Dahua ASI2201H-W User Manual

Access Standalone
User's Manual
V1.0.
I
General
Signal Words
Meaning
DANGER
WARNING
CAUTION
TIPS
NOTE
Version
Revision Content
Release Time
This manual introduces the installation and basic operations of the Access Standalone (hereinafter
referred to as "the Device").
Safety Instructions
The following signal words might appear in the manual.

Foreword

Indicates a high potential hazard which, if not avoided, will result in
death or serious injury.
Indicates a medium or low potential hazard which, if not avoided,
could result in slight or moderate injury.
Revision History
V1.0.4 Updated the user management. November 2023
V1.0.3 Updated the manual. January 2023
V1.0.2 Updated the manual. May 2022
V1.0.1
Indicates a potential risk which, if not avoided, could result in
property damage, data loss, reductions in performance, or
unpredictable results.
Provides methods to help you solve a problem or save time.
Provides additional information as a supplement to the text.
Updated the card reader
configurations.
October 2021
Privacy Protection Notice
V1.0.0 First release September 2021
As the device user or data controller, you might collect the personal data of others such as their face,
fingerprints, and license plate number. You need to be in compliance with your local privacy protection
laws and regulations to protect the legitimate rights and interests of other people by implementing
I
measures which include but are not limited: Providing clear and visible identification to inform people
of the existence of the surveillance area and provide required contact information.
About the Manual
The manual is for reference only. Slight differences might be found between the manual and the
product.
We are not liable for losses incurred due to operating the product in ways that are not in
compliance with the manual.
The manual will be updated according to the latest laws and regulations of related jurisdictions.
For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or visit
our official website. The manual is for reference only. Slight differences might be found between
the electronic version and the paper version.
All designs and software are subject to change without prior written notice. Product updates
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
There might be errors in the print or deviations in the description of the functions, operations and
technical data. If there is any doubt or dispute, we reserve the right of final explanation.
Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
If there is any uncertainty or controversy, we reserve the right of final explanation.
II

Important Safeguards and Warnings

This section introduces content covering the proper handling of the Device, hazard prevention, and
prevention of property damage. Read carefully before using the Device, comply with the guidelines
when using it, and keep the manual safe for future reference.
Transportation Requirements
Transport the Device under allowed humidity and temperature conditions.
Storage Requirements
Store the Device under allowed humidity and temperature conditions.
Installation Requirements
WARNING
Connect the Device to the adapter before power on. Strictly abide by local electrical safety standards, and make sure that the voltage in the area is
steady and conforms to the power requirements of the Device.
Do not connect the Device to more than one power supply. Otherwise, the Device might become
damaged.
Observe all safety procedures and wear required protective equipment provided for your use
while working at heights.
Keep the Device on a stable place to prevent it from falling. Do not expose the Device to direct sunlight or heat sources. Do not install the Device in humid, dusty or smoky places. Install the device in a well-ventilated place, and do not block the ventilator of the Device. Use the power adapter or case power supply provided by the Device manufacturer. The power supply must conform to the requirements of ES1 in IEC 62368-1 standard and be no
higher than PS2. Note that the power supply requirements are subject to the Device label.
Connect class I electrical appliances to a power socket with protective earthing.
III
Operating Requirements
Make sure that the power supply of the Device works properly before use. Do not pull out the power cable of the Device while it is powered on. Only use the Device within the rated power range. Use the Device under allowed humidity and temperature conditions. Prevent liquids from splashing or dripping on the Device. Make sure that there are no objects
filled with liquid on top of the Device to avoid liquids flowing into it.
Do not disassemble the Device.
IV
Table of Contents
Foreword ............................................................................................................................................................................ I
Important Safeguards and Warnings ......................................................................................................................... III
1 Product Overview ........................................................................................................................................................ 1
Introduction ................................................................................................................................................................................. 1
Features ......................................................................................................................................................................................... 1
Dimensions ................................................................................................................................................................................... 2
Application ................................................................................................................................................................................... 3
2 Local Configuration ..................................................................................................................................................... 4
Configuration Process .............................................................................................................................................................. 4
Keypad Function ........................................................................................................................................................................ 4
Initialization .................................................................................................................................................................................. 4
Standby Screen ........................................................................................................................................................................... 5
Logging in to the Main Menu ................................................................................................................................................ 6
Unlocking Methods ................................................................................................................................................................... 7
2.6.1 Card .................................................................................................................................................................................... 7
2.6.2 Fingerprint ....................................................................................................................................................................... 7
2.6.3 User Password ................................................................................................................................................................ 7
2.6.4 Administrator Password ............................................................................................................................................. 8
User Management ..................................................................................................................................................................... 8
2.7.1 Adding New User .......................................................................................................................................................... 8
2.7.2 User/Admin List ........................................................................................................................................................... 10
2.7.3 Setting Administrator Password ............................................................................................................................ 11
Access Control Management ............................................................................................................................................... 12
2.8.1 Configuring Unlocking Mode ................................................................................................................................ 12
2.8.2 Configuring Lock Holding Time ............................................................................................................................. 12
Communication ........................................................................................................................................................................ 13
2.9.1 Configuring IP .............................................................................................................................................................. 13
2.9.2 Configuring Wi-Fi ........................................................................................................................................................ 13
2.9.3 Configuring Wiegand ................................................................................................................................................ 14
2.9.4 Configuring Serial Port ............................................................................................................................................. 15
2.9.5 Configuring Mode ...................................................................................................................................................... 15
System ....................................................................................................................................................................................... 16
2.10.1 Time ............................................................................................................................................................................... 16
2.10.2 Volume ......................................................................................................................................................................... 17
2.10.3 Restoring to Default Settings ............................................................................................................................... 18
2.10.4 Restarting the Device ............................................................................................................................................. 18
USB Management .................................................................................................................................................................. 18
2.11.1 Exporting to USB ...................................................................................................................................................... 18
2.11.2 Importing From USB................................................................................................................................................ 19
2.11.3 Updating System ...................................................................................................................................................... 19
2.11.4 Exporting Unlocking Records .............................................................................................................................. 20
2.11.5 Exporting/Importing User Information............................................................................................................ 20
System Information .............................................................................................................................................................. 21
V
3 Web Configuration ....................................................................................................................................................22
Web on Computer .................................................................................................................................................................... 22
3.1.1 Initialization .................................................................................................................................................................. 22
3.1.2 Logging In...................................................................................................................................................................... 23
3.1.3 Resetting the Password ............................................................................................................................................ 24
3.1.4 Configuring Door Parameter .................................................................................................................................. 26
3.1.5 Alarm Linkage .............................................................................................................................................................. 28
3.1.6 Time Section ................................................................................................................................................................. 30
3.1.7 Data Capacity ............................................................................................................................................................... 33
3.1.8 Setting Volume ............................................................................................................................................................ 33
3.1.9 Configuring Network ................................................................................................................................................. 34
3.1.10 Setting Date ................................................................................................................................................................ 37
3.1.11 Safety Management ................................................................................................................................................ 38
3.1.12 User Management ................................................................................................................................................... 45
3.1.13 Maintenance .............................................................................................................................................................. 48
3.1.14 Configuration Management ................................................................................................................................ 49
3.1.15 Updating System ...................................................................................................................................................... 51
3.1.16 Version Information ................................................................................................................................................. 52
3.1.17 Viewing Online User ................................................................................................................................................ 52
3.1.18 Viewing System Logs .............................................................................................................................................. 53
3.1.19 Logging Out ............................................................................................................................................................... 54
Web on Phone ........................................................................................................................................................................... 55
4 SmartPSS AC Configuration .....................................................................................................................................56
Logging in ................................................................................................................................................................................... 56
Adding Devices ......................................................................................................................................................................... 56
4.2.1 Adding Individually .................................................................................................................................................... 56
4.2.2 Adding in Batch ........................................................................................................................................................... 57
User Management ................................................................................................................................................................... 58
4.3.1 Setting Card Type ........................................................................................................................................................ 58
4.3.2 Adding User .................................................................................................................................................................. 59
Assigning Permissions ............................................................................................................................................................ 62
Fingerprint Registration Instructions .................................................................................................64
Cybersecurity Recommendations .......................................................................................................65
VI

