Hikvision Video Access Control Terminal User Manual

Video Access Control Terminal
User Manual
Video Access Control Terminal User Manual
User Manual
©2019 Hangzhou Hikvision Digital Technology Co., Ltd.
It includes instructions on how to use the Product. The software embodied in the Product is governed by the user license agreement covering that Product.
About this Manual
This Manual is subject to domestic and international copyright protection. Hangzhou Hikvision Digital Technology Co., Ltd. (“Hikvision”) reserves all rights to this manual. This manual cannot be reproduced, changed, translated, or distributed, partially or wholly, by any means, without the prior written permission of Hikvision.
Trademarks
and other Hikvision marks are the property of Hikvision and are registered trademarks or the subject of applications for the same by Hikvision and/or its affiliates. Other trademarks mentioned in this manual are the properties of their respective owners. No right of license is given to use such trademarks without express permission.
Disclaimer
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, HIKVISION MAKES NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, REGARDING THIS MANUAL. HIKVISION DOES NOT WARRANT, GUARANTEE, OR MAKE ANY REPRESENTATIONS REGARDING THE USE OF THE MANUAL, OR THE CORRECTNESS, ACCURACY, OR RELIABILITY OF INFORMATION CONTAINED HEREIN. YOUR USE OF THIS MANUAL AND ANY RELIANCE ON THIS MANUAL SHALL BE WHOLLY AT YOUR OWN RISK AND RESPONSIBILITY.
REGARDING TO THE PRODUCT WITH INTERNET ACCESS, THE USE OF PRODUCT SHALL BE WHOLLY AT YOUR OWN RISKS. OUR COMPANY SHALL NOT TAKE ANY RESPONSIBILITIES FOR ABNORMAL OPERATION, PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER ATTACK, HACKER ATTACK, VIRUS INSPECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, OUR COMPANY WILL PROVIDE TIMELY TECHNICAL SUPPORT IF REQUIRED.
SURVEILLANCE LAWS VARY BY JURISDICTION. PLEASE CHECK ALL RELEVANT LAWS IN YOUR JURISDICTION BEFORE USING THIS PRODUCT IN ORDER TO ENSURE THAT YOUR USE CONFORMS THE APPLICABLE LAW. OUR COMPANY SHALL NOT BE LIABLE IN THE EVENT THAT THIS PRODUCT IS USED WITH ILLEGITIMATE PURPOSES.
IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW, THE LATER PREVAILS.
Support
Should you have any questions, please do not hesitate to contact your local dealer.
Data Protection
During the use of device, personal data will be collected, stored and processed. To protect data, the development of Hikvision devices incorporates privacy by design principles. For example, for device with facial recognition features, biometrics data is stored in your device with encryption method; for fingerprint device, only fingerprint template will be saved, which is impossible to reconstruct a fingerprint image.
As data controller, you are advised to collect, store, process and transfer data in accordance with the applicable data protection laws and regulations, including without limitation, conducting security controls to safeguard personal data, such as, implementing reasonable administrative and physical security controls, conduct periodic reviews and assessments of the effectiveness of your security controls.
Video Access Control Terminal User Manual
ii
Regulatory Information
FCC Information
Please take attention that changes or modification not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment.
FCC compliance: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
—Reorient or relocate the receiving antenna.
—Increase the separation between the equipment and receiver.
—Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
—Consult the dealer or an experienced radio/TV technician for help.
This equipment should be installed and operated with a minimum distance 20cm between the radiator and your body.
FCC Conditions
This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions:
1. This device may not cause harmful interference.
2. This device must accept any interference received, including interference that may cause undesired operation.
EU Conformity Statement
This product and - if applicable - the supplied accessories too are marked with "CE" and comply therefore
with the applicable harmonized European standards listed under the RE Directive 2014/53/EU, the EMC
Directive 2014/30/EU, the RoHS Directive 2011/65/EU.
2012/19/EU (WEEE directive): Products marked with this symbol cannot be disposed of as unsorted
municipal waste in the European Union. For proper recycling, return this product to your local supplier
upon the purchase of equivalent new equipment, or dispose of it at designated collection points. For more
information see: www.recyclethis.info
2006/66/EC (battery directive): This product contains a battery that cannot be disposed of as unsorted
municipal waste in the European Union. See the product documentation for specific battery information.
The battery is marked with this symbol, which may include lettering to indicate cadmium (Cd), lead (Pb), or
mercury (Hg). For proper recycling, return the battery to your supplier or to a designated collection point. For more information see: www.recyclethis.info
Industry Canada ICES-003 Compliance
This device meets the CAN ICES-3 (B)/NMB-3(B) standards requirements.
This device complies with Industry Canada licence-exempt RSS standard(s). Operation is subject to the following two conditions:
(1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of the device. Le présent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radioexempts de licence.
L'exploitation est autorisée aux deux conditions suivantes : (1) l'appareil ne doit pas produire de brouillage, et (2) l'utilisateur de l'appareil doit accepter tout brouillage radioélectrique subi, même si le brouillage est susceptible
d'en compromettre le fonctionnement.
Video Access Control Terminal User Manual
iii
Under Industry Canada regulations, this radio transmitter may only operate using an antenna of a type and maximum (or lesser) gain approved for the transmitter by Industry Canada. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (e.i.r.p.) is not more than that necessary for successful communication.
Conformément à la réglementation d'Industrie Canada, le présent émetteur radio peut fonctionner avec une antenne d'un type et d'un gain maximal (ou inférieur) approuvé pour l'émetteur par Industrie
Canada. Dans le but de réduire les risques de brouillage radioélectrique à l'intention des autres utilisateurs, il faut choisir le type d'antenne et son gain de sorte que la puissance isotrope rayonnée équivalente (p.i.r.e.) ne dépasse pas l'intensité nécessaire à l'établissement d'une communication satisfaisante.
This equipment should be installed and operated with a minimum distance 20cm between the radiator and your body. Cet équipement doit être installé et utilisé à une distance minimale de 20 cm entre le radiateur et votre corps.
Safety Instruction
These instructions are intended to ensure that user can use the product correctly to avoid danger or property loss. The precaution measure is divided into Warnings and Cautions:
Warnings: Neglecting any of the warnings may cause serious injury or death. Cautions: Neglecting any of the cautions may cause injury or equipment damage.
