Dahua DHI-ASC1204B User Manual

Controller
User’s Manual
V1.0.0
Cybersecurity Recommendations I
Cybersecurity Recommendations
Mandatory actions to be taken towards cybersecuri ty
1. Change Passwords and Use Str ong Passwords:
The number one reason syst ems get “hac ked” is du e to hav ing weak or def aul t passw ords. It is recommended to change default passwords immediately and choose a strong password whenever possible. A strong password should be made up of at least 8 characters and a combination of special charac t er s, numbers, and upper and lower case letters.
2. Update Firmware As is standard procedure in the tech-industry, we recommend keeping NVR, DVR, and IP camera firmware up-to-date to ens ure the sy st em is cur rent w ith th e l atest secur ity patches an d fixes.
“Nice to have” recomm endations to im pr ove your network security
1. Change Passwords Regul ar l y
Regularly change the credentials to your devices to help ensure that only authorized users are able to access the system.
2. Change Default HTTP and TCP Port s:
● Change default HTTP and TCP ports for systems. These are the two ports used to
communicate and to view v ideo feeds r emotely.
● These ports can be changed to any set of numbers between 1025-65535. Avoiding the default ports reduces the ris k of outsiders being able to guess whi ch por t s you are using.
3. Enable HTTPS/SSL: Set up an SSL Certificate to enable HTTPS. This will encrypt all communication between your devices and recorder.
4. Enable IP Filter: Enabling your IP filter will prevent everyone, except those with specified IP addresses, from accessing the system.
5. Change ONVIF Password: On older IP Camera firmware, the ONVIF password does not change when you change the system’s credentials. You w ill need t o either u pdate t he c amer a’s fir mwar e to t he latest revision or manually change the ONVI F password.
6. Forward Only Ports You Need:
Cybersecurity Recommendations II
● Only forward the HTTP and TCP ports that you need to use. Do not forward a huge range of
numbers to the device. Do not DMZ t he device's IP address.
● You do not need to forward any ports for individual cameras if they are all connected to a recorder on site; just the NVR is needed.
7. Disable Auto-Logi n on SmartPSS: Those using SmartPSS to view their system and on a computer that is used by multiple pe ople should disable auto-login. This adds a lay er of se curit y to pr event users w ithout t he appropri ate credentials from accessing the system.
8. Use a Different Username and Password for Smart P SS: In the event that your social media, bank, email, etc. account is compromised, you would not want someone collecting those passwords and trying them out on your video surveillance system. Using a different username and password for your security system will make it more difficult for someone to guess their way into your system.
9. Limit Feature s of Guest Accounts: If your system is set up for multiple user s, ensure tha t each user on ly has r ights to features and functions they need to use to per form their job.
10. UPnP:
● UPnP will automatically try to forward ports in your router or modem. Normally this would be a
good thing. However, if your system automatically forwards the ports and you leave the credentials defaulted, you may end up with unwanted visitors.
● If you manually forwarded the HTTP and TCP port s in your router/mod em, this feature sho uld be turned off regardless. Disab ling UPnP i s reco mmende d w hen the funct ion is not use d in rea l applications.
11. SNMP: Disable SNMP if you are n ot using it. I f you are us ing SNMP, you should do s o only tempor arily, for tracing and testing purpos es only.
12. Multicast: Multicast is used to share video streams between two recorders. Currently there are no known issues involving Multicast, but if you are not using this feature, deactivation can enhance your network security.
13. Check the Log: If you suspect that someone has gained unauthorized access to your system, you can check the system log. The system log will show you which IP addresses were used to login to your system and what was accessed.
14. Physically Lock Down the Device:
Cybersecurity Recommendations III
Ideally, you want to prevent any unauthorized physical access to y our system. The best way to achieve this is to install the recorder in a lockbox, locking server rack, or in a room that is behind a lock and key.
15. Connect IP Cameras t o t he P oE Ports on the Back of an NVR: Cameras connected to th e PoE por ts on the back of an NVR are isolated from the out side w orld and cannot be accessed directly.
16. Isolate NVR and IP Camera Network The network your NVR and IP camera resides on should not be the same network as your
public computer network. This w il l prevent any visitors or unwanted guests from gett in g ac cess to the same network the security system needs in order to fun ct ion properly.
Regulatory Information IV
Regulatory Information
FCC Information
CAUTION
Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.
