Safety Instructions Contents Safety Instructions ................. 4 Introduction .................... 6 Components ..............................6 Name and function of each part ....................... 7 Cables and connectors ........................... 9 Correct face registration and authentication method................10 Cautions for registering a face ......................10 Cautions for authenticating a face ....................
Page 3
Safety Instructions Troubleshooting ..................28 Checklist before reporting a failure ......................28 Product specifications ................. 29 Dimensions ..............................30 FCC compliance information ............... 31 EU Declaration of Conformity (CE) ............. 31 Appendices ................... 32 Disclaimers ..............................32 Copyright notice ............................32 Open Source License ............................
Safety Instructions Safety Instructions Observe the following instructions to use the product safely and prevent any risk of injury or property damage. Warning Noncompliance with instructions can lead to serious injury or death. Installation Do not install the product in a location with direct sunlight, moisture, dust, or soot. •...
Page 5
Safety Instructions Operation Do not drop the product or apply an impact to the product. Product failure may occur. • Manage the password with care; do not to disclose it to others and change it periodically. Otherwise, illegal intrusion may occur. •...
When assembling the product with the bracket, you can use the included bracket fixing screw(Star Shaped) instead of the product fixing screw for enhanced security. For additional content regarding product installation, visit the Suprema website (www.suprema.co.kr) and view the installation •...
Introduction Name and function of each part RF card authentication Microphone unit LCD screen IR camera Camera TTL input (4 pins) RS-485 (4 pins) Relay (3 pins) Wiegand input (4 pins) Power supply (2 pins) Ethernet Wiegand output (4 pins) USB memory slot Mini USB cable slot Speaker...
Page 8
Introduction Power supply (2 pins) Connects the power supply cable. Ethernet Connects the Ethernet cable. Wiegand input (4 pins) Connects the Wiegand input cable. Wiegand output (4 pins) Connects the Wiegand output cable.
Introduction Cables and connectors Power Name Color PWR +VDC Red (White stripe) PWR GND Black (White stripe) Relay Name Color RLY NO White RLY COM Blue RLY NC Orange RS-485 Name Color 485 TRXP Blue 485 TRXN Yellow 485 GND Black SH GND Gray...
Introduction Correct face registration and authentication method Cautions for registering a face When registering a face, maintain a distance of 40cm to 80cm between the device and the face. • • Be careful not to change the facial expression. (smiling face, drawn face, wink, etc.) If you do not follow the instructions on the screen, the face registration may take longer or may fail.
Admin Menu Admin Menu All Menus Press and authenticate with the Admin level credential. Select the desired menu. NOTE If the administrator has not been designated, the menu screen will be displayed when you press •...
User User Registering user information The user information, including the face, can be registered. Press and authenticate with the Admin level credential. Press User > . The face registration wizard will begin. To proceed with the face registration wizard, press Next. To skip, press Skip and go to step 5. If you have pressed Next, register the face according to the instructions on the screen.
Page 13
User NOTE • When registering a face, maintain a distance of 40cm to 80cm between the device and the face. • Be careful not to change the facial expression. (smiling face, drawn face, wink, etc.) If you do not follow the instructions on the screen, the face registration may take longer or may fail. •...
User Modifying user information ’ User Management or Administrator can modify the registered user information. A user s face or card can be added, and the PIN and level can be modified. Press and authenticate with the Admin level credential. Press User >...
Authentication Authentication Auth Mode Modifying Auth Mode You can set the authentication method and schedule according to each credential. Press and authenticate with the Admin level credential. Press AUTHENTICATION > Auth Mode. Press to add an auth mode or press an auth mode you wish to modify. Pressing the icon will delete the selected credential, and pressing will display an addable credential on the screen.
Authentication Delete Auth Mode Press and authenticate with the Admin level credential. Press AUTHENTICATION > Auth Mode. Press and select an item to delete. When you press OK, the selected item will be deleted. Add Auth Mode Press and authenticate with the Admin level credential. Press AUTHENTICATION >...
Authentication Face Recognition Change settings regarding face authentication. Press and authenticate with the Admin level credential. Press AUTHENTICATION and then modify the items below Face Recognition. Security Level: Set the security level for 1:N authentication. • Group Matching: Check whether or not to use Group Matching. If Group Matching is used, you can increase the authentication speed by •...
Network Network Network Settings You can change the network settings of the device. Ethernet Press and authenticate with the Admin level credential. Press NETWORK > Ethernet. DHCP: Set whether or not to use DHCP. If DHCP setting is disabled, the user can modify Device Port, IP Address, Gateway, Subnet Mask, •...