Warnings
All the electronic operation should be strictly compliance with the electrical safety regulations, fire prevention
regulations and other related regulations in your local region.
Please use the power adapter, which is provided by normal company. The power consumption cannot be less than
the required value.
Do not connect several devices to one power adapter as adapter overload may cause over-heat or fire hazard.
Please make sure that the power has been disconnected before you wire, install or dismantle the device.
When the product is installed on wall or ceiling, the device shall be firmly fixed. If smoke, odors or noise rise from the device, turn off the power at once and unplug the power cable, and then
please contact the service center.
If the product does not work properly, please contact your dealer or the nearest service center. Never attempt to
disassemble the device yourself. (We shall not assume any responsibility for problems caused by unauthorized repair or maintenance.)
Cautions
Do not drop the device or subject it to physical shock, and do not expose it to high electromagnetism radiation.
Avoid the equipment installation on vibrations surface or places subject to shock (ignorance can cause equipment damage).
Do not place the device in extremely hot (refer to the specification of the device for the detailed operating
temperature), cold, dusty or damp locations, and do not expose it to high electromagnetic radiation. The appropriate operation temperature is 0 to +45, and the storage temperature should be -10 to +55.
The device cover for indoor use shall be kept from rain and moisture.
Warnings Follow these safeguards to prevent serious injury or death.
Cautions Follow these precautions to prevent potential injury or material damage.
Video Access Control Terminal User Manual
iv
Exposing the equipment to direct sun light, low ventilation or heat source such as heater or radiator is forbidden
(ignorance can cause fire danger).
Do not aim the device at the sun or extra bright places. A blooming or smear may occur otherwise (which is not a
malfunction however), and affecting the endurance of sensor at the same time.
Please use the provided glove when open up the device cover, avoid direct contact with the device cover, because
the acidic sweat of the fingers may erode the surface coating of the device cover.
Please use a soft and dry cloth when clean inside and outside surfaces of the device cover, do not use alkaline
detergents.
Please keep all wrappers after unpack them for future use. In case of any failure occurred, you need to return the
device to the factory with the original wrapper. Transportation without the original wrapper may result in damage on the device and lead to additional costs.
Improper use or replacement of the battery may result in hazard of explosion. Replace with the same or equivalent
type only. Dispose of used batteries according to the instructions provided by the battery manufacturer.
Please take care of your card and report card loss in time when card is lost. If you require a higher security level, use multiple authentication modes. Multiple card types are supported. Please select an appropriate card type according to the card performance and
the usage scenarios.
Video Access Control Terminal User Manual
1
Table of Contents
1 Overview ................................................................................................................................................................. 3
1.1 Introduction ....................................................................................................................................................... 3
1.2 Main Features .................................................................................................................................................... 3
2 Appearance.............................................................................................................................................................. 4
2.1 Appearanceof DS-K1T500S Model ...................................................................................................................... 4
2.2 Video Access Control Terminal Connector ........................................................................................................... 5
3 Installation ............................................................................................................................................................... 6
4 Terminal Connection ................................................................................................................................................ 7
5 Wiring Description ................................................................................................................................................... 9
5.1 External Device Wiring Overview ........................................................................................................................ 9
5.2 The Wiring of External Card Reader ...................................................................................................................10
5.2.1 The Wiring of External RS-485 Card Reader .................................................................................................10
5.3 Card Reader Connection ....................................................................................................................................10
5.3.1 The Wiring of Wiegand................................................................................................................................11
5.3.2 The Wiring of RS-485 Output .......................................................................................................................11
6 Activating the Access Control Terminal ...................................................................................................................12
6.1 Activating via SADP Software .............................................................................................................................12
6.2 Activating via Client Software ............................................................................................................................13
7 iVMS-4200 Access Control Client Operation ............................................................................................................16
7.1 Overview of iVMS-4200 Client Software ............................................................................................................16
7.1.1 Description .................................................................................................................................................16
7.1.2 Running Environment..................................................................................................................................16
7.1.3 Client Performance .....................................................................................................................................16