1 Product Overview

Introduction

Integrated with a powerful processor and a deep-learning algorithm, the Device can identify
fingerprints instantly and accurately. The Device also supports unlocking the door by cards, passwords,
fingerprints, or their combinations. To meet different needs, it also works with a management software
to perform more functions.
The fingerprint function is available on select models.

Features

LCD display. PC + ABS/acrylic panel that is suitable for outdoor use. Supports card reader and controller modes to adapt to different situations. Supports unlocking the door remotely on SmartPSS AC, or by cards, passwords, fingerprints, or
their combinations.
Supports multiple alarm types, such as duress, intrusion and tamper. Supports various types of users, including guest, patrol, blocklist, VIP, normal users, and other user
types.
You can log in to the web browser with a PC or a phone. Supports door bell. Works with SmartPSS AC and DSS Pro.
1

Dimensions

Dimensions (1) (mm [inch])
Dimensions (2) (mm[inch])
2

Application

The Device is applicable to a variety of scenarios, such as office buildings, schools, industrial parks,
apartment complexes, factories, public stadiums, and business centers. This user manual mainly
describes the Device with the fingerprint function in the controller mode.
The user manual is for reference only, and might differ from the actual product.
Network diagram
3

2 Local Configuration

Item
Description

Configuration Process

Configuration workflow

Keypad Function

Number
or letter
Esc Cancel an operation or go back to the previous page.
OK Go to the selected page or confirm your change.
Used to enter information or password.
Navigate the page.
Go to the administrator login page.
Backspace.
Ring the bell (only on the standby page), navigate the page, or change the input
method.
Table 2-1 Description of keypad

Initialization

For first-time use or after restoring factory defaults, you need to set a password and associate your
email address for the admin account. You also need to set the time zone of the Device. You can use the
4
No.
Item
Description
admin account to log in to the main menu of the Device, configure the Device, and log in to the web
browser and SmartPSS AC.
Initialization
If you forget the administrator password, send a reset request to your associated e-mail address. The password must consist of 8 to 32 non-blank characters and contain at least two types of the
following characters: Upper case, lower case, numbers, and special characters (excluding ' " ; : &).
Set a high-security password by following the password strength prompt.

Standby Screen

You can unlock the door on the standby page with your card, password, or fingerprint.
The Device goes back to the standby page if there is no operation in 30 seconds. The Device turns off the screen if it stays on the standby page for 30 seconds. The screen in the user manual is for reference only.
Standby screen
Table 2-2 Description of standby page
1 Status Displays the status of Wi-Fi, wired network (if any), and USB drive.
2 Date & Time Time and date.
5
No.
Item
Description
3
4
Unlock the
door with
password
Unlocking
methods
Enter the user ID and password, or the administrator password (for details,
see "2.6.4 Administrator Password") to unlock the door.
Displays the unlocking methods you configured.
Tap to enter the main menu. Only Admin and users with
5 Main menu
administrator permission can log in to the main menu. See "2.5 Logging in
to the Main Menu".

Logging in to the Main Menu

Log in to the main menu to configure parameters of the Device. For example, you can add users of
different permissions and change the unlocking mode.
Only the administrator and admin users can log in to the main menu.
On the standby screen, tap .
Verification methods varies with the Device type.
Log in to the main menu.
Log in as a user with the administrator permission by using a card, fingerprint, or
password.
Log in as admin: Tap admin, and then enter the password you set during initialization.
Log in as an administrator
On the main menu, tap / to navigate the page, and then tap OK to configure parameters
of the Device.
Use the shortcuts to configure parameters by simply tapping 1–6.
To configure user management, tap 1. To configure access control, tap 2. To configure communication, tap 3.
6
To configure system, tap 4. To configure USB, tap 5. To view system information, tap 6.
Main menu

Unlocking Methods

2.6.1 Card

Swipe your card to unlock the door.
For the Access Standalone with ID function, if it is connected with an external ID card reader, the
distance between the Access Standalone and the card reader must be larger than 10 cm. Otherwise,
the card reader might malfunction because it is too close to the Access Standalone.

2.6.2 Fingerprint

Press your enrolled fingerprint on the fingerprint scanner to unlock the door.

2.6.3 User Password

Enter the user ID and password to unlock the door.
Tap on the standby page. Select PWD, and then tap OK.
Enter the user ID and password.
To enter the user ID, you need to select the input box of user ID and tap OK. You can directly enter the password on the keypad.
Tap to change the input method.
7
Select OK, and then tap OK.
The system will prompt that the door is unlocked.

2.6.4 Administrator Password

After you set your administrator password and enable it, you can unlock the door by simply entering
the administrator password. Using administrator password to unlock the door without being subject
to user levels, unlock modes, periods, holiday plans, and anti-passback except for normally closed door.
The Device only allows for one administrator password.
To use the administrator password for door access, you need to enable the function. See "2.7.3
Setting Administrator Password".
Select on the standby screen. Select Admin PWD, and then tap OK.
Enter the administrator password. Select OK, and then tap OK.
The door is unlocked.

User Management

You can add new users, view the user list or admin list on the User screen.

