Dahua ASI6213S-PW User Manual
Dahua ASI6213S-PW User Manual

Dahua ASI6213S-PW User Manual

Face recognition access controller web 5.0
Table of Contents

Advertisement

Quick Links

Face Recognition Access
Controller Web 5.0
User's Manual
V1.3.1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the ASI6213S-PW and is the answer not in the manual?

Questions and answers

Summary of Contents for Dahua ASI6213S-PW

  • Page 1 Face Recognition Access Controller Web 5.0 User's Manual V1.3.1...
  • Page 2: Foreword

    Foreword General This manual introduces the functions and operations of the Face Recognition Access Controller (hereinafter referred to as the "Device"). Read carefully before using the device, and keep the manual safe for future reference. Safety Instructions The following signal words might appear in the manual. Signal Words Meaning Indicates a high potential hazard which, if not avoided, will result in...
  • Page 3 Version Revision Content Release Time Updated communication V1.2.0 settings, access control settings November 2023 and more. V1.1.0 Updated the manual. October 2023 V1.0.0 First Release. June 2023 Privacy Protection Notice As the device user or data controller, you might collect the personal data of others such as their face, audio, fingerprints, and license plate number.
  • Page 4: Table Of Contents

    Table of Contents Foreword................................I 1 Overview................................1 2 Local Operations.............................. 2 2.1 Basic Configuration Procedure......................2 2.2 Common Icons............................2 2.3 Standby Screen............................3 2.4 Initialization............................4 2.5 Logging In...............................4 2.6 Resetting the Password......................... 5 2.7 Unlocking Methods..........................6 2.7.1 Unlocking by Cards........................6 2.7.2 Unlocking by Face........................
  • Page 5 2.12.1 Configuring Time........................35 2.12.2 Configuring Face Parameters....................37 2.12.3 Setting the Volume......................... 38 2.12.4 Configuring the Language......................39 2.12.5 Screen Settings........................39 2.12.6 (Optional) Configuring Fingerprint Parameters..............39 2.12.7 Restoring Factory Defaults.....................40 2.12.8 Restarting the Device......................40 2.13 USB Management..........................40 2.13.1 Exporting to USB........................41 2.13.2 Importing from USB........................
  • Page 6 3.7.3 Using the Platform as the SIP server..................83 3.7.4 Call Config..........................86 3.8 Attendance Configuration........................87 3.8.1 Configuring Departments......................87 3.8.2 Configuring Shifts........................88 3.8.3 Configuring Holiday........................91 3.8.4 Configuring Work Schedules....................91 3.8.5 Configuring Attendance Modes....................94 3.9 Configuring Audio and Video......................96 3.9.1 Configuring Video........................
  • Page 7 3.14.7 Security Warning........................144 3.14.8 Security Authentication......................144 4 Phone Operations............................146 4.1 Initialization............................146 4.2 Logging in to the Webpage......................146 4.3 Home Page............................147 4.4 Person Management......................... 150 4.5 Configuring the System........................153 4.5.1 Viewing Version Information....................153 4.5.2 Maintenance..........................153 4.5.3 Configuring Time........................154 4.5.4 Data Capacity...........................156 4.6 Configuring Attendance........................
  • Page 8 5 Smart PSS Lite Configuration........................189 5.1 Installing and Logging In........................189 5.2 Adding Devices..........................189 5.2.1 Adding Device One by One.....................189 5.2.2 Adding Devices in Batches..................... 190 5.3 User Management..........................192 5.3.1 Configuring Card Type......................192 5.3.2 Adding Personnel........................192 5.3.3 Assigning Access Permission....................195 5.3.4 Assigning Attendance Permissions..................
  • Page 9: Overview

    1 Overview The Device is an access controller that supports unlocking through faces, passwords, fingerprints, cards, QR code, and their combinations. Based on the deep-learning algorithm, it features faster recognition and higher accuracy. It can work with management platform which meets various needs of customers.
  • Page 10: Local Operations

    2 Local Operations Configurations might differ depending on the actual product. ● Models with non-touch screen needs connecting a wired USB mouse. This section uses the ● models with touch screen as an example. External expansion modules are only available on select models. ●...
  • Page 11: Standby Screen

    2.3 Standby Screen You can unlock the door through faces, cards, passwords, and QR code. You can also make calls through the intercom function. Unlock methods might differ depending on the models of the product. If there is no operation in 30 seconds, the Device will go to the standby mode. ●...
  • Page 12: Initialization

    Table 2-2 Home screen description Name Description Date and time Current date and time. Enter user password, public password or temporary Password password to unlock the door. Tap the QR code icon and scan QR code to unlock the door. QR code For models that have a standalone QR code module or connect a QR expansion module.
  • Page 13: Resetting The Password

    Administrator account: Can log in to the main menu of the Device and has door access ● permissions. Procedure Step 1 Press and hold the standby screen for 1.5 seconds. Step 2 Select a verification method to enter the main menu. Face: Enter the main menu by face recognition.
  • Page 14: Unlocking Methods

    Step 10 Click OK. 2.7 Unlocking Methods You can unlock the door through faces, passwords, fingerprints, cards, and more. 2.7.1 Unlocking by Cards Place the card at the swiping area to unlock the door. This function is only available on select models. 2.7.2 Unlocking by Face Verify the identity of an individual by detecting their faces.
  • Page 15: Unlocking By Qr Code

    2.7.5 Unlocking by QR code The QR code method is available when the Device is used with the visitor module of DSS. Procedure Step 1 On the standby screen, tap The QR code icon is displayed only after you go to Functions > Face Recognition Interface Shortcut to enable QR code.
  • Page 16 Figure 2-3 Add the user Table 2-3 Parameters description Parameter Description The No. is like employee ID, which can be numbers, letters, and their combinations, and the maximum length of the No. is 30 characters. The name can have up to 32 characters (including numbers, symbols, and Name letters).
  • Page 17 Parameter Description Register fingerprints. A user can register up to 3 fingerprints, and you can set a fingerprint to the duress fingerprint. An alarm will be triggered when the duress fingerprint is used to unlock the door. Fingerprint Fingerprint function is only available on select models. ●...
  • Page 18: Viewing User Information

    Parameter Description General User : General users can unlock the door. ● Blocklist User : When users in the blocklist unlock the door, an blocklist ● alarm will be triggered. Guest User : Guests can unlock the door within a defined period or for ●...
  • Page 19: Configuring The Public Password

    Related Operations On the User screen, you can manage the added users. Search for users: Tap and then enter the username or user ID. ● Edit users: Tap the user to edit user information. ● Delete users ● Delete one by one: Select a user, and then tap Delete in batches: On the User List screen, tap to delete all users.
  • Page 20 Figure 2-5 Combination unlock Tap Unlock Method, and select unlock methods. Step 3...
  • Page 21 Figure 2-6 Unlock method Tap +And or /Or to configure combinations. Step 4 To cancel your selection, tap the selected method again. +And : ● Verify all the selected unlock methods to open the door. People have to complete verification in the order of card, fingerprint, face and password.
  • Page 22: Configuring Alarms

    Step 2 Tap Combination Unlock next to Unlock Method, and then select Unlock by Period from the list. For details on how to configure unlock by period, see "3.6.1.2 Configuring Unlock Methods". Step 3 to save changes. 2.9.1.3 Configuring Unlock by Multiple Users Procedure Step 1 Select Access Control Management.
  • Page 23 Figure 2-7 Alarm Table 2-4 Description of alarm parameters Parameter Description Users need to verify their identities both for entry and exit; otherwise an alarm will be triggered. This helps prevent card holders from giving their card to other people to allow them access. When anti-passback is enabled, the card holder must leave the secure area through an exit reader before the system will grant them access again.
  • Page 24: Configuring The Door Status

    Parameter Description Door Detector With the door detector wired to your device, alarms can be triggered when doors are opened or closed abnormally. There are 2 types of door detectors: NC detector and NO detector. Normally Closed: In this mode, a short circuit in the sensor indicates ●...
  • Page 25: Configuring The Verification Time Interval

