CONTENTS Safety instructions Network Instructional icons Network Settings Ethernet Server Serial Setting Introduction Components Device Name and function of each part Cables and connectors Relay How to scan a QR code/barcode Date & Time Daylight Saving Time Device Info Admin Menu Memory Info All Menus USB Memory...
Page 3
CONTENTS Product specifications Dimensions XS2-QAPB, XS2-QDPB XS2-APB, XS2-DPB FCC compliance information EU Declaration of Conformity (CE) Appendices Disclaimers Copyright notice Open Source License GNU General Public License TERMS AND CONDITIONS BoringSSL License OpenSSL License Original SSLeay License Licenses for support code Apache License...
Safety instructions Please read this safety instructions before you use the product to prevent injury to yourself and others and to prevent property damage. The term ‘product’ in this manual refers to the product and any items provided with the product. Instructional icons Warning: This symbol indicates situations that could result in death or severe injury.
Page 5
Safety instructions Caution Installation Do not install the product under direct sunlight or UV light. • This may result in product damage, malfunction, discoloration, or deformation. Do not install the power supply cable in a location where people pass by. •...
Page 6
Safety instructions RTC battery Discard the battery according to the appropriate regional or international waste regulations. Discard the battery according to the appropriate regional or international waste regulations.
When assembling the product with the bracket, you can use the included bracket fixing screw (Star Shaped) instead of the product fixing screw for enhanced security. • For more details regarding the product installation, visit the Suprema website (https://www.supremainc.com) and refer to the installation guide.
Introduction Name and function of each part Camera LCD screen RF card and mobile access card authentication unit QR code/Barcode authentication unit USB (Type-C) cable slot Cable connector Speaker Name Description Camera Captures actual images. LCD screen Provides UI for operation. RF card and mobile access card Part to scan a RFID card or mobile access card for entrance.
Introduction How to scan a QR code/barcode You can issue a QR code/barcode to a user and use it as an authentication method. Scan the QR code/barcode properly by following the instructions on the screen to increase the recognition rate. •...
Admin Menu All Menus Press and authenticate with the Admin level credential. Select the desired menu. If the administrator has not been designated, the menu screen will be displayed when you press...
User Registering user information The user information including credentials can be registered. Press and authenticate with the Admin level credential. → Select USER , and choose a credential you want to register. There are two steps for the user registration. Some options are available after the credential has been registered. •...
User Modifying User Information User Management or Administrator can modify the registered user information. A card can be added, and PIN and level can be modified. Press and authenticate with the Admin level credential. → Select USER Select your search terms. You can search for a user by All, User ID, Name, and Card / QR Code. Select a user you wish to modify.
Authentication Auth Mode Modifying Auth Mode You can set the authentication method and schedule according to each credential. You can set up to 3 auth modes. Press and authenticate with the Admin level credential. → Select AUTHENTICATION Auth Mode. Select the authentication mode to modify. When you press , the selected credential will be deleted, and when you press , available credentials to be...
Authentication Delete Auth Mode Press and authenticate with the Admin level credential. → Select AUTHENTICATION Auth Mode. Press and select the authentication mode to delete. You can select multiple options. Press OK. To delete the selected option, press OK. Or, press Cancel to cancel the deletion. Add Auth Mode You can register up to 3 auth modes.
Authentication QR/Barcode Operation Press and authenticate with the Admin level credential. Press AUTHENTICATION and then modify items below QR/Barcode Operation. • QR/Barcode: Set to use QR code or Barcode to authenticate. • QR/Barcode Scan Timeout: If you do not scan the QR code or Barcode within the set time, the authentication will fail.
Voice Instruction: Set to use the voice instruction instead of alarm sounds. • Volume: Set the volume. Refer to the BioStar 2 Device SDK webpage on the Suprema Knowledge Base website (kb.supremainc.com/bs2sdk/) for more information on the BioStar 2 Device SDK.
Network Network Settings You can change the network settings of the device. Ethernet Press and authenticate with the Admin level credential. → Select NETWORK Ethernet. Change the desired item. • DHCP: Set whether to use DHCP. If DHCP setting is disabled, the user can modify Port, IP Address, Gateway, Subnet Mask, and DNS.
Network Server Press and authenticate with the Admin level credential. → Select NETWORK Server. Change the desired item. → • Device Server: You can send a connection signal from the device to a server with the input information → directly. When you select Server Device, Server IP, Server URL and Server Port cannot be entered.
Device Relay You can set the open time and the input port of the exit button in the device. Press and authenticate with the Admin level credential. → Select DEVICE Relay. • Relay: You can set whether relay is enabled or not. To set the open time and the input port of the exit button, activate this option.
Device Daylight Saving Time You can use the device by applying daylight saving time. Set the start and end time correctly. Press and authenticate with the Admin level credential. → Select DEVICE Daylight Saving Time and press to add additional daylight-saving time. Select the desired item and change the setting.
Device Device Info You can view the model name, device ID, serial number, firmware version of device ID, and MAC address. Press and authenticate with the Admin level credential. → Select DEVICE Device Info. You can view the information including Model Name, Device ID, Serial No., HW, FW, Kernel, and MAC.