2.7.1 Adding New User

Select on the standby screen, and then tap OK. Log in with the administrator account, and then select User > New User.
The screens in this manual are only for reference, and might differ from the actual product.
Add a new user
Configure the parameters.
8
Parameter
Description
We do not recommend setting the first fingerprint as the duress
Table 2-3 Description of user parameters
ID
Name
Each user ID is unique. It can be 18 characters of numbers, letters, or their
combination.
Enter the name ( a maximum of 32 characters, including numbers, symbols,
and letters).
Each user can add up to 3 fingerprints. Follow the on-screen prompts and
voice prompts to add fingerprints.
You can enable the duress fingerprint function under each fingerprint. After
the duress alarm function is enabled, an alarm will be triggered if the door is
Fingerprint
unlocked by the duress fingerprint.
fingerprint.
Only certain models support the fingerprint function.
You can register five cards for each user. On the card registration page, swipe
your card on the card reader, and then the card information will be read by the
Card
Device.
You can enable the duress card function on the card registration page. After
the duress alarm function is enabled, an alarm will be triggered if the door is
unlocked by the duress card.
Enter the user password. The maximum length of the password is 8 digits. The
duress password is adding 1 based on the last digit of the unlock password.
PWD
For example, if the user password is 12345, the duress password will be 12346;
if the user password is 789, and then the duress password is 780. A duress
alarm will be triggered when a duress password is used to unlock the door.
You can select a user permission for the new user.
Permission
Period
Holiday Plan
Normal users only have door unlock permission. Administrators can configure the Device and unlock the door.
A user can only have door access within the defined period. The default value
is 255, which means no period is configured.
A user can only have door access within the scheduled holidays. The default
value is 255, which means no holiday plan is configured.
Valid Date Define a period during which the user has door access control.
9
Parameter
Description
General
Blocklist
Guest
Patrol
VIP
Multi-card
Time Section
Others
Custom User 1/2
General
User Type
After you have configured all the parameters, tap Esc. Tap OK to save changes.

2.7.2 User/Admin List

: General users can unlock the door normally.
: When users in the blocklist unlock the door, service personnel
receive a notification.
: Guests can unlock the door within a defined period or for a certain
number of times. After the defined period expires or the unlocking times
runs out, they cannot unlock the door.
: Paroling users can have their attendance tracked, but they have no
unlocking permissions.
: When VIP unlock the door, service personnel will receive a notification.
The VIP user is not restricted by unlock modes, such as
.
: When they unlock the door, the door will stay unlocked for 5 more
seconds.
: Same as
.
and
You can view and search all the general users and admin users, and edit user information.
On the main menu, select
User > User List/Admin List.
User list
Admin list
Unlocking method
10
: Fingerprint.
: Card.
: Password.
Editing User Information
Select the user and tap OK. Edit the user information. Tap Esc. Tap OK to save changes.
Searching Users
Select and tap OK. Enter the user ID, swipe a card, or press a fingerprint to search the user.
Deleting Users
Select the user, tap OK, and then select to delete the user.

2.7.3 Setting Administrator Password

The Device allows for only one administrator password. You can use it to unlock the door without
entering user ID.
On the main menu, select User > Administrator PWD. Enter the administrator password, and then tap OK.
Administrator password
Select Enable, and then tap OK to enable the function.
11

Access Control Management

Configure the unlocking mode and the unlocking duration.
Access control management

2.8.1 Configuring Unlocking Mode

Configure the unlocking combinations. The unlocking methods vary with different device types.
Use card, fingerprint, password, or any of their combinations to unlock the door.
On the main menu, select Access > Unlock Mode, and then tap OK. Tap OK to configure the unlocking combinations.
And: You have to verify all the selected unlocking methods to open the door. Or: You can verify one of the selected unlocking methods to open the door.
Element (Multiple Choice)
Tap Esc. Tap OK to save changes.

2.8.2 Configuring Lock Holding Time

The door will remain unlocked during the defined period.
12
On the main menu, select Access > Lock Holding.
Parameter
Description
Esc
Tap OK, and then enter the time.
Tap to change the input method.

Communication

Configure the network, serial port and Wiegand port parameters to connect the Device to the network
or other devices.

2.9.1 Configuring IP

Set IP address for the Device to connect it to the network. After that, you can log in to the web portal
to configure the Device, and add it to SmartPSS AC.
On the main menu, select Comm > IP Address, and then tap OK. Select IP Address and tap OK to configure parameters.
Configure IP
Table 2-4 Description of network parameters
IP address,
subnet mask
and gateway
DHCP
P2P
The IP address, subnet mask, and gateway IP address should be on the same
network segment. Tap
It stands for Dynamic Host Configuration Protocol.
When it is enabled, the Device will automatically obtain an IP address.
When it is enabled, you can directly manage the Device without a dynamic
domain, relay server, or port mapping.

2.9.2 Configuring Wi-Fi

Connect the Device to a wireless network.
to save the configurations.
13
Only certain models support Wi-Fi.
On the main menu, select Comm > Wi-Fi, and then tap OK.
Wi-Fi
Select Wifi Search, and then tap OK. Select WiFi, and then tap OK to enable the Wi-Fi function.
The Device will search for and display available wireless networks.
Tap or to go to the previous or next page.
Select a wireless network, tap OK, and then enter the password.

2.9.3 Configuring Wiegand

Configure Wiegand input or output to connect a card reader or access controller.
On the main menu, select
Select Wiegand Input when you need to connect a card reader to the Device.
Select Wiegand Output when the Device functions as a card reader, and you need to connect it
to another access controller.
Comm > Wiegand, and then tap OK.
Wiegand
14
Table 2-5 Description of Wiegand parameters
Parameter
Description
Wiegand26
Wiegand34
Wiegand66
UserID
Card No.
Select a Wiegand format to read card numbers or ID numbers.
Output Type
Pulse Width
Enter the value.
Pulse Interval
Output Data Type

2.9.4 Configuring Serial Port

On the main menu, select Comm > Serial Port, and then tap OK.
: Reads 3 bytes or 6 digits.
: Reads 4 bytes or 8 digits.
: Reads 8 bytes or 16 digits.
: Outputs the ID of the user who swipes a card.
: Outputs the card number that is used.
Serial port settings
Select Serial Input when the Device connects to a card reader. The card reader will send the card
number to the Device or SmartPSS AC.
Select Serial Output when the Device functions as a card reader. The Device will send the card
number to the controller, and the controller controls the door access.
UserID: Outputs the ID of the user who swipes a card. Card No.: Outputs the card number that is used.
Select OSDP Input when the Device connects a card reader through OSDP protocol. The card
reader will send the card information to the Device or SmartPSS AC.

2.9.5 Configuring Mode

The Device can function as a controller or a card reader.
On the main menu, select
Comm > Mode Setting.
15
Serial port settings
Mode
Controller: The Device works as an access controller. You can connect it to a card reader, and
the card reader sends the card information to the Device or SmartPSS AC.
Card Reader: The Device functions as a card reader, and it can be connected to a controller
or another access standalone.
The serial port input cannot be configured in the card reader mode. For the card reader mode, refer to the wiring method of a card reader. You can connect
the Device to an external controller or another access standalone via RS485 protocol. It
does not support Wiegand.
For card reader mode, the two wires A/B (RS-485) are connected to the A/B wires of the
controller. To realize the tamper alarm function, DOOR1_COM and DOOR1_NC should
be connected to the CASE and GND wires of the external controller.
Baud Rate Setting
9600: By default. 115200: Applicable to the controller and card reader with this baud rate.
For the card reader mode, the baud rate will automatically adjust according to the
external controller. We recommend you not to modify other configurations on the web
portal and on the device.
For the controller mode, you need to manually set the same baud rate as the external
device.

