Quick Start Guide Foreword General This manual introduces the wiring, installation and basic operations of the Access Controller. Read carefully before using the device, and keep the manual safe for future reference. Safety Instructions The following signal words might appear in the manual. Signal Words Meaning Indicates a high potential hazard which, if not avoided, will result in...
Page 3
Quick Start Guide About the Manual The manual is for reference only. Slight differences might be found between the manual and the ● product. We are not liable for losses incurred due to operating the product in ways that are not in ●...
Quick Start Guide Important Safeguards and Warnings This section introduces content covering the proper handling of the Access Controller, hazard prevention, and prevention of property damage. Read carefully before using the Access Controller, and comply with the guidelines when using it. Transportation Requirement Transport, use and store the Access Controller under allowed humidity and temperature conditions.
Page 5
Quick Start Guide Operation Requirements Check whether the power supply is correct before use. ● Do not unplug the power cord on the side of the Access Controller while the adapter is powered ● Operate the Access Controller within the rated range of power input and output. ●...
Quick Start Guide Table of Contents Foreword........................................I Important Safeguards and Warnings..............................III 1 Dimensions and Appearance................................1 2 Ports Overview......................................4 3 Wring of Locks....................................... 11 3.1 Wiring of Magnetic Locks..............................11 3.1.1 Wring of Dual Magnetic Locks with PoE (12V and Relay)................11 3.1.2 Wring of Dual Magnetic Locks with 12 V External Power Supply (12 V and Relay)......
Quick Start Guide 2 Ports Overview Figure 2-1 Ports Table 2-1 Ports description Name Description READER1 Reader connector READER2 Reader connector Auxiliary connector (including door detector, door exit button, and alarm input). DC IN Power connector ALM_OUT Alarm output connector RJ45 Network connector (PoE) —...
Page 11
Quick Start Guide Name Description LOCK Power lock connector STATUS LED indicator RS485 RS485 connector (not used) AUDIO Audio connector (not used) Figure 2-2 Reader connector Table 2-2 Reader connector description Port Description 12 V Supplies 12 VDC power for the reader. Connects the grounding wire.
Page 12
Quick Start Guide Port Port Name Indicator color Status Solid yellow and green Lock open Lock 2 indicator Solid red Lock closed Lock 1 indicator Solid yellow and green Lock open Figure 2-4 Auxiliary I/O ports Table 2-4 Description of auxiliary I/O ports Ports Description Door detector for door 1...
Page 13
Quick Start Guide Figure 2-5 Power ports Table 2-5 Description of power ports Ports Description – Grounding wire 12 VDC. For powering the Access Controller when not using Power over Ethernet. Figure 2-6 Alarm output ports...
Page 14
Quick Start Guide Table 2-6 Description of alarm output ports Ports Description OUT2+ Alarm output 2 OUT2- OUT1+ Alarm output 1 OUT1- Figure 2-7 Relay ports Table 2-7 Description of relay ports Ports Description REL1 Connects to relay devices. Max voltage = +12 VDC Max load = 500 mA REL2 Connect locks to the pins according to the wiring diagram generated through the hardware configuration.
Page 15
Quick Start Guide Figure 2-8 Lock ports Table 2-8 Description of lock Ports Description L1/L2 Power one or two locks (DC output). The lock connector can also be used to power external devices. Connects to lock. 12 VDC Max total load = 1000 mA REL2 For controlling up to 12 V lock.
Page 16
Quick Start Guide Table 2-9 Description of RS-485 Ports Description 485A/485B Reserved port. Not used. Grounding wire. Figure 2-10 Audio ports Table 2-10 Description of audio ports Ports Description MIC+ Reserved port. Not used. MIC- Grounding wire. SPK+ Reserved port. Not used. SPK- Grounding wire.
Quick Start Guide 3 Wring of Locks This section use lock wiring of two-door solution as an example. The wiring of lock might differ depending on the lock type that you configured. configure lock for Relay. ● Relay Open = Unlocked: Set the lock to unlock when the relay is open. Relay Open = Locked: Set the lock to remain locked when the relay is open.
Quick Start Guide Figure 3-3 Wiring of locks 3.1.2 Wring of Dual Magnetic Locks with 12 V External Power Supply (12 V and Relay) Supply power for the Access Controller through 12 V external power supply. One door uses the external power supply, and the other uses the Access Controller to supply power.
