Page 2
Foreword General This manual introduces the installation and basic operations of the Face Recognition Access Controller (hereinafter referred to as "access controller"). Safety Instructions The following categorized signal words with defined meaning might appear in the manual. Signal Words Meaning Indicates a high potential hazard which, if not avoided, will result DANGER in death or serious injury.
Page 3
errors in print. If there is any doubt or dispute, we reserve the right of final explanation. Upgrade the reader software or try other mainstream reader software if the manual (in PDF format) cannot be opened. All trademarks, registered trademarks and the company names in the manual are the ...
Important Safeguards and Warnings This chapter describes the contents covering proper handling of the access controller, hazard prevention, and prevention of property damage. Read these contents carefully before using the access controller, comply with them when using, and keep them well for future reference. Operation Requirement Do not expose the access controller to direct sunlight or heat source.
Table of Contents Foreword ..............................I Important Safeguards and Warnings ....................III 1 Overview ..............................1 Introduction ........................... 1 Features ............................1 Application ............................. 1 Dimension and Component ......................2 2 Connection and Installation ......................... 4 Cable Connections ........................4 Installation Notes...........................
Page 6
3.10.9 Reboot ..........................29 USB ............................30 3.11.1 USB Export ........................30 3.11.2 USB Import ........................31 3.11.3 USB Update ........................31 Features ............................ 31 3.12.1 Privacy Setting ........................ 33 3.12.2 Result Feedback ......................34 Record ............................36 Auto Test............................ 37 System Info ..........................
Page 7
4.11.3 Onvif User ........................69 Maintenance ..........................69 Configuration Management ...................... 70 Upgrade ............................ 70 Version Information ........................71 Online User ..........................71 System Log ..........................71 4.17.1 Querying Logs ........................ 72 4.17.2 Backup Logs ........................72 4.17.3 Admin Log ........................72 Exit ............................
Overview Introduction The access controller is an access control panel that supports unlock through faces, passwords, cards, and their combinations. Features LCD display, the resolution of 7-inch access controller is 1024 × 600. Support face unlock, IC card unlock, and password unlock; unlock by period. ...
Networking Dimension and Component Dimensions and components of model X (mm [inch]) Table 1-1 Component description (1) Name Name Temperature monitoring unit Dual cameras Display...
Page 10
Dimensions and components of model Y (mm [inch]) Table 1-2 Component description (2) Name Name Temperature monitoring unit Display IR light Card swiping area Phototransistor White LED illuminator Dual cameras...
Connection and Installation Cable Connections The cable connection of model X and model Y is the same. Here takes model X as an example. The access controller needs to be connected to devices like sirens, readers, and door contacts. Cable connections Table 2-1 Component description Name USB port...
Page 12
Port Cable Color Cable Name Description Blue CASE Tamper alarm input of the external card reader. Wiegand D1 input (connected to external card White reader)/output (connected to controller). Wiegand D0 input (connected to external card Green reader)/output (connected to controller). Connected to external reader and verify card Brown number.
Port Cable Color Cable Name Description purple Black RS-232 receiving port. Black RS-232 sending port. orange Black Connected to the common GND port. blue Black Used for door contact detection. gray CON3 Black PUSH1 Door open button of door No.1 green Black DOOR1_CO...
Page 14
If there is no suitable indoor environment (including areas directly facing indoor and outdoor areas, and outdoor doorways), set up a temporary passage with stable ambient temperature for temperature monitoring. The factors such as sunlight, wind, cold air, and air conditioning cold and warm air can ...
Installation The installation of model X and model Y is the same. This section takes model X as an example. Make sure that the distance between the camera and ground is 1.4 meters. Installation height Installation diagram...
Page 16
Installation Procedure Fix the temperature monitoring unit to the bracket with 3 screws. Drill six holes (five bracket installation holes and one cable entry) in the wall according to holes in the bracket. Fix the bracket on the wall by installing the expansion screws into the six bracket installation holes.
System Operations Basic Configuration Procedure Basic configuration procedure Common Icons Table 3-1 Icon description Icon Description Main menu icon. Confirm icon. Turn to the first page of the list. Turn to the last page of the list. Turn to the previous page of the list. Turn to the next page of the list.