System

2.10.1 Time

Configure the time of the Device, such as date, time, and date format.
On the main menu, select System > Time, and then tap OK. Select a parameter, and then tap OK.
16
Parameter
Description
Time settings
Table 2-6 Description of time parameters
24-hour System Enable 24-hour format.
Date Setting Set up the date.
Time Set up the time.
Date Format Select a date format.
Time Zone Select a time zone.

2.10.2 Volume

Adjust the volume of the voice prompt.
On the main menu, select System > Volume, and then tap OK. Tap the up arrow or down arrow to adjust the volume.
Adjust the volume
17

2.10.3 Restoring to Default Settings

Data will be lost if you restore the Device to factory defaults. Please be advised.
On the main menu, select System > Restore Factory, and then tap OK. Select an option, and then tap OK.
Default: Restores factory defaults and deletes all data, including users, device
information, and logs.
Default (Save user&log): Restores factory defaults and deletes all data except user
information and logs.
Restore to default settings

2.10.4 Restarting the Device

On the main menu, select System > Reboot, and then tap OK to restart the Device.

USB Management

Make sure that a USB flash drive is inserted to the Device before exporting user information or
upgrading system. To avoid failure, do not pull out the USB flash drive or perform any operation
during the process.
If you want to import data from one device to another, you must export the data to a USB flash
drive first.
You can use a USB flash drive to update the Device, and export or import user information.

2.11.1 Exporting to USB

Export data from the Device to a USB flash drive. The exported data is encrypted and cannot be edited.
18
On the main menu, select USB > USB Export, and then tap OK. Select the type of data you want to export, and then tap OK.
Export data to the USB drive
Tap OK.
The selected data is exported to the USB flash drive.

2.11.2 Importing From USB

You can import data from USB to the Device.
On the main menu, select USB > USB Import, and then tap OK. Select the type of data you want to import, and then tap OK.
Import data from the USB flash drive
Tap OK.
The selected data is imported to the Device.

2.11.3 Updating System

You can use a USB flash drive to update the system of the Device.
Rename the update file to "update.bin", put it in the root directory of the USB flash drive, and
then insert the USB flash drive to the Device.
On the main menu, select USB > USB Update.
19
Tap OK.
The Device will restart when update is complete.

2.11.4 Exporting Unlocking Records

Export unlocking records to a USB flash drive.
On the main menu, select USB > Export Records, and then tap OK. Select the time.
Export unlocking records
Select USB Export, and then tap OK.
The unlocking records are exported to the USB flash drive.

2.11.5 Exporting/Importing User Information

You can use one-click function to import or export user information, including cards and fingerprints.
On the main menu, select USB > One-click Operation, and then tap OK.
Import: Import user information, including cards and fingerprints. Export: Export user information, including cards and fingerprints.
Select Import or Export, and then tap OK.
One-click operation
20

System Information

On the main menu, select Info, and then tap OK. You can view data capacity and system information
of the Device.
Data Capacity: Displays the number of general users, admin users, cards, fingerprints, unlocking
records, and alarm records that have been stored, and the storage capacity.
Device Version: Displays software and hardware information of the Device.
21
Open the web browser on your computer or phone. Log in to the web page to configure and update
the Device.

Web on Computer

3.1.1 Initialization

You need to set a password and link an email address before logging in to the web for the first time.
Go to the IP address (192.168.1.108 by default) of the Device in the browser.
Make sure the computer is on the same LAN as the Device.

3 Web Configuration

Initialization
Enter the new password, confirm password, enable Bind Email, enter an email address, and
then click Next.
The password must consist of 8 to 32 non-blank characters and contain at least two
types of the following characters: Upper case, lower case, numbers, and special
characters (excluding ' " ; : &). Set a high-security password by following the password
strength prompt.
Keep the password properly after initialization and change the password regularly to
improve security.
When you need to reset the administrator password by scanning the QR code, you need
the associated email address to receive the security code.
22
Click Next.
Auto check
(Optional) Select Auto Check.
We recommend you select Auto Check to get the latest version in time.
Click Next.
Finish initialization
Click Complete.

3.1.2 Logging In

Go to the IP address (192.168.1.108 by default) of the Device in the browser, and press the
23
Enter key.
Make sure that the computer is on the same LAN as the Device. The default IP address is 192.168.1.108.
Login
Enter the user name and password.
The default administrator name is admin, and the password is the one you set during
initialization. We recommend you to change the administrator password regularly to
increase security.
If you forgot the administrator password, click Forget Password? to reset it. See "3.3
Resetting the Password".
Click Login.

3.1.3 Resetting the Password

When resetting the password of the admin account, your email address is required.
On the login page, click Forgot Password. Read the prompt carefully and click OK.
24
Reset prompt
Scan the QR code on the window, and you will get the security code.
A maximum of two security codes will be generated by scanning the same QR code. If
security codes become invalid, refresh the QR code and scan again.
After you scanned the QR code, send the content that you received to the designated
email address, and then you will receive a security code.
Use the security code within 24 hours after you receive it. Otherwise, it will become
invalid. If wrong security codes are entered for consecutive five times, the administrator
will be frozen for five minutes.
Reset Password
25
Enter the security code you have received.
Parameter
Description
NC
Time Section:
Multi-card
Unlock mode
Click Next. Reset and confirm the new password.
The password must consist of 8 to 32 non-blank characters and contain at least two types of
the following characters: Upper case, lower case, numbers, and special characters (excluding
' " ; : &). Set a high-security password by following the password strength prompt.
Click OK to complete resetting.