Quick Start Guide Figure 3-5 Lock 2 (door 2) 3. Wiring the locks according to the diagram below. Figure 3-6 Wiring of locks 3.1.3 Wring of Dual Magnetic Locks with 12 V External Power Supply (Relay) Supply power for the Access Controller through 12 V external power supply. Both doors use the external power supply.
Page 20
Quick Start Guide Figure 3-7 Lock 1 (door 1) 2. Select Relay Open = Unlocked from the Relay list for lock 2 (door 2). Figure 3-8 Lock 2 (door 2) 3. Wiring the locks according to the diagram below. Figure 3-9 Wiring of locks...
Quick Start Guide 3.1.4 Wring of 2-in-1 Magnetic Lock with 12 V External Power Supply (Relay) Supply power for the Access Controller through 12 V external power supply. Both doors use the external power supply. 1. Select Relay Open = Unlocked from the Relay for lock 1 (door 1). Figure 3-10 Lock 1 (door 1) 2.
Quick Start Guide Figure 3-12 Wiring of locks 3.2 Wiring of Electric Strike Lock 3.2.1 Wring of Dual Electric Strikes with PoE Supplies power for the Access Controller over the same Ethernet cable. Both doors use the external power supply. 1.
Quick Start Guide Figure 3-14 Lock 2 (door 2) 3. Wiring the locks according to the diagram below. Figure 3-15 Wiring of locks 3.2.2 Wring of Dual Electric Strikes with 12 V External Power Supply Supply power for the Access Controller through 12 V external power supply. Both doors use the external power supply.
Page 24
Quick Start Guide Figure 3-16 Lock 1 (door 1) 2. Select Fail Secure from the 12V list for door 2. Figure 3-17 Lock 2 (door 2) 3. Wiring the locks according to the diagram below.
Page 25
Quick Start Guide Figure 3-18 Wiring of locks...
Quick Start Guide 4 Installation 4.1 Wall Mount Procedure Step 1 Paste the positioning map to the wall at an appropriate position. Step 2 Drill holes through the marks on the map. Step 3 Hammer in the expansion tubes, and then remove the map. Figure 4-0 Hammer in the expansion tubes Step 4 Slide up the front panel of the Access Controller and remove the panel.
Page 27
Quick Start Guide Figure 4-1 Remove the front panel Step 5 Attach the back panel of the Access Controller to the wall with self-tapping screws. Step 6 Wire the Access Controller, bind the wires with nylon cable ties, and then cut off the excess part of the ties.
Quick Start Guide Figure 4-2 Mount the Access Controller to the wall Step 9 Remove the protection film. 4.2 DIN Rail Mount Procedure Step 1 Attach the DIN rail to the wall with screws. The DIN rail does not come with the Access Controller. Step 2 Hook the lower DIN clip of the back panel onto the bottom of the DIN rail, slightly push upwards the back panel, and then push the back panel backwards to hook the upper DIN...
Page 29
Quick Start Guide Figure 4-3 DIN clips Figure 4-4 Hook DIN clips to the rail Step 3 Slide up the front panel of the Access Controller to remove the cover. Step 4 Wire the Access Controller, bind the wires with nylon cable ties, and then cut off the excessive part of the ties.
Page 30
Quick Start Guide Step 5 Align the marks on the front panel with the marks on the back panel, and then slide down the front cover to attach it. Figure 4-5 slide down the front cover Step 6 Screw a screw into the bottom of the Access Controller to secure it. Step 7 Remove the protection film.
Quick Start Guide 5 Access Control Configurations 5.1 Networking Diagram The main controller comes with a management platform (herein referred as the platform). Sub controller needs to be added to the management platform of the main controller. The main controller can manage up to 19 sub controllers. Figure 5-0 Networking diagram 5.2 Configurations of Main Controller 5.2.1 Configuration Flowchart...
Quick Start Guide 5.2.2 Initialization Initialize the main controller when you log in to the webpage for the first time or after it is restored to its factory defaults. Prerequisites Make sure that the computer used to log in to the webpage is on the same LAN as the main controller.
Quick Start Guide Step 6 (Optional) Select Auto Check for Updates , and then click Completed. The system automatically check is there any higher version available, and inform the user to update the system. The system automatically checks for new updates, and informs you when a new update is available.
