Advertisement

X-Station 2
USER GUIDE
Version 1.03
English
EN 102.00.XS2 V1.03A

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the X-Station 2 XS2-QAPB and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for suprema X-Station 2 XS2-QAPB

  • Page 1 X-Station 2 USER GUIDE Version 1.03 English EN 102.00.XS2 V1.03A...
  • Page 2: Table Of Contents

    CONTENTS Safety instructions Network Instructional icons Network Settings Ethernet Server Serial Setting Introduction Components Device Name and function of each part Cables and connectors Relay How to scan a QR code/barcode Date & Time Daylight Saving Time Device Info Admin Menu Memory Info All Menus USB Memory...
  • Page 3 CONTENTS Product specifications Dimensions XS2-QAPB, XS2-QDPB XS2-APB, XS2-DPB FCC compliance information EU Declaration of Conformity (CE) Appendices Disclaimers Copyright notice Open Source License GNU General Public License TERMS AND CONDITIONS BoringSSL License OpenSSL License Original SSLeay License Licenses for support code Apache License...
  • Page 4: Safety Instructions

    Safety instructions Please read this safety instructions before you use the product to prevent injury to yourself and others and to prevent property damage. The term ‘product’ in this manual refers to the product and any items provided with the product. Instructional icons Warning: This symbol indicates situations that could result in death or severe injury.
  • Page 5 Safety instructions Caution Installation Do not install the product under direct sunlight or UV light. • This may result in product damage, malfunction, discoloration, or deformation. Do not install the power supply cable in a location where people pass by. •...
  • Page 6 Safety instructions RTC battery Discard the battery according to the appropriate regional or international waste regulations. Discard the battery according to the appropriate regional or international waste regulations.
  • Page 7: Introduction

    When assembling the product with the bracket, you can use the included bracket fixing screw (Star Shaped) instead of the product fixing screw for enhanced security. • For more details regarding the product installation, visit the Suprema website (https://www.supremainc.com) and refer to the installation guide.
  • Page 8: Name And Function Of Each Part

    Introduction Name and function of each part Camera LCD screen RF card and mobile access card authentication unit QR code/Barcode authentication unit USB (Type-C) cable slot Cable connector Speaker Name Description Camera Captures actual images. LCD screen Provides UI for operation. RF card and mobile access card Part to scan a RFID card or mobile access card for entrance.
  • Page 9: Cables And Connectors

    Introduction Cables and connectors Cable Name Color ENET TXP White ENET TXN Orange RJ-45 (Ethernet + PoE) ENET RXP Black ENET RXN Yellow TTL GND Gray TTL input TTL IN0 Purple TTL IN1 Brown 485 GND White (Black stripe) RS-485 485 TRXN Yellow (Black stripe) 485 TRXP...
  • Page 10: How To Scan A Qr Code/Barcode

    Introduction How to scan a QR code/barcode You can issue a QR code/barcode to a user and use it as an authentication method. Scan the QR code/barcode properly by following the instructions on the screen to increase the recognition rate. •...
  • Page 11: Admin Menu

    Admin Menu All Menus Press and authenticate with the Admin level credential. Select the desired menu. If the administrator has not been designated, the menu screen will be displayed when you press...
  • Page 12: User

    User Registering user information The user information including credentials can be registered. Press and authenticate with the Admin level credential. → Select USER , and choose a credential you want to register. There are two steps for the user registration. Some options are available after the credential has been registered. •...
  • Page 13: Modifying User Information

    User Modifying User Information User Management or Administrator can modify the registered user information. A card can be added, and PIN and level can be modified. Press and authenticate with the Admin level credential. → Select USER Select your search terms. You can search for a user by All, User ID, Name, and Card / QR Code. Select a user you wish to modify.
  • Page 14: Authentication

    Authentication Auth Mode Modifying Auth Mode You can set the authentication method and schedule according to each credential. You can set up to 3 auth modes. Press and authenticate with the Admin level credential. → Select AUTHENTICATION Auth Mode. Select the authentication mode to modify. When you press , the selected credential will be deleted, and when you press , available credentials to be...
  • Page 15: Delete Auth Mode

    Authentication Delete Auth Mode Press and authenticate with the Admin level credential. → Select AUTHENTICATION Auth Mode. Press and select the authentication mode to delete. You can select multiple options. Press OK. To delete the selected option, press OK. Or, press Cancel to cancel the deletion. Add Auth Mode You can register up to 3 auth modes.
  • Page 16: Qr/Barcode Operation