Initialization Administrator and password set on this interface are used to log in to the web management platform. The administrator password can be reset through the email address you entered if the administrator forgets the password. The password must consist of 8 to 32 non-blank characters and contain at least two types ...
Homepage Table 3-2 Homepage description Description Unlock methods: Card, face, fingerprint, and password. When card, face, fingerprint, and password are all set as unlock mode, the password icon will not be displayed at the upper-left corner of the access controller. Date &...
Page 20
Different modes support different unlock methods, and the actual interface shall prevail. Administrator login...
Main menu Unlocking Methods You can unlock the door through faces, passwords, and cards. 3.6.1 Cards Put the card at the card swiping area to unlock the door. 3.6.2 Face Make sure that your face is centered on the face recognition frame, and then you can unlock the door.
on the homepage. Enter the user ID, and then tap Enter the user password, and then tap The door is unlocked. 3.6.4 Administrator Password Enter the administrator password, and then you can unlock the door. There is only one administrator password for one access controller. The administrator password can unlock the door without being subject to user levels, unlock modes, periods, holiday plans, and anti-passback.
Page 23
New User Info Configure parameters on the interface. Table 3-3 New user parameter description Parameter Description Enter user IDs. The IDs can be numbers, letters, and their combinations, and User ID the maximum length of the ID is 32 characters. Each ID is unique. Enter names with at most 32 characters (including numbers, symbols, and Name letters).
Parameter Description Admin: Administrators can unlock the door and also have parameter configuration permission. No matter whether there is an administrator in the access controller, administrator identity authentication is needed. Period You can set a period in which the user can unlock the door. Holiday You can set a holiday plan in which the user can unlock the door.
Page 25
3.8.1.1 Period Config You can configure 128 periods (weeks) whose number range is 0–127. You can set four periods on each day of a period (week). Users can only unlock the door in the periods that you set. 3.8.1.2 Holiday Group You can set group holidays, and then you can set plans for holiday groups.
3.8.2 Unlock There are three unlock modes: unlock mode, unlock by period, and group combination. Unlock modes vary with controller access models, and the actual controller access shall prevail. 3.8.2.1 Unlock Mode When the Unlock Mode is on, users can unlock through cards, faces, passwords, or any one of all the unlocking methods.
Page 27
Enable the Unlock Mode. means enabled. means not enabled. 3.8.2.2 Unlock by Period Doors can be unlocked through different unlock modes in different periods. For example, in period 1, the door can only be unlocked through cards; and in period 2, doors can only be locked through faces.
Page 28
3.8.2.3 Group Combination Doors can only be unlocked by a group or groups that consist of more than two users if the Group Combination is enabled. Select Access > Unlock Mode > Group Combination. Group combination to create a group. Add a group Table 3-4 Group parameter Parameter...
Enable the Group Combination. means enabled. means not enabled. 3.8.3 Alarm Configuration Administrators can manage visitors’ unlock permission through alarm configuration. Select Access > Alarm. Alarm means enabled. means not enabled. Table 3-5 Parameters on the alarm interface Parameter Description After the anti-passback is enabled, users need to verify identities both for...
Parameter Description Timeout door exceeds the Door Sensor Timeout time. The Door Sensor Timeout time range is 1–9999 seconds. Door Sensor Only when the Door Sensor On is enabled can the intrusion alarm and door sensor timeout alarm be triggered. 3.8.4 Door Status There are three options: NO, NC, and Normal.
Page 31
IP address configuration Table 3-6 IP configuration parameters Parameter Description NIC 1/2 Tap to configure parameters for the Ethernet port. IP Address/Subnet The IP address, subnet mask, and gateway IP address must be on the Mask/Gateway IP same network segment. Address DHCP (Dynamic Host Configuration Protocol).
Name Parameter Server IP Address IP address of the managing platform. Port Port number of the managing platform. Device ID Subordinate device number on the managing platform. 3.9.1.3 Wi-Fi You can connect the access controller to the network through Wi-Fi if the access controller has Wi-Fi function.
Wiegand Select Wiegand Input when an external card swipe mechanism is connected to the access controller. Select Wiegand Output when the access controller works as a reader that can be connected to the controller. Table 3-8 Wiegand output Parameter Description The Wiegand Output Type determines the card number or the digit...
