suprema FSF2-AB User Manual
Hide thumbs Also See for FSF2-AB:

Advertisement

Quick Links

FaceStation F2
USER GUIDE
Version 1.10
English
EN 102.00.FSF2-DB, FSF2-AB V1.10

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the FSF2-AB and is the answer not in the manual?

Questions and answers

Summary of Contents for suprema FSF2-AB

  • Page 1 FaceStation F2 USER GUIDE Version 1.10 English EN 102.00.FSF2-DB, FSF2-AB V1.10...
  • Page 2: Table Of Contents

    CONTENTS Safety instructions Authentication Instructional icons Auth Mode Registering auth mode Modifying Auth Mode Introduction Delete Auth Mode Server Matching Components Face Name and function of each part Cables and connectors T&A Mode Correct face enrollment and authentication method Display & Sound Admin Menu Network All Menus...
  • Page 3 CONTENTS Device Product specifications Relay Dimensions Date & Time FCC compliance information Daylight Saving Time Device Info EU Declaration of Conformity (CE) Memory Info USB Memory Appendices Secure Tamper Disclaimers Restart Device Copyright notice Restore Default Open Source License GNU General Public License User ID Type TERMS AND CONDITIONS BoringSSL License...
  • Page 4: Safety Instructions

    Safety instructions Please read this safety instructions before you use the product to prevent injury to yourself and others and to prevent property damage. The term ‘product’ in this manual refers to the product and any items provided with the product. Instructional icons Warning: This symbol indicates situations that could result in death or severe injury.
  • Page 5 The product may be affected by radio frequencies emitted by other products and the product may malfunction. Use the IEC/EN 62368-1 approved power adapter that supports higher power consumption than the product. It is highly recommended to use the power adapter sold by Suprema. •...
  • Page 6 Safety instructions Caution Operation Do not drop the product or cause impacts to the product. • The product may malfunction. Do not disconnect the power supply while upgrading the firmware of the product. • The product may malfunction. Do not disclose the password to others and change it regularly. •...
  • Page 7: Introduction

    When assembling the product with the bracket, you can use the included bracket fixing screw (Star Shaped) instead of the product fixing screw for enhanced security. • For more details regarding the product installation, visit the Suprema website (https://www.supremainc.com) and refer to the installation guide.
  • Page 8: Name And Function Of Each Part

    Introduction Name and function of each part LED Lamp Visual Camera Infrared Camera LCD Screen RF card and mobile access card authentication unit Speaker Ethernet TTL Input (4 pins) Relay (3 pins) Wiegand Input/Output Power Supply (2 pins) (4 pins) SAM Card Slot RS-485 (4 pins) USB (Type-C) Memory Slot...
  • Page 9: Cables And Connectors

    Introduction Name Description Power Supply (2 pins) Connect the power supply cable. RS-485 (4 pins) Connect the RS-485 cable. SAM Card Slot Insert the SAM card. USB (Type-C) Memory Slot Connects the USB memory. Cables and connectors Power supply Name Color PWR +VDC Red (white stripe)
  • Page 10 Introduction TTL input Name Color TTL IN0 TTL IN1 Yellow TTL GND Black SH GND Gray Wiegand input and output Name Color WG D0 Green WG D1 White WG GND Black SH GND Gray...
  • Page 11: Correct Face Enrollment And Authentication Method

    Introduction Correct face enrollment and authentication method Cautions for enrolling a face • When enrolling a face, maintain a distance of 60 – 100 cm between the device and the face. • Do not change your face expression. • Do not wear masks, hats, or eye patches. •...
  • Page 12: Admin Menu

    Admin Menu All Menus Press and authenticate with the Admin level credential. Select the desired menu. If the administrator has not been designated, the menu screen will be displayed when you press...
  • Page 13: User

    User Registering user information The user information including credentials can be registered. Press and authenticate with the Admin level credential. → Select USER , and choose a credential you want to register. There are two steps for the user registration. Some options are available after the credential has been registered. •...
  • Page 14: Registering A Face

    User • Period: Set an expiry date to use the user account. • Extended Private Auth Mode: Change the authentication method according to the user. You can set whether to use the extended private auth mode. this mode allows you to combine user authentication methods, including both faces.
  • Page 15: Delete All Users

    User Delete All Users You can delete all registered users at once. Press and authenticate with the Admin level credential. → Select USER Check Delete All to delete all registered users and press OK. When you press OK, all registered users will be deleted. View User Usage You can see the number of registered users and cards at a glance.
  • Page 16: Authentication

