Advertisement

Quick Links

FaceStation 2
USER GUIDE
Version 1.17
English
EN 102.00.FS2 V1.17A

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the FS2-D and is the answer not in the manual?

Questions and answers

Summary of Contents for suprema FS2-D

  • Page 1 FaceStation 2 USER GUIDE Version 1.17 English EN 102.00.FS2 V1.17A...
  • Page 2: Table Of Contents

    Safety Instructions Contents Safety Instructions ................. 4 Introduction .................... 6 Components ..............................6 Name and function of each part ....................... 7 Cables and connectors ........................... 9 Correct face registration and authentication method................10 Cautions for registering a face ......................10 Cautions for authenticating a face ....................
  • Page 3 Safety Instructions Troubleshooting ..................28 Checklist before reporting a failure ......................28 Product specifications ................. 29 Dimensions ..............................30 FCC compliance information ............... 31 EU Declaration of Conformity (CE) ............. 31 Appendices ................... 32 Disclaimers ..............................32 Copyright notice ............................32 Open Source License ............................
  • Page 4: Safety Instructions

    Safety Instructions Safety Instructions Observe the following instructions to use the product safely and prevent any risk of injury or property damage. Warning Noncompliance with instructions can lead to serious injury or death. Installation Do not install the product in a location with direct sunlight, moisture, dust, or soot. •...
  • Page 5 Safety Instructions Operation Do not drop the product or apply an impact to the product. Product failure may occur. • Manage the password with care; do not to disclose it to others and change it periodically. Otherwise, illegal intrusion may occur. •...
  • Page 6: Introduction

    When assembling the product with the bracket, you can use the included bracket fixing screw(Star Shaped) instead of the product fixing screw for enhanced security. For additional content regarding product installation, visit the Suprema website (www.suprema.co.kr) and view the installation •...
  • Page 7: Name And Function Of Each Part

    Introduction Name and function of each part RF card authentication Microphone unit LCD screen IR camera Camera TTL input (4 pins) RS-485 (4 pins) Relay (3 pins) Wiegand input (4 pins) Power supply (2 pins) Ethernet Wiegand output (4 pins) USB memory slot Mini USB cable slot Speaker...
  • Page 8 Introduction Power supply (2 pins) Connects the power supply cable. Ethernet Connects the Ethernet cable. Wiegand input (4 pins) Connects the Wiegand input cable. Wiegand output (4 pins) Connects the Wiegand output cable.
  • Page 9: Cables And Connectors

    Introduction Cables and connectors Power Name Color PWR +VDC Red (White stripe) PWR GND Black (White stripe) Relay Name Color RLY NO White RLY COM Blue RLY NC Orange RS-485 Name Color 485 TRXP Blue 485 TRXN Yellow 485 GND Black SH GND Gray...
  • Page 10: Correct Face Registration And Authentication Method

    Introduction Correct face registration and authentication method Cautions for registering a face When registering a face, maintain a distance of 40cm to 80cm between the device and the face. • • Be careful not to change the facial expression. (smiling face, drawn face, wink, etc.) If you do not follow the instructions on the screen, the face registration may take longer or may fail.
  • Page 11: Admin Menu

    Admin Menu Admin Menu All Menus Press and authenticate with the Admin level credential. Select the desired menu. NOTE If the administrator has not been designated, the menu screen will be displayed when you press •...
  • Page 12: User

    User User Registering user information The user information, including the face, can be registered. Press and authenticate with the Admin level credential. Press User > . The face registration wizard will begin. To proceed with the face registration wizard, press Next. To skip, press Skip and go to step 5. If you have pressed Next, register the face according to the instructions on the screen.
  • Page 13 User NOTE • When registering a face, maintain a distance of 40cm to 80cm between the device and the face. • Be careful not to change the facial expression. (smiling face, drawn face, wink, etc.) If you do not follow the instructions on the screen, the face registration may take longer or may fail. •...
  • Page 14: Modifying User Information