3.10.2 Face Parameter Face parameter Tap a parameter and do configuration, and then tap Table 3-9 Face parameter Name Description Face Recognition Face recognition accuracy can be adjusted. The larger the value is, Threshold the higher the accuracy will be. Max.
Name Description This function prevents people from unlocking by human face images Anti-fake Threshold or face models. Set whether to enable the body temperature monitoring. Temp Unit: Select a temperature unit. Temp Rect: Set whether to display the temperature monitoring box or not.
3.10.4 Fill Light Mode Setting You can select fill light modes according to your needs. There are three modes: Auto: When the photo sensor detects that the ambient environment is not dark, the fill light is normally off; otherwise, the fill light will be on. NO: The fill light is normally on.
Make sure that the USB is inserted before exporting user information and updating. During exporting or updating, do not pull out the USB or do other operations; otherwise the exporting or updating will fail. You need to import information from one access controller to the USB before using USB to ...
3.11.2 USB Import Only data in the USB that was exported from one access controller can be imported into another access controller. Select USB > USB Import. USB Import Select the data type that you want to import. Tap OK. Data in the USB flash drive will be imported into the access controller.
Page 39
Features Table 3-10 Feature description Parameter Description Privacy Setting See "3.12.1 Privacy Setting" for details. If the third-party card reader needs to be connected to the access through the wiegand output port, you need to enable the controller Card No. Reverse Card No.
3.12.1 Privacy Setting Privacy setting Table 3-11 Features Parameter Description PWD Reset If the PWD Reset Enable function is enabled, you can reset the password. Enable The PWD Reset function is enabled by default. Hypertext Transfer Protocol Secure (HTTPS) is a protocol for secure communication over a computer network.
Parameter Description Capture If you select ON, when a user unlocks the door, the user’s photo will be Photo automatically taken. This function is ON by default. Clear All Captured Tap the icon, and you can delete all captured photos. Photos Face Privacy Set different levels to blur the standby interface.
Page 42
User Photo & Name User photo & name Only Name Only name...
Search punch records Auto Test When you use the access controller for the first time or when the access controller malfunctioned, you can use auto test function to check whether the access controller can work normally. Do actions according to the prompts.
Auto test When you select Auto Test, the access controller will guide you to do all the auto tests. System Info You can view data capacity, device version, and hardware version of the access controller on the System Info interface.
Web Operations The access controller can be configured and operated on the web. Through the web you can set network parameters, video parameters, and access controller parameters; and you can also maintain and update the system. Initialization You need to set a password and an email address before logging in to the web for the first time. Open IE web browser, and enter the IP address (the default address is 192.168.1.108) of the access controller in the address bar, and then press Enter.
Page 47
When you need to reset the administrator password by scanning the QR code, you need an email address to receive the security code. Click Next. Auto check You can decide whether to select Auto Check or not. It is recommended that Auto Check be selected to get the latest program in time. Click Next.
Login Open IE web browser, enter the IP address of the access controller in the address bar, and press Enter. IE 8 and later are supported. Otherwise you might not log in to the web. Make sure that the computer used to log in to the web is in the same LAN with the ...
Page 49
Tips Read the tips. Click OK. Reset Password Scan the QR code on the interface, and you will get the security code. At most two security codes will be generated by scanning the same QR code. If security codes become invalid, to get more security codes, refresh the QR code. You need to send the content that you get after you scan the QR code to the ...
If wrong security codes are entered for consecutive five times, the administrator will be frozen for five minutes. Enter the security code you have received. Click Next. Reset and confirm the new password. The password should consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special character (excluding ' "...
Page 51
Modifying alarm linkage parameter Table 4-1 Alarm linkage parameter description Parameter Description Alarm Input You cannot modify the value. Keep it default. Name Enter a zone name. There are two options: NO and NC. Alarm Input Type If alarm input type of the alarm device that you purchased is NO, select NO;...
4.4.2 Alarm Log You can view the alarm type and time range in the Alarm Log interface. Select Alarm Linkage > Alarm Log. Alarm log Select a time range and alarm type, and then click Query. Query results Call Configuration The access controller can work as a door station and call other devices.
Page 53
Configure the parameters. Local (1) Table 4-2 Parameter description Parameter Description Device Type The access controller can only work as a unit door station. Enter a number to be identified by the management center. It should be Centre Call No. "888888"...