    Authentication Auth Mode Set the authentication mode. You can make a combination of face, PIN, card, or ID and you can also set a schedule for each authentication mode. Registering auth mode Press and authenticate with the Admin level credential. →...
  • Page 17: Server Matching

    Authentication Server Matching You can set the server matching. When this option is activated, it performs user authentication matching in BioStar 2, not in the device. It can be used when the device has too much user information or when the device is installed outside. Press and authenticate with the Admin level credential.
  • Page 18 Authentication • Security Level: Set the security level for 1:N authentication. • Operation Mode: Set the operation mode of the device when the face is authenticated. - Fusion Matching: Use both visual and infrared cameras to increase the face authentication accuracy. - Fast Matching: The device authenticates users who pass an access point without a pause within the authentication distance.
  • Page 19 Authentication - ROI X(%), ROI Y(%), ROI Width(%), ROI Height(%): You can set the ROI manually when you disable Dynamic ROI. Set the temperature measurement area by adjusting the size and position of ROI (Region of Interest). To move the ROI horizontally (left or right), change the ROI X(%) value. The ROI moves to the right as entering a larger value.
  • Page 20: T&A Mode

    Authentication • It is not possible to use both face authentication with a mask on and thermal camera features on a slave device. • The supported thermal camera is TCM10-FSF2. T&A Mode You can set how to register T&A Mode. Press and authenticate with the Admin level credential.
  • Page 21: Display & Sound

    Voice Instruction: Set to use the voice instruction instead of alarm sounds. • Volume: Set the volume. Refer to the BioStar 2 Device SDK webpage on the Suprema Knowledge Base website (kb.supremainc.com/bs2sdk/) for more information on the BioStar 2 Device SDK.
  • Page 22: Network

    Network Network Settings You can change the network settings of the device. Ethernet Press and authenticate with the Admin level credential. → Select NETWORK Ethernet. Change the desired item. • DHCP: Set whether to use DHCP. If DHCP setting is disabled, the user can modify Port, IP Address, Gateway, Subnet Mask, and DNS.
  • Page 23: Server

    Network Server Press and authenticate with the Admin level credential. → Select NETWORK Server. Change the desired item. → • Device Server: You can send a connection signal from the device to a server with the input information directly. -> When you select Server Device, Server IP, Server URL and Server Port cannot be entered.
  • Page 24: Device

    Device Relay You can set the open time and the input port of the exit button in the device. Press and authenticate with the Admin level credential. → Select DEVICE Relay. • Relay: You can set whether relay is enabled or not. To set the open time and the input port of the exit button, activate this option.
  • Page 25: Date & Time

    Device Date & Time You can set date and time. Set the date and time accurately in order to collect accurate log data. Press and authenticate with the Admin level credential. → Select DEVICE Date & Time. Change the desired item. •...
  • Page 26: Daylight Saving Time

    Device Daylight Saving Time You can use the device by applying daylight saving time. Set the start and end time correctly. Press and authenticate with the Admin level credential. → Select DEVICE Daylight Saving Time and press to add additional daylight-saving time. Select the desired item and change the setting.
  • Page 27: Device Info

    Device Device Info You can view the model name, device ID, serial number, firmware version of device ID, and MAC address. Press and authenticate with the Admin level credential. → Select DEVICE Device Info. You can view the information including Model Name, Device ID, Serial No., HW, FW, Kernel, and MAC.
  • Page 28: Usb Memory

    Device USB Memory Connect USB Memory and import user information to the device or export log and user information from the device. Upgrade the firmware. Press and authenticate with the Admin level credential. → Select DEVICE USB Memory. Select the desired item and change the setting. •...
  • Page 29: Secure Tamper

    Device • When upgrading firmware from version 1.0.5 or earlier to version 1.1.0 or later, it starts of migration of face templates registered. It may take up to 10 hours depending on the amount of data. • It is recommended to use a USB flash drive formatted in NTFS or exFAT. USB flash drives in FAT32 format may malfunction when more than 50,000 face credentials are stored.
  • Page 30: Restore Default

    Device Restore Default Device settings, network settings, and operator levels will be reset. Press and authenticate with the Admin level credential. → Select DEVICE Restore Default. • All settings: You can reset all settings stored on the device. Press OK to reset all device settings. •...
  • Page 31: Event Log

    Event Log Search Log You can set a condition and search a log. Press and authenticate with the Admin level credential. Select EVENT LOG. All event logs appear. Press to search a specific log and change the condition. Press OK. A log that matches the condition will be displayed on the screen. Delete All Logs You can delete all saved logs.
  • Page 32: View Log Usage