Device USB Memory Connect USB Memory and import user information to the device or export log and user information from the device. Upgrade the firmware. Press and authenticate with the Admin level credential. → Select DEVICE USB Memory. Select the desired item and change the setting. •...
Device Secure Tamper When the tamper is turned on, you can set to delete the entire user, the entire log, and the security key. Press and authenticate with the Admin level credential. Select DEVICE. Activate Secure Tamper to delete data of all registered users, all logs, and secure keys when a temper event occurs. Restart Device The user can restart the device.
Event Log Search Log You can set a condition and search a log. Press and authenticate with the Admin level credential. Select EVENT LOG. All event logs appear. Press to search a specific log and change the condition. Press OK. A log that matches the condition will be displayed on the screen. Delete All Logs You can delete all saved logs.
Event Log View Log Usage You can check the status of log usage. Press and authenticate with the Admin level credential. → Select EVENT LOG . You can check the capacity of event and image logs on the device.
Troubleshooting Checklist before reporting a failure Category Problem Solution • If the terminal and the bracket are far away from each other, the device The power is being may not operate due to the temper switch. Power supplied but the device does not operate.
Page 29
Product specifications • Power: DC 12 V (Max. 0.8 A) or DC 24 V (Max. 0.45 A) Power • Adapter recommended specifications: DC 12 V (± 10%) with a minimum of 1,500 mA or DC 24 V (±10%) with a minimum of 800 mA*** Min.: 3 V Switch input VIH...
This product is CE marked according to the provisions of the Radio Equipment Directive (RED) 2014/53/EU. Hereby, Suprema Inc. declares that this product is in compliance with the essential requirements and other relevant provisions of Radio Equipment Directive (RED) 2014/53/EU.
Information in this document is provided in connection with Suprema products. • The right to use is acknowledged only for Suprema products included in the terms and conditions of use or sale for such products guaranteed by Suprema. No license, express or implied, by estoppel or otherwise, to any intellectual property is granted by this document.
Appendices Open Source License • The software of this product is based on "Linux Kernel 4.x", which is licensed under GPL. As for GPL, please refer to GNU General Public License in this manual. • This product uses the "BoringSSL", which is licensed under the OpenSSL and Original SSLeay licenses. As for the OpenSSL and Original SSLeay licenses, please refer to BoringSSL License in this manual.
Appendices TERMS AND CONDITIONS 0. Definitions. “This License” refers to version 3 of the GNU General Public License. “Copyright” also means copyright-like laws that apply to other kinds of works, such as semiconductor masks. “The Program” refers to any copyrightable work licensed under this License. Each licensee is addressed as “you”. “Licensees”...
Page 35
Appendices otherwise remains in force. You may convey covered works to others for the sole purpose of having them make modifications exclusively for you, or provide you with facilities for running those works, provided that you comply with the terms of this License in conveying all material for which you do not control copyright. Those thus making or running the covered works for you must do so exclusively on your behalf, under your direction and control, on terms that prohibit them from making any copies of your copyrighted material outside their relationship with you.
Page 36
Appendices c) Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source. This alternative is allowed only occasionally and noncommercially, and only if you received the object code with such an offer, in accord with subsection 6b. d) Convey the object code by offering access from a designated place (gratis or for a charge), and offer equivalent access to the Corresponding Source in the same way through the same place at no further charge.
Page 37
Appendices c) Prohibiting misrepresentation of the origin of that material, or requiring that modified versions of such material be marked in reasonable ways as different from the original version; or d) Limiting the use for publicity purposes of names of licensors or authors of the material; or e) Declining to grant rights under trademark law for use of some trade names, trademarks, or service marks;...
Page 38
Appendices 11. Patents. A “contributor” is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based. The work thus licensed is called the contributor's “contributor version”. A contributor's “essential patent claims” are all patent claims owned or controlled by the contributor, whether already acquired or hereafter acquired, that would be infringed by some manner, permitted by this License, of making, using, or selling its contributor version, but do not include claims that would be infringed only as a consequence of further modification of the contributor version.
Page 39
Appendices 14. Revised Versions of this License. The Free Software Foundation may publish revised and/or new versions of the GNU General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
Appendices BoringSSL License BoringSSL is a fork of OpenSSL. As such, large parts of it fall under OpenSSL licensing. Files that are completely new have a Google copyright and an ISC license. This license is reproduced at the bottom of this file. Contributors to BoringSSL are required to follow the CLA rules for Chromium: https://cla.developers.google.com/clas Files in third_party/ have their own licenses, as described therein.
Appendices Original SSLeay License Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code;...
Appendices The code in third_party/fiat carries the MIT license: Copyright (c) 2015-2016 the fiat-crypto authors (see https://github.com/mit-plv/fiat-crypto/blob/master/AUTHORS). Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the...
Appendices Apache License Version 2.0, January 2004 (http://www.apache.org/licenses/) TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 0. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. "Licensor"...
Page 44
Appendices 3. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions: (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and (b) You must cause any modified files to carry prominent notices stating that You changed the files;...
Need help?
Do you have a question about the X-Station 2 XS2-QAPB and is the answer not in the manual?
Questions and answers