    Table 2-5 Parameters description Parameter Description Normally Open : The door remains unlocked all the time. ● Normally Closed : The door remains locked all the time. ● Door Status Normal : If Normal is selected, the door will be locked and ●...
  • Page 26: Configuring Shifts

    Figure 2-10 Create departments Step 3 2.10.2 Configuring Shifts Configure shifts to define time attendance rules. Employees need to come to work at the time scheduled for their shift to start, and leave at the end time, except when they choose to work overtime.
  • Page 27 Figure 2-11 Create shifts Table 2-6 Shift parameters description Parameter Description Shift Name Enter the name of the shift. Period 1 Specify a time range when people can clock in and clock out for the workday. If you only set one attendance period, employees need to clock in and out by the designated times to avoid an anomaly appearing on their attendance records.
  • Page 28: Configuring Holiday Plans

    Figure 2-12 Time interval (even number) For example: If the interval is 120 minutes, then the clock-out time for period 1 is from 12:00 to 12:59, and the clock-in time for period 2 is from 13:00 to 14:00. If a person clocks out multiple times during period 1, the latest time will be valid, and if they clock in multiple times during period 2, the earliest time will be valid.
  • Page 29: Configuring Work Schedules

    Step 2 Click to add holiday plans. Step 3 Configure the parameters. Figure 2-14 Create holiday plans Table 2-7 Parameters description Parameter Description Attendance Holiday No. The number of the holiday. Attendance Holiday The name of the holiday. Start Time The start and end time of the holiday.
  • Page 30 Figure 2-15 Configure work schedules Procedure Select Attendance > Schedule Config. Step 1 Step 2 Set work schedules for individuals. 1. Tap Personal Schedule. 2. Enter the user ID, and then tap 3. On the calendar, select a day, and then select a shift. The shift is scheduled for the day.
  • Page 31 Figure 2-16 Schedule shifts to individuals 4. Tap Step 3 Set works schedules for departments. 1. Tap Department Schedule. 2. Tap a department, and then select shifts for a week. Shifts are scheduled for the week. 0 indicates rest. ● 1 to 24 indicates the number of the pre-defined shifts.
  • Page 32: Configuring Attendance Modes

    Figure 2-17 Schedule shifts to a department The defined work schedule is in a week cycle and will be applied to all employees in the department. Step 4 2.10.5 Configuring Attendance Modes When you clock in or clock out, you can set the attendance modes to define the attendance status. Procedure On the main menu screen, click Attendance .
  • Page 33 Figure 2-18 Enable attendance Click Mode Settings, and then select an attendance mode. Step 3 The attendance records will also be synchronized to the management platform. Figure 2-19 Attendance mode Table 2-8 Attendance mode Parameter Description The screen displays the attendance status automatically after you Auto/Manual Mode clock in or out, but you can also manually change your attendance status.
  • Page 34 Parameter Description The screen displays your attendance status automatically after you Auto Mode clock in or out. Manual Mode Manually select your attendance status when you clock in or out. When you clock in or out, the screen will display the pre-defined Fixed Mode attendance status all the time.
  • Page 35: Communication Settings

    Table 2-9 Attendance mode parameters Parameters Description Check In Clock in when your normal workday starts. Break Out Clock out when your break starts. Break In Clock in when your break ends. Check Out Clock out when your normal workday ends. Overtime Check In Clock in when your overtime period starts.
  • Page 36: Configuring The Ip Address

    2.11.1.1 Configuring the IP Address Set an IP address for the Device to connect it to the network. After that, you can log in to the webpage and the management platform to manage the Device. Procedure On the Main Menu, select Communication Settings > Network > IP Settings. Step 1 Step 2 Set the IP address.
  • Page 37 2.11.1.2 Configuring Auto Registration Add the device to a management platform, so that you can manage it on the platform. Procedure On the Main Menu, select Communication Settings > Network > Auto Registration. Step 1 To avoid exposing the system to security risks and data loss, control the management platform permissions.
  • Page 38 The Wi-Fi function is only available on select models. ● Wi-Fi AP and Wi-Fi function cannot be enabled at the same time. ● After Wi-Fi is enabled, wait about 1 minute to connect Wi-Fi. ● Step 3 to search available wireless networks. Step 4 Select a wireless network and enter the password.
  • Page 39 Wi-Fi AP and Wi-Fi function cannot be enabled at the same time. ● Every time you power on the Device, the Wi-Fi AP function will be automatically ● enabled for 30 minutes. Figure 2-26 Connect to Wi-Fi AP Related Operations You can also tap the right corner on the standby screen to view the Wi-Fi AP status.
  • Page 40: Configuring Rs-485

    Figure 2-27 Wi-Fi AP 2.11.2 Configuring RS-485 This function is only available on select models. Procedure On the Main Menu, select Communication Settings > RS-485 Settings. Step 1 Step 2 Select an external device.
  • Page 41 Figure 2-28 External device type Table 2-12 Port description External device Description The Device functions as a card reader and sends data to other external access controllers to control access. Output Data Type: Card Number : Outputs data based on the card number ●...
  • Page 42: Configuring Wiegand

    External device Description After the security module is enabled, the door exit button, lock control and fire linkage of the Device become not effective. You can verify the identification through the methods of ● face, card, fingerprint and password on the Device to unlock the door security module lock.
  • Page 43: System Settings

    Figure 2-29 Wiegand output Table 2-13 Description of Wiegand output Parameter Description Select a Wiegand format to read card numbers or ID numbers. Wiegand26 : Reads 3 bytes or 6 digits. ● Wiegand Output Type Wiegand34 : Reads 4 bytes or 8 digits. ●...
  • Page 44 Figure 2-30 Time Table 2-14 Description of time parameters Parameter Description 24-hour System The time is displayed in 24-hour format. Date & Time Set up the date. Time Set up the time. Date Format Select a date format. 1. Tap DST Setting and enable it. 2.
  • Page 45: Configuring Face Parameters

    2.12.2 Configuring Face Parameters Face parameters might differ depending on the models of the Device. Procedure On the main menu, select System Settings > Face Parameter Config. Step 1 Step 2 Configure the face parameters, and then tap Figure 2-31 Face parameter Table 2-15 Description of face parameters Name Description...
  • Page 46: Setting The Volume

    Name Description When the same face remains in front of the lens after the first Valid Face Interval (sec) successful recognition, the Device will perform recognition again for the face after a defined interval. When the same face remains in front of the lens after the first Invalid Face Interval (sec) failed recognition, the Device will perform recognition again for the face after a defined interval.
  • Page 47: Configuring The Language

    Table 2-16 Parameters description Parameters Description Speaker Volume Tap the volume, and then tap to adjust the volume. Microphone Volume When this function is enabled, touch screen devices will produce tap Screen Tap Sound sound and non-touch screen devices will produce mouse click sound. 2.12.4 Configuring the Language Change the language on the Device.
  • Page 48: Restoring Factory Defaults

    2.12.7 Restoring Factory Defaults Restoring the device to the factory settings might cause data loss. Please be advised. Restore through the Software 1. On the Main Menu, select System Settings > Factory Defaults. 2. Restore factory defaults if necessary. Restore the factory default settings if necessary. Factory Defaults : Resets all configurations and data except for IP settings and the type of ●...
  • Page 49: Exporting To Usb

    2.13.1 Exporting to USB You can export data from the Device to a USB. The exported data is encrypted and cannot be edited. Procedure On the Main Menu, select USB Management > USB Export. Step 1 Select the data type you want to export, and then tap OK. Step 2 When the data is exported in Excel, it can be edited.
  • Page 50 Figure 2-32 Functions...
  • Page 51 Table 2-17 Function description Parameter Description Password reset: The password can be reset when you turn on ● this function. Enable HTTPS: Hypertext Transfer Protocol Secure (HTTPS) is a ● protocol for secure communication over a computer network. When HTTPS is enabled, HTTPS will be used to access CGI commands;...
  • Page 52 Parameter Description Select identity verification methods on the standby screen. Password: Its icon is displayed on the standby screen. ● QR code: It's icon is displayed on the standby screen. ● This function is only available on select models. Doorbell: It's icon is displayed on the standby screen. ●...
  • Page 53: Records Management

