HIKVISION DS-K1T805MBWX User Manual

HIKVISION DS-K1T805MBWX User Manual

Access control terminal
Hide thumbs Also See for DS-K1T805MBWX:
Table of Contents

Advertisement

Access Control Terminal
User Manual

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the DS-K1T805MBWX and is the answer not in the manual?

Questions and answers

Summary of Contents for HIKVISION DS-K1T805MBWX

  • Page 1 Access Control Terminal User Manual...
  • Page 2 WITHOUT LIMITATION, MERCHANTABILITY, SATISFACTORY QUALITY, OR FITNESS FOR A PARTICULAR PURPOSE. THE USE OF THE PRODUCT BY YOU IS AT YOUR OWN RISK. IN NO EVENT WILL HIKVISION BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL, OR INDIRECT DAMAGES,...
  • Page 3 During the use of device, personal data will be collected, stored and processed. To protect data, the development of Hikvision devices incorporates privacy by design principles. For example, for device with facial recognition features, biometrics data is stored in your device with encryption method;...
  • Page 4 Access Control Terminal User Manual Symbol Conventions The symbols that may be found in this document are defined as follows. Symbol Description Indicates a hazardous situation which, if not avoided, will or could Danger result in death or serious injury. Indicates a potentially hazardous situation which, if not avoided, could Caution result in equipment damage, data loss, performance degradation, or...
  • Page 5 Access Control Terminal User Manual Regulatory Information FCC Information Please take attention that changes or modification not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment. FCC compliance: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules.
  • Page 6 Access Control Terminal User Manual EU Conformity Statement This product and - if applicable - the supplied accessories too are marked with "CE" and comply therefore with the applicable harmonized European standards listed under the EMC Directive 2014/30/EU, the RoHS Directive 2011/65/EU 2012/19/EU (WEEE directive): Products marked with this symbol cannot be disposed of as unsorted municipal waste in the European Union.
  • Page 7 Access Control Terminal User Manual rayonnée équivalente (p.i.r.e.) ne dépasse pas l'intensité nécessaire à l'établissement d'une communication satisfaisante. This equipment should be installed and operated with a minimum distance 20cm between the radiator and your body. Cet équipement doit être installé et utilisé à une distance minimale de 20 cm entre le radiateur et votre corps.
  • Page 8 Access Control Terminal User Manual Safety Instruction These instructions are intended to ensure that user can use the product correctly to avoid danger or property loss. The precaution measure is divided into Dangers and Cautions: Dangers: Neglecting any of the warnings may cause serious injury or death. Cautions: Neglecting any of the cautions may cause injury or equipment damage.
  • Page 9 Improper use or replacement of the battery may result in hazard of explosion. Replace with the ● same or equivalent type only. Dispose of used batteries according to the instructions provided by the battery manufacturer. You can view the device License via the website: http://opensource.hikvision.com/Home/List? ● id=46. viii...
  • Page 10 Access Control Terminal User Manual Available Models The access control terminal contains the following models: Product Name Model Wireless Access Control Terminal DS-K1T805MBWX 13.56 MHz Card Presenting Frequency, Wi-Fi, Bluetooth DS-K1T805MBFWX 13.56 MHz Card Presenting Frequency, Wi-Fi, Bluetooth DS-K1T805EBWX 125 KHz Card Presenting...
  • Page 11: Table Of Contents

    Access Control Terminal User Manual Contents Chapter 1 Features ........................1 Chapter 2 Appearance ........................ 2 Chapter 3 Installation ......................... 4 3.1 Installation Environment ......................4 3.2 Surface Mounting ........................4 3.3 Flush Mounting with Gang Box ....................7 Chapter 4 Device Wiring ......................13 4.1 External Device Wiring ......................
  • Page 12 Access Control Terminal User Manual 8.4 Person Management ......................24 8.5 Search Event ........................25 8.6 Configuration ........................25 8.6.1 View Device Information ..................... 25 8.6.2 Set Time ........................25 8.6.3 Set DST ........................26 8.6.4 Change Administrator's Password ................26 8.6.5 Account Security Settings ....................
  • Page 13 Access Control Terminal User Manual 9.4.3 Set DST ........................44 9.4.4 User Management ...................... 45 9.4.5 Network Settings ......................45 9.4.6 User Management ...................... 49 9.4.7 Search Event ........................ 51 9.4.8 Access Control Settings ....................51 9.4.9 Fingerprint Parameters Settings .................. 57 9.4.10 Upgrade and Maintenance ..................
  • Page 14: Chapter 1 Features

