suprema X-Station 2 Installation Manual
Hide thumbs Also See for X-Station 2:

Advertisement

Quick Links

X-Station 2
INSTALLATION GUIDE
Version 1.01
English
EN 101.00.XS2-ODPB, XS2-OAPB V1.01A

Advertisement

Table of Contents
loading

Summary of Contents for suprema X-Station 2

  • Page 1 X-Station 2 INSTALLATION GUIDE Version 1.01 English EN 101.00.XS2-ODPB, XS2-OAPB V1.01A...
  • Page 2: Table Of Contents

    CONTENTS Safety instructions Product specifications Instructional icons Dimensions Introduction FCC compliance information Components Name and function of each part EU Declaration of Conformity (CE) Cables and connectors How to enroll a fingerprint Appendices Note for QR/Barcode Usage and Device License How to scan a QR/Barcode Disclaimers Notes for Device License...
  • Page 3: Safety Instructions

    Safety instructions Please read this safety instructions before you use the product to prevent injury to yourself and others and to prevent property damage. The term ‘product’ in this manual refers to the product and any items provided with the product. Instructional icons Warning: This symbol indicates situations that could result in death or severe injury.
  • Page 4 The product may be affected by radio frequencies emitted by other products and the product may malfunction. Use the IEC/EN 62368-1 approved power adapter that supports higher power consumption than the product. It is highly recommended to use the power adapter sold by Suprema. •...
  • Page 5 Safety instructions RTC battery Use of an unapproved or incorrect type of battery may result in a risk of explosion. Discard the battery according to the appropriate regional or international waste regulations.
  • Page 6: Introduction

    When assembling the product with the bracket, you can use the included bracket fixing screw (Star Shaped) instead of the product fixing screw for enhanced security. • For more details regarding the product, visit the Suprema website (https://www.supremainc.com) and refer to the user guide.
  • Page 7: Name And Function Of Each Part

    Introduction Name and function of each part Camera LCD screen RF card and mobile access card authentication unit Fingerprint authentication unit Cable connector Speaker USB (Type-C) cable slot Name Description Camera Captures actual images. LCD screen Provides UI for operation. RF card and mobile access card Part to scan a RFID card or mobile access card for entrance.
  • Page 8: Cables And Connectors

    Introduction Cables and connectors Cable Name Color ENET TXP White ENET TXN Orange RJ-45 (Ethernet + PoE) ENET RXP Black ENET RXN Yellow TTL GND Gray TTL input TTL IN0 Purple TTL IN1 Brown 485 GND White (Black stripe) RS-485 485 TRXN Yellow (Black stripe) 485 TRXP...
  • Page 9: How To Enroll A Fingerprint

    When the fingerprint recognition fails X-Station 2 can recognize a fingerprint regardless of a change in season or finger condition. However, the authentication rate may vary according to the external environment or fingerprint input method. If the fingerprint authentication cannot be done smoothly, it is recommended to take the following measures.
  • Page 10: Note For Qr/Barcode Usage And Device License

    Introduction Note for QR/Barcode Usage and Device License You can issue a QR/Barcode to a user and use it as an authentication method. Scan the QR/Barcode properly by following the instructions on the screen to increase the recognition rate. How to scan a QR/Barcode 5 ~ 20 cm •...
  • Page 11: Installation

    X-Station 2 will be installed. • If installing X-Station 2 on a concrete wall, drill holes, insert PVC anchors, and fix them with fixing screws. • To avoid RF interference, a minimum separation distance must be maintained.
  • Page 12 Installation Assemble the cable cover and install X-Station 2 onto the fixed bracket. Connect X-Station 2 to the bracket by rotating the product fixing screw of X-Station 2.
  • Page 13: Power Supply Connection

    DC power 12 - PWR +VDC Red 10 - PWR GND Black (white stripe) X-Station 2 • Use the IEC/EN 62368-1 approved power adapter that supports higher power consumption than the product. If you wish to connect and use another device to the power supply adapter, you should use an adapter with a current capacity which is the same or larger than the total power consumption required for the terminal and another device.
  • Page 14: Network Connection

    You can connect the product to a hub using a general type CAT-5 cable. X-Station 2 LAN connection (connecting to a PC directly) X-Station 2 has an automatic MDI/MDIX function so that it can be connected to a PC directly using a normal straight type CAT-5 cable or a cross cable. X-Station 2...
  • Page 15: Ttl Input Connection

    Installation TTL input connection Door sensor 11 - TTL IN0 Purple 13 - TTL IN1 Brown 9 - TTL GND Gray X-Station 2 Door button...
  • Page 16: Relay Connection

    NOT recommended to use the internal relay of a reader to prevent any tampering attacks which can potentially trigger the door unlock. For such applications, it is highly recommended to use a separate relay unit for a lock control such as Suprema’s Secure I/O 2, DM-20 or CoreStation installed at a secure side of a door.
  • Page 17: Fail Secure Lock

    NOT recommended to use the internal relay of a reader to prevent any tampering attacks which can potentially trigger the door unlock. For such applications, it is highly recommended to use a separate relay unit for a lock control such as Suprema’s Secure I/O 2, DM-20 or CoreStation installed at a secure side of a door.
  • Page 18: Automatic Door Connection