Page 34
Quick Start Guide Step 4 Configure the parameters of the doors. Figure 5-4 Configure door parameters Table 5-1 Parameter description Parameter Description Select the card reader protocol. Wiegand: Connects to a Wiegand reader. You can connect the ● LED wire to the LED port of the controller, and the reader will Entry Card Reader beep and flash when the door unlocks.
Page 35
Quick Start Guide Parameter Description Relay open = unlocked: Sets the lock to unlock when the relay is open. The electromagnetic lock unlocks in a instant and locks again immediately when the Access Controller is in the soft reboot. Step 5 Configure access control parameters.
Page 36
Quick Start Guide Parameter Description The Bluetooth unlock range might differ depending on models of your phone and the environment. After a person is granted access, the door will remain unlocked Door Unlock Duration for a defined time for them to pass through. It ranges from 0.2 s to 600 s.
Page 37
Quick Start Guide Figure 5-7 Wiring diagram Step 10 Click Apply. You can go to Local Device Config > Hardware to change the settings after you ● successfully log in to the platform. Click Download Image to download the diagram to your computer. ●...
Quick Start Guide 5.2.4 Adding Devices You can add devices to the management platform of the main controller in batches or one by one. If the controller was set to the main controller while you were going through the login wizard, you can add and manage sub controllers through the Platform.
Page 39
Quick Start Guide Figure 5-9 Successfully add devices If the controller was set as the main controller while you were going through the login wizard, the controller will be added to the management platform automatically and function as both the main controller and sub controller. Related Operations : Edit the information on the device.
Quick Start Guide All devices that were searched for will be displayed. You can select devices from the list, and click Device Initialization to initialize them in batches. To ensure the security of devices, initialization is not supported for devices on different segments.
Page 41
Quick Start Guide Figure 5-11 Add department Click OK. Step 3 5.2.5.2 Adding Roles Procedure Step 1 On the home page, select Person Management. Step 2 Create roles. The following roles already exist and cannot be modified or deleted: Default, Manager, ●...
Page 42
Quick Start Guide Figure 5-12 Basic information on the user Table 5-5 Parameters description Parameter Description User ID The ID of the user. The department that the user belongs to. For details on how to create Department departments, see "5.2.5.1 Adding Departments". Set a date on which the access permissions of the person will become Validity Period effective.
Page 43
Quick Start Guide Parameter Description Other User : When they unlock the door, the door will stay unlocked for 5 more seconds. Unlock Attempts The number of times a guest user can unlock the door. b. Click Add. You can click Add More to add more users. Add users through importing the template.
Page 44
Quick Start Guide Figure 5-13 Quick add c. Select the department, role and the effective time. d. Issue cards to the users in batches. You can manually enter the card number, or use the enrollment reader or card reader to read the card number. For details, see "5.2.5.4.2 Adding Cards". Related Operations Batch Edit: Edit personal information in batches.
Page 45
Quick Start Guide Figure 5-14 Batch edit 5.2.5.4 Adding Authentication Methods Add password, cards, fingerprint or Bluetooth cards to users, so that users can unlock the door through authentication. Each user can have up to 1 password, 5 IC/ID cards, 3 fingerprints, and 5 Bluetooth cards.
Page 46
Quick Start Guide Figure 5-15 Add the password 5.2.5.4.2 Adding Cards Add IC cards or ID cards to users for them to gain access by swiping their cards Procedure Step 1 (Optional) Before you assign cards to users, set the card type and the type of card number.
Page 47
Quick Start Guide b. Enter the card number, and then click Add. Use the enrollment reader to read the card number. ● Figure 5-16 Use the enrollment reader to read the card number a. Click Add. b. Click Modify , and then select Enrollment Reader. Make sure that the card enrollment reader is connected to your computer.
Page 48
Quick Start Guide Figure 5-17 Use the card reader to read the card number a. Click Modify, and then select a card reader. Make sure that the card reader is connected to the Access Controller. b. Click Read Card, and then swipe the cards on the card reader. A 60-second countdown is displayed to remind you to swipe the card, and the system will read the card number automatically.
Page 49
Quick Start Guide Figure 5-18 Issue cards through the enrollment reader or card reader Related Operations : Change the number of the card. ● : Set the card to duress card. ● An alarm is triggered when people use the duress card to unlock the door. : Delete the card.