    Access Control Terminal User Manual Chapter 1 Features High protective level: IP65 and IK08 ● Slim and flexible design with metal ● Built-in card reader for M1/EM card ● Note Device supports M1 card or EM card according to different device models. Supports operation by mobile App (Hik-Connect) ●...
  • Page 15: Chapter 2 Appearance

    Access Control Terminal User Manual Chapter 2 Appearance Refer to the following contents for detailed information of the access control terminal: Figure 2-1 Access Control Terminal (Fingerprint + Card Series) Figure 2-2 Access Control Terminal (Card Series)
  • Page 16 Access Control Terminal User Manual Note The pictures here are for reference only. Figure 2-3 Keypad Note Key 5: Hold to enable AP mod. ● #: Press # to confirm PIN entering. ●...
  • Page 17: Chapter 3 Installation

    Access Control Terminal User Manual Chapter 3 Installation 3.1 Installation Environment The minimum bearing weight of the wall or other places should be 3 times heavier than the device weight. 3.2 Surface Mounting Steps Note The additional force shall be equal to three times the weight of the equipment. The equipment ad its associated mounting means shall remain secure during the installation.
  • Page 18 Access Control Terminal User Manual Figure 3-2 Mounting Plate Dimension 2. Remove the back panel to display the wiring area. Wire the cables and install the back panel back. Figure 3-3 Remove Back Panel Note Apply Silicone sealant among the cable wiring area to keep the raindrop from entering.
  • Page 19 Access Control Terminal User Manual Figure 3-4 Apply Silicone Sealant 3. AAlign and hang the device with the mounting plate. Figure 3-5 Align and Hang Device 4. Use 1 supplied screw (SC-KM3×8-T10-SUS-NL) to secure the device and the mounting plate.
  • Page 20: Flush Mounting With Gang Box

    Access Control Terminal User Manual Figure 3-6 Secure Device 3.3 Flush Mounting with Gang Box Steps Note The gang box is optional. You should purchase it separately. 1. Make sure the gang box is on the wall.
  • Page 21 Access Control Terminal User Manual Figure 3-7 The Gang Box on the Wall Note Gang box is not supplied. 2. Secure the mounting plate on the wall with 4 supplied screws (SC-KA4X22). Make sure the cables are through the cable hole.
  • Page 22 Access Control Terminal User Manual Figure 3-8 Install Mounting Plate...
  • Page 23 Access Control Terminal User Manual Figure 3-9 Mounting Plate Dimension 3. Remove the back panel to display the wiring area. Wire the cables and install the back panel back. Figure 3-10 Remove Back Panel Note Apply Silicone sealant among the cable wiring area to keep the raindrop from entering.
  • Page 24 Access Control Terminal User Manual Figure 3-11 Apply Silicone Sealant 4. Align and hang the device with the mounting plate. Figure 3-12 Align Device 5. Secure the device on the mounting plate with 1 supplied screw (SC-KM3X8-T10-SUS-NL).
  • Page 25 Access Control Terminal User Manual Figure 3-13 Secure Device...
  • Page 26: Chapter 4 Device Wiring

    Access Control Terminal User Manual Chapter 4 Device Wiring 4.1 External Device Wiring Wire the external device. The wiring diagram is as follows. Figure 4-1 External Device Wiring Note When connecting door contact and exit button, the device and the RS-485 card reader should ●...
  • Page 27: Wire Secure Door Control Unit

    Access Control Terminal User Manual The suggested external power supply for door lock is 12 V, 1 A. ● The suggested external power supply for Wiegand card reader is 12 V, 1 A. ● Do not wire the device to the electric supply directly. ●...
  • Page 28: Chapter 5 Activation

    Access Control Terminal User Manual Chapter 5 Activation You should activate the device before the first login. After powering on the device, the system will switch to Device Activation page. Activation via the device, SADP tool and the client software are supported. The default values of the device are as follows: The default IP address: 192.0.0.64 ●...
  • Page 29: Activate Via Web Browser

    Access Control Terminal User Manual letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product. 3.
  • Page 30 Get the SADP software from the supplied disk or the official website http:// ● www.hikvision.com/en/ , and install the SADP according to the prompts. The device and the PC that runs the SADP tool should be within the same subnet.
  • Page 31: Activate Device Via Ivms-4200 Client Software

    Access Control Terminal User Manual 2) Change the device IP address to the same subnet as your computer by either modifying the IP address manually or checking Enable DHCP. 3) Input the admin password and click Modify to activate your IP address modification. 5.4 Activate Device via iVMS-4200 Client Software For some devices, you are required to create the password to activate them before they can be added to the iVMS-4200 software and work properly.
  • Page 32: Chapter 6 Identity Authentication