7.2 Resource Management .....................................................................................................................................17
7.2.1 Access Control Device Management ............................................................................................................17
7.2.2 Network Settings ........................................................................................................................................38
7.2.3 Capture Settings..........................................................................................................................................40
7.2.4 RS-485 Settings ...........................................................................................................................................41
7.2.5 Door Group Management ...........................................................................................................................42
7.3 Permission Configuration ..................................................................................................................................45
7.3.1 Person Management ...................................................................................................................................45
7.3.2 Card Management ......................................................................................................................................51
7.3.3 Schedule Template ......................................................................................................................................57
7.3.4 Door Status Management ...........................................................................................................................62
7.3.5 Linkage Configuration .................................................................................................................................66
7.3.6 Permission Configuration ............................................................................................................................70
7.3.7 Advanced Functions ....................................................................................................................................74
7.4 Event and Alarm Management ..........................................................................................................................87
7.4.1 Real-Time Access Control Event and Alarm ..................................................................................................87
7.4.2 Event Management .....................................................................................................................................88
7.5 System Maintenance .........................................................................................................................................90
7.5.1 Log Management ........................................................................................................................................90
7.5.2 Account Management .................................................................................................................................91
7.5.3 Auto Backup Settings ..................................................................................................................................92
7.5.4 System Configuration ..................................................................................................................................92
8 iVMS-4200 Control Client Operation .......................................................................................................................97
8.1 Importing Access Control Device .......................................................................................................................97
8.2 Live View and Playcak Settings ...........................................................................................................................97
8.3 Group Management ..........................................................................................................................................99
8.3.1 Adding the Group........................................................................................................................................99
8.3.2 Importing Encoding Device to Group ......................................................................................................... 100
8.3.3 Editing the Group/Camera......................................................................................................................... 101
8.3.4 Removing Cameras from the Group ........................................................................................................... 101
Video Access Control Terminal User Manual
2
8.3.5 Deleting the Group ................................................................................................................................... 102
8.4 Live View......................................................................................................................................................... 102
8.4.1 Starting and Stopping the Live View .......................................................................................................... 105
8.4.2 Manual Recording and Capture ................................................................................................................. 107
8.4.3 Instant Playback ........................................................................................................................................ 109
8.4.4 Custom Window Division .......................................................................................................................... 111
8.4.5 Other Functions in Live View ..................................................................................................................... 112
8.5 Playback.......................................................................................................................................................... 113
8.5.1 Storing on Storage Device ......................................................................................................................... 113
8.5.2 Normal Playback ....................................................................................................................................... 115
8.5.3 Event Playback .......................................................................................................................................... 122
9 Appendix .............................................................................................................................................................. 125
9.1 DIP Switch Introduction ................................................................................................................................... 125
9.2 Indicator and Buzzer Description ..................................................................................................................... 126
9.3 Access Controller Model List............................................................................................................................ 127
Video Access Control Terminal User Manual
3