    User Modifying user information ’ User Management or Administrator can modify the registered user information. A user s face or card can be added, and the PIN and level can be modified. Press and authenticate with the Admin level credential. Press User >...
  • Page 15: Authentication

    Authentication Authentication Auth Mode Modifying Auth Mode You can set the authentication method and schedule according to each credential. Press and authenticate with the Admin level credential. Press AUTHENTICATION > Auth Mode. Press to add an auth mode or press an auth mode you wish to modify. Pressing the icon will delete the selected credential, and pressing will display an addable credential on the screen.
  • Page 16: Delete Auth Mode

    Authentication Delete Auth Mode Press and authenticate with the Admin level credential. Press AUTHENTICATION > Auth Mode. Press and select an item to delete. When you press OK, the selected item will be deleted. Add Auth Mode Press and authenticate with the Admin level credential. Press AUTHENTICATION >...
  • Page 17: Face Recognition

    Authentication Face Recognition Change settings regarding face authentication. Press and authenticate with the Admin level credential. Press AUTHENTICATION and then modify the items below Face Recognition. Security Level: Set the security level for 1:N authentication. • Group Matching: Check whether or not to use Group Matching. If Group Matching is used, you can increase the authentication speed by •...
  • Page 18: Network

    Network Network Network Settings You can change the network settings of the device. Ethernet Press and authenticate with the Admin level credential. Press NETWORK > Ethernet. DHCP: Set whether or not to use DHCP. If DHCP setting is disabled, the user can modify Device Port, IP Address, Gateway, Subnet Mask, •...
  • Page 19: Wireless

    Network Wireless Press and authenticate with the Admin level credential. Press NETWORK > Wireless. The list of available networks for connection will be displayed. Select the network to which you wish to connect and enter the password. When you press OK, the connection to the wireless network will be made.
  • Page 20: Serial Settings

    Network Serial Settings RS-485 Press and authenticate with the Admin level credential. Press NETWORK and then modify the items below Serial Setting. RS-485: Select the RS-485 mode. • • Baud Rate: Select the desired baud rate.
  • Page 21: Display & Sound

    Display & Sound Display & Sound You can change the display and sound settings of the device. Press and authenticate with the Admin level credential. Press DISPLAY & SOUND. Change the desired item. • Home Screen: Select items to be displayed in the background of the home screen. When Custom is selected for Style, the user can modify the Home Screen directly.
  • Page 22: Device

    Device Device Interphone Set the account and extensions of SIP interphone. Press and authenticate with the Admin level credential. Press DEVICE > Interphone. When Enable is set for Interphone, you can set the SIP account and the extensions. Ensure to set each item correctly. Relay You can set the open time and the input port of the exit button in the device.
  • Page 23: Daylight Saving Time

    Device • Standard time zone: Set the time reference of the current location. Time Sync: Synchronize the server and the time. If you wish to synchronize the server and the time, enable Time Sync. • Date Format: Set the date format. You can select among YYYY/MM/DD, MM/DD/YYYY and DD/MM/YYYY. •...
  • Page 24: Secure Tamper

    Device Secure Tamper When the tamper is turned on, you can set to delete the entire user, the entire log, and the security key. Press and authenticate with the Admin level credential. Select DEVICE > Secure Tamper, then change the settings. Restart Device The user can restart the device.
  • Page 25: User Id Type

    Device User ID Type You can set the type of user ID to be registered on the device to a combination of alphabetic characters, numbers, and symbols (_, -). Press and authenticate with the Admin level credential. Press DEVICE > User ID Type. Change to the desired item and press OK.
  • Page 26: Event Log

    Event Log Event Log Search Log You can set a condition and search a log. Press and authenticate with the Admin level credential. Press EVENT LOG. Press and change the condition. When you press OK, a log that matches the condition will be displayed on the screen. Detail View Log Press and authenticate with the Admin level credential.
  • Page 27: View Log Usage