    Parameter Description Select the function that the port can be used for. Port Config When the cables can be used as different functions, Port ● Config is displayed. The functions might differ according to the actual device ● models. 2.15 Records Management On the main menu, select Records Management >...
  • Page 54: Web Operations

    3 Web Operations On the webpage, you can also configure and update the Device. Web configurations differ depending on models of the Device. 3.1 Initialization Initialize the Device when you log in to the webpage for the first time or after the Device is restored to the factory defaults.
  • Page 55: Resetting The Password

    3.3 Resetting the Password Reset the password through the linked email when you forget the admin password. Procedure On the login page, click Forgot password. Step 1 Read the on-screen prompt carefully, and then click OK. Step 2 Step 3 Scan the QR code, and you will receive a security code.
  • Page 56: Person Management

    Figure 3-2 Home page Table 3-1 Home page description Description Main menu. : Enter the home page. ● : Select a language on the device. ● : Log out or restart the device. ● : Enter the Security page. ● : Scan the QR code with your phone to view the product ●...
  • Page 57 Figure 3-3 Add the user Table 3-2 Parameters description Parameter Description The User ID is like employee ID, which can be numbers, letters, and their combinations, and the maximum length of the number is 30 characters. The name can have up to 32 characters (including numbers, symbols, and Name letters).
  • Page 58 Parameter Description Department Add users to a department. If a department schedule is assigned to the person, they will follow the established department schedule. For how to create department, see "2.10.1 Configuring Departments". Department Schedule: Assign department schedule to the user. For details, ●...
  • Page 59 Parameter Description Click Upload to upload a face image. Each person can only add up to 2 face images. You can view or delete the face image after you upload it. Face The face image is in jpg, jpeg, png format and must be less than 100 KB. Enter the user password.
  • Page 60: Configuring Access Control

    Parameter Description Register fingerprints. A user can register up to 3 fingerprints, and you can set a fingerprint to the duress fingerprint. An alarm will be triggered when the duress fingerprint is used to unlock the door. Enroll fingerprints through an enrollment reader or the Device. 1.
  • Page 61 Figure 3-4 Basic parameters Table 3-3 Basic parameters description Parameter Description Name The name of the door. Set the door status. Normal: The door will be locked and unlocked according to your ● Door Status settings. Always Open: The door remains unlocked all the time. ●...
  • Page 62 Parameter Description Displays the notification on the screen when a person verifying their identity on the Device. High Speed Mode: The system prompts Successfully verified or ● Not authorized on the screen. Simple Mode: Displays user ID, name and verification time after ●...
  • Page 63 Figure 3-5 Unlock settings Table 3-4 Unlock settings description Parameter Description Unlock methods might differ depending on the models of Unlock Method (Multi-select) product. When PIN code authentication is enabled, you can open the door PIN Code Authentication with just the password. After a person is granted access, the door will remain unlocked Door Unlocked Duration for a defined time for them to pass through.
  • Page 64: Configuring Alarms

    Figure 3-6 Unlock by period Unlock by multiple users. ● 1. In the Unlock Mode list, select Unlock by multiple users. 2. Click Add to add groups. 3. Select unlock method, valid number and user list. If only one group is added, the door unlocks only after the number of people in the group who grant access equals the defined valid number.
  • Page 65 Figure 3-8 Alarm Table 3-5 Description of alarm parameters Parameter Description An alarm will be triggered when a duress card, duress Duress Alarm password or duress fingerprint is used to unlock the door. Users need to verify their identities both for entry and exit; otherwise an alarm will be triggered.
  • Page 66: Configuring Alarm Linkages (Optional)

    Parameter Description With the door detector wired to your device, alarm can be triggered when doors are opened or closed abnormally. The door detector includes 2 types, including NC detector and NO detector. Door Detector NC: The sensor is in a shorted position when the door or ●...
  • Page 67 Figure 3-9 Alarm linkage Step 3 Create a name for the alarm zone. Enable Link Fire Safety Control, and select a type for the alarm input device. Step 4 NC: The alarm input is in a normally closed (NC) circuit state when the alarm has not ●...
  • Page 68: Configuring Alarm Event Linkage

    3.6.4 Configuring Alarm Event Linkage Procedure Step 1 On the Main Menu, select Access Control > Alarm > Alarm Event Linkage. Step 2 Configure alarm event linkages. Figure 3-10 Alarm event linkage Table 3-6 Alarm event linkage Parameter Description If the door is opened abnormally, an intrusion alarm will be triggered. Buzzer: The buzzer sounds when an intrusion alarm is triggered.
  • Page 69: Configuring Face Parameters

    Parameter Description When the door remains unlocked for longer than the defined timeout duration, the door timeout alarm will be triggered and last for the defined time. Buzzer: The buzzer sounds when the unlock timeout alarm is ● triggered. You can configure the alarm duration. Unlock Timeout Alarm Custom time: Customize the duration.
  • Page 70 Figure 3-11 Face detection parameters Step 3 Configure the parameters. Table 3-7 Description of face parameters Name Description Adjust the accuracy level of face recognition. Higher threshold means higher accuracy and lower false recognition rate. Face Recognition Threshold When the threshold is too low such as 0, the false recognition rate will be extremely high.
  • Page 71 Name Description Turn on: The illuminator is turned on in low-light conditions. ● Turn off: The illuminator is turned off all the time. ● Illuminator This function is only available on select models. When the same face remains in front of the lens after the first Valid Face Interval (sec) successful recognition, the Device will perform recognition again for the face after a defined interval.
  • Page 72 Name Description Detects 4 to 6 face images at a time. Combination unlock cannot be used with this, and the door will be unlocked when one of the people are successfully verified. Multi-face Recognition The number of face images which are supported might differ depending on the model of the product.
  • Page 73: Configuring Card Settings

    3.6.6 Configuring Card Settings Background Information This function is only available on select models. Procedure Step 1 Log in to the webpage. Select Access Control > Card Settings. Step 2 Step 3 Configure the card parameters. Figure 3-13 Card parameters Table 3-9 Card parameters description Item Parameter...
  • Page 74 Item Parameter Description Only the encrypted IC card can be read when this function is enabled. IC Card Encryption & Verification Make sure IC Card is enabled. Prevent unlocking through duplicated NFC card after this function is enabled. This function is only available on models ●...
  • Page 75: Configuring Qr Code

    3.6.7 Configuring QR Code Procedure Step 1 On the webpage, select Access Control > Card Settings. Figure 3-14 QR code Table 3-10 QRR code parameters Parameters Description Enable QR Code Exposure The QR code will be exposed at the defined brightness, and the QR code can be detected and read clearly.
  • Page 76 1. Configure the plan number and the plan name. 2. Drag the time slider to configure time for each day. 3. (Optional) Click Copy to copy the configuration to the rest of days. Figure 3-15 Configure general plan Click OK. Step 4 3.6.8.2 Configuring Holiday Plan You can configure up to 128 holiday groups (from No.0 through No.127), and for each holiday...
  • Page 77 Figure 3-16 Add a holiday group 2. Click Add , add a holiday to a holiday group, and then click OK. Figure 3-17 Add a holiday to a holiday group Click OK. Step 4 Click Plan Management , and then click Add. Step 5 1.
  • Page 78: Configuring Expansion Modules

    Figure 3-18 Add holiday plan Step 6 Click OK. 3.6.9 Configuring Expansion Modules For Device that supports connecting expansion modules, configure the type of the module that the Device supports. Background Information The type the expansion module might differ depending on models of the Device. ●...
  • Page 79: Configuring Port Functions

