Cybersecurity Recommendations Mandatory actions to be taken towards cybersecurity 1. Change Passwords and Use Strong Passwords: The number one reason systems get “hacked” is due to having weak or default passwords. It is recommended to change default passwords immediately and choose a strong password whenever possible.
Page 3
● Only forward the HTTP and TCP ports that you need to use. Do not forward a huge range of numbers to the device. Do not DMZ the device's IP address. ● You do not need to forward any ports for individual cameras if they are all connected to a recorder on site;...
Page 4
Ideally, you want to prevent any unauthorized physical access to your system. The best way to achieve this is to install the recorder in a lockbox, locking server rack, or in a room that is behind a lock and key. 15.
Foreword General This document elaborates on structure, installation, interface and wiring of two-door slave access controller. Safety Instructions The following categorized signal words with defined meaning might appear in the Manual. Signal Words Meaning Indicates a high potential hazard which, if not avoided, will result in death or serious injury.
Page 6
All the designs and software are subject to change without prior written notice. The product updates might cause some differences between the actual product and the Manual. Please contact the customer service for the latest program and supplementary documentation. There still might be deviation in technical data, functions and operations description, or ...
Important Safeguards and Warnings The following description is the correct application method of the device. Please read the manual carefully before use, in order to prevent danger and property loss. Strictly conform to the manual during application and keep it properly after reading. Operating Requirement Please don’t place and install the device in an area exposed to direct sunlight or near heat ...
Overview As a slave controller of access master controller, two-door slave access controller is matched with access master controller and is widely used in banks, prisons and safe places. Its rich functions are as follows: Adopt sliding rail type and lock type installation, convenient installation and maintenance. ...
Packing List Before installation, please check according to Table 2-1. Name Quantity Access controller Installation positioning drawing Accessory kit (screw, expansion pipe and wiring terminal) Quick start guide Certificate of qualification Table 2-1...
Installation Guide System Structure System structure of two-door slave access controller, door lock and reader is shown in Figure 3-1. Figure 3-1 External Dimension Its appearance and dimension is shown in Figure 3-2 and Figure 3-3. The unit is mm.
Figure 3-2 Figure 3-3 Device Installation There are two installation modes. Mode 1: fix the whole device onto the wall with screws. Mode 2: install U-shaped guide rail, and hang the whole device onto the wall (U-shaped guide rail is a self-bought fitting). Mode 1 Installation diagram is shown in Figure 3-4.
Figure 3-4 Mode 2 Installation diagram is shown in Figure 3-5. Figure 3-5 Step 1 Fix the U-shaped guide rail onto the wall with screws. Step 2 Buckle the upper rear part of the device into upper groove of U-shaped guide rail. Step 3 Push the snap joint at the bottom of the device upwards.
whole device can be disassembled smoothly. Figure 3-6 Wiring Description Device wiring diagram is shown in Figure 3-7. Figure 3-7 Interfaces are described in Table 3-1.
Interface Description Interface Description CAN bus Not available at present External extension module Entry reader of door 1 Door sensor and exit button Exit reader of door 1 External alarm input Entry reader of door 2 External alarm output Exit reader of door 2 Lock control output Reboot Internal alarm output...
Interface Wiring Terminal Description sensor sensor input of door 1 PUSH1 Exit button of door 1 Door sensor input of door 1 PUSH2 Exit button of door 2 Door sensor input of door 2 Shared by exit button of door 2 and door sensor input of door 2 Table 3-4 3.5.3 Wiring Description of External Alarm Input...
Figure 3-10 Figure 3-11 Interface Wiring Terminal Description External alarm External alarm output interfaces are able output to connect audible and visual sirens. Table 3-6 3.5.5 Wiring Description of Lock Support 2 groups of lock control outputs; serial numbers after the terminals represent corresponding doors.
Figure 3-14 Interface Wiring Terminal Description COM1 Lock control of door 1 Lock control output COM2 Lock control of door 2 Table 3-7 3.5.6 Wiring Description of Internal Alarm Output Corresponding wiring terminals of internal alarm control output are shown in Table 3-8. Interface Wiring Terminal Description...
Interface Wiring Terminal Cable Color Description Table 3-9 Reader Type Connection Mode Length 485 Reader CAT5e network cable, 485 connection 100m Wiegand Reader CAT5e network cable, Wiegand connection Table 3-10 DIP Switch Set device number and speed with DIP switch. DIP switch is shown in Figure 3-15. Please refer Function No.
Page 20
Table 3-11 for details. the switch is at ON position, meaning 1. the switch is at the bottom, meaning 0. Figure 3-15 Function Description Set device number with binary system. The left is the lowest order. For example: Device 1~5 Number...
Technical Parameters Parameter Specification Processor 32-bit ARM processor Storage Capacity Max User 20,000 Max Record 30,000 Communication Port of Reader Wiegand,RS485 Communication Port Quantity of Connected Reader 4 groups Working Power Rated power 10V~15V DC, rated current 0.75A Real-time Monitoring Support Fire Alarm Linkage Support...
Need help?
Do you have a question about the DHI-ACS2204C-H and is the answer not in the manual?
Questions and answers