Dahua ASI7223X-A-T1 Quick Start Manual

Dahua ASI7223X-A-T1 Quick Start Manual

Face recognition terminal

Advertisement

Quick Links

Face Recognition Terminal
Quick Start Guide
V1.0.0

Advertisement

Table of Contents
loading

Summary of Contents for Dahua ASI7223X-A-T1

  • Page 1 Face Recognition Terminal Quick Start Guide V1.0.0...
  • Page 2: Foreword

    Foreword General This manual introduces the installation and basic operation of the Face Recognition Terminal (hereinafter referred to as "terminal"). Safety Instructions The following categorized signal words with defined meaning might appear in the manual. Signal Words Meaning Indicates a potential risk which, if not avoided, could result in property damage, data loss, lower performance, or unpredictable CAUTION result.
  • Page 3: Important Safeguards And Warnings

    Important Safeguards and Warnings This chapter describes the contents covering proper handling of the terminal, hazard prevention, and prevention of property damage. Read these contents carefully before using the terminal, comply with them when using, and keep it well for future reference. Operation Requirement ...
  • Page 4: Table Of Contents

    Table of Contents Foreword ..............................I Important Safeguards and Warnings ..................... II 1 Dimensions and Components ......................1 2 Installation .............................. 2 Installation Notes........................... 2 Installation Drawings ........................3 Cable Connections ........................3 Installation ............................. 5 3 System Operation ..........................6 Initialization ...........................
  • Page 5: Dimensions And Components

    Dimensions and Components Figure 1-1 Dimensions and components (mm [inch]) Table 1-1 Component description Name Dual camera IR light Phototransistor White fill light Display Dimensions and Components 1...
  • Page 6: Installation

    Installation Installation Notes If there is light source 0.5 meters away from the device, the minimum illumination should  be no less than 100Lux. It is recommended that the device is installed indoors, at least 3 meters away from  windows and doors and 2 meters away from lights.
  • Page 7: Installation Drawings

    Figure 2-3 Places not recommended Installation Drawings Figure 2-4 Installation drawings (mm[inch]) Cable Connections  Check if the access control security module is enabled in Function > Security Module. If the security module is enabled, you need to purchase access control security module separately.
  • Page 8 Figure 2-5 Cable connection Table 2-1 Component description Name USB port Power port Ethernet port Installation 4...
  • Page 9: Installation

    Installation Figure 2-6 Installed on the gate machine Table 2-2 Component description Name Ornamental cover M5 screw Waterproof silica gel plug Terminal Cable Installation Procedure Step 1 Thread cable through the turnstile. Step 2 Put the waterproof silica gel plug on the cable. Step 3 Fix the terminal onto the turnstile with M5 screw.
  • Page 10: System Operation

    System Operation Initialization Administrator password and an email should be set the first time the terminal is turned on; otherwise the terminal cannot be used. See Figure 3-1. Figure 3-1 Initialization  The administrator password can be reset through the email address you entered if the administrator forgets the administrator password.
  • Page 11 Figure 3-2 New user Step 2 Configure parameters on the interface. See Table 3-1. Table 3-1 New user parameter description Parameter Description You can enter user IDs. The IDs consist of 32 characters (including numbers User ID and letters), and each ID is unique. You can enter names with at most 32 characters (including numbers, symbols, Name and letters).
  • Page 12 Parameter Description You can select a user level for new users. There are two options.  User: Users only have door unlock authority.  Admin: Administrators can not only unlock the door but also have parameter configuration authority. Level In case that you forget the administrator password, you had better create more than one administrator.
  • Page 13: Web Operation

    Web Operation The terminal can be configured and operated on the web. Through the web you can set parameters including network parameters, video parameters, and terminal parameters; and you can also maintain and update the system. Login You need to set a password and an email address before logging in to the web for the first time. Password you set is used to log in to the web, and the email is used to retrieve passwords.
  • Page 14: Appendix 1 Notes Of Face Recording

    Appendix 1 Notes of Face Recording Before Registration  Glasses, hats, and beards might influence face recognition performance.  Do not cover your eye brows when wearing hats. Do not change your beard style greatly if you will use the device; otherwise face ...
  • Page 15  Do not shake your head or body, or the registration might fail.  Avoid two faces appear in the box at the same time. Face Position If your face is not at the appropriate position, face recognition effect might be influenced. Appendix figure 1-2 Appropriate face position Requirements of Faces Make sure that the face is clean and forehead is not covered by hair.
  • Page 16 too far from the camera. Appendix figure 1-3 Head position Appendix figure 1-4 Face distance  When importing face images through the management platform, make sure that image resolution is within the range 150 × 300–600 × 1200; image pixels are more than 500 × 500;...
  • Page 17: Appendix 2 Cybersecurity Recommendations

    Appendix 2 Cybersecurity Recommendations Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks.
  • Page 18 Change Default HTTP and Other Service Ports We suggest you to change default HTTP and other service ports into any set of numbers between 1024~65535, reducing the risk of outsiders being able to guess which ports you are using. Enable HTTPS We suggest you to enable HTTPS, so that you visit web service through a secure communication channel.
  • Page 19  The network should be partitioned and isolated according to the actual network needs. If there are no communication requirements between two sub networks, it is suggested to use VLAN, network GAP and other technologies to partition the network, so as to achieve the network isolation effect. ...

Table of Contents