Parameter Description the same. Mode1: Real-time call but the video and sound may be lagging with poor network. Transmission Mode Mode2: Not real-time call but ensures smooth video and sound. 4.5.2 SIP Server On the web, you can add door stations and indoor stations to the SIP server so that they can talk to each other.
4.5.2.2 Other Device as SIP Server Log in to the web. Select Talkback Setting > SIP Server. Select Server Type as VTO and do not enable SIP Server. Configure the parameters SIP server (2) Table 4-4 SIP server parameter description (1) Parameter Description IP Address...
Page 56
Log in to the web. Select Talkback Setting > VTO No. Management. Click Add. VTO No. management Configure the parameters. Add a door station Table 4-5 Parameter description Parameter Description Rec No. Number of the door station. Register Password Keep the default value.
Parameter Description Build No. Cannot be configured. Unit No. Cannot be configured. IP Address IP address of the door station. Username Web login username and password for the door station. Password Click OK. 4.5.4 Indoor Monitor Management When the access controller works as the SIP server, add all relevant indoor monitors to call them.
Page 58
Add one indoor monitor Table 4-6 Parameter description Parameter Description First Name Last Name To differentiate each indoor monitor. Nick Name Room number of the indoor monitor. It can contain up to five digits and must be the same as the one ...
Click Add. Add indoor monitors in batches 4.5.5 Configuring the Managing Device When the access controller works as the SIP server, add other managing devices to call them. Log in to the web. Select Talkback Setting > VTS Management. Click Add. Add managing devices Enter the information.
Added a managing device Modify a managing device. You need to update the information when the register password or IP address of the managing device change. Click and enter the new password or IP address, and then click OK. Delete a managing device.
Status 4.5.7 Call Logs You can check up to 1024 call logs. Log in to the web. Select Talkback Setting > Call. (Optional) Click Export Data to export all the logs. Call logs...
Data Capacity You can see how many users, cards and face images that the access controller can hold on the Data Capacity interface. Data capacity Video Setting You can set parameters including data rate, image parameters (brightness, contrast, hue, saturation, and more), and exposure on the Video Setting interface. 4.7.1 Data Rate Data rate...
Table 4-7 Data rate parameter description Parameter Description Video Standard There are two options: NTSC and PAL. Select a standard according to the video standard of your region. Channel There are two options: 1 and 2. 1 is white light camera and 2 is IR light camera.
Select Wide Dynamic in the Backlight Mode. Table 4-8 Image parameter description Parameter Description Brightness The larger the value is, the brighter the images will be. Contrast is the difference in luminance or color that makes an object Contrast distinguishable. The larger the contrast value is, the greater the brightness and color contrast will be.
Parameter Description 60Hz: When the utility frequency of alternating current is 60Hz, the exposure is automatically adjusted to make sure that there are no stripes on images. Outdoor: When Outdoor is selected, the exposure mode can be switched. You can select from: Auto: The access controller will automatically adjust brightness of images.
Page 66
Motion detection Press and hold the left mouse button, and then drag the mouse in the red area. The red rectangles are motion detection area. The default motion detection range is all the rectangles. To draw a motion detection area, you need to click Remove All first. ...
When grid number is smaller than the threshold, green line will appear; when grid number is more than the threshold, red line will appear. See. Click OK to finish the setting. 4.7.5 Volume Setting You can adjust volume of the access controller speaker. Volume setting 4.7.6 Image Mode There are three options: indoor, outdoor and other.
Local coding Click OK. Face Detect You can configure human face related parameters on this interface to increase the accuracy of the face recognition. Select Face Detect.
Page 69
Face detect Configure parameters. Table 4-10 Face detect parameter description Parameter Description Face Recognition The larger the value is, the higher the accuracy will be. Threshold Max. Angle of Face The larger the angle is, the wider range of the profiles will be Recognition recognized.
Page 70
Parameter Description value is greater than 19. Infrared Light Adjust IR brightnees by dragging the scroll bar. When a person who does not have the access permission stands in Recognition front of the access controller and gets the face recognized, the Timeout controller will prompt that face recognition failed.