    Authentication QR/Barcode Operation Press and authenticate with the Admin level credential. Press AUTHENTICATION and then modify items below QR/Barcode Operation. • QR/Barcode: Set to use QR code or Barcode to authenticate. • QR/Barcode Scan Timeout: If you do not scan the QR code or Barcode within the set time, the authentication will fail.
  • Page 17: Display & Sound

    Voice Instruction: Set to use the voice instruction instead of alarm sounds. • Volume: Set the volume. Refer to the BioStar 2 Device SDK webpage on the Suprema Knowledge Base website (kb.supremainc.com/bs2sdk/) for more information on the BioStar 2 Device SDK.
  • Page 18: Network

    Network Network Settings You can change the network settings of the device. Ethernet Press and authenticate with the Admin level credential. → Select NETWORK Ethernet. Change the desired item. • DHCP: Set whether to use DHCP. If DHCP setting is disabled, the user can modify Port, IP Address, Gateway, Subnet Mask, and DNS.
  • Page 19: Server

    Network Server Press and authenticate with the Admin level credential. → Select NETWORK Server. Change the desired item. → • Device Server: You can send a connection signal from the device to a server with the input information → directly. When you select Server Device, Server IP, Server URL and Server Port cannot be entered.
  • Page 20: Device

    Device Relay You can set the open time and the input port of the exit button in the device. Press and authenticate with the Admin level credential. → Select DEVICE Relay. • Relay: You can set whether relay is enabled or not. To set the open time and the input port of the exit button, activate this option.
  • Page 21: Daylight Saving Time

    Device Daylight Saving Time You can use the device by applying daylight saving time. Set the start and end time correctly. Press and authenticate with the Admin level credential. → Select DEVICE Daylight Saving Time and press to add additional daylight-saving time. Select the desired item and change the setting.
  • Page 22: Device Info

    Device Device Info You can view the model name, device ID, serial number, firmware version of device ID, and MAC address. Press and authenticate with the Admin level credential. → Select DEVICE Device Info. You can view the information including Model Name, Device ID, Serial No., HW, FW, Kernel, and MAC.
  • Page 23: Usb Memory

    Device USB Memory Connect USB Memory and import user information to the device or export log and user information from the device. Upgrade the firmware. Press and authenticate with the Admin level credential. → Select DEVICE USB Memory. Select the desired item and change the setting. •...
  • Page 24: Secure Tamper

    Device Secure Tamper When the tamper is turned on, you can set to delete the entire user, the entire log, and the security key. Press and authenticate with the Admin level credential. Select DEVICE. Activate Secure Tamper to delete data of all registered users, all logs, and secure keys when a temper event occurs. Restart Device The user can restart the device.
  • Page 25: Event Log

    Event Log Search Log You can set a condition and search a log. Press and authenticate with the Admin level credential. Select EVENT LOG. All event logs appear. Press to search a specific log and change the condition. Press OK. A log that matches the condition will be displayed on the screen. Delete All Logs You can delete all saved logs.
  • Page 26: View Log Usage

    Event Log View Log Usage You can check the status of log usage. Press and authenticate with the Admin level credential. → Select EVENT LOG . You can check the capacity of event and image logs on the device.
  • Page 27: Troubleshooting

    Troubleshooting Checklist before reporting a failure Category Problem Solution • If the terminal and the bracket are far away from each other, the device The power is being may not operate due to the temper switch. Power supplied but the device does not operate.
  • Page 28: Product Specifications

    Product specifications Category Feature Specification • XS2-DPB, XS2-QDPB: 125 kHz EM & 13.56 MHz MIFARE, MIFARE Plus, DESFire EV1/EV2*, FeliCa RF Option • XS2-APB, XS2-QAPB: 125 kHz EM, HID Prox & 13.56 MHz MIFARE, MIFARE Plus, DESFire EV1/EV2*, FeliCa, iCLASS SE/SR/Seos Credential RF read range**...
  • Page 29 Product specifications • Power: DC 12 V (Max. 0.8 A) or DC 24 V (Max. 0.45 A) Power • Adapter recommended specifications: DC 12 V (± 10%) with a minimum of 1,500 mA or DC 24 V (±10%) with a minimum of 800 mA*** Min.: 3 V Switch input VIH...
  • Page 30: Dimensions