3.1.4 Configuring Door Parameter

Configure the access control parameters.
Log in to the web page. Select Door Parameter.
Figure 3-9 Door parameter
Table 3-1 Description of door parameters
Name Enter a name for the door that the Device controls.
State
Opening
Method
Hold Time (Sec.)
Select
the defined opening method will not be effective.
Unlock duration. The door will be locked again after the duration. It ranges
from 0.2 to 600 seconds.
for normally closed, or NO for normally open. If either is selected,
Set different unlock method for defined periods.
: The user can unlock the door when multiple users and multiple
user groups grant access.
: set unlock combinations.
Normally Open
Time
The door remains open or closed during the defined period.
Normally Close
Time
26
Parameter
Description
Door Sensor
Door Sensor
Timeout(Sec)
Timeout (Sec.)
than this value.
Set the remote verification door opening period. For details, see "3.6.1
A timeout alarm will be triggered if the door remains unlocked for longer time
Remote
Verification
Configuring Time Section". When opening a door is authorized on the device, it
needs to be confirmed on the platform before it can be opened.
An alarm will be triggered when a duress card or duress password is used to
Duress Alarm
unlock the door.
Intrusion and overtime alarms can be triggered only after
Door Sensor
enabled.
When
Intrusion Alarm
is opened abnormally.
A timeout alarm will be triggered if the door remains unlocked for longer time
Overtime Alarm
than the
If enabled, users need to verify identities both for entry and exit; otherwise an
alarm will be triggered.
If a person enters with verification and exits without verification, an alarm
Anti-passback
Alarm
If a person enters without verification and exits with verification, an alarm
Configure unlock method.
Time section
1) In the
Opening Method list, select Time Section, and then click .
is
is enabled, an intrusion alarm will be triggered if the door
, which ranges from 1 to 9999 seconds.
will be triggered when they attempt to unlock again, and access is denied
at the same time.
will be triggered when the they attempt to unlock again, and access is
denied at the same time.
Time section parameter
2) Configure the time and opening method for a time section. You can configure up to four
time sections for a single day.
3) (Optional) Select
4) Click
Multi-card
1) In the
2) Click
OK.
Opening Method list, select Multi-card, and then click .
Add.
3) Select an unlocking method in the
Apply to the whole week to copy the configuration to the rest of days.
Opening Method list., and enter a number for the
valid user.
27
Multi-card parameter
4) In the User List area, enter user ID. For details, see "2.7.1 Adding New User".
VIP, patrol, and blocklist users cannot be added. All the users in different groups must all verify their identities in the group order to
unlock the door.
Unlock mode
1) In the
2) In the
3) In the
Opening Method list, select Unlock Mode.
Combination list, select Or or And.
And means you must use all the selected methods to open the door. Or means you can open the door with any of the selected methods.
Element list, select the unlock method.
Configure other parameters. Click OK.

3.1.5 Alarm Linkage

3.1.5.1 Setting Alarm Linkage
Alarm input devices can be connected to the Device, and you can modify the alarm linkage parameters.
Log in to the web page. Select Alarm Linkage > Alarm Linkage.
Click to configure alarm linkage.
Alarm linkage
28
Parameter
Description
NO
NC
Modify linkage parameters
Table 3-2 Description of alarm linkage parameters
Alarm Input You cannot modify the value. Keep it default.
Name Enter a zone name.
Select the type according to the alarm device.
Alarm Input Type
: The circuit of the alarm device is normally open, and it closes
when an alarm is triggered.
: The circuit of the alarm device is normally closed, and it opens
when an alarm is triggered.
If fire linkage is enabled, the device will generate fire alarms when
Fire Link Enable
being triggered. The alarm messages are displayed in the alarm log.
If fire link is enabled, alarm output and access linkage are NO by default.
Alarm Output Enable If alarm output is enabled, the relay can generate alarm messages.
Duration (Sec.) Alarm duration. It ranges from 1 s through 300 s.
Alarm Output Channel
Access Link Enable
The Device has only one output channel. Select the output channel
according to your alarm device.
If access linkage is enabled, the Device will be normally on or normally
closed when there are input alarm signals.
Channel Type There are two options: NO and NC.
Click OK to save changes.
The configurations on the web will be synchronized with the software client if the Device is
added to the client.
3.1.5.2 Alarm Log
Log in to the web page.
29
Select Alarm Linkage > Alarm Log.
Alarm log
Select a time range and alarm type, and then click Query.

3.1.6 Time Section

Configure time sections and holiday plans, and then you can define when a user has the permissions
to unlock doors.
3.1.6.1 Configuring Time Section
Query results
You can configure up to 128 groups (from No.0 through No.127) of time section. In each group, you
need to configure door access schedules for a whole week. A user can only unlock the door during the
scheduled time.
Log in to the web page. Select Time Section > Time Section. Click Add.
30
Time section parameters
Enter No. and name for the time section.
No.: Enter a section number It ranges from 0 through 127. Time Section Name: Enter a name for each time section. You can enter a maximum of
32 characters (contain number, special characters and English characters).
Configure time sections for each day.
You can configure up to four time sections for a single day.
(Optional) Click Apply to the whole week to copy the configuration to the rest of days. Click OK to save the changes.
3.1.6.2 Configuring Holiday Group
Set time sections for different holiday groups. You can configure up to 128 holiday groups (from No.0
through No.127). and up to 16 time sections for a single holiday group. Users can unlock doors in the
defined time sections.
Log in to the web page. Select Time Section > Holiday Group Config. Click Add.
31
Add a holiday group
Enter a number and a name for the holiday group.
No.: Enter a section number. It ranges from 0 through 127. Time Section Name: Enter a name for each time section. You can enter a maximum of
32 characters (contain numbers, special characters and English characters).
Click Add. Enter a name in the Time Section Name box, select the start date and end date, and then
click OK.
You can add multiple holidays for one holiday group.
Add a holiday
Click OK.
3.1.6.3 Configuring Holiday Plan
Assign the configured holiday groups to the holiday plan. Users can only unlock the door in the
defined time in the holiday plan.
Log in to the web page.
32
Select Time Section > Holiday Plan Config. Click Add.
Add a holiday plan
Enter a number and name for the holiday plan.
No.: Enter a section number. It ranges from 0 through 127. Time Section Name: Enter a name for each time section. You can enter a maximum of
32 characters (contain numbers, special characters and English characters).
In the Holiday Group No. list, select the holiday group that you have configured.
Select 255 if you do not want to select a holiday group.
In the Holiday Period area, configure time sections in the holiday group. You can configure
up to four time sections.
Click OK.

3.1.7 Data Capacity

View data capacity such as users, cards, and fingerprints that the Device can store.
Log in to the web page. Select Data Capacity on the navigation bar.

3.1.8 Setting Volume

Log in to the web page. Click Volume Setting, and adjust the volume.
33
Click OK.