FCC conditions :
This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions:
This device may not cause harmful interference. This device must accept any interference received, including interference that may cause
undesired operation.
FCC compliance:
This equipment has been tested and found to comply with the limits for a digital device, pursuant to part 15 of the FCC Rules. This equipment generate, uses and can radiate radio frequency energy and, if not installed and used in accordance with the guide, may cause harmful interference to radio communication.
For class A device, these limits are designed to provide reasonable protection against
harmful interference in a commercial environment. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the inte r ference at his own expense.
For class B device, these limits are designed to provide reasonable protection against
harmful interference in a residential installation. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures :
Reorient or relocate the receiv in g ant enna. Increase the separation between the equipment an d r eceiver. Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
Consult the dealer or an experi enced radio/TV technician f or help.
Foreword V
Foreword
General
This document elaborates on structure, installation and wiring of four-door one-way access controller.
Safety Instructions
The following categorized signal words with defined meaning might appear in the Manual.
Signal Words
Meaning
Indicates a high p otential hazard which, if not avoided, will res ult in death or serious injury.
Indicates a medium or low potential hazard which, if not avoided,
could result in slight or moderate injury.
Indicates a potential risk which, if not avoided, could result in property damage, data loss, lower performance, or unpredictable
result.
Provides methods to help you solve a problem or save you time.
Provides additiona l information as the em phasis and s upplement to the text.
Privacy Protection Notice
As the device user or data controller, you might collect personal data of others, such as face, fingerprints, car plate number, Email address, phone number, GPS and so on. You need to be in compliance with the local privacy protection laws and regulations to protect the legitimate rights and interests of other people by implementing measures, including but not limited to: providing clear and visible identification to inform data subject the existence of surveillance area and providing related contact.
About the Manual
The Manual is for reference only. If there is inconsistency between the Manual and the
actual product, the actual pr oduct s hall prevail.
We are not liable for any loss ca used by the operat ions that d o not com ply wit h the Manua l. The Manual would be updated according to the latest laws and regulations of related
regions. For detailed information, see the paper User's Manual, CD-ROM, QR code or our official website. If there is inconsistency between paper User's Manual and the electronic version, the electronic ver sion shall prevail.
Foreword VI
All the designs and sof tw ar e are su bject to ch ang e w ithout pr ior w ritt en not ice. The produ ct
updates might cause som e differe nces betw een the act ual produ ct and the Ma nual. Pleas e contact the customer service for the latest program and supplementary documentation.
There still might be deviation in technical data, functions and operations description, or
errors in print. If there is any doubt or dispute, please refer to our final explanation.
Upgrade the reader software or try other mainstream reader software if the Guide (in PDF
format) cannot be opened .
All trademarks, registered trademarks and the company names in the Manual are the
properties of their respecti ve owners.
Please visit our website, contact the supplier or customer service if there is any problem
occurred when using the dev ice.
If there is any uncertaint y or controversy, please refer t o our final explanation.
Important Safeguards and Warnings VII
Important Safeguards and Warnings
The following description is the correct application method of the device. Please read the manual carefully before use, in order to prevent danger and property loss. Strictly conform to the manual during applica t ion an d keep it properly after read ing.
Operating Requirement
Please don’t place and install the device in an area exposed to direct sunlight or near heat
generating device.
Please don’t install the device in a humid, dusty or fuliginous area. Please keep its horizontal installation, or install it at stable places, and prevent it from
falling.
Please don’t drip or splash liquids onto the device; don’t put on the device anything filled
with liquids, in order to prevent liquids from flowing into the device.
Please install the device at well-ventilated places; don’t block its ventilation opening. Use the device only within rat ed input and output range. Please don’t dismantle the device arbitrarily. Please transport, use and store t he device w ithin allowed hu midity and tempe ratur e range.
Power Requirement
Please make sure to use batteries according to requirements; otherwise, it may result in
fire, explosion or burning ris ks of batteries!
To replace bat t er ies, only the same type of batteries can be used! The product shall use electric cables (power cables) recommended by this area, which
shall be used within its rat ed specification!
Please use standard power adapter matched with the device. Otherwise, the user shall
undertake resulting personnel injury or device da m age.
Please use power supply that meets SELV (safety extra low voltage) requirements, and
supply power with rated v oltag e that co nforms to L imited Power Sourc e in IE C60950-1. For specific power supply req uir ements, please refer to device labels.
Products with category I structure shall be connected to grid power out put s ocket , which is
equipped with protective gr ounding.