    Face images will be captured automatically when people unlock the door. Figure 3-19 Enable snapshot Click Apply. Step 3 3.6.11 Configuring Port Functions Some ports can function as different ports, you can set them to different ports based on the actual needs.
  • Page 80 Local verification: The identifications are verified on the Access Controller. ● Figure 3-21 Configure the elevator control parameters Step 4 Click next to the elevator controller to configure the parameters, and then enable the elevator controller. One access controller can connect to up to 8 elevator controllers. Figure 3-22 Configure the parameters Table 3-11 Device parameters description Parameter...
  • Page 81: Configuring Back-End Comparison

    Parameter Description Configure the elevator control duration. The value ranges from 0 second to 999 seconds. The duration priority is: Access Controller or door station > Lift Control Duration (sec) elevator controller > elevator control module. For example, if you configure the duration on the Access Controller and the elevator control module, the duration on the Access Controller shall prevail.
  • Page 82: Using The Device As The Sip Server

    3.7.1 Using the Device as the SIP Server 3.7.1.1 Configuring SIP Server When the Device functions as the SIP server, it can connect up to 500 VTHs. Procedure Select Intercom Settings > SIP Server. Step 1 Turn on SIP Server. Step 2 The device settings will be automatically restored to factory defaults if the SIP server status changes.
  • Page 83 Figure 3-25 Basic parameters Table 3-13 Basic parameters description Parameter Description Select Door Station. Device Type Cannot be set. When you turn on the group call function, the door station calls the Group Call main VTH and the extensions at the same time. The setup is effective after the door station restarts.
  • Page 84 Figure 3-26 Add door station Table 3-14 Add VTO configuration Parameter Description Device Type Select Door Station. To view the number of the door station, go to the Device screen of the door station, and then enter the number of door station on this page. Registration Keep it default.
  • Page 85 3.7.1.4 Adding the VTH When the Device functions as the SIP Server, you can add all VTHs in the same unit to the SIP server to make sure that they can call each other. Background Information When there are main VTH and extension, you need to turn on the group call function first, and ●...
  • Page 86 Figure 3-27 Add one by one Table 3-15 Room information Parameter Description First Name Last Name Enter the name of the VTH to help you differentiate VTHs. Alias...
  • Page 87 Parameter Description Enter the room number of the VTH. The room number consists of 1-5 digits, and must conform to the configured room number on the VTH. When there are main VTH and extensions, the room number of main VTH ends with -0 and the room number of Room No.
  • Page 88 Figure 3-28 Batch add Table 3-16 Add in batches Parameter Description The number of floors of the building, which ranges from 1 to Floors in Unit The number of rooms on each floor, which ranges from 1 to Rooms on Each Floor First Room No.
  • Page 89: Using Vto As The Sip Server

    Figure 3-29 VTS management Table 3-17 VTS parameters Parameter Description Enter 888888+ VTS No, which can include up to 9 digits. For the VTS No. VTS No, go to Device screen on the VTS. IP Address The IP address of the VTS. Registration Password Keep it as default.
  • Page 90 Figure 3-30 Use VTO as the SIP server Table 3-18 SIP server configuration Parameter Description IP/Domain Name IP address or domain name of the VTO. Port 5060 by default when VTO works as SIP server. Username Leave them as default. Registration Password SIP Domain VDP.
  • Page 91: Using The Platform As The Sip Server

    3.7.2.2 Configuring Local Parameters Configure the parameters of the Device when you use another VTO as the SIP server. Procedure Select Intercom Settings > Local Device Config. Step 1 Step 2 Configure the parameters. Figure 3-31 Configure the parameters Table 3-19 Parameters description Parameter Description Select Door Station.
  • Page 92 Do not enable SIP Server. Figure 3-32 Alternate server Table 3-20 SIP server configuration Parameter Description Server Address IP address of the platform. Port 5080 by default when the platform works as SIP server. Registration Password Leave them as default. SIP Domain Leave it as default.
  • Page 93 3.7.3.2 Configuring Local Parameters Configure the parameters of the Device when the platform is used as the SIP server. Procedure Select Intercom Settings > Local Device Config. Step 1 Step 2 Configure the parameters. Figure 3-33 Basic parameter Table 3-21 Parameters description Parameter Description Device Type...
  • Page 94: Call Config

    3.7.3.3 Registration Management When the management platform works as the SIP server, you can view and manage all devices that registered to SIP server. Procedure Select Intercom Settings > Registration Management. Step 1 Step 2 You can view and edit the devices. Figure 3-34 View and manage devices 3.7.4 Call Config Configure the call function of the Device.
  • Page 95: Attendance Configuration

    Only when the Device is set as the SIP server, and VTH and VTS are added to the SIP ● server on the Device Setting page, the corresponding device type is displayed. Figure 3-35 Call room type and phone book mode Step 3 Add VTH and VTS.
  • Page 96: Configuring Shifts

    Figure 3-36 Create departments Related Operations You can click Default to restore departments to default settings. 3.8.2 Configuring Shifts Configure shifts to define time attendance rules. Employees need to work at the time scheduled for their shift to start, and leave at the end time, except when they choose to work overtime. Procedure Step 1 Select Attendance Config >...
  • Page 97 Figure 3-37 Create shifts Table 3-23 Shift parameters description Parameter Description Shift Name Enter the name of the shift. Period 1 Specify a time range when people can clock in and clock out for the workday. If you only set one attendance period, employees need to clock in and out by the designated times to avoid an anomaly appearing on their attendance record.
  • Page 98 When the time interval between 2 periods is an even number, you can divide the time ● interval by 2, and assign the first half of the interval to the first period, which will be the clock out time. The second half of the interval should be assigned to the second period as the clock in time.
  • Page 99: Configuring Holiday

    3.8.3 Configuring Holiday Configure holiday plans to set periods for attendance to not be tracked. Procedure Select Attendance Config > Shift Config > Holiday. Step 1 Step 2 Click Add to add holiday plans. Step 3 Configure the parameters. Figure 3-40 Create holiday plans Table 3-24 Parameters description Parameter Description...
  • Page 100 Figure 3-41 Configure work schedules Procedure Select Attendance Config > Schedule Config. Step 1 Step 2 Set work schedules for individuals. 1. Click Personal Schedule. 2. Select a person in the person list. 3. On the calendar, select a day, and then select a shift. You can also click Batch Configure to schedule shifts to multiple days.
  • Page 101 Figure 3-42 Personal schedule You can only set work schedules for the current month and the next month. 0 indicates break. ● 1 to 24 indicates the number of the pre-defined shifts. For how to configure shifts, see ● "2.10.2 Configuring Shifts". 25 indicates business trip.
  • Page 102: Configuring Attendance Modes

    Figure 3-43 Schedule shifts to a department The defined work schedule is in a week cycle and will be applied to all employees in the department. 3.8.5 Configuring Attendance Modes Procedure Step 1 Select Attendance Config > Attendance Config. Enable Local Attendance, and then set the attendance mode. Step 2 Step 3 Configure attendance modes.
  • Page 103 Figure 3-44 Attendance modes Table 3-25 Attendance mode Parameter Description The screen displays the attendance status automatically after you clock in or out, but you can also manually change your attendance status. Check In: Clock in when your normal workday starts. ●...
  • Page 104: Configuring Audio And Video

    Related Operations Refresh: If you do not want to the save the current changes, click Refresh to cancel changes and ● restore it to previous settings. Default: Restore the attendance settings to factory defaults. ● 3.9 Configuring Audio and Video 3.9.1 Configuring Video Procedure Select Audio and Video Config >...
  • Page 105 Parameter Description Video compression standard to deliver good Compression video quality at lower bit rates. The sub-stream supports D1, VGA and Resolution QVGA. The number of frames (or images) per Frame Rate (FPS) second. Sub Stream It indicates the amount of data transmitted Bit Rate over an internet connection in a given amount of time.
  • Page 106 Parameter Description Day/Night mode affects light compensation in different situations. Auto : The system automatically adjusts the day/night mode ● Day/Night based on the photographic sensitivity. Colorful : In this mode, images are colorful. ● Black and white : In this mode, images are in black and white. ●...
  • Page 107 Table 3-28 Exposure parameter description Parameter Description Set anti-flicker to reduce flicker and decrease or reduce uneven colors or exposure. 50Hz : When the mains electricity is 50 Hz, the exposure is ● automatically adjusted based on brightness of the surroundings to prevent the appearance of horizontal lines.
  • Page 108: Configuring Audio Prompts