    Event Log View Log Usage You can check the status of log usage. Press and authenticate with the Admin level credential. Press EVENT LOG. Press...
  • Page 28: Troubleshooting

    Troubleshooting Troubleshooting Checklist before reporting a failure Classification Problem Solution The power is being supplied If the distance between the terminal and the bracket is too great, the • Power but the device does not device may not operate due to the temper switch. operate.
  • Page 29: Product Specifications

    Category Feature Specification Biometric Face • FS2-D: 125kHz EM & 13.56Mhz MIFARE, MIFARE Plus, DESFire/EV1, FeliCa, NFC • FS2-DS: 125kHz EM & 13.56Mhz MIFARE, MIFARE Plus, DESFire/EV1, FeliCa, NFC RF Option Credential • FS2-AWB: 125kHz EM, HID Prox & 13.56Mhz MIFARE, MIFARE Plus, DESFire/EV1,...
  • Page 30: Dimensions

    Product specifications Dimensions (Unit: mm)
  • Page 31: Fcc Compliance Information

    This product is CE marked according to the provisions of the R&TTE Directive (1999/5/EC). Suprema Inc. hereby declares that this product is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC. This device is a class 1 radio device according to the directive.
  • Page 32: Appendices

    • Do not use a Suprema product in situations related to medical, rescue of human lives, or maintenance of life, as a person may be injured or killed due to product malfunction. If an accident occurs while a consumer is using the product under the...
  • Page 33 Appendices can get it if you want it, that you can change the software or use pieces of it in new free programs, and that you know you can do these things. To protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights. Therefore, you have certain responsibilities if you distribute copies of the software, or if you modify it: responsibilities to respect the freedom of others.
  • Page 34 Appendices The “System Libraries” of an executable work include anything, other than the work as a whole, that (a) is included in the normal form of packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable use of the work with that Major Component, or to implement a Standard Interface for which an implementation is available to the public in source code form.
  • Page 35 Appendices d) If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the Program has • interactive interfaces that do not display Appropriate Legal Notices, your work need not make them do so. A compilation of a covered work with other separate and independent works, which are not by their nature extensions of the covered work, and which are not combined with it such as to form a larger program, in or on a volume of a storage or distribution medium, is called an “aggregate”...
  • Page 36 Appendices conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law. If additional permissions apply only to part of the Program, that part may be used separately under those permissions, but the entire Program remains governed by this License without regard to the additional permissions.
  • Page 37 Appendices or could give under the previous paragraph, plus a right to possession of the Corresponding Source of the work from the predecessor in interest, if the predecessor has it or can get it with reasonable efforts. You may not impose any further restrictions on the exercise of the rights granted or affirmed under this License. For example, you may not impose a license fee, royalty, or other charge for exercise of rights granted under this License, and you may not initiate litigation (including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it.
  • Page 38: Openssl License

    Appendices Each version is given a distinguishing version number. If the Program specifies that a certain numbered version of the GNU General Public License “or any later version” applies to it, you have the option of following the terms and conditions either of that numbered version or of any later version published by the Free Software Foundation.
  • Page 39: Original Ssleay License

    Appendices Original SSLeay License Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code;...
  • Page 40 Appendices copyright notice that is included in or attached to the work (an example is provided in the Appendix below). "Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship.
  • Page 41 Appendices 8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor...
  • Page 42 Tel: +82 31 783 4502 I Fax: +82 31 783 4503 I Inquiry: sales_sys@supremainc.com ©2019 Suprema Inc. Suprema and identifying product names and numbers herein are registered trade marks of Suprema, Inc. All non-Suprema brands and product names are trademarks or registered trademarks of their respective companies. Product appearance, build status and/or specifications are subject to change without notice.

This manual is also suitable for:

Facestation 2Fs2-dsFs2-awb

Table of Contents