Appliance coupler is a di sconn ect ing dev ice. Durin g nor mal use, p lease keep an an gle th at
facilitates operation.
Table of Contents VIII
Table of Contents
Cybersecurity Recommendations ......................................................................................................... I
Regulatory Information ........................................................................................................................ IV
Foreword ................................................................................................................................................. V
Important Safeguards and Warnings ................................................................................................. VII
1 Overview .............................................................................................................................................. 1
1.1 Functional Feature ........................................................................................................................ 1
1.2 External Dimension ....................................................................................................................... 1
2 Installation Guide ................................................................................................................................ 3
2.1 System Struct ure ........................................................................................................................... 3
2.2 Device Installation ......................................................................................................................... 3
2.3 Disassembly .................................................................................................................................. 4
2.4 Wiring Diagram ............................................................................................................................. 5
2.4.1 Wiring Description o f Ex it But t on/Door Contact ..................................... 错误!
未定义书签。
2.4.2 Wiring Description o f External Alarm Input ............................................. 错误!
未定义书签。
2.4.3 Wiring Description of Alarm Output ........................................................ 错误!
未定义书签。
2.4.4 Wiring Description o f Loc k ...................................................................... 错误!
未定义书签。
2.4.5 Wiring Description o f Reader.................................................................. 错误!
未定义书签。
2.5 DIP Switch ..................................................................................................................................... 6
2.6 Reboot .......................................................................................................................................... 11
3 Smart PSS Config ................................................................................................................................ 12
3.1 Login Client ................................................................................................................................. 12
3.2 Add Access Controller ................................................................................................................. 12
3.2.1 Auto Search ...................................................................................................................... 12
3.2.2 Manual Add ....................................................................................................................... 14
3.3 Add User ..................................................................................................................................... 16
3.3.1 Card Type ......................................................................................................................... 17
3.3.2 Single Add ......................................................................................................................... 18
3.4 Add Door Group .......................................................................................................................... 20
3.5 Authorize ..................................................................................................................................... 22
3.5.1 Aut horize Accor ding to Door Group .................................................................................. 22
3.5.2 Authorize According to User ............................................................................................. 23
4 FAQ ....................................................................................................................................................... 25
1. Question: After pow er on, power indicator doesn’t tur n on or the buzzer doesn’t respond. ..... 25
2. Question: After the reader is connected with the device, card swiping light doesn’t turn on, and
it doesn’t respond after swiping a card. ............................................................................................ 25
3. Question: Client soft w ar e fa ils to det ect the device. ................................................................. 25
4. Question: After swiping ca r d, it prompts that card is invalid. ..................................................... 25
5. Question: Default IP of access controller. ................................................................................. 25
6. Question: Defau lt port, initial user name and p assword of access control ler. .......................... 25
7. Question: Online upgrad e of the device. ................................................................................... 25
8. Question: Max. wiring distance and transmission d istance of card reader and controller. ....... 25
Table of Contents IX
5 Technical Parameters ....................................................................................................................... 26
Overview 1
1 Overview
Four-door one-way access controller is a controlling device which compensates video surveillance and visual intercom. It has neat and modern design with strong functionality, suitable for commerc ial building, corporation property and intelligent community.
1.1 Functional Feature
Its rich functions are as fo llows:
Adopt slide rail and lock-controlled design, convenient installation a nd maintenance. Integrate alarm, access cont r ol, video surveillance and fire alarm. Support 4 sets of card rea ders . Support 9 groups o f sig nal input (exit button*4, door contact*4 and intrusion alarm*1). Support 5 groups of control output (electric lock *4 and a larm output *1). With RS485 port, it may extend t o connect control module. FLASH sto rage capaci ty is 16M (which may extend to 32M). Support max. 100,000 card
holders and 150,000 card readi ng records.
Support illegal intrusion alarm, unlock timeout alarm, duress card and duress code setup.
Also support black-white lis t and patrol card setup.
Support valid time period setting, password setting and expiration date setting of cards.
Regarding guest card, its time of use can be set.
Support 128 groups of sc hedules and 128 groups o f ho lid ay schedules. Permanent data storage during outage, built-in RTC (support DST), online upgrade.
1.2 External Dimension
Its appearance and dimension is shown in Figure 1-1 and Figure 1-2. The un it is mm.
Figure 1-1
Loading...
+ 25 hidden pages