    Figure 3-48 Image Table 3-29 Image description Parameter Description Brightness The brightness of the image. Higher value means brighter images. Contrast is the difference in the luminance or color that makes an Contrast object distinguishable. The larger the contrast value is, the greater the color contrast will be.
  • Page 109 Figure 3-49 Configure audio parameters Table 3-30 Parameters description Parameters Description Speaker Set the volume of the speaker. Microphone Volume Set the volume of the microphone. When this function is enabled, touch screen devices will produce Screen Tap Sound tap sound and non-touch screen devices will produce mouse click sound.
  • Page 110: Configuring Motion Detection

    3.9.3 Configuring Motion Detection When there are moving objects detected and reaches the set threshold, the screen will be awaken. Background Information This function is only available on select models. Procedure Select Audio and Video Config > Motion Detection Settings. Step 1 Step 2 Enable the motion detection function.
  • Page 111: Configuring Local Coding

    3.9.4 Configuring Local Coding Set the view area in the video talk and preview. Background Information This function is only available on select models. ● This function is enabled by default when it works with a VTH. The preview might be not ●...
  • Page 112: Communication Settings

    3.10 Communication Settings 3.10.1 Network Settings 3.10.1.1 Configuring TCP/IP You need to configure IP address of Device to make sure that it can communicate with other devices. Procedure Step 1 Select Communication Settings > Network Setting > TCP/IP. Step 2 Configure the parameters.
  • Page 113 Figure 3-52 TCP/IP Table 3-31 Description of TCP/IP Parameter Description Static: Manually enter IP address, subnet mask, and gateway. ● DHCP: It stands for Dynamic Host Configuration Protocol. ● Mode When DHCP is turned on, the Device will automatically be assigned with IP address, subnet mask, and gateway.
  • Page 114 Parameter Description IP Address If you set the mode to Static, configure the IP address, subnet mask and gateway. Subnet Mask IPv6 address is represented in hexadecimal. ● Default Gateway IPv6 version do not require setting subnet masks. ● The IP address and default gateway must be in the same ●...
  • Page 115 Static: Enable this function, manually enter a Wi-Fi address, and then click Apply, the Device will ● connect to the Wi-Fi. 3.10.1.3 Configuring Wi-Fi AP The Wi-Fi function is available on select models. ● The Wi-Fi and Wi-Fi AP cannot be enabled at the same time. ●...
  • Page 116: Configuring Port

    3.10.1.4 Configuring Port You can limit access to the Device at the same time through webpage, desktop client and mobile client. Procedure Select Communication Settings > Network Setting > Port. Step 1 Step 2 Configure the ports. Except for Max Connection and RTSP Port, you need to restart the Device to make the configurations effective after you change other parameters.
  • Page 117 3.10.1.5 Configuring Basic Service When you want to connect the Device to a third-party platform, turn on the CGI and ONVIF functions. Procedure Select Communication Settings > Network Settings > Basic Services. Step 1 Step 2 Configure the basic service. Figure 3-56 Basic service Table 3-33 Basic service parameter description Parameter...
  • Page 118 Parameter Description Set the authentication mode, including safe mode and compatibility mode. It is recommended to choose Security Mode. Security Mode (recommended): Does not support accessing ● Private Protocol Authentication the device through Digest, DES, and plaintext authentication Mode methods, improving device security. Compatible Mode: Supports accessing the device through ●...
  • Page 119 Figure 3-57 Cloud service Step 3 Click Apply. Step 4 Scan the QR code with DMSS to add the device. 3.10.1.7 Configuring Auto Registration The auto registration enables the devices to be added to the management platform without manual input of device information such as IP address and port. Background Information The auto registration only supports SDK.
  • Page 120 Figure 3-58 Auto Registration Table 3-34 Automatic registration description Parameter Description Status Displays the connection status of auto registration. Server Address The IP address or the domain name of the server. Port The port of the server that is used for automatic registration. The registration ID (user defined) of the device.
  • Page 121 Figure 3-59 CGI auto registration Table 3-35 Automatic registration description Parameter Description Supports up to 32 bytes, including Chinese, numbers, letters, and Device ID special characters. Address Type Supports 2 methods to register. Host IP Host IP: Enter the IP address of the third-party platform. ●...
  • Page 122: Configuring Rs-485

    3.10.1.9 Configuring Auto Upload Send user information and unlock records through to the management platform. Procedure On the home page, select Communication Settings > Network Settings > Auto Step 1 Upload. (Optional) Enable Push Person Info. Step 2 When the user information is updated or new users are added, the Device will automatically push user information to the management platform.
  • Page 123 Figure 3-61 Configure parameters Table 3-37 Configure the RS-485 parameters Parameter Description Access Controller ● Select Access Controller when the Device functions as a card reader, and sends data to other external access controllers to control access. Output Data type: Card Number: Outputs data based on card number when users swipe card to unlock door;...
  • Page 124: Configuring Wiegand

    Parameter Description The number of bits used to transmit the actual data in a serial communication. Data Bit It represents the binary digits that carry the information being transmitted. A bit sent after the data and optional parity bits to indicate the end of a data Stop Bit transmission.
  • Page 125: Configuring The System

    Figure 3-62 Wiegand output Table 3-38 Description of Wiegand output Parameter Description Select a Wiegand format to read card numbers or ID numbers. Wiegand26 : Reads 3 bytes or 6 digits. ● Wiegand Output Type Wiegand34 : Reads 4 bytes or 8 digits. ●...
  • Page 126: User Management

    3.11.1 User Management You can add or delete users, change users' passwords, and enter an email address for resetting the password when you forget your password. 3.11.1.1 Adding Administrators You can add new administrator accounts, and then they can log in to the webpage of the Device. Procedure Step 1 On the home page, select System >...
  • Page 127 3.11.1.2 Adding ONVIF Users Background Information Open Network Video Interface Forum (ONVIF), a global and open industry forum that is established for the development of a global open standard for the interface of physical IP-based security products, which allows the compatibility from different manufactures. ONVIF users have their identities verified through ONVIF protocol.
  • Page 128: Viewing Online Users

    Click OK. Step 3 3.11.1.3 Resetting the Password Reset the password through the linked email when you forget your password. Procedure Select System > Account. Step 1 Step 2 Enter the email address, and set the password expiration time. Step 3 Turn on the password reset function.
  • Page 129 Figure 3-66 Date settings Table 3-40 Time settings description Parameter Description Manual Set: Manually enter the time or you can click Sync Time to ● sync time with computer. NTP: The Device will automatically sync the time with the NTP ●...
  • Page 130: Configuring The Shortcuts

    Parameter Description 1. (Optional) Enable DST. 2. Select Date or Week from the Type. 3. Configure the start time and end time of the DST. Click Apply. Step 3 3.11.3 Configuring the Shortcuts Procedure On the webpage, select System > Shortcut Settings. Step 1 Step 2 Configure the shortcut parameters.
  • Page 131 Table 3-41 Parameters description Parameter Description The icon of the password unlock method is displayed on the standby Password screen. The QR code icon is displayed on standby screen. This function is not QR code available for Device with a standalone QR code module. After the doorbell function is turned on, doorbell icon is displayed on the standby screen.
  • Page 132: Personalization

    3.12 Personalization Configure themes and add video or image advertisements to the Device. The function is available on select models. ● Decoding of video containing B-frames sent from the platform is not supported. ● Images with a bit depth of 1 cannot be processed. ●...
  • Page 133: Configuring Themes