1 Overview

1.1 Introduction

DS-K1T500S is a series video access control terminal with multiple advanced technologies including face detection, Wi­Fi, smart card recognition, and HD camera (2 MP optional). It supports offline operation.

1.2 Main Features

Transmission modes of wired network (TCP/TP), Wi-Fi, RS-485, and Wiegand Face detection and picture capturing function implemented by built-in camera (2 MP optional) Supports RS-485 communication for connecting external card reader Supports working as a card reader, and supports Wiegand interface and RS-485 interface for accessing the
controller
Supports EHome Max. 50,000 cards Max. and 200,000 access control events records Supports multiple authentication modes including card, card + password, and so on. Supports Mifare card/ QR Code reading Tampering detection, unlocking overtime alarm, invalid card swiping over times alarm, duress card alarm,
and so on
Supports security door control unit connection Protection level: IP65 Data can be permanently saved after power-off
Video Access Control Terminal User Manual
4

2 Appearance

2.1 Appearanceof DS-K1T500S Model

Please refer to the following content for detailed information of DS-K1T500S series model
Table 2-1 Description of DS-K1T500S Series Model
No.
Description
1
Mic
2
Camera
3
LED Indicator
4
Card Swiping Area
5
Doorbell Button
6
Voice Talk Button
7
Loud Speaker
In the Event Card Interact interface in the iVMS-4200 Client Software, choose the alarm output of Event Bell. You can connect a bell at the alarm output terminal. For details about configuring the Event Bell alarm output, see the User Manual of iVMS- 4200 Client Software.
Video Access Control Terminal User Manual
5

2.2 Video Access Control Terminal Connector

Video Access Control Terminal User Manual
6

3 Installation

Before You Start:
Make sure that the device in the package is in good condition and all the assembly parts are included. Make sure that the wall is strong enough to withstand three times the weight of the terminal. Set the DIP address before installation.
Steps:
1. Connect the cables with the connecter on the
rear panel of the device. Route the cables through the cable hole of the mounting plate. The cable holes are on the right side, left side and lower side of the rear cover. If the right/left side cable hole is selected, remove the plastic sheet of the cable hole.
2. Secure the mounting plate on the wall with 4
supplied screws.
3. Connect the corresponding cables.
4. Push the terminal in the mounting plate from
bottom up.
5. Tighten the screws on the bottom of the
terminal to fix the terminal on the mounting plate and complete the installation.
Video Access Control Terminal User Manual
7