Parameter Description between the monitored temperature and the actual temperature, you can correct the temperature deviation by this parameter. For example, if the monitored temperature is 0.5°C lower than the actual temperature, the correction value is set to 0.5°C; if the monitored temperature is 0.5°C higher than the actual temperature, the correction value is set to -0.5°C.
Table 4-11 TCP/IP Parameter Description Ethernet Card Select to configure parameters of the card. IP Version There is one option: IPv4. MAC Address MAC address of the access controller. Static Set IP address, subnet mask, and gateway address manually. DHCP ...
Click OK to complete the setting. 4.9.3 Register When connected to external network, the access controller will report its address to the server that is designated by the user so that clients can get access to the access controller. Select Network Setting > Auto Register. Select Enable, and enter host IP, port, and sub device ID.
Select Network Setting > P2P. Select Enable to enable P2P function. Click OK to complete the setting. Scan the QR code on your web interface to get the serial number of the access controller. Safety Management 4.10.1 IP Authority Select a cybersecurity mode as needed. IP authority 4.10.2 Systems 4.10.2.1 System Service...
System service 4.10.2.2 Creating Server Certificate Click Create Server Certificate, enter needed information, click Save, and then the access controller will reboot. 4.10.2.3 Downloading Root Certificate Click Download Root Certificate. Select a path to save the certificate on the Save File dialog box. Double-click on the Root Certificate that you have downloaded to install the certificate.
User management 4.11.3 Onvif User Open Network Video Interface Forum (ONVIF), a global and open industry forum with the goal of facilitating the development and use of a global open standard for the interface of physical IP-based security products. When ONVIF is used, administrator, operator, and user have different permission of ONVIF server.
Maintenance Configuration Management You need to do configuration management, select unlock result feedback, Wiegand and serial settings for the access controller. When more than one access controller needs the same configuration, you can configure parameters for them by importing or exporting configuration files. Configuration management Upgrade You can select Auto Check to upgrade the system automatically.
Version Information You can view information including MAC address, serial number, MCU version, web version, security baseline version, and system version. Online User You can view username, IP address, and user login time on the Online User interface. Online user System Log You can view and backup the system log on the System Log interface.
System log 4.17.1 Querying Logs Select a time range and its type, click Query, and logs meet the conditions will be displayed. 4.17.2 Backup Logs Click Backup to back up the logs displayed. 4.17.3 Admin Log Enter Admin ID on the Admin Log interface, click Query, and then you will see the administrator’s operation records.
Admin log Hover the mouse cursor over , and then you can see detailed information of the current user. Exit Click , click OK, and then you will log out the web interface.
The access controller fails to start after power-on. Check whether the 12V power supply is correctly connected, and whether the power button is pressed. Faces cannot be recognized after the access controller powers on. Make sure that Face is selected in the unlock mode. See “3.8.2 Unlock”. Make sure that Face is selected as unlock mode in Access >...
Notes of Temperature Monitoring Warm up the temperature monitoring unit for more than 20 minutes after power-on to enable the temperature monitoring unit to reach thermal equilibrium. Install the temperature monitoring unit in an indoor windless environment, and maintain the ...
Notes of Face Recording/Comparison Before Registration Glasses, hats, and beards might influence face recognition performance. Do not cover your eyebrows when wearing hats. Do not change your beard style greatly if you will use the device; otherwise face ...
Page 84
Do not shake your head or body, otherwise the registration might fail. Avoid two faces appear in the capture frame at the same time. Face Position If your face is not at the appropriate position, face recognition effect might be influenced. Appendix Figure 2-2 Appropriate face position Requirements of Faces Make sure that the face is clean and forehead is not covered by hair.
Page 85
too far from the camera. Appendix Figure 2-3 Head position Appendix Figure 2-4 Face distance When importing face images through the management platform, make sure that image resolution is within the range 150 × 300–600 × 1200; image pixels are more than 500 × 500;...
Cybersecurity Recommendations Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks.
Page 87
We suggest you to change default HTTP and other service ports into any set of numbers between 1024~65535, reducing the risk of outsiders being able to guess which ports you are using. Enable HTTPS We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel.
Page 88
Enable IP/MAC address filtering function to limit the range of hosts allowed to access the device.
Need help?
Do you have a question about the DHI-ASI7213X-V1-T1 and is the answer not in the manual?
Questions and answers