    1. Click 2. Select image from the local and upload it. Supports PNG, JPG, BMP. Image size must be less than 2 M. Related Operations Click to delete uploaded images or videos. Videos and images in use cannot be deleted. 3.12.2 Configuring Themes Procedure On the home page, select Personalization >...
  • Page 134 Figure 3-70 Advertisement mode 2. Select the display mode. Original Scale: Plays the image and video in the original size. ● Full Screen: Plays the image and video in full screen. ● 3. Click Add to add time schedules. You can add up to 10 schedules. 4.
  • Page 135 Figure 3-71 Add time schedules Step 5 Configure greetings. 1. Select Greetings from the Custom Content. 2. Select the template. 3. Enter the title and subtitle.
  • Page 136: Management Center

    Figure 3-72 Greetings 4. Click Apply. 3.13 Management Center 3.13.1 One-click Diagnosis The system automatically diagnoses the configurations and the status of the device to improve its performance. Procedure On the home page, select Maintenance Center > One-click Diagnosis. Step 1 Click Diagnose.
  • Page 137: System Information

    Figure 3-73 One-click diagnosis 3.13.2 System Information 3.13.2.1 Viewing Version Information On the webpage, select System > Version, and you can view version information of the Device. 3.13.2.2 Viewing Legal Information On the home page, select System > Legal Info, and you can view the software license agreement, privacy policy and open source software notice.
  • Page 138 Related Operations click Export to export the searched logs to your local computer. ● Click Encrypt Log Backup, and then enter a password. The exported file can be opened only ● after entering the password. Click to view details of a log. ●...
  • Page 139: Configuration Management

    Select Maintenance Center > Log > USB Management. Step 2 Make sure that a USB is inserted to the Device before you export data or update the ● system. To avoid failure, do not pull out the USB or perform any operation of the Device during the process.
  • Page 140: Maintenance

    3.13.5.2 Restoring the Factory Default Settings Procedure Select System > Config. Step 1 Restoring the Device to its default configurations will result in data loss. Please be advised. Step 2 Restore to the factory default settings if necessary. Factory Defaults : Resets all the configurations of the Device and delete all the data. ●...
  • Page 141: Advanced Maintenance

    3.13.7.2 Online Update Procedure On the home page, select System > Update. Step 1 In the Online Update area, select an update method. Step 2 Select Auto Check for Updates, and the Device will automatically check for the latest ● version update.
  • Page 142: Security Settings(Optional)

    Figure 3-76 Network test 3. Click Test. The result is displayed in the Test Result area. You can copy the result. 3.14 Security Settings(Optional) 3.14.1 Security Status Scan the users, service, and security modules to check the security status of the Device. Background Information User and service detection: Check whether the current configuration conforms to ●...
  • Page 143: Configuring Https

    Figure 3-77 Security Status Related Operations After you perform the scan, the results will be displayed in different colors. Yellow indicates that the security modules are abnormal, and green indicates that the security modules are normal. Click Details to view the details on the results of the scan. ●...
  • Page 144: Attack Defense

    Figure 3-78 HTTPS Step 4 Click Apply. Enter “https://IP address: https port" in a web browser. If the certificate is installed, you can log in to the webpage successfully. If not, the webpage will display the certificate as wrong or untrusted. 3.14.3 Attack Defense 3.14.3.1 Configuring Firewall Configure firewall to limit access to the Device.
  • Page 145 Figure 3-80 Add IP information Step 5 Click OK. Related Operations Click to edit the IP information. ● Click to delete the IP address. ● 3.14.3.2 Configuring Account Lockout If the incorrect password is entered for a defined number of times, the account will be locked. Procedure >...
  • Page 146 Figure 3-81 Account lockout Login Attempt: The limit of login attempts. If the incorrect password is entered for a ● defined number of times, the account will be locked. Lock Time: The duration during which you cannot log in after the account is locked. ●...
  • Page 147: Installing Device Certificate

    Figure 3-82 Anti-DoS attack Click Apply. Step 3 3.14.4 Installing Device Certificate Create a certificate or upload an authenticated certificate, and then you can log in through HTTPS on your computer. 3.14.4.1 Creating Certificate Create a certificate for the Device. Procedure Step 1 Select...
  • Page 148 Figure 3-83 Certificate information The name of region cannot exceed 2 characters. We recommend entering the abbreviation of the name of the region. Click Create and install certificate. Step 5 The newly installed certificate is displayed on the Device Certificate page after the certificate is successfully installed.
  • Page 149 Region: The name of region must not exceed 3 characters. We recommend you enter ● the abbreviation of region name. Figure 3-84 Certificate information (2) Step 5 Click Create and Download. Save the request file to your computer. Step 6 Apply to a third-party CA authority for the certificate by using the request file.
  • Page 150: Installing The Trusted Ca Certificate

    Step 2 Click Install Device Certificate. Step 3 Select Install Existing Certificate , and click Next. Step 4 Click Browse to select the certificate and private key file, and enter the private key password. Figure 3-85 Certificate and private key Click Import and Install.
  • Page 151: Data Encryption

    Figure 3-86 Install the trusted certificate Click OK. Step 4 The newly installed certificate is displayed on the Trusted CA Certificates page after the certificate is successfully installed. Related Operations Click Enter Edit Mode on the Device Certificate page to edit the name of the certificate. ●...
  • Page 152: Security Warning

    Table 3-42 Data encryption description Parameter Description Streams are encrypted during transmission Enable through private protocol. Private Protocol Encryption Type Keep it as default. Update Period of Secret Ranges from 0 h -720 h. 0 means never update the secret key. RTSP stream is encrypted during transmission Enable through TLS tunnel.
  • Page 153 Figure 3-89 Security Authentication...
  • Page 154: Phone Operations

    4 Phone Operations 4.1 Initialization When the phone is on the same LAN as the Access Controller, you can initialize the Access Controller for the first time or after the Device is restored to the factory defaults on the webpage of the phone.
  • Page 155: Home Page

    If you forget the administrator login password, you can reset the password through ● the webpage on the computer. For details, see "3.3 Resetting the Password". Figure 4-1 Login page Click Login. Step 3 4.3 Home Page The home page is displayed after you successfully log in. at the upper-right corner of the webpage.
  • Page 156 Figure 4-2 Admin page The Door Status area displays the status of the door. You can remotely open or close the door. ● You can also configure the door status as Always Open or Always Closed.
  • Page 157 Figure 4-3 Door status The Common Function area displays the configuration menu of the Device. Click More to view ● all the configuration menus. Figure 4-4 Common functions View the serial number and the version information on the Version area. Click > to view the ●...
  • Page 158: Person Management

    Figure 4-5 Version 4.4 Person Management Add the person and configure the permissions. Procedure Step 1 Log in to the webpage. Click Person Management , and then click +. Step 2 Step 3 Configure user information. Figure 4-6 Add the person (1)
  • Page 159 Figure 4-7 Add the person (2) Table 4-1 Parameters description Parameter Description The User ID is like employee ID, which can be numbers, letters, and their combinations, and the maximum length of the number is 30 characters. The name can have up to 32 characters (including numbers, symbols, and Name letters).
  • Page 160 Parameter Description Enter the card number manually. ● 1. Click Add. 2. Enter the card number, and then click Add. Read the number automatically through the Device. ● 1. Click Add. 2. Swipe cards on the card reader. A 60-second countdown is displayed to remind you to swipe cards, and the system will read the card number automatically.
  • Page 161: Configuring The System

    Parameter Description People can unlock the door or take attendance during the defined holiday. Holiday Plan You can select more than one holiday. Lock Permission Select the local and external lock as needed. General User : General users can unlock the door. ●...
  • Page 162: Configuring Time

    Select More > System > Maintenance. Step 2 Set the time, and then click Apply. Step 3 The Device will restart at the scheduled time, or you can click Restart to restart it immediately. Figure 4-8 Maintenance 4.5.3 Configuring Time Procedure Step 1 Log in to the webpage.
  • Page 163 Figure 4-9 Configure the time parameters Table 4-2 Time settings description Parameter Description Manual Set: Manually enter the time or you can click Sync Phone ● to sync time with the phone. NTP: The Device will automatically sync the time with the NTP ●...
  • Page 164: Data Capacity

