connected. Face recognition terminal is added to Express. The video channel number of the face recognition terminal is modified, and the feature of the video channel is set to IVS alarm.
Page 65
Deployment Manual 6.3.8.2 Viewing Access Control Records (with Temperature and Mask-wearing Info) Preparation Face recognition terminal and turnstile are correctly installed and connected. Face database and face recognition parameters are correctly configured on the face recognition terminal. Face recognition terminal is added to Express.
Deployment Manual Figure 6-36 History access control records 6.4 Configuring DMSS DMSS is a mobile App that can manage your system and provide video monitoring wherever you are. Skip this chapter if you do not use DMSS. Make sure that DMSS can visit the face recognition terminal. For example, if the face recognition terminal is in the LAN, you can set wireless LAN on the router for DMSS;...
Page 67
Deployment Manual Log in to the web interface of the face recognition terminal, and then select Network Setting > P2P. Select Enable to enable P2P function. Click OK. Step 3 Enter device name, device password, and save settings. Figure 6-37 Add face recognition terminal (SN/scan) 6.4.1.2 Adding by IP/Domain You can add devices by entering IP of the device or specific domain.
Deployment Manual Figure 6-39 Select device SN Step 2 Tap the device SN as needed. The device type interface is displayed. Step 3 Select the device type. Figure 6-40 Add face recognition terminal (search online) Step 4 Enter information as needed, and then save settings. 6.4.2 Configuring Video/Image Storage Store video/image on SD card or DMSS cloud (you need to purchase SD card or DMSS cloud separately).
Deployment Manual Figure 6-41 Subscribe alarm message 6.4.4 Commissioning Preparation Face recognition terminal and turnstile are correctly installed and connected. Unlock mode, face database and face recognition parameters are correctly configured on the face recognition terminal. Face recognition terminal is added to DMSS. ...
IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks. Below are some tips and recommendations from Dahua on how to create a more secured security system.
Page 72
Deployment Manual Change Default HTTP and Other Service Ports We suggest you to change default HTTP and other service ports into any set of numbers between 1024~65535, reducing the risk of outsiders being able to guess which ports you are using. Enable HTTPS We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel.
Page 73
Deployment Manual Disable the port mapping function of the router to avoid direct access to the intranet devices from external network. The network should be partitioned and isolated according to the actual network needs. If there are no communication requirements between two sub networks, it is suggested to use VLAN, network GAP and other technologies to partition the network, so as to achieve the network isolation effect.
Need help?
Do you have a question about the DHI-ASI7213X-T1 and is the answer not in the manual?
Questions and answers