Access Reader User's Manual V1.0.
Foreword General This manual introduces the functions and operations of the Access Reader. Read carefully before using the device, and keep the manual safe for future reference. Safety Instructions The following signal words might appear in the manual. Signal Words Meaning Indicates a high potential hazard which, if not avoided, will result in death or serious injury. Indicates a medium or low potential hazard which, if not avoided, could result in slight or moderate injury.
About the Manual ● The manual is for reference only. Slight differences might be found between the manual and the product. ● We are not liable for losses incurred due to operating the product in ways that are not in compliance with the manual. ● The manual will be updated according to the latest laws and regulations of related jurisdictions. For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or visit our official website. The manual is for reference only.
Important Safeguards and Warnings This section introduces content covering the proper handling of the Device, hazard prevention, and prevention of property damage. Read carefully before using the Device, and comply with the guidelines when using it. Transportation Requirement Transport, use and store the Device under allowed humidity and temperature conditions. Storage Requirement Store the Device under allowed humidity and temperature conditions.
● The power supply must conform to the requirements of ES1 in IEC 62368-1 standard and be no higher than PS2. Please note that the power supply requirements are subject to the Device label. ● The Device is a class I electrical appliance. Make sure that the power supply of the Device is connected to a power socket with protective earthing. Operation Requirements ● Check whether the power supply is correct before use. ● Do not unplug the power cord on the side of the Device while the adapter is powered on.
Table of Contents 1 Overview................................................................................................................................................. 1 2 Device Structure..................................................................................................................................... 2 3 Device Installation ................................................................................................................................. 4 4 System Structure .........
1 Overview Reader, achieving video surveillance, is a complement to video monitoring, visual talk products. It has simple appearance, powerful function, and is suitable for advanced commercial building, company property and smart community. Reader has abundant functions, including: ⚫ Non-contact reader (read-only), within distance of 3cm~5cm, response time <0.3 s. ⚫ Support Wiegand Protocol and RS485 protocol. RS485 baud rate is 9600 bps. ⚫ Support watch dog.
2 Device Structure The device’s structure and dimension are shown in Error! Reference source not found.and Error! Reference source not found.. Unit is mm.
Figure 2-2 Side view 3
3 Device Installation Figure 3-1 Installation Step 1. Fix rear cover's self-tapping screw on wall. Step 2. Hang front cover on hook on rear cover. Step 3. Pull recessed screw throught hole at bottom, and lock front cover on rear cover. Step 4. Apply silica gel to gaps between the device and the wall. Liquid sodium silicate is recommended.
Figure 3-2 Apply silica gel 5
4 System Structure 4.1 Wiring Wiring of the device includes two groups of wires, as 8-pin and 3-pin. Table 4-1 8-pin wires No.
4.
Appendix 1 Cybersecurity Recommendations Mandatory actions to be taken for basic device network security: 1. Use Strong Passwords Please refer to the following suggestions to set passwords: The length should not be less than 8 characters. Include at least two types of characters; character types include upper and lower case letters, numbers and symbols. Do not contain the account name or the account name in reverse order. Do not use continuous characters, such as 123, abc, etc.
7. 8. 9. 10. 11. 12. 13. MAC Address Binding We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing the risk of ARP spoofing. Assign Accounts and Privileges Reasonably According to business and management requirements, reasonably add users and assign a minimum set of permissions to them. Disable Unnecessary Services and Choose Secure Modes If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to reduce risks.