    Click Apply. Step 4 4.5.4 Data Capacity You can see how many users, cards, face images, fingerprints, logs, unlock records, and other information that the Device can store. Log in to the webpage and select More > System > Data Capacity. 4.6 Configuring Attendance This function is only available on select models.
  • Page 165: Configuring Shifts

    There are 20 default departments. We recommend you rename them. Figure 4-11 Rename the department Related Operations You can click to restore departments to default settings. 4.6.2 Configuring Shifts Configure shifts to define time attendance rules. Employees need to work at the time scheduled for their shift to start, and leave at the end time, except when they choose to work overtime.
  • Page 166 Figure 4-12 Shift list Click the shift to configure the shift parameters, and then click Save. Step 3...
  • Page 167 Figure 4-13 Configure the shift Table 4-3 Shift parameters description Parameter Description Shift Name Enter the name of the shift. Period 1 Specify a time range when people can clock in and clock out for the workday. If you only set one attendance period, employees need to clock in and out by the designated times to avoid an anomaly appearing on their attendance record.
  • Page 168 When the time interval between 2 periods is an even number, you can divide the time ● interval by 2, and assign the first half of the interval to the first period, which will be the clock out time. The second half of the interval should be assigned to the second period as the clock in time.
  • Page 169: Configuring Holiday

    4.6.3 Configuring Holiday Configure holiday plans to set periods for attendance to not be tracked. Procedure Step 1 Log in to the webpage. Step 2 Select More > Attendance Config > Shift Config > Holiday. Click + to add holiday plans. Step 3 Configure the parameters, and then click Save.
  • Page 170 Figure 4-17 Configure work schedules Procedure Step 1 Log in to the webpage. Select More > Attendance Config > Schedule Config. Step 2 Step 3 Set work schedules for individuals. 1. Click Personal Schedule. 2. Select a person in the person list. After you configure the Schedule Mode as the Personal Schedule when you add the person, the person is displayed in the person list.
  • Page 171: Configuring Attendance Modes

    Figure 4-18 Department schedule 0 indicates rest. ● 1 to 24 indicates the number of the pre-defined shifts. ● 25 indicates business trip. ● 26 indicates leave of absence. ● The defined work schedule is in a week cycle and will be applied to all employees in the department.
  • Page 172 Figure 4-19 Attendance configuration Table 4-5 Description of attendance parameters Parameter Description The screen displays the attendance status automatically after you clock in or out, but you can also manually change your attendance status. Check In: Clock in when your normal workday starts. ●...
  • Page 173: Configuring Access Control

    Parameter Description Manual Mode Manually select your attendance status when you clock in or out. When you clock in or out, the screen will display the pre-defined Fixed Mode attendance status all the time. Step 4 Click Apply. 4.7 Configuring Access Control 4.7.1 Configuring Unlock Methods You can use multiple unlock methods to unlock the door, such as fingerprint, card, and password.
  • Page 174 Click Face Parameters on the main menu, or select More > Access Control > Face Step 2 Parameters. Configure the parameters, and then click Apply. Step 3 Figure 4-21 Configure the face parameters (1)
  • Page 175: Configuring Access Control Parameters

    Figure 4-22 Configure the face parameters (2) 4.7.3 Configuring Access Control Parameters Procedure Step 1 Log in to the webpage. Step 2 Click Access Control Parameters on the main menu, or select More > Access Control > Access Control Parameters. Step 3 Configure basic parameters for the access control, and then click Apply.
  • Page 176 Figure 4-23 Access control parameters (1)
  • Page 177 Figure 4-24 Access control parameters (2) Table 4-7 Description of access control parameters Parameter Description Name The name of the door. Set the door status. Normal: The door will be unlocked and locked ● according to your settings. Basic Settings Door Status Always Open: The door remains unlocked all the ●...
  • Page 178 Parameter Description Displays the notification on the screen when a person verifying their identity on the Device. High Speed Mode: The system prompts ● Successfully verified or Not authorized on the screen. Simple Mode: Displays user ID, name and ● verification time after access granted;...
  • Page 179: Configuring Alarms

    Parameter Description Normally Open General Plan/ When you select Normal, you can select a time Period Holiday Plan template from the drop-down list. The door remains open or closed during the defined time. For details on how to configure general plans and holiday plans, see "3.6.8 Configuring Schedules".
  • Page 180 Step 4 Configure alarm parameters, and then click Apply. Figure 4-25 Alarm settings Table 4-8 Description of alarm parameters Parameter Description An alarm will be triggered when a duress card, duress Duress Alarm password or duress fingerprint is used to unlock the door.
  • Page 181 Parameter Description Users need to verify their identities both for entry and exit; otherwise an alarm will be triggered. It helps prevents a card holder from passing an access card back to another person to gain entry. When anti-passback is enabled, the card holder must leave the secured area through an exit reader before system will grant another entry.
  • Page 182: Configuring Alarm Linkages (Optional)

    4.7.5 Configuring Alarm Linkages (Optional) You can configure alarm linkages. Procedure Step 1 Log in to the webpage. Select More > Access Control > Alarm Linkage Setting. Step 2 Step 3 Select the zone to configure alarm. Figure 4-26 Alarm linkage Step 4 Create a name for the alarm zone.
  • Page 183: Configuring Alarm Event Linkage

    This function takes effect only after Link Fire Safety Control is enabled. Step 7 Select a linkage mode. Strong Execution: When the fire alarm signal disappears, the door remains the current ● status. Please manually changes to its previous door status settings if you want to. Weak Execution: When the fire alarm signal disappears, the door automatically returns ●...
  • Page 184: Configuring Card Settings

    Table 4-9 Alarm event linkage Parameter Description If the door is opened abnormally, an intrusion alarm will be triggered. Buzzer: The buzzer sounds when an intrusion alarm is triggered. You ● can configure the alarm duration. Intrusion Alarm Linkage Link Alarm Output: The external alarm device generates alarms ●...
  • Page 185 Figure 4-28 Card settings (1) Figure 4-29 Card settings (2) Table 4-10 Card parameters description Item Parameter Description The IC card can be read when this function is enabled. IC Card This function is only available on select models. Card Settings Only the encrypted IC card can be read when this function is enabled.
  • Page 186: Privacy Setting

    Item Parameter Description Prevent unlocking through duplicated NFC card after this function is enabled. This function is only available on models ● Block NFC Cards that support IC cards. Make sure IC Card is enabled. ● NFC function is only available on select ●...
  • Page 187: Communication Settings

    Face images will be captured automatically when people unlock the door. Figure 4-30 Enable snapshot Step 4 Click Apply. 4.8 Communication Settings 4.8.1 Configuring TCP/IP You need to configure IP address of Device to make sure that it can communicate with other devices.
  • Page 188 Figure 4-31 TCP/IP Table 4-11 Description of TCP/IP Parameter Description Static: Manually enter IP address, subnet mask, and gateway. ● DHCP: It stands for Dynamic Host Configuration Protocol. ● Mode When DHCP is turned on, the Device will automatically be assigned with IP address, subnet mask, and gateway.
  • Page 189: Configuring Wi-Fi

    Parameter Description Preferred DNS Set IP address of the preferred DNS server. Alternate DNS Set IP address of the alternate DNS server. MTU (Maximum Transmission Unit) refers to the maximum size of data that can be transmitted in a single network packet in computer networks.
  • Page 190: Configuring Cloud Service

    Figure 4-32 Wi-Fi AP 4.8.4 Configuring Cloud Service Procedure Step 1 Log in to the webpage. Step 2 Select More > Communication Settings > Cloud Service. Step 3 Turn on the cloud service function. The cloud service goes online if the P2P and PaaS are online. Click Apply.
  • Page 191: Configuring Wiegand