4 Terminal Connection

Video Access Control Terminal User Manual
8
Table 4-1 Terminal Description
Group
No.
Function
Color
Terminal
Name
Description
Group A
A1
Power Input
Red
+12V
12V DC Power Supply
A2
Black
GND
GND
Group B
B1
Alarm Input
Yellow
IN1
Alarm Input 1
B2
Orange
IN2
Alarm Input 2
B3
Black
GND
GND
B4
Alarm Output
Red
NC
Alarm Output Wiring
B5
White
COM
B6
Purple
NO
Group C
C1
Wiegand
Black
GND
GND
C2
Green
W0
Wiegand Wiring 0
C3
White
W1
Wiegand Wiring 1
C4
Black
GND
GND
C5
Brown
LED-OK
Wiegand
Authenticated
C6
Orange
LED-ERR
Wiegand
Authentication Failed
C7
Gray
TAMPER
Tampering Alarm
Wiring
C7
Purple
BEEP
Buzzer Wiring
Group D
D1
Lock
Purple
NC
Lock Wiring
D2
White
COM
D3
Red
NO
D4
Green
SENSOR
Door Magnetic Signal
Input
D5
Gray
BUTTON
Exit Door Wiring
D6
Black
GND
GND
Group E
E1
RS-485
Yellow
485 +
RS-485 Wiring
E2
Blue
485 -
Video Access Control Terminal User Manual
9

5 Wiring Description

5.1 External Device Wiring Overview

Notes:
If set the working mode as the controller mode, the terminal can connect the RS-485 card reader or security control
unit via RS-485 protocol. For details about wiring of RS-485 card reader, see 5.2.1 The Wiring of External RS-485 Card Reader.
If set the working mode as the controller mode, the terminal cannot connect the Wiegand card reader. The security control unit can also connect the external devices. For details, see the specified user manual of security
control unit.
Video Access Control Terminal User Manual
10

5.2 The Wiring of External Card Reader

5.2.1 The Wiring of External RS-485 Card Reader

If set the working mode as the controller mode, the DIP switch No.6 should be set as OFF. If set the working mode as card reader mode, the DIP switch No. from 1 to 4 should be set as OFF. Set the external card reader’s RS-485 DIP switch to 2. For details about DIP switch configuration, see 9.1 DIP
Switch Introduction.

5.3 Card Reader Connection

The access control terminal can be switched into the card reader mode. It can access to the access control as a card reader, and supports Wiegand communication port and RS-485 communication port.
When the access control terminal works as a card reader, it only supports being connected to the controller, but does not support alarm input or output, or the connection of external devices.
Video Access Control Terminal User Manual
11

5.3.1 The Wiring of Wiegand

When the access control terminal works as a card reader, you must the WG_ERR, BUZZER and WG_OK
interfaces if you want to control the LED and buzzer of the Wiegand card reader.
Set the working mode of the terminal as card reader, if the terminal is required to work as a card reader. The
card reader mode support to communicate by Wiegand or RS-485.
The distance of Wiegand communication should be no longer than 80 m. The external power supply and the access control terminal should use the same GND cable.

5.3.2 The Wiring of RS-485 Output

Set the working mode of the terminal as card reader, if the terminal requires working as a card reader. When the access control terminal works as a RS-485 card reader, you can set the RS-485 address via the DIP
switch.
The external power supply and the access control terminal should use the same GND cable.
Video Access Control Terminal User Manual
12

6 Activating the Access Control Terminal

Purpose:
You are required to activate the terminal first before using it. Activation via SADP, and Activation via client software are supported. The default values of the control terminal are as follows.
The default IP address: 192.0.0.64. The default port No.: 8000. The default user name: admin.