    Installation Automatic door connection 18 - RLY NO Gray (white stripe) 14 - RLY COM Green (white stripe) Door button Detection sensor Door lock Automatic door control device X-Station 2...
  • Page 19: Connecting As A Standalone

    Installation Connecting as a standalone X-Station 2 can be connected to the door lock, door button, and door sensor directly without connecting a separate I/O device. TTL connection 11 - TTL IN0 Purple 13 - TTL IN1 Brown 9 - TTL GND...
  • Page 20: Connecting To Secure I/O 2

    Connecting to Secure I/O 2 Secure I/O 2 is an I/O device, can be connected to X-Station 2 with the RS-485 cable. Security can be maintained even if the connection between X-Station 2 and Secure I/O 2 has been lost or the power supply to X-Station 2 has been shut off due to external factors.
  • Page 21: Wiegand Connection

    Installation Wiegand connection Use as a Wiegand input or output device RFID reader / Controller 22 - WG D0 Green 21 - WG D1 White 20 - WG GND Black X-Station 2...
  • Page 22: Product Specifications

    KC, CE, UKCA, FCC, RCM (Compliance: RoHS, REACH, WEEE) Image dimension 300 x 400 pixels Resolution 500 dpi Template SUPREMA / ISO19794-2, ANSI-378 Fingerprint Extractor / Matcher MINEX certified and compliant Sensor Certificates FBI PIV and FBI Mobile ID FAP20...
  • Page 23 1 A @ 30 VDC Inductive load DESFire EV2/EV3 cards are supported by having backward compatibility of DESFire EV1 cards. CSN and smart card functions are compatible with X-Station 2. RF read range will vary depending on installation environment. Supports QR/Barcodes composed of up to 32 ASCII code strings.
  • Page 24: Dimensions

    Product specifications Dimensions (Unit: mm) 25.9 187.1 208.5 69.6...
  • Page 25: Fcc Compliance Information

    This product is CE marked according to the provisions of the Radio Equipment Directive (RED) 2014/53/EU. Hereby, Suprema Inc. declares that this product is in compliance with the essential requirements and other relevant provisions of Radio Equipment Directive (RED) 2014/53/EU.
  • Page 26: Appendices

    Information in this document is provided in connection with Suprema products. • The right to use is acknowledged only for Suprema products included in the terms and conditions of use or sale for such products guaranteed by Suprema. No license, express or implied, by estoppel or otherwise, to any intellectual property is granted by this document.
  • Page 27: Open Source License

    Appendices Open Source License • The software of this product is based on "Linux Kernel 4.x", which is licensed under GPL. As for GPL, please refer to GNU General Public License in this manual. • This product uses the "BoringSSL", which is licensed under the OpenSSL and Original SSLeay licenses. As for the OpenSSL and Original SSLeay licenses, please refer to BoringSSL License in this manual.
  • Page 28: Terms And Conditions

    Appendices TERMS AND CONDITIONS 0. Definitions. “This License” refers to version 3 of the GNU General Public License. “Copyright” also means copyright-like laws that apply to other kinds of works, such as semiconductor masks. “The Program” refers to any copyrightable work licensed under this License. Each licensee is addressed as “you”. “Licensees”...
  • Page 29 Appendices 2. Basic Permissions. All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, given its content, constitutes a covered work.
  • Page 30 Appendices 6. Conveying Non-Source Forms. You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways: a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange.
  • Page 31 Appendices 7. Additional Terms. “Additional permissions” are terms that supplement the terms of this License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law.
  • Page 32 Appendices 9. Acceptance Not Required for Having Copies. You are not required to accept this License in order to receive or run a copy of the Program. Ancillary propagation of a covered work occurring solely as a consequence of using peer-to-peer transmission to receive a copy likewise does not require acceptance.
  • Page 33 Appendices A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted under this License. You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software, under which you make payment to the third party based on the extent of your activity of conveying the work, and under which the third party grants, to any of the parties who would receive the covered work from you, a...
  • Page 34: Boringssl License

    Appendices 17. Interpretation of Sections 15 and 16. If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms, reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program, unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee.
  • Page 35: Original Ssleay License

    Appendices Original SSLeay License Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code;...
  • Page 36: Licenses For Support Code

    Appendices The code in third_party/fiat carries the MIT license: Copyright (c) 2015-2016 the fiat-crypto authors (see https://github.com/mit-plv/fiat-crypto/blob/master/AUTHORS). Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the...
  • Page 37: Apache License

    Appendices Apache License Version 2.0, January 2004 (http://www.apache.org/licenses/) TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 0. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. "Licensor"...
  • Page 38 Appendices 3. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions: (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and (b) You must cause any modified files to carry prominent notices stating that You changed the files;...
  • Page 39 QR code. http://www.supremainc.com/en/about/contact-us.asp © 2023 Suprema Inc. Suprema and identifying product names and numbers herein are registered trade marks of Suprema, Inc. All non-Suprema brands and product names are trademarks or registered trademarks of their respective companies.

This manual is also suitable for:

Xs2-odpbXs2-oapb

Table of Contents