    Figure 4-33 Auto registration Table 4-12 Automatic registration description Parameter Description Status Displays the connection status of auto registration. Server Address The IP address or the domain name of the server. Port The port of the server that is used for automatic registration. The registration ID (user defined) of the device.
  • Page 192 Figure 4-34 Wiegand input Select Wiegand Output when the Device functions as a card reader, and you need to ● connect it to another access controller. Figure 4-35 Wiegand output Table 4-13 Description of Wiegand output Parameter Description Select a Wiegand format to read card numbers or ID numbers. Wiegand26 : Reads 3 bytes or 6 digits.
  • Page 193: Configuring Rs-485

    Parameter Description Select the type of output data. No. : Outputs data based on user ID. The data format is Output Data Type hexadecimal or decimal. Card Number : Outputs data based on user's first card number. 4.8.7 Configuring RS-485 Configure the RS-485 parameters if you connect an external device to the RS-485 port.
  • Page 194: Configuring Audio Prompts

    Table 4-14 Configure the RS-485 parameters Parameter Description Access Controller ● Select Access Controller when the Device functions as a card reader, and sends data to other external access controllers to control access. Output Data type: Card Number: Outputs data based on card number when users swipe card to unlock door;...
  • Page 195: Viewing Logs

    Figure 4-37 Configure the audio parameters Table 4-15 Parameters description Parameters Description Speaker Set the volume of the speaker. Microphone Volume Set the volume of the microphone. When this function is enabled, touch screen devices will produce Screen Tap Sound tap sound and non-touch screen devices will produce mouse click sound.
  • Page 196: Unlock Records

    Figure 4-38 Logs 4.10.2 Unlock Records Search for unlock records. Procedure Step 1 Log in to the webpage. Select More > Log > Unlock Records. Step 2 Step 3 Click a record to view the details. 4.10.3 Alarm Logs View alarm logs. Procedure Step 1 Log in to the webpage.
  • Page 197: Smart Pss Lite Configuration

    5 Smart PSS Lite Configuration This section introduces how to manage and configure the device through Smart PSS Lite. For details, see the user's manual of Smart PSS Lite. 5.1 Installing and Logging In Install and log in to Smart PSS Lite. For details, see the user manual of Smart PSS Lite. Procedure Step 1 Get the software package of the Smart PSS Lite from the technical support, and then...
  • Page 198: Adding Devices In Batches

    Figure 5-1 Add devices Table 5-1 Parameters of IP adding Parameter Description We recommend you name devices with the monitoring area for easy Device Name identification. Select IP/Domain. Method to add IP/Domain: Enter the IP address or domain name of the device. ●...
  • Page 199 Procedure On the Device Manager page, click Auto Search. Step 1 Step 2 Select a search method. Auto Search: Enter the username and the password of the device. The system will ● automatically search for devices that are on the same network to your computer. Device Segment Search: Enter the username and the password of the device, and then ●...
  • Page 200: User Management

    5.3 User Management Add users, assign cards to them, and configure their access permissions. 5.3.1 Configuring Card Type Set the card type before you assign cards to users. For example, if the assigned card is an ID card, set card type to ID card. Procedure Step 1 Log in to Smart PSS Lite.
  • Page 201 Only 8-digit card number in hexadecimal mode can display the QR code of the card. Configure the fingerprints. ● to select Device or Fingerprint Scanner as the fingerprint collector. a. Click b. Add fingerprints. Select Add > Add Fingerprint, and then place one of your fingers on the scanner for 3 times continuously.
  • Page 202 Click the More Info tab to add more information of the personnel. Step 3 Figure 5-5 Add more information Step 4 Click Complete. Related Operations Click to modify information or add more details in the list of personnel. ● Click to delete all information of the personnel.
  • Page 203: Assigning Access Permission

    Click OK. Step 7 Figure 5-6 Add personnel in batches 5.3.3 Assigning Access Permission Create a permission group that is a collection of door access permissions, and then link users with the group so that users can unlock doors associated with the permission group. Procedure Step 1 Click Access Solution >...
  • Page 204 Figure 5-7 Create a permission group Step 6 Click of the permission group. Step 7 Select users to associate them with the permission group. Figure 5-8 Add users to a permission group Step 8 Click OK. Users can unlock the door in this permission group after valid identity verification.
  • Page 205: Assigning Attendance Permissions

    5.3.4 Assigning Attendance Permissions Create a permission group that is a collection of time attendance permissions, and then associate employees with the group so that they can punch in/out through defined verification methods. Procedure Step 1 Log in to the Smart PSS Lite. Click Access Solution >...
  • Page 206 Figure 5-9 Create a permission group The Time & Attendance supports punch-in/out through password, face attendance, ● card and fingerprint attendance. Card and fingerprint attendance are available on select models. ● Step 7 Click of the permission group you added. Step 8 Select users to associate them with the permission group.
  • Page 207: Access Management

    Figure 5-10 Add users to a permission group Step 9 Click OK. 5.4 Access Management 5.4.1 Remotely Opening and Closing Door You can remotely monitor and control door through the platform. For example, you can remotely open or close the door. Procedure Step 1 Click Access Solution >...
  • Page 208: Setting Always Open And Always Close

    Related Operations Event filtering: Select the event type in the Event Info, and the event list displays the selected ● event type, such as alarm events and abnormal events. Event refresh locking: Click to lock the event list, and then event list will stop refreshing. Click ●...
  • Page 209 Figure 5-13 Monitor door status Related Operations Show All Door: Displays all doors controlled by the Device. ● Reboot: Restart the Device. ● Details: View the device details, such as IP address, model, and status. ●...
  • Page 210: Appendix 1 Important Points Of Face Registration

    Appendix 1 Important Points of Face Registration Before Registration Glasses, hats, and beards might influence face recognition performance. ● Do not cover your eyebrows when wearing hats. ● Do not change your beard style greatly if you use the Device; otherwise face recognition might ●...
  • Page 211 Appendix Figure 1-1 Appropriate face position Requirements of Faces Make sure that the face is clean and forehead is not covered by hair. ● Do not wear glasses, hats, heavy beards, or other face ornaments that influence face image ● recording.
  • Page 212 Appendix Figure 1-3 Face distance When importing face images through the management platform, make sure that image ● resolution is within the range from 150 × 300 pixels to 600 × 1200 pixels. It is recommended that the resolution be greater than 500 × 500 pixels, the image size be less than 100 KB, and the image name and person ID be the same.
  • Page 213: Appendix 2 Important Points Of Intercom Operation

    Appendix 2 Important Points of Intercom Operation The Device can function as VTO to realize intercom function. Prerequisites The intercom function is configured on the Device. Procedure Step 1 On the standby screen, tap Step 2 Enter the room No., and then tap...
  • Page 214: Appendix 3 Important Points Of Fingerprint Registration Instructions

    Appendix 3 Important Points of Fingerprint Registration Instructions When you register the fingerprint, pay attention to the following points: Make sure that your fingers and the scanner surface are clean and dry. ● Press your finger on the center of the fingerprint scanner. ●...
  • Page 215 How to Press Your Fingerprint on the Scanner Appendix Figure 3-2 Correct placement Appendix Figure 3-3 Wrong placement...
  • Page 216: Appendix 4 Important Points Of Qr Code Scanning

    Appendix 4 Important Points of QR Code Scanning Place the QR code on your phone at a distance of 30 mm–50 mm away from the QR code scanning lens. It supports QR code that is larger than 30 mm × 30 mm and less than 128 bytes in size. QR code detection distance differs depending on the bytes and size of QR code.
  • Page 217: Appendix 5 Security Recommendation

    Appendix 5 Security Recommendation Account Management 1. Use complex passwords Please refer to the following suggestions to set passwords: The length should not be less than 8 characters; ● Include at least two types of characters: upper and lower case letters, numbers and symbols; ●...
  • Page 218 Network Configuration 1. Enable Allowlist It is recommended that you turn on the allowlist function, and only allow IP in the allowlist to access the device. Therefore, please be sure to add your computer IP address and supporting device IP address to the allowlist. 2.
  • Page 219 and key management in place to prevent unauthorized personnel from damaging hardware and other peripheral equipment (e.g. USB flash disk, serial port).

This manual is also suitable for:

6923169754758

Table of Contents