Face Recognition Access Control Terminal Quick Guide V1.
Contents 1 Packing List ······················································································································1 2 Product Overview ············································································································1 2.1 Appearance and Dimension ···············································································2 2.
1 Packing List No. 2 Name Qty Unit 1 Face recognition access control terminal 1 PCS 2 Screw component 1 Set 3 Bracket 1 PCS 4 T10 box-end wrench with hole-L shape 1 PCS 5 Installation sticker 1 PCS 6 20-pin cable 1 PCS 7 2-pin power cable 1 PCS 8 User manual 1 PCS Product Overview The face recognition access control terminal features high performance and high reliability.
2.1 Appearance and Dimension The actual device appearance shall prevail. The figure below shows the dimension of the device. A waterproof hood is required in waterproof installation. The figure below shows the dimensions of the waterproof hood.
2.2 Structure Description The figure below shows the structure of the device. The actual device shall prevail. Figure 2-1 Device Structure 1 2 3 4 5 13 14 6 15 16 7 8 9 10 11 12 1.Light supplement lamp 1 2.Infrared camera 3.Infrared light supplement lamp 4.Visible light camera 5.Light supplement lamp 2 6.Display screen 7.Pass-through indicator 8.Microphone 9.Card reading area 10.Loudspeaker 11.Reset button 12.USB2.0 13.Network interface 14.Power input (DC 12V±25%) 15.20-pin interface 16.
3 Device Installation 3.1 Installation Environment Try to avoid intense direct light and intense backlighting scenes when installing the device. Please keep the ambient light bright. 3.2 Device Wiring 1 Wiring Embedding Before installing the face recognition access control terminal, plan the layout of cables, including the power cable (for the diameter selection for the extension power cable, see Table 3-1), network cable, door lock cable, Wiegand cable, alarm cable, and RS485 (RS232) cable.
Figure 3-1 Wiring Schematic Diagrams (without Security Module) RS485 Wiegand input GND ALARM_IN0 WHITE/GREEN GND BLACK ALARM_IN1 WHITE/BLUE Alarm input device Alarm input device Alarm output ALARM_OUT_NC GREEN ALARM_OUT_COM WHITE/PURPLE device - Power supply ALARM_OUT_NO WHITE/ORANGE Alarm output device RS485_P ORANGE Digital Detection RS485_N PURPLE Module GND BLACK WG_IN_D0 WHITE/BLACK WG_IN_D1 WHITE/RED WG_OUT_D0 BLUE WG_OUT_D1 RED GND BLACK Wiegand output Wiegand card reader + + Power supply -
3.3 Tools Preparations Phillips screwdriver Antistatic wrist strap or antistatic gloves Drill Tape measure Marker Plenty of silicone rubber Silicone gun 3.4 Installation Steps 1. Determine the position of the 86*86mm wall-mounted junction box. This installation mode embeds an 86*86mm junction box in the wall in advance or makes a hole on the wall to embed the box. 2. Determine the positions of holes on the wall by referring to the positions of four holes A on the installation sticker.
3. Use a drill to drill two holes with the depth of 30mm and diameter of 6mm to 6.5mm on the wall. 4. Embed expansion bolts inside the two installation holes on the wall. Wall Wall Note: Avoid embedded wires in the wall during drilling! 5. Bracket. Normal Installation:Align holes on the bracket with installation holes on the wall and the 86*86mm wall-mounted junction box and use the Phillips screwdriver to tighten the screws clockwise to fasten the bracket.
6. Fasten the access control terminal to the bracket hook. 4 7. At the bottom of the device (dotted box as shown in the figure below), use the L-shape wrench to tighten the two fastening screws clockwise. Device Startup After the device is installed correctly, connect one end of the power adapter (purchased or prepared) to the mains supply and the other end to the power interface of the face recognition access control terminal, and then start the device.
5 Web Login You can log in to the Web page of the access control terminal to manage and maintain the device. For detailed operations, see the Visual Intercom Face Recognition Terminal User Manual. On a client PC, open the Internet Explorer (IE9 or later), enter the IP address of the device 192.168.1.13 into the address bar, and press Enter. In the login dialog box, enter the username (admin by default) and password (123456 by default), and click Login to access the Web page.
Personnel management on the GUI 1. Tap and hold the main interface of the face recognition access control terminal (for more than 3s). On the displayed password input interface, enter the correct activation password to go to the Activation Config interface. On the Activation Config interface, click User Management. On the displayed User Management interface, input personnel information. For detailed operations, see the Visual Intercom Face Recognition Terminal User Manual II. 7 Appendix 7.
7.1.2 Face Match Position The figure below shows the correct face match position. Figure 7-1 Face Match Position Note: Range of recognizable distance: 0.5m to 2m. Wall 2m Matchable range 1.5m 1m 1 2 0.5m Ground 0.5m 1m 1.5m 2m NOTE! The face match position should be within the recognizable range shown in the figure. If face match fails in area 1 shown in the figure, move backward. If face match fails in area 2 shown in the figure, move forward. 7.1.
2 Facial Posture To ensure the accuracy of face match, keep the face facing the recognition window during the match. Avoid the head to one side, side face, head too high, head too low, and other incorrect postures.
Disclaimer and Safety Warnings Copyright Statement No part of this manual may be copied, reproduced, translated or distributed in any form by any means without prior content in writing from our company (referred to as us hereafter). The product described in this manual may contain proprietary software owned by our company and its possible licensors.
The following are recommendations for enhancing network security of your device: Change password regularly: Change your device password on a regular basis and keep the password safe. Make sure only the authorized user can log in to the device. Enable HTTPS/SSL: Use SSL certificate to encrypt HTTP communications and ensure data security. Enable IP address filtering: Allow access only from the specified IP addresses.
If you think batteries might have been swallowed or placed inside any part of the body, seek immediate medical attention. Avertissement de l’utilisation de la batterie Lorsque utiliser la batterie, évitez: Températures extrêmement élevées ou basses pendant l’utilisation, le stockage et le transport; Pression d’air extrêmement basse, ou pression d’air basse à haute altitude. Remplacement de la batterie. Utilisez la batterie correctement.
Battery Directive-2013/56/EC Battery in the product complies with the European Battery Directive 2013/56/EC. For proper recycling, return the battery to your supplier or to a designated collection point.