CONTENTS Safety instructions Product specifications Instructional icons Dimensions Introduction FCC compliance information Components Name and function of each part EU Declaration of Conformity (CE) Cables and connectors How to enroll a fingerprint Appendices Note for QR/Barcode Usage and Device License How to scan a QR/Barcode Disclaimers Notes for Device License...
Safety instructions Please read this safety instructions before you use the product to prevent injury to yourself and others and to prevent property damage. The term ‘product’ in this manual refers to the product and any items provided with the product. Instructional icons Warning: This symbol indicates situations that could result in death or severe injury.
Page 4
The product may be affected by radio frequencies emitted by other products and the product may malfunction. Use the IEC/EN 62368-1 approved power adapter that supports higher power consumption than the product. It is highly recommended to use the power adapter sold by Suprema. •...
Page 5
Safety instructions RTC battery Use of an unapproved or incorrect type of battery may result in a risk of explosion. Discard the battery according to the appropriate regional or international waste regulations.
When assembling the product with the bracket, you can use the included bracket fixing screw (Star Shaped) instead of the product fixing screw for enhanced security. • For more details regarding the product, visit the Suprema website (https://www.supremainc.com) and refer to the user guide.
Introduction Name and function of each part Camera LCD screen RF card and mobile access card authentication unit Fingerprint authentication unit Cable connector Speaker USB (Type-C) cable slot Name Description Camera Captures actual images. LCD screen Provides UI for operation. RF card and mobile access card Part to scan a RFID card or mobile access card for entrance.
When the fingerprint recognition fails X-Station 2 can recognize a fingerprint regardless of a change in season or finger condition. However, the authentication rate may vary according to the external environment or fingerprint input method. If the fingerprint authentication cannot be done smoothly, it is recommended to take the following measures.
Introduction Note for QR/Barcode Usage and Device License You can issue a QR/Barcode to a user and use it as an authentication method. Scan the QR/Barcode properly by following the instructions on the screen to increase the recognition rate. How to scan a QR/Barcode 5 ~ 20 cm •...
X-Station 2 will be installed. • If installing X-Station 2 on a concrete wall, drill holes, insert PVC anchors, and fix them with fixing screws. • To avoid RF interference, a minimum separation distance must be maintained.
Page 12
Installation Assemble the cable cover and install X-Station 2 onto the fixed bracket. Connect X-Station 2 to the bracket by rotating the product fixing screw of X-Station 2.
DC power 12 - PWR +VDC Red 10 - PWR GND Black (white stripe) X-Station 2 • Use the IEC/EN 62368-1 approved power adapter that supports higher power consumption than the product. If you wish to connect and use another device to the power supply adapter, you should use an adapter with a current capacity which is the same or larger than the total power consumption required for the terminal and another device.
You can connect the product to a hub using a general type CAT-5 cable. X-Station 2 LAN connection (connecting to a PC directly) X-Station 2 has an automatic MDI/MDIX function so that it can be connected to a PC directly using a normal straight type CAT-5 cable or a cross cable. X-Station 2...
NOT recommended to use the internal relay of a reader to prevent any tampering attacks which can potentially trigger the door unlock. For such applications, it is highly recommended to use a separate relay unit for a lock control such as Suprema’s Secure I/O 2, DM-20 or CoreStation installed at a secure side of a door.
NOT recommended to use the internal relay of a reader to prevent any tampering attacks which can potentially trigger the door unlock. For such applications, it is highly recommended to use a separate relay unit for a lock control such as Suprema’s Secure I/O 2, DM-20 or CoreStation installed at a secure side of a door.
Installation Automatic door connection 18 - RLY NO Gray (white stripe) 14 - RLY COM Green (white stripe) Door button Detection sensor Door lock Automatic door control device X-Station 2...
Installation Connecting as a standalone X-Station 2 can be connected to the door lock, door button, and door sensor directly without connecting a separate I/O device. TTL connection 11 - TTL IN0 Purple 13 - TTL IN1 Brown 9 - TTL GND...
Connecting to Secure I/O 2 Secure I/O 2 is an I/O device, can be connected to X-Station 2 with the RS-485 cable. Security can be maintained even if the connection between X-Station 2 and Secure I/O 2 has been lost or the power supply to X-Station 2 has been shut off due to external factors.
Installation Wiegand connection Use as a Wiegand input or output device RFID reader / Controller 22 - WG D0 Green 21 - WG D1 White 20 - WG GND Black X-Station 2...
KC, CE, UKCA, FCC, RCM (Compliance: RoHS, REACH, WEEE) Image dimension 300 x 400 pixels Resolution 500 dpi Template SUPREMA / ISO19794-2, ANSI-378 Fingerprint Extractor / Matcher MINEX certified and compliant Sensor Certificates FBI PIV and FBI Mobile ID FAP20...
Page 23
1 A @ 30 VDC Inductive load DESFire EV2/EV3 cards are supported by having backward compatibility of DESFire EV1 cards. CSN and smart card functions are compatible with X-Station 2. RF read range will vary depending on installation environment. Supports QR/Barcodes composed of up to 32 ASCII code strings.
This product is CE marked according to the provisions of the Radio Equipment Directive (RED) 2014/53/EU. Hereby, Suprema Inc. declares that this product is in compliance with the essential requirements and other relevant provisions of Radio Equipment Directive (RED) 2014/53/EU.
Information in this document is provided in connection with Suprema products. • The right to use is acknowledged only for Suprema products included in the terms and conditions of use or sale for such products guaranteed by Suprema. No license, express or implied, by estoppel or otherwise, to any intellectual property is granted by this document.
Appendices Open Source License • The software of this product is based on "Linux Kernel 4.x", which is licensed under GPL. As for GPL, please refer to GNU General Public License in this manual. • This product uses the "BoringSSL", which is licensed under the OpenSSL and Original SSLeay licenses. As for the OpenSSL and Original SSLeay licenses, please refer to BoringSSL License in this manual.
Appendices TERMS AND CONDITIONS 0. Definitions. “This License” refers to version 3 of the GNU General Public License. “Copyright” also means copyright-like laws that apply to other kinds of works, such as semiconductor masks. “The Program” refers to any copyrightable work licensed under this License. Each licensee is addressed as “you”. “Licensees”...
Page 29
Appendices 2. Basic Permissions. All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, given its content, constitutes a covered work.
Page 30
Appendices 6. Conveying Non-Source Forms. You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways: a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange.
Page 31
Appendices 7. Additional Terms. “Additional permissions” are terms that supplement the terms of this License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law.
Page 32
Appendices 9. Acceptance Not Required for Having Copies. You are not required to accept this License in order to receive or run a copy of the Program. Ancillary propagation of a covered work occurring solely as a consequence of using peer-to-peer transmission to receive a copy likewise does not require acceptance.
Page 33
Appendices A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted under this License. You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software, under which you make payment to the third party based on the extent of your activity of conveying the work, and under which the third party grants, to any of the parties who would receive the covered work from you, a...
Appendices 17. Interpretation of Sections 15 and 16. If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms, reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program, unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee.
Appendices Original SSLeay License Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code;...
Appendices The code in third_party/fiat carries the MIT license: Copyright (c) 2015-2016 the fiat-crypto authors (see https://github.com/mit-plv/fiat-crypto/blob/master/AUTHORS). Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the...
Appendices Apache License Version 2.0, January 2004 (http://www.apache.org/licenses/) TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 0. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. "Licensor"...
Page 38
Appendices 3. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions: (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and (b) You must cause any modified files to carry prominent notices stating that You changed the files;...