3.1.9 Configuring Network

3.1.9.1 Configuring TCP/IP
You need to configure IP address and DNS server so that the Device can communicate with other
devices.
Volume setting
Prerequisite
Make sure that the Device is connected to the network.
Log in to the web page. Select Network Setting > TCP/IP.
TCP/IP
Configure parameters.
34
Parameter
Description
Static
DHCP
and gateway
Parameter
Description
Table 3-3 Description of TCP/IP
IP Version IPv4.
MAC Address MAC address of the Device.
Mode
: Set IP address, subnet mask, and gateway address manually.
After DHCP is enabled, IP address, subnet mask,
address cannot be configured.
If DHCP is effective, IP address, subnet mask, and gateway address
will be assigned by DHCP automatically.
If you disable DHCP, the default IP will be displayed.
IP Address
Subnet Mask
Default Gateway
Preferred/
Alternate DNS
Server
Click OK to complete the setting.
3.1.9.2 Configuring Port
You can limit access to the Device at the same time by web, software and phone, and configure port
numbers of the Device.
Log in to the web page. Select Network Setting > Port. Configure the port number.
Except Max Connection, you need to restart the Device to make your configurations effective.
Enter IP address, and then configure subnet mask and gateway address.
IP address and gateway address must be in the same network segment.
Set IP address of the preferred DNS server.
Table 3-4 Description of ports
Set the maximum access to the Device via clients, such as web, software, and
Max
Connection
phone.
Platform clients like SmartPSS AC are not counted.
TCP Port Default value is 37777.
HTTP Port
Default value is 80. If you want to change the port number, add the changed
port number after the address when you log in via a web browser.
HTTPS Port Default value is 443.
RTSP Port Default value is 554.
Click OK to complete the setting.
35
3.1.9.3 Register
Parameter
Description
The Device reports its address to the designated server so that clients can access.
Log in to the web page. Select Network Setting > Auto Register. Select Enable, and enter host IP, port, and sub device ID.
Host IP Server IP address or server domain name.
Port Server port used for auto registeration.
Sub Device ID Access controller ID assigned by the server.
Click OK to complete the setting.
3.1.9.4 P2P
Peer-to-peer computing or networking is a distributed application architecture that partitions tasks or
workloads between peers. Users can download mobile application by scanning QR code, and then
register an account. You can manage multiple devices on the mobile application. Dynamic domain
name, port mapping, and transit server are not required.
Table 3-5 Auto register description
If you want to use P2P, you must connect the Device to the Internet; otherwise this function cannot
work properly.
P2P
Log in to the web page. Select Network Setting > P2P. Select Enable to enable the P2P function. Click OK.
Scan the QR code on your web page to get the serial number of the Device.
36

3.1.10 Setting Date

Parameter
Description
Sync with PC
Date
Week
Sate Setting
NTP Setting
Server
Port
Update Cycle
You can configure time zone, system time, DST (Daylight Saving Time) or NTP (Network Time Protocol).
Log in to the web page. Click Date Setting.
Date setting
Table 3-6 Data setting description
Time Zone Configure the time zone.
System Time
Configure system time.
Click
, and the system time changes to the PC time.
1. (Optional) Enable DST.
DST
2. Select
or
3. Configure start time and end time.
Select the
1.
2. Configure parameters.
NTP Setting
: Enter the domain of a NTP server, and the Device will
automatically sync time with NTP server.
: Enter the port of the NTP server.
: Enter time synchronization interval.
Click OK.
in
checkbox.
.
37

3.1.11 Safety Management

3.1.11.1 Configuring IP Authority
Log in to the web page. Click Safety Mgmt. > IP Authority.
Select a cybersecurity mode in the Type list.
Network Access: Set allowlist and blocklist to control access to the Device.
Allowlist: a list of trusted IP/MAC addresses that has access to the Device.
Blocklist: a list of blocked IP/MAC addresses that has no access to Device.
Prohibit PING: Enable PING prohibited function, and the Device will not respond to the
Ping request.
Anti Half Connection: Enable Anti Half Connection function, and the Device can still
function properly under half connection attack.
IP authority
3.1.11.1.2 Network Access
Select Network Access in the Type list.
Procedure
Select the Enable checkbox.
38
Parameter
Description
Type
All Ports
Network access
Select Allow List or Block List. Click Add.
Add IP
Configure parameters.
Table 3-7 Description of adding IP parameters
Type Select the address type in the
IP Version IPv4 by default.
All Ports Select
checkbox, and your settings will apply to all ports.
39
list.
Parameter
Description
All Ports
Device Start Port
Device End Port
Click Save, and the IP Authority window is displayed. Click OK.
Related Operations
Click to edit the allowlist or blocklist.
Click to delete the allowlist or blocklist
3.1.11.1.3 Prohibit PING
Select Prohibit PING in the Type list. Select the Enable checkbox.
If you clear
checkbox, set the device start port and device end port.
Prohibit PING
Click OK.
3.1.11.1.4 Anti Half Connection
Select the Anti Half Connection in the Type list. Select the Enable checkbox.
Click OK.
Network access
40
3.1.11.2 Configuring System
Parameter
Description
3.1.11.2.1 System Service
Log in to the web page. Select Safety Mgmt. > System Service. Enable or disable the system services.
System service
SSH
PWD Reset
Enable
CGI
ONVIF
Table 3-8 Description of system service
Secure Shell (SSH) is a cryptographic network protocol for operating network
services securely over an unsecured network.
When SSH is enabled, SSH provides cryptographic service for the data
transmission.
If enabled, you can reset the password. This function is enabled by default.
Common Gateway Interface (CGI) offers a standard protocol for web servers to
execute programs similarly to console applications running on a server that
dynamically generates web pages.VR dne
When CGI is enabled, CGI commands can be used. The CGI is enabled by
default.
Enable other devices to pull video stream of the VTO through the ONVIF
protocol.
41
Parameter
Description
Hypertext Transfer Protocol Secure (HTTPS) is a protocol for secure
Security Mode (recommended)
logging in with Digest
Compatible Mode
communication over a computer network.
When HTTPS is enabled, HTTPS will be used to access CGI commands;
HTTPS
otherwise HTTP will be used.
When HTTPS is enabled, the Device will restart automatically.
Compatible with
TLSv1.1 and
Enable this function if your browser is using TLS V1.1 or earlier versions.
earlier versions
Emergency
Maintenance
Auth Method
Enable it for faults analysis and maintenance.
authentication.
3.1.11.2.2 Creating Server Certificate
: Supports
: Compatible with the login method of old devices.
Configure HTTPS server to improve your website security with server certificate.
If you use HTTPS for the first time or the IP address of the Device is changed, create a server
certificate and install a root certificate.
If you change PC to log in to web, you need to download and install the root certificate again on
the new PC or copy it to the new PC.
On the System Service page, click Create Server Certificate. Enter information and click OK, and then the Device will restart.
Create server certificate
42
3.1.11.2.3 Downloading Root Certificate
On the System Service page, click Download Root Certificate. Double-click the file that you have downloaded, and then click Open.
Click Install Certificate.
File download
Certificate information
Select Current User or Local Machine, and then click Next.
Current User: Applies to the user that has logged in to the PC. Local Machine: Applies to all users that have logged in to the PC
43
Store Location
Select the appropriate storage location.
1) Select Place all certificates in the following store.
2) Click
Browse to import the certificate to the Trusted Root Certification Authorities
store, and then click Next.
Certificate store
Click Finish.
44
Certificate store selected

3.1.12 User Management

You can add and delete users, change users' passwords, and link your email address for resetting the
password when you forget password.
User refers to the user who logs in to the web page.
3.1.12.1 User
3.1.12.1.1 Adding Users
Log in to the web page. Select User Mgmt. > User Mgmt.
45
Click Add.
User management
Add user
Enter username, password, confirm password, and remark. Click OK.
3.1.12.1.2 Changing Password
Log in to the web page. Select User Mgmt. > User Mgmt. Click .
46
Modify user information
Select the Bind Email checkbox and enter the email address. Select the Modify Password checkbox, and then enter the old password, new password and
confirm password.
Click OK.
3.1.12.2 ONVIF User
Open Network Video Interface Forum (ONVIF), a global and open industry forum that is established for
the development of a global open standard for the interface of physical IP-based security products.
Create ONVIF users and have their identities verified via ONVIF protocol.
3.1.12.2.1 Adding ONVIF User
Log in to the web page. Select User Mgmt. > Onvif User.
Onvif user
Click Add.
47
Add ONVIF user
Enter username, password, and confirm password. Select the group. Click OK.
3.1.12.2.2 Changing Password
Log in to the web page. Select User Mgmt. > Onvif User. Click .
Select the Modify Password checkbox, and then enter the old password, new password and
confirm password.
Click OK.
Change the password (ONVIF user)

3.1.13 Maintenance

You can regularly restart the Device during idle time to improve its performance.
Log in to the web page. Select Maintenance.
48
Maintenance
Set the time, and then click OK.
The Device will restart at the defined the time.
It is Never by default.
(Optional) Click Reboot Device, and the Device will restart immediately.