6.1 Activating via SADP Software

SADP software is used for detecting the online device, activating the device, and resetting the password. Get the SADP software from the supplied disk or the official website, and install the SADP according to the
prompts. Follow the steps to activate the control panel.
Steps:
1. Run the SADP software to search the online devices.
2. Check the device status from the device list, and select an inactive device.
3. Create a password in the password field, and confirm the password.
STRONG PASSWORD RECOMMENDED We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product.
4. Click Activate to activate the device.
5. Check the activated device, you can change the device IP address to the same network segment with your
computer by either modifying the IP address manually or checking the checkbox of Enable DHCP.
Video Access Control Terminal User Manual
13
6. Input the password and click the Modify button to activate your IP address modification.

6.2 Activating via Client Software

The client software is versatile video management software for multiple kinds of devices. Get the client software from the supplied disk or the official website, and install the software according to the
prompts. Follow the steps to activate the control panel.
Steps:
1. Run the client software and the control panel of the software pops up, as shown in the figure below.
Video Access Control Terminal User Manual
14
2. Click the Device Management to enter the Device Management interface.
3. Check the device status from the online device list, and select an inactive device.
4. Click the Activate button to pop up the Activation interface.
5. In the pop-up window, create a password in the password field, and confirm the password.
STRONG PASSWORD RECOMMENDED We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product.
Video Access Control Terminal User Manual
15
6. Click OK button to activate.
7. Click the Modify Netinfor button to pop up the Network Parameter Modification interface.
8. Change the device IP address to the same network segment with your computer by either modifying the IP
address manually.
9. Input the password and click the OK button to save the settings.
Video Access Control Terminal User Manual
16

7 iVMS-4200 Access Control Client Operation

7.1 Overview of iVMS-4200 Client Software

7.1.1 Description

The iVMS-4200 Access Control Client is a client-based access control system for management of access control devices. With intuitive and easy-to-use operations, it provides multiple functionalities, including access control device management, person/card management, permission configuration, door status management, attendance management, event search, etc.
This user manual describes the function, configuration and operation steps of iVMS-4200 Access Control Client. To ensure the properness of usage and stability of the client, please refer to the contents below and read the manual carefully before installation and operation.

7.1.2 Running Environment

Operating System: Microsoft Windows 7/Windows 2008 R2/Windows 8.1/Windows 10 (32-bit or 64-bit), Windows
XP SP3 (32-bit)
CPU: Intel Pentium IV 3.0 GHz or above Memory: 2G or above
Video Card: RADEON X700 Series or above GPU: 256 MB or above
For high stability and good performance, these above system requirements must be met. The software does not support 64-bit operating system; the above mentioned 64-bit operating system refers
to the system which supports 32-bit applications as well.

7.1.3 Client Performance

The client performance is shown as follows:
Client Performance
Quantity
User Account
Up to 16 user accounts (including super user) supported
Access Control Device
Up to 16 access control devices supported
Access Control Point
Up to 64 access control points (doors) supported
Person
Up to 2,000 persons supported
Card
Up to 2,000 cards supported
Department
Up to 10 levels of departments supported
Video Access Control Terminal User Manual
17

7.2 Resource Management

After running the iVMS-4200 Access Control Client, the access control device should be added to the client for the remote configuration and management.