    Event Log View Log Usage You can check the status of log usage. Press and authenticate with the Admin level credential. → Select EVENT LOG . You can check the capacity of event and image logs on the device.
  • Page 33: Troubleshooting

    Troubleshooting This troubleshooting provides information to solve unexpected issues that you may encounter when using the device. Category Problem Solution • If the terminal and the bracket are far away from each other, the The power is being supplied device may not operate due to the temper switch. but the device does not operate.
  • Page 34: Product Specifications

    FSF2-DB: 125 kHz EM & 13.56 MHz MIFARE, MIFARE Plus, DESFire, DESFire EV1/EV2/EV3 , FeliCa RF Option • FSF2-AB: 125 kHz EM, HID Prox & 13.56 MHz MIFARE, MIFARE Credential Plus, DESFire, DESFire EV1/EV2/EV3 , FeliCa, iCLASS SE/SR/Seos RF Read Range...
  • Page 35 Product specifications Category Feature Specification Ethernet Supported (10/100 Mbps, auto MDI/MDI-X) RS-485 1 ch Master / Slave (Selectable) RS-485 Communication Protocol OSDP V2 compliant Wiegand 1 ch Input / 1 ch Output (Selectable) Interface TTL Input 2 ch Inputs Relay 1 Relay USB 2.0 (Host) Tamper...
  • Page 36: Dimensions

    Product specifications Dimensions (Unit: mm) 98.4 23.5 119.8 223.3...
  • Page 37: Fcc Compliance Information

    This product is CE marked according to the provisions of the Radio Equipment Directive (RED) 2014/53/EU. Hereby, Suprema Inc. declares that this product is in compliance with the essential requirements and other relevant provisions of Radio Equipment Directive (RED) 2014/53/EU.
  • Page 38: Appendices

    Information in this document is provided in connection with Suprema products. • The right to use is acknowledged only for Suprema products included in the terms and conditions of use or sale for such products guaranteed by Suprema. No license, express or implied, by estoppel or otherwise, to any intellectual property is granted by this document.
  • Page 39: Open Source License

    Appendices Open Source License • The software of this product is based on "Linux Kernel 4.x", which is licensed under GPL. As for GPL, please refer to GNU General Public License in this manual. • This product uses the "BoringSSL", which is licensed under the OpenSSL and Original SSLeay licenses. As for the OpenSSL and Original SSLeay licenses, please refer to BoringSSL License in this manual.
  • Page 40: Terms And Conditions

    Appendices TERMS AND CONDITIONS 0. Definitions. “This License” refers to version 3 of the GNU General Public License. “Copyright” also means copyright-like laws that apply to other kinds of works, such as semiconductor masks. “The Program” refers to any copyrightable work licensed under this License. Each licensee is addressed as “you”. “Licensees”...
  • Page 41 Appendices 2. Basic Permissions. All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, given its content, constitutes a covered work.
  • Page 42 Appendices 6. Conveying Non-Source Forms. You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways: a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange.
  • Page 43 Appendices 7. Additional Terms. “Additional permissions” are terms that supplement the terms of this License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law.
  • Page 44 Appendices 9. Acceptance Not Required for Having Copies. You are not required to accept this License in order to receive or run a copy of the Program. Ancillary propagation of a covered work occurring solely as a consequence of using peer-to-peer transmission to receive a copy likewise does not require acceptance.
  • Page 45 Appendices A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted under this License. You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software, under which you make payment to the third party based on the extent of your activity of conveying the work, and under which the third party grants, to any of the parties who would receive the covered work from you, a...
  • Page 46: Boringssl License

    Appendices 17. Interpretation of Sections 15 and 16. If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms, reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program, unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee.
  • Page 47: Original Ssleay License

    Appendices Original SSLeay License Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code;...
  • Page 48: Licenses For Support Code

    Appendices The code in third_party/fiat carries the MIT license: Copyright (c) 2015-2016 the fiat-crypto authors (see https://github.com/mit-plv/fiat-crypto/blob/master/AUTHORS). Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the...
  • Page 49: Apache License

    Appendices Apache License Version 2.0, January 2004 (http://www.apache.org/licenses/) TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 0. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. "Licensor"...
  • Page 50 Appendices 3. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions: (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and (b) You must cause any modified files to carry prominent notices stating that You changed the files;...
  • Page 51 QR code. https://supremainc.com/en/about/global-office.asp © 2024 Suprema Inc. Suprema and identifying product names and numbers herein are registered trade marks of Suprema, Inc. All non-Suprema brands and product names are trademarks or registered trademarks of their respective companies.

This manual is also suitable for:

Fsf2-dbFacestation f2

Table of Contents