    Product specifications Dimensions XS2-QAPB, XS2-QDPB (Unit: mm) 35.2 69.6 XS2-APB, XS2-DPB 152.5 27.2 69.6...
  • Page 31: Fcc Compliance Information

    This product is CE marked according to the provisions of the Radio Equipment Directive (RED) 2014/53/EU. Hereby, Suprema Inc. declares that this product is in compliance with the essential requirements and other relevant provisions of Radio Equipment Directive (RED) 2014/53/EU.
  • Page 32: Appendices

    Information in this document is provided in connection with Suprema products. • The right to use is acknowledged only for Suprema products included in the terms and conditions of use or sale for such products guaranteed by Suprema. No license, express or implied, by estoppel or otherwise, to any intellectual property is granted by this document.
  • Page 33: Open Source License

    Appendices Open Source License • The software of this product is based on "Linux Kernel 4.x", which is licensed under GPL. As for GPL, please refer to GNU General Public License in this manual. • This product uses the "BoringSSL", which is licensed under the OpenSSL and Original SSLeay licenses. As for the OpenSSL and Original SSLeay licenses, please refer to BoringSSL License in this manual.
  • Page 34: Terms And Conditions

    Appendices TERMS AND CONDITIONS 0. Definitions. “This License” refers to version 3 of the GNU General Public License. “Copyright” also means copyright-like laws that apply to other kinds of works, such as semiconductor masks. “The Program” refers to any copyrightable work licensed under this License. Each licensee is addressed as “you”. “Licensees”...
  • Page 35 Appendices otherwise remains in force. You may convey covered works to others for the sole purpose of having them make modifications exclusively for you, or provide you with facilities for running those works, provided that you comply with the terms of this License in conveying all material for which you do not control copyright. Those thus making or running the covered works for you must do so exclusively on your behalf, under your direction and control, on terms that prohibit them from making any copies of your copyrighted material outside their relationship with you.
  • Page 36 Appendices c) Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source. This alternative is allowed only occasionally and noncommercially, and only if you received the object code with such an offer, in accord with subsection 6b. d) Convey the object code by offering access from a designated place (gratis or for a charge), and offer equivalent access to the Corresponding Source in the same way through the same place at no further charge.
  • Page 37 Appendices c) Prohibiting misrepresentation of the origin of that material, or requiring that modified versions of such material be marked in reasonable ways as different from the original version; or d) Limiting the use for publicity purposes of names of licensors or authors of the material; or e) Declining to grant rights under trademark law for use of some trade names, trademarks, or service marks;...
  • Page 38 Appendices 11. Patents. A “contributor” is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based. The work thus licensed is called the contributor's “contributor version”. A contributor's “essential patent claims” are all patent claims owned or controlled by the contributor, whether already acquired or hereafter acquired, that would be infringed by some manner, permitted by this License, of making, using, or selling its contributor version, but do not include claims that would be infringed only as a consequence of further modification of the contributor version.
  • Page 39 Appendices 14. Revised Versions of this License. The Free Software Foundation may publish revised and/or new versions of the GNU General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
  • Page 40: Boringssl License

    Appendices BoringSSL License BoringSSL is a fork of OpenSSL. As such, large parts of it fall under OpenSSL licensing. Files that are completely new have a Google copyright and an ISC license. This license is reproduced at the bottom of this file. Contributors to BoringSSL are required to follow the CLA rules for Chromium: https://cla.developers.google.com/clas Files in third_party/ have their own licenses, as described therein.
  • Page 41: Original Ssleay License

    Appendices Original SSLeay License Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code;...
  • Page 42: Licenses For Support Code

    Appendices The code in third_party/fiat carries the MIT license: Copyright (c) 2015-2016 the fiat-crypto authors (see https://github.com/mit-plv/fiat-crypto/blob/master/AUTHORS). Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the...
  • Page 43: Apache License

    Appendices Apache License Version 2.0, January 2004 (http://www.apache.org/licenses/) TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 0. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. "Licensor"...
  • Page 44 Appendices 3. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions: (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and (b) You must cause any modified files to carry prominent notices stating that You changed the files;...
  • Page 45 QR code. http://www.supremainc.com/en/about/contact-us.asp © 2022 Suprema Inc. Suprema and identifying product names and numbers herein are registered trade marks of Suprema, Inc. All non-Suprema brands and product names are trademarks or registered trademarks of their respective companies.

Table of Contents