7.2.1 Access Control Device Management

Click icon on the control panel to enter the access control device management interface.
The interface is divided into two parts: Device Management area and Online Device Detection area.
Device Management
Manage the access control devices, including adding, editing, deleting, and batch time synchronizing functions.
Online Device Detection
Automatically detect online devices in the same subnet with the client, and the detected devices can be added to the client in an easy way.
Note: The client can manage up to 16 access control devices and 64 access control points.
Video Access Control Terminal User Manual
18
Activating Device and Creating Password
Purpose:
If the access control device is not activated, you are required to create the password to activate them before they can be added to the software and work properly.
Steps:
1. On the Device for Management or Online Device area, check the device status (shown on Security column)
and select an inactive device.
2. Click the Activate button to pop up the Activation interface.
3. Create a password in the password field, and confirm the password.
STRONG PASSWORD RECOMMENDED We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product.
4. Click OK to create the password for the device. A “The device is activated.” window pops up when the
password is set successfully.
5. Perform the following steps to edit the device’s network parameters.
1) Click Modify Netinfo to pop up the Modify Network Parameter interface.
Note: This function is only available on the Online Device area. You can change the device IP address to
the same subnet with your computer if you need to add the device to the software.
2) Input the password set in step 3 and click OK to complete the network settings.
Video Access Control Terminal User Manual
19
3) Click OK to save the settings.
Adding Online Devices
Purpose:
The active online access control devices in the same local subnet with the client will be displayed on the Online Device area. You can click the Refresh Every 60s button to refresh the information of the online devices.
Note: You can click to hide the Online Device area.
Steps:
1. Select the devices to be added from the list.
Note: For the inactive device, you need to create the password for it before you can add the device properly.
For detailed steps, please refer to 3.1.1 Activating Device and Creating Password.
2. Click Add to Client to open the device adding dialog box.
3. Input the required information.
Nickname: Edit a name for the device as you want. Connection Type: Select TCP/IP as the connection type. IP Address: Input the device’s IP address. The IP address of the device is obtained automatically in this
adding mode.
Video Access Control Terminal User Manual
20
Port: Input the device port No.. The default value is 8000. User Name: Input the device user name. By default, the user name is admin. Password: Input the device password.
4. Click Add to add the device to the client.
5. (Optional) If you want to add multiple online devices to the client software, click and hold Ctrl key to select
multiple devices, and click Add to Client to open the device adding dialog box. In the pop-up message box, enter the user name and password for the devices to be added.
If you want to add all the online devices to the client software, click Add All and click OK in the pop-up message box. Then enter the user name and password for the devices to be added.
6. You can select the device from the list and click Reset Password to reset the device password.
Perform the following steps to reset the device password.
1) Click Export to save the device file on your PC.
2) Send the file to our technical engineers.
3) Our technical engineer will send you a file or an eight-digit number to you.
If you receive a file from the technical engineer, select Import File from Key Importing Mode drop-
down list and click to import the file.
If you receive an eight-digit number from the technical engineer, select Input Key from Key
Importing Mode drop-down list and input the number.
4) Input new password in text fields of Password and Confirm Password.
5) Click OK to reset the password.
The password strength of the device can be checked by the software. For your privacy, we strongly recommend changing the password to something of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product.
Adding Access Control Device Manually
Steps:
1. Click Add Device on the Device for Management panel to enter the Add Device interface.
Video Access Control Terminal User Manual
21
2. Input the device name.
3. Select the connection type in the dropdown list: TCP/IP, COM port (1 to 5), or EHome protocol.
TCP/IP: Connect the device via the network. COM1 to COM5: Connect the device via the COM port. EHome: Connect the device via EHome Protocol.
Note: For connection type of EHome protocol, please set the network center parameter first. For details,
refer to 3.2.2 Network Center Settings.
4. Set the parameters of connecting the device.
If you select the connection type as TCP/IP, you should input the device IP Address, Port No., User Name, and Password.
If you select the connection type as COM port, you should input the Baud Rate and Dial-up value. If you select the connection type as EHome, you should input the Account.
5. Click Add button to finish adding.
Editing Access Control Device
Purpose:
After adding the device, you can configure the added access control device’s parameters, its access control point (door)’s parameters, and its card readers’ parameters.