    Access Control Terminal User Manual Chapter 6 Identity Authentication After network configuration, system parameters configuration and user configuration, you can go back to the initial page for identity authentication. The system will authenticate person according to the configured authentication mode. 6.1 Authenticate via Single Credential Set the user authentication type before authentication.
  • Page 33: Chapter 7 Quick Operation Via Web Browser

    Answer the security questions. E-mail Verification 1. Export the QR code and send it to pw_recovery@hikvision.com as attachment. 2. You will receive a verification code within 5 minutes in your reserved email. 3. Enter the verification code into the verification code field to verify your identification.
  • Page 34: Administrator Settings

    Access Control Terminal User Manual Manual By default, the device time should be synchronized manually. You can set the device time manually or check Sync. with Computer Time to synchronize the device time with the computer's time. Enable DST. Set the DST start time, end time and bias time. Click Next to save the settings and go to the next parameter.
  • Page 35: Chapter 8 Operation Via Web Browser

    Answer the security questions. E-mail Verification 1. Export the QR code and send it to pw_recovery@hikvision.com as attachment. 2. You will receive a verification code within 5 minutes in your reserved email. 3. Enter the verification code into the verification code field to verify your identification.
  • Page 36 Access Control Terminal User Manual Figure 8-1 Overview Page Function Descriptions: Door Operation The door operation is open/closed/remaining open/remaining closed. Door Status You can click , and the door status will be controlled/controlled/remaining open/remaining closed. Real-Time Event You can view the event Employee ID, Name, Card No., Event Type, Time, and Operation. You can also click View More to enter the search conditions, including the event type, employee ID, the name, the card No., the start time, and the end time, and click Search.
  • Page 37: Person Management

    Access Control Terminal User Manual Note Only devices supporting fingerprint function can display the fingerprint capacity. View More You can click View More to view the event details. 8.4 Person Management Click Add to add the person's information, including the basic information, certificate, and  authentication settings.
  • Page 38: Search Event

    Access Control Terminal User Manual Click Save to save the settings. 8.5 Search Event Click Event Search to enter the Search page. Figure 8-2 Search Event Enter the search conditions, including the event type, the employee ID, the name, the card No., the start time, and the end time, and click Search.
  • Page 39: Set Dst

    Access Control Terminal User Manual Time Zone Select the device located time zone from the drop-down list. Time Sync. You should set the NTP server's IP address, port No., and interval. Manual By default, the device time should be synchronized manually. You can set the device time manually or check Sync.
  • Page 40: Account Security Settings

    Access Control Terminal User Manual 8.6.5 Account Security Settings You can change the security questions and answers, or the email address for the device. After change the settings, once you forgot the device password, you should answer the new questions or use the new email address to reset the device password.
  • Page 41 Access Control Terminal User Manual If uncheck the function, you should set the IPv4 address, IPv4 subnet mask, IPv4 default gateway, Mac address, and MTU. If you check the function, the system will allocate the IPv4 address, IPv4 subnet mask, the IPv4 default gateway automatically.
  • Page 42 Access Control Terminal User Manual 1) Set the IP address, subnet mask, and default gateway. Or enable DHCP and the system will allocate the IP address, subnet mask, and default gateway automatically. 6. Click Save. Device Hotspot Set the device hotspot. Click Configuration →...
  • Page 43 Access Control Terminal User Manual Set Port Parameters Set the HTTP, HTTPS, HTTP Listening parameters. Click Configuration → Network → Network Service → HTTP(S) . HTTP It refers to the port through which the browser accesses the device. For example, when the HTTP Port is modified to 81, you need to enter http://192.0.0.65:81 in the browser for login.
  • Page 44: Event Linkage

    Access Control Terminal User Manual Set ISUP Parameters Set the ISUP parameters for accessing device via ISUP protocol. Steps Note The function should be supported by the device. 1. Click Configuration → Network → Device Access → ISUP . 2. Check Enable. 3.
  • Page 45: Access Control Settings