Page 50
Quick Start Guide Step 2 Connect a fingerprint scanner to the computer, and follow the on-screen instructions to register the fingerprint. Step 3 Click Add. 5.2.5.4.4 Adding Bluetooth Cards Add Bluetooth cards to users for them to gain access through Bluetooth cards. Prerequisites The Bluetooth unlock function has been turned on.
Page 51
Quick Start Guide Figure 5-19 Flowchart for configuring Bluetooth unlock Procedure On the tab, click Bluetooth Card. Step 1 3 methods are available to add Bluetooth cards.
Page 52
Quick Start Guide Request through Email one by one: Click Request through Email. ● A Bluetooth card is generated automatically. You can generate up to 5 cards for each user. Figure 5-20 Request through Email Request through Email in batches. ●...
Page 53
Quick Start Guide Figure 5-21 Batch issue cards If you have requested Bluetooth cards for the user before, you can add the Bluetooth ● cards through registration code. using registration codes. Figure 5-22 The flowchart for requesting through registration code a.
Page 54
Quick Start Guide c. On the Bluetooth Card tab, click Request through Registration Code, paste the registration code, and then click OK. Figure 5-23 Request through registration code d. Click OK. The Bluetooth card is added. Click OK. Step 2 Results After users sign up and log in to DMSS with the Email address, they can open DMSS to unlock the door through Bluetooth cards.
Page 55
Quick Start Guide Figure 5-24 Unlock the door through Bluetooth cards Related Operations Users can manage Bluetooth cards on DMSS. ● Move to the Top: If multiple Bluetooth cards have been added, you can move cards to the top that are currently in use. Rename: Rename the Bluetooth card.
Quick Start Guide View the request records: On the Person Management page, click More > Bluetooth Card ● Records to view the request status. Figure 5-25 Request status View Details: View the details of the request, including user information, reasons for failed requests and more.
Quick Start Guide Figure 5-26 Create the weekly plan Step 3 Drag the slider to adjust the time period for each day. You can also click Copy to apply the configured time period to other days. You can only configure up to 4 time sections for each day. Step 4 Click Apply.
Quick Start Guide Figure 5-27 Add areas Step 3 Enter the name of the area. Step 4 Select doors. Click Apply. Step 5 5.2.8 Adding Permission Rules By creating permissions rules, you can assign access permissions to users by linking them to the areas.
Page 59
Quick Start Guide Dept: All personnel in the department will be assigned with access permissions. ● Role: All personnel with these roles will be assigned with access permissions. ● User: Only selected users will be assigned with access permissions. ● When you want to assign permission to a new person or change access permissions for an existing person, you can simply add the user in a existing department or link them with a existing role, they will be automatically assigned access permissions set...
Quick Start Guide Figure 5-30 Add area In the Time Templates area, select the weekly plan and the holiday plan. Step 6 Step 7 Click Apply. Related Operations 5.2.9 Viewing Authorization Progress After you assign access permissions to users, you can view the authorization process. Procedure On the home page, select Access Control Config >...
Quick Start Guide 5.2.10 Configuring Global Alarm linkages (Optional) You can configure global alarm linkages across different Access Controllers. Procedure Select Access Control Config > Global Alarm Linkage. Step 1 When you have configured both global alarm linkages and local alarm linkages, and if ●...
Quick Start Guide Figure 5-33 Door linkage c. Click Enable to turn on the door linkage function. Figure 5-34 Door linkage If you turn on link fire safety control, all door linkages will automatically change to the Always Open status, and all the doors will open when the fire alarm is triggered. d.
Page 63
Quick Start Guide Procedure On the home page, select Local Device Config > Network Setting > Cloud Service. Step 1 Step 2 Turn on the cloud service function. The cloud service function is turned on by default. Figure 5-35 Cloud service Click Apply.
Quick Start Guide 5.3 Configurations of Sub Controller You can log in to the webpage of the sub controller to configure it locally. 5.3.1 Initialization Initialize the sub controller when you log in to the webpage for the first time or after the sub controller is restored to its factory default settings.
IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks. Below are some tips and recommendations from Dahua on how to create a more secured security system.
Page 66
● to private networks. Enable IP/MAC address filtering function to limit the range of hosts allowed to access the ● device. More information Please visit Dahua official website security emergency response center for security announcements and the latest security recommendations.
Need help?
Do you have a question about the ASC3202B and is the answer not in the manual?
Questions and answers