Click to select the added access control device from the list, and then click Modify button to enter the Edit Access Controller interface.
Notes:
After editing the device, you can click Apply Parameters to apply the configured parameters to the device to
take effect.
You can also click Read Parameters to get the device parameters from the device itself.
Editing Basic Information
You can configure the device basic information including IP address, port No., etc.
Steps:
1. In the device list on the left, select the access control device and you can edit its basic parameters on your
demand, which are the same as the ones when adding the device.
Video Access Control Terminal User Manual
22
2. Click Save button to save the settings.
3. You can click Apply Parameters button to apply the updated parameters to the local memory of the device.
Editing Door Information
Steps:
1. In the device list on the left, click to expand the access control device, select the door (access control
point) and you can edit the information of the selected door on the right.
Video Access Control Terminal User Manual
23
2. You can editing the following parameters:
Door Magnetic: The Door Magnetic is in the status of Normal Closed (excluding special conditions). Exit Button Type: The Exit Button Type is in the status of Remain Open (excluding special conditions). Door Locked Time: After swiping the normal card and relay action, the timer for locking the door starts
working. Door Open Duration by Card for Door Extended Opening: The door magnetic can be enabled with
appropriate delay after card holder swipes the card.
Door Open Timeout Alarm: The alarm can be triggered if the door has not been close Enable Locking Door when Door Closed: The door can be locked once it is closed even if the Door Locked
Time is not reached. Duress Code: The door can open by inputting the duress code when there is duress. At the same time, the
client can report the duress event.
Super Password: The specific person can open the door by inputting the super password. Dismiss Code: Input the dismiss code to stop the buzzer of the card reader.
Note: The Duress Code, Super Code, and Dismiss Code should be different.
3. Click Save button to save parameters.
4. Click Apply Parameters button to apply the updated parameters to the local memory of the device.
Editing Card Reader Information
Steps:
1. In the device list on the left, click to expand the door, select the card reader name and you can edit the
card reader information on the right.
Video Access Control Terminal User Manual
24
2. You can editing the following parameters:
Enable Card Reader: Select Yes to enable the card reader. OK LED Polarity: Select the OK LED Polarity of the card reader mainboard. Error LED Polarity: Select the Error LED Polarity of the card reader mainboard Buzzer Polarity: Select the Buzzer LED Polarity of the card reader mainboard Interval between Card Swiping: If the interval between card swiping of the same card is less than the set value,
the card swiping is invalid. You can set it as 0 to 255. Max. Interval When Inputting Password: When you inputting the password on the card reader, if the interval
between pressing two digits is larger than the set value, the digits you pressed before will be cleared automatically.
Enable Failed Attempts Limit of Card Reading: Enable to report alarm when the card reading attempts reach the set value.
Max. Times of Card Swiping Failure: Set the max. failure attempts of reading card. Enable Tampering Detection: Enable the anti-tamper detection for the card reader. Detect When Card Reader is Offline for: When the access control device cannot connect with the card reader
for longer than the set time, the card reader will turn offline automatically.
Mode: Select the card reader mode as normal mode (reading card) or issuing card mode (getting the card No.).
3. Click the Save button to save parameters.
4. Click Apply Parameters button to apply the updated parameters to the local memory of the device.
Deleting Device
Steps:
1. In the device list, click to select a single device, or select multiple devices by pressing Ctrl button on your
keyboard and clicking them one by one.
2. Click Remove button to delete the selected device(s).
3. Click OK button in the pop-up confirmation dialog to finish deleting.
Video Access Control Terminal User Manual
25
Time Synchronization
Steps:
1. In the device list, click to select a single device, or select multiple devices by pressing Ctrl button on your
keyboard and clicking them one by one.
2. Click Synchronization button to start time synchronization.
A message box will pop up on the lower-right corner of the screen when the time synchronization is compeleted.
Viewing Device Status
In the device list, you can select the device and then click Status button to enter view its status.
Door Status: The status of the connected door. Host Status: The status of the host, including Storage Battery Power Voltage, Device Power Supply Status, Multi-
door Interlocking Status, Anti-passing Back Status, and Host Anti-Tamper Status.
Card Reader Status: The status of card reader. Alarm Input Status: The alarm input status of each port. Alarm Output Status: The alarm output status of each port. Event Sensor Status: The event status of each port. Secure Door Control Unit Status: The online status and tamper status of the Secure Door Control Unit.
Remote Configuration
Purpose:
In the device list, select the device and click Remote Configuration button to enter the remote configuration interface. You can set the detailed parameters of the selected device.
Loading...
+ 103 hidden pages