    Access Control Terminal User Manual Note Equip the device with an SD card to use video recording function. To view the recorded videos, see Search Event . 8.6.10 Access Control Settings Set Authentication Parameters Click Configuration → Access Control → Authentication Settings . Note The functions vary according to different models.
  • Page 46 Access Control Terminal User Manual Authentication Interval You can set the authentication interval of the same person when authenticating. The same person can only authenticate once in the configured interval. A second authentication will be failed. Alarm of Max. Failed Attempts Enable to report alarm when the card reading attempts reach the set value.
  • Page 47 Access Control Terminal User Manual Figure 8-5 Door Parameters Settings Page Click Save to save the settings after the configuration. Door No. Select the device corresponded door No. Name You can create a name for the door. Open Duration Set the door unlocking duration. If the door is not opened for the set time, the door will be locked.
  • Page 48 Access Control Terminal User Manual The door contact can be enabled with appropriate delay after person with extended access needs swipes her/his card. Door Remain Open Duration with First Person Set the door open duration when first person is in. After the first person is authorized, it allows multiple persons access the door or other authentication actions.
  • Page 49 Access Control Terminal User Manual Set Wiegand Parameters You can set the Wiegand transmission direction. Steps Note Some device models do not support this function. Refer to the actual products when configuration. 1. Click Configuration → Access Control → Wiegand Settings . 2.
  • Page 50: Card Settings

    Access Control Terminal User Manual 8.6.11 Card Settings Set Card Security Click Configuration → Card Settings → Card Type to enter the settings page. Set the parameters and click Save. Enable NFC Card In order to prevent the mobile phone from getting the data of the access control, you can enable NFC card to increase the security level of the data.
  • Page 51: Set Privacy Parameters

    Access Control Terminal User Manual 8.6.12 Set Privacy Parameters Set the event storage type. Go to Configuration → Security → Privacy Settings Event Storage Settings Select a method to delete the event. You can select from Delete Old Events Periodically, Delete Old Events by Specified Time, or Overwriting.
  • Page 52: Device Debugging

    Access Control Terminal User Manual Note Do not power off during the upgrading. ● You can click Check for Updates to check the newer version. ● Restore Parameters Click Maintenance and Security → Maintenance → Backup and Reset . Restore All All parameters will be restored to the factory settings.
  • Page 53: Security Mode Settings

    Access Control Terminal User Manual Set the major and minor type of the log type. Set the start time and end time for searching, and click Search. The results will be displayed below, which including the No., time, the major type the minor type, the channel No., the local/remote user information, the remote host IP, etc.
  • Page 54 Access Control Terminal User Manual 2) Select a certificate type in the Import Communication Certificate area, and select a certificate from the local, and click Install. Install Other Authorized Certificate If you already has an authorized certificate (not created by the device), you can import it to the device directly.
  • Page 55: Chapter 9 Configure The Device Via The Mobile Browser

    Access Control Terminal User Manual Chapter 9 Configure the Device via the Mobile Browser 9.1 Login Login the mobile browser to configure. Note Parts of the models supports Wi-Fi settings. ● Make sure the device is activated. ● Make sure the device and the mobile phone are in the same IP segment. ●...
  • Page 56: Forget Password

    Answer the security questions. E-mail Verification 1. Export the QR code and send it to pw_recovery@hikvision.com as attachment. 2. You will receive a verification code within 5 minutes in your reserved email. 3. Enter the verification code into the verification code field to verify your identification.
  • Page 57: Set Dst

    Access Control Terminal User Manual Figure 9-1 Time Settings Tap Save to save the settings. Time Zone Select the time zone where the device is located from the drop-down list. Time Sync. Mode Manual By default, the device time should be synchronized manually. You can set the device time manually.
  • Page 58: User Management

    Access Control Terminal User Manual Figure 9-2 DST 2. Tap Enable DST. 3. Set the start time, end time, and DST bias. 4. Tap Save. 9.4.4 User Management Steps 1. Tap → User Management → User Management → admin to enter the setting page. 2.
  • Page 59 Access Control Terminal User Manual → Communication Settings → Wired Network to enter the configuration page. DHCP If you disable the function, you should set the IPv4 address, IPv4 subnet mask, IPv4 default gateway, Mac address, and MTU, Mac address, MTU. If you enable the function, the system will allocate the IPv4 address, IPv4 subnet mask, the IPv4 default gateway automatically.
  • Page 60 Access Control Terminal User Manual Figure 9-3 Wi-Fi...
  • Page 61 Access Control Terminal User Manual 3. Add Wi-Fi. 1) Tap Add Wi-Fi. 2) Enter Wi-Fi Name and Wi-Fi Password, and select Encryption Type. 3) Tap Save. 4. Select the Wi-Fi name, and tap Connect. 5. Enter the password and tap Save. Set Device Hotspot Set the device hotspot, and mobile phone can connect to the device to enter the mobile browser.
  • Page 62: User Management