Network Wireless Press and authenticate with the Admin level credential. Press NETWORK > Wireless. The list of available networks for connection will be displayed. Select the network to which you wish to connect and enter the password. When you press OK, the connection to the wireless network will be made.
Network Serial Settings RS-485 Press and authenticate with the Admin level credential. Press NETWORK and then modify the items below Serial Setting. RS-485: Select the RS-485 mode. • • Baud Rate: Select the desired baud rate.
Display & Sound Display & Sound You can change the display and sound settings of the device. Press and authenticate with the Admin level credential. Press DISPLAY & SOUND. Change the desired item. • Home Screen: Select items to be displayed in the background of the home screen. When Custom is selected for Style, the user can modify the Home Screen directly.
Device Device Interphone Set the account and extensions of SIP interphone. Press and authenticate with the Admin level credential. Press DEVICE > Interphone. When Enable is set for Interphone, you can set the SIP account and the extensions. Ensure to set each item correctly. Relay You can set the open time and the input port of the exit button in the device.
Device • Standard time zone: Set the time reference of the current location. Time Sync: Synchronize the server and the time. If you wish to synchronize the server and the time, enable Time Sync. • Date Format: Set the date format. You can select among YYYY/MM/DD, MM/DD/YYYY and DD/MM/YYYY. •...
Device Secure Tamper When the tamper is turned on, you can set to delete the entire user, the entire log, and the security key. Press and authenticate with the Admin level credential. Select DEVICE > Secure Tamper, then change the settings. Restart Device The user can restart the device.
Device User ID Type You can set the type of user ID to be registered on the device to a combination of alphabetic characters, numbers, and symbols (_, -). Press and authenticate with the Admin level credential. Press DEVICE > User ID Type. Change to the desired item and press OK.
Event Log Event Log Search Log You can set a condition and search a log. Press and authenticate with the Admin level credential. Press EVENT LOG. Press and change the condition. When you press OK, a log that matches the condition will be displayed on the screen. Detail View Log Press and authenticate with the Admin level credential.
Troubleshooting Troubleshooting Checklist before reporting a failure Classification Problem Solution The power is being supplied If the distance between the terminal and the bracket is too great, the • Power but the device does not device may not operate due to the temper switch. operate.
This product is CE marked according to the provisions of the R&TTE Directive (1999/5/EC). Suprema Inc. hereby declares that this product is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC. This device is a class 1 radio device according to the directive.
• Do not use a Suprema product in situations related to medical, rescue of human lives, or maintenance of life, as a person may be injured or killed due to product malfunction. If an accident occurs while a consumer is using the product under the...
Page 33
Appendices can get it if you want it, that you can change the software or use pieces of it in new free programs, and that you know you can do these things. To protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights. Therefore, you have certain responsibilities if you distribute copies of the software, or if you modify it: responsibilities to respect the freedom of others.
Page 34
Appendices The “System Libraries” of an executable work include anything, other than the work as a whole, that (a) is included in the normal form of packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable use of the work with that Major Component, or to implement a Standard Interface for which an implementation is available to the public in source code form.
Page 35
Appendices d) If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the Program has • interactive interfaces that do not display Appropriate Legal Notices, your work need not make them do so. A compilation of a covered work with other separate and independent works, which are not by their nature extensions of the covered work, and which are not combined with it such as to form a larger program, in or on a volume of a storage or distribution medium, is called an “aggregate”...
Page 36
Appendices conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law. If additional permissions apply only to part of the Program, that part may be used separately under those permissions, but the entire Program remains governed by this License without regard to the additional permissions.
Page 37
Appendices or could give under the previous paragraph, plus a right to possession of the Corresponding Source of the work from the predecessor in interest, if the predecessor has it or can get it with reasonable efforts. You may not impose any further restrictions on the exercise of the rights granted or affirmed under this License. For example, you may not impose a license fee, royalty, or other charge for exercise of rights granted under this License, and you may not initiate litigation (including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it.
Appendices Each version is given a distinguishing version number. If the Program specifies that a certain numbered version of the GNU General Public License “or any later version” applies to it, you have the option of following the terms and conditions either of that numbered version or of any later version published by the Free Software Foundation.
Appendices Original SSLeay License Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code;...
Page 40
Appendices copyright notice that is included in or attached to the work (an example is provided in the Appendix below). "Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship.
Page 41
Appendices 8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor...
Need help?
Do you have a question about the FS2-D and is the answer not in the manual?
Questions and answers