3.1.14 Configuration Management

When more than one device needs the same configurations, you can configure parameters for them
by importing or exporting configuration files.
3.1.14.1 Exporting Configuration File
You can export the configuration file of the Device for backup.
Log in to the web page. Select Config Mgmt > Config Mgmt.
Configuration management
Click Export configuration to save the configuration file locally.
IP information of the Device will not be exported.
3.1.14.2 Importing Configuration File
You can export the configuration file from the Device to another one with the same device model.
Log in to the web page. Select Config Mgmt > Config Mgmt. Click Browse to select the configuration file, and then click Import configuration.
The Device will restart after importing configuration file.
49
3.1.14.3 Setting Features
Parameter
Description
Card No. Reverse
Security Module
NC
NO
Log in to the web page. Select Config Mgmt > Config Mgmt. In the Features area, set the features.
Features
Table 3-9 Description of features
Enable
Card No. Reverse
external device, but the order of the received card number is inconsisent with
that of the actual number.
Security Module
If
invalid.
Set door sensor type:
Door Sensor Type
Baud Rate Select baud rate according to the external device.
Click OK.
3.1.14.4 Setting Fingerprint
You can set the fingerprint identity level to adjust recognition accuracy rate.
Log in to the web page. Select Config Mgmt > Config Mgmt. In the Fingerprint area, set the identity level.
The higher identity level means higher recognition accuracy and higher recognition threshold.
function, if you set Wiegand output and connect a
is enabled, door exit button, lock and fire linkage are
: Normally closed.
: Normally open.
Fingerprint identity level
50
Click OK.
3.1.14.5 Restoring Factory Defaults
Restoring the Device to default configurations will cause data loss. Please be advised.
Log in to the web page. Select Config Mgmt. >Default.
Default
Restore factory defaults if necessary.
Restore Factory: Resets configurations of the Device and deletes all data. Restore Factory (Save user & log): Resets configurations of the Device and deletes all
data except for user information and logs.

3.1.15 Updating System

Export the configuration file for backup before updating, and then import the file after the update
completes.
Use the correct update file. Make sure to get the correct update file from the technical support.
Do not disconnect the power or network, or restart or shut down the Device during the update.
Log in to the web page. Select Upgrade.
51
Select update method.
File Update
1) Click
2) Click
Online Update
1) Select the
Browse, and then upload upgrade file.
The upgrade file should be a .bin file.
Upgrade.
The Device will restart after the upgrading completes.
Auto-check checkbox, and then click OK.
The system checks for new version automatically.
Upgrade
We need to collect the data such as device name, firmware version, and device serial
number to proceed auto-check. The collected information is only used for verifying the
legality of cameras and giving upgrade notification.
2) If there is any new version available, click
The Device will restart after the upgrading completes.
Click Manual Check to check for new version manually.

3.1.16 Version Information

View information including MAC address, serial number, MCU version, web version, security baseline
version, system version, and firmware version.
Log in to the web page. Select Version Info to view version information.

3.1.17 Viewing Online User

Upgrade.
You can view online users who log in to web, including their username, IP address, and login time.
Log in to the web page. Select Online User.
52

3.1.18 Viewing System Logs

Online user
View and back up system logs, admin logs, and unlock records.
3.1.18.1 System Logs
View and search for system logs.
Log in to the web page. Select System Log > System Log. Select the time range and the log type, and then click Query.
Click Backup to download the results.
Search for logs
53
3.1.18.2 Admin Logs
Search for admin logs by using admin ID.
Log in to the web page. Select System Log > Admin Log. Enter the admin ID, and then click Query.
Admin log
3.1.18.3 Unlock Records
Search for and export unlock records.
Log in to the web page. Select System Log > Search Records. Select the time range and the log type, and then click Query. Click Export Data to download the results.

3.1.19 Logging Out

Click at the upper-left corner, and then click OK to log out of the web page.
54

Web on Phone

Make sure the Device is on the same LAN as your phone. Connect the Device to your phone hotspot
or connect the Device and your phone to the same router.
Only certain parameters can be configured on the web portal if you log in on a phone.
Go to the IP address (192.168.1.108 by default) of the Device in the browser.
Login
Enter the user name and password.
The default administrator name is admin, and the password is the one you set during
initialization. We recommend you to change the administrator password regularly to increase
security.
Click Login.
55

4 SmartPSS AC Configuration

This chapter introduces how to manage and configure the Device by using SmartPSS AC. For details,
see the user's manual of SmartPSS AC.
Use Smart PSS AC as an example for configurations. The windows in the user manual are only for
reference, and might differ from the actual product.

Logging in

Install SmartPSS AC.
Double-click , and then follow the prompts to complete initialization and log in.

Adding Devices

You need to add the Device to SmartPSS AC. You can in batch or individually.

4.2.1 Adding Individually

Log in to SmartPSS AC. Click Device Manager. Click Add on the Device Manager page. Enter the required information.
Enter device information
56
Parameter
Description
Table 4-1 Description of device parameters
Device Name
Method to add Select IP to add device through IP address.
IP Enter IP address of the device.
Port The port number is 37777 by default.
User Name,
Password
Click Add, and then you can see the added device on the Devices page.
The device automatically logs in after being added. Online is displayed after successful login.

4.2.2 Adding in Batch

We recommend the auto-search function when you add devices in batch. The devices you add should
be on the same network segment.
Log in to SmartPSS AC. Click Device Manager.
Enter a name of the device. We recommend naming the device according to
its installation area.
Enter the username and password of the device.
Devices
Click Auto Search.
Auto search
57
Enter the network segment, and then click Search.
A device list will be displayed.
Click Search to refresh the device list. Select a device, and then click Modify IP to modify its IP address. For details, see the
Select devices that you want to add to the SmartPSS AC, and then click Add. Enter the username and the password of the device.
You can view the added devices on the Devices page.
The device automatically logs in after being added. Online is displayed after successful
Related Operation
: Edit the device information, including device name, IP address, port number, username, and
password.
You can also double-click the device to edit its information.
user's manual of SmartPSS AC.
login.
: Configure the device. You can set up the time, update the device, restart the device, and
extract user information or attendance records from the device.
and : Log in to and out of the device.
: Delete the device.