    Access Control Terminal User Manual Note 6 to 12 letters (a to z, A to Z) or numbers (0 to 9), case sensitive. You are recommended to use ● a combination of no less than 8 letters or numbers. The verification code cannot be 123456 or abcdef (case non-sensitive0). ●...
  • Page 63 Access Control Terminal User Manual Figure 9-4 Add User 2) Set the following parameters. Employee ID Enter the employee ID. The Employee ID cannot be 0 or exceed 32 characters. It can be a combination of uppercase, lowercase letters and numbers. Name Enter your name.
  • Page 64: Search Event

    Access Control Terminal User Manual If the user needs to be set as administrator, you can enable Administrator. User Role Select your user role. Fingerprint Add fingerprint. Tap Fingerprint, then tap +, and add fingerprint via the fingerprint module. Card Add card.
  • Page 65 Access Control Terminal User Manual Figure 9-5 Authentication Settings 2. Tap Save. Terminal Select terminal for settings. Terminal Type/Terminal Model Get terminal description. They are read-only. Enable Authentication Device Enable the authentication function. Authentication Select an authentication mode according to your actual needs from the drop-down list. Authentication Interval...
  • Page 66 Access Control Terminal User Manual You can set the authentication interval of the same person when authenticating. The same person can only authenticate once in the configured interval. A second authentication will be failed. Max. Authentication Failed Attempts Alarm/Alarm of Max. Failed Attempts Enable to report alarm when the card reading attempts reach the set value.
  • Page 67 Access Control Terminal User Manual Figure 9-6 Door Parameters Settings Page Tap Save to save the settings after the configuration. Name You can create a name for the door. Open Duration Set the door unlocking duration. If the door is not opened for the set time, the door will be locked.
  • Page 68 Access Control Terminal User Manual You can set the exit button as Remain Open or Remain Closed according to your actual needs. By default, it is Remain Open. Door Remain Open Duration with First Person (min) Set the door open duration when first person is in. After the first person is authorized, it allows multiple persons access the door or other authentication actions.
  • Page 69 Access Control Terminal User Manual In order to prevent the mobile phone from getting the data of the access control, you can enable NFC card to increase the security level of the data. Enable M1 Card Enable M1 card and authenticating by presenting M1 card is available. M1 Card Encryption Sector M1 card encryption can improve the security level of authentication.
  • Page 70: Fingerprint Parameters Settings

    Access Control Terminal User Manual Note If you select Access Controller: If connect the device to a terminal via the RS-485 interface, set the RS-485 address as 2. If you connect the device to a controller, set the RS-485 address according to the door No.
  • Page 71: Upgrade And Maintenance

    Access Control Terminal User Manual 9.4.10 Upgrade and Maintenance Restart device, restore device parameters, and upgrade device version. Restart Device → Restart Device . Tap Restart to restart the device. Upgrade → Upgrade . Tap Upgrade to upgrade the device. Note Do not power off during the upgrading.
  • Page 72: Chapter 10 Other Platforms To Configure

    You can also configure the device via iVMS-4200 Client Software or HikCentral Access Control. For details, see the platforms' user manual. iVMS-4200 Client Software Click/tap the link to view the client software's user manual. https://pinfo.hikvision.com/hkwsen/unzip/20230109110406_14606_doc/ UD31348B_iVMS-4200%20AC%20Client_User%20Manual_V1.9.0_PDF1-TEST_en- US_20221226.PDF HikCentral Access Control (HCAC) Click/tap the link to view the HCAC's user manual.
  • Page 73: Appendix A. Tips For Scanning Fingerprint

    Access Control Terminal User Manual Appendix A. Tips for Scanning Fingerprint Recommended Finger Forefinger, middle finger or the third finger. Correct Scanning The figure displayed below is the correct way to scan your finger: You should press your finger on the scanner horizontally. The center of your scanned finger should align with the scanner center.
  • Page 74 Access Control Terminal User Manual Environment The scanner should avoid direct sun light, high temperature, humid conditions and rain. When it is dry, the scanner may not recognize your fingerprint successfully. You can blow your finger and scan again. Others If your fingerprint is shallow, or it is hard to scan your fingerprint, we recommend you to use other authentication methods.
  • Page 75: Appendix B. Dimension

    Access Control Terminal User Manual Appendix B. Dimension Dimension of Device (Fingerprint + Card Series)
  • Page 76 Access Control Terminal User Manual Figure B-1 Dimension of Device (Card Series) Note The pictures here are for reference only.
  • Page 77 UD32554B...

This manual is also suitable for:

Ds-k1t805mbfwxDs-k1t805ebwxDs-k1t805ebfwx

Table of Contents

Save PDF