User Management

Add users, issue cards to them, and configure their access permissions.

4.3.1 Setting Card Type

Before issuing card, set card type first. For example, if the issued card is ID card, set type to ID card.
Card types must be the same as card issuer types; otherwise, card numbers cannot be read.
Log in to SmartPSS AC. Click Personnel Manager.
Personnel manager
58
Click , and then click . On the Setting Card Type window, select a card type.
Click to select the display method of card number in decimal or in hex.
Setting card type
Click OK.

4.3.2 Adding User

4.3.2.1 Adding Individually
You can add users one by one manually.
Log in to SmartPSS AC. Click Personnel Manger > User > Add. Click the Basic Info tab, and enter the basic information of the user.
59
Add basic information
Click the Certification tab to add certification information of the user.
Configure password.
The password must consist of 6–8 digits.
Configure card.
The card number can be read automatically or entered manually. To read the card
number automatically, select a card reader, and then place the card on the card reader.
1) Click , set
2) Click
3) Click
Add, swipe a card on the device, and then the card number will be displayed.
OK.
Card Reader to Device, and then select the device you add from Device.
4) (Optional) After adding a card, you can set the card to main card or duress card, or replace
the card with a new one, or delete the card.
Configure fingerprint.
1) Click , set
2) Click
Add and press your finger on the scanner three times continuously.
Fingerprint Collector to Device.
60
Add password, card, and fingerprint
Configure permissions for the user.
For details, see "4.4 Assigning Permissions".
Click Finish.
4.3.2.2 Adding in Batch
Permission configuration
You can add users in batches.
Log in to SmartPSS AC. Click Personnel Manger > User > Batch Add. Select Device from Device, and then select the device that you add. Configure the following parameters.
Start No.: The user ID starts with the number you defined. Quantity: The number of users you want to add. Department: Select the department that the user belongs to.
61
Effective Time and Expired Time: The users can unlock the door within the defined
period.
Click Issue.
The card number will be read automatically.
Click Stop when you finish issuing cards. Click OK.
Add users in batches
In the user list, click to edit the information of the added users.

Assigning Permissions

Add devices to a permission group, and then users in the group can unlock corresponding doors.
Log in to SmartPSS AC. Click Personnel Manger > Permission configuration.
Click . Enter the group name, remarks (optional), and select a time template.
Select the devices. Click OK.
Create a permission group
Click of the permission group you added.
62
Select the users you want to add to the permission group. Click OK.
Users in the permission group can swipe their cards, or use other unlock methods to unlock
the door.
Add users to a permission group
63
Fingerprint Registration Instructions
When you register the fingerprint, pay attention to the following points:
Make sure that your fingers and the scanner surface are clean and dry. Press your finger on the center of the fingerprint scanner. Do not put the fingerprint sensor in a place with intense light, high temperature, and high
humidity.
If your fingerprints are unclear, use other unlocking methods.
Fingers Recommended
Forefingers, middle fingers, and ring fingers are recommended. Thumbs and little fingers cannot be
put at the recording center easily.
Appendix Figure 1-1 Recommended fingers
How to Press Your Fingerprint on the Scanner
Appendix Figure 1-2 Correct placement
Appendix Figure 1-3 Wrong placement
64
Cybersecurity Recommendations
Mandatory actions to be taken for basic device network security:
1. Use Strong Passwords
Please refer to the following suggestions to set passwords:
The length should not be less than 8 characters. Include at least two types of characters; character types include upper and lower case letters,
numbers and symbols.
Do not contain the account name or the account name in reverse order. Do not use continuous characters, such as 123, abc, etc. Do not use overlapped characters, such as 111, aaa, etc.
2. Update Firmware and Client Software in Time
According to the standard procedure in Tech-industry, we recommend to keep your device
(such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is equipped
with the latest security patches and fixes. When the device is connected to the public
network, it is recommended to enable the “auto-check for updates” function to obtain timely
information of firmware updates released by the manufacturer.
We suggest that you download and use the latest version of client software.
"Nice to have" recommendations to improve your device network security:
2. Physical Protection
We suggest that you perform physical protection to device, especially storage devices. For
example, place the device in a special computer room and cabinet, and implement well-done
access control permission and key management to prevent unauthorized personnel from
carrying out physical contacts such as damaging hardware, unauthorized connection of
removable device (such as USB flash disk, serial port), etc.
3. Change Passwords Regularly
We suggest that you change passwords regularly to reduce the risk of being guessed or cracked.
4. Set and Update Passwords Reset Information Timely
The device supports password reset function. Please set up related information for password
reset in time, including the end user’s mailbox and password protection questions. If the
information changes, please modify it in time. When setting password protection questions, it is
suggested not to use those that can be easily guessed.
5. Enable Account Lock
The account lock feature is enabled by default, and we recommend you to keep it on to guarantee
the account security. If an attacker attempts to log in with the wrong password several times, the
corresponding account and the source IP address will be locked.
6. Change Default HTTP and Other Service Ports
We suggest you to change default HTTP and other service ports into any set of numbers between
1024–65535, reducing the risk of outsiders being able to guess which ports you are using.
7. Enable HTTPS
We suggest you to enable HTTPS, so that you visit Web service through a secure communication
channel.
8. MAC Address Binding
We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing
65
the risk of ARP spoofing.
9. Assign Accounts and Privileges Reasonably
According to business and management requirements, reasonably add users and assign a
minimum set of permissions to them.
10. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to
reduce risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to the
following services:
SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.
SMTP: Choose TLS to access mailbox server. FTP: Choose SFTP, and set up strong passwords. AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords.
11. Audio and Video Encrypted Transmission
If your audio and video data contents are very important or sensitive, we recommend that you
use encrypted transmission function, to reduce the risk of audio and video data being stolen
during transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.
12. Secure Auditing
Check online users: we suggest that you check online users regularly to see if the device is
logged in without authorization.
Check device log: By viewing the logs, you can know the IP addresses that were used to log
in to your devices and their key operations.
13. Network Log
Due to the limited storage capacity of the device, the stored log is limited. If you need to save the
log for a long time, it is recommended that you enable the network log function to ensure that
the critical logs are synchronized to the network log server for tracing.
14. Construct a Safe Network Environment
In order to better ensure the safety of device and reduce potential cyber risks, we recommend:
Disable the port mapping function of the router to avoid direct access to the intranet devices
from external network.
The network should be partitioned and isolated according to the actual network needs. If
there are no communication requirements between two sub networks, it is suggested to use
VLAN, network GAP and other technologies to partition the network, so as to achieve the
network isolation effect.
Establish the 802.1x access authentication system to reduce the risk of unauthorized access
to private networks.
Enable IP/MAC address filtering function to limit the range of hosts allowed to access the
device.
66
Loading...