User's Manual
User's Manual
User's Manual
V1.0.2
I
Foreword
General
This manual introduces the installation and basic operations of the Access Standalone (hereinafter
referred to as "the Device").
Safety Instructions
The following signal words might appear in the manual.
Signal Words Meaning
Revision History
Version Revision Content Release Time
As the device user or data controller, you might collect the personal data of others such as their face,
fingerprints, and license plate number. You need to be in compliance with your local privacy protection
laws and regulations to protect the legitimate rights and interests of other people by implementing
measures which include but are not limited: Providing clear and visible identification to inform people
of the existence of the surveillance area and provide required contact information.
I
About the Manual
The manual is for reference only. Slight differences might be found between the manual and the
product.
We are not liable for losses incurred due to operating the product in ways that are not in
compliance with the manual.
The manual will be updated according to the latest laws and regulations of related jurisdictions.
For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or visit
our official website. The manual is for reference only. Slight differences might be found between
the electronic version and the paper version.
All designs and software are subject to change without prior written notice. Product updates
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
There might be errors in the print or deviations in the description of the functions, operations and
technical data. If there is any doubt or dispute, we reserve the right of final explanation.
Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
If there is any uncertainty or controversy, we reserve the right of final explanation.
II
Important Safeguards and Warnings
This section introduces content covering the proper handling of the Device, hazard prevention, and
prevention of property damage. Read carefully before using the Device, comply with the guidelines
when using it, and keep the manual safe for future reference.
Transportation Requirements
Storage Requirements
Installation Requirements
WARNING
Observe all safety procedures and wear required protective equipment provided for your use
while working at heights.
Keep the Device on a stable place to prevent it from falling.
Do not expose the Device to direct sunlight or heat sources.
Do not install the Device in humid, dusty or smoky places.
Install the device in a well-ventilated place, and do not block the ventilator of the Device.
Use the power adapter or case power supply provided by the Device manufacturer.
The power supply must conform to the requirements of ES1 in IEC 62368-1 standard and be no
higher than PS2. Note that the power supply requirements are subject to the Device label.
Connect class I electrical appliances to a power socket with protective earthing.
III
Operating Requirements
Make sure that the power supply of the Device works properly before use.
Do not pull out the power cable of the Device while it is powered on.
Only use the Device within the rated power range.
Use the Device under allowed humidity and temperature conditions.
Prevent liquids from splashing or dripping on the Device. Make sure that there are no objects
filled with liquid on top of the Device to avoid liquids flowing into it.
Do not disassemble the Device.
IV
Table of Contents
Foreword ............................................................................................................................................................ I
Important Safeguards and Warnings ............................................................................................................. III
1 Product Overview .......................................................................................................................................... 1
Introduction ................................................................................................................................................................................. 1
Features ......................................................................................................................................................................................... 1
Dimensions................................................................................................................................................................................... 2
Application ................................................................................................................................................................................... 3
2 Local Configuration ....................................................................................................................................... 4
Configuration Process .............................................................................................................................................................. 4
Keypad Function ........................................................................................................................................................................ 4
Initialization.................................................................................................................................................................................. 4
Standby Screen ........................................................................................................................................................................... 5
Logging in to the Main Menu ................................................................................................................................................ 6
Unlocking Methods ................................................................................................................................................................... 7
2.6.1 Card .................................................................................................................................................................................... 7
2.6.2 Fingerprint ....................................................................................................................................................................... 7
2.6.3 User Password ................................................................................................................................................................ 7
2.6.4 Administrator Password ............................................................................................................................................. 8
User Management ..................................................................................................................................................................... 8
2.7.1 Adding New User .......................................................................................................................................................... 8
2.7.2 User/Admin List ...........................................................................................................................................................10
2.7.3 Setting Administrator Password............................................................................................................................11
Access Control Management...............................................................................................................................................11
2.8.1 Configuring Unlocking Mode ................................................................................................................................12
2.8.2 Configuring Lock Holding Time.............................................................................................................................12
Communication ........................................................................................................................................................................12
2.9.1 Configuring IP ..............................................................................................................................................................12
2.9.2 Configuring Wi-Fi ........................................................................................................................................................13
2.9.3 Configuring Wiegand ................................................................................................................................................14
2.9.4 Configuring Serial Port .............................................................................................................................................14
2.9.5 Configuring Mode ......................................................................................................................................................15
System .......................................................................................................................................................................................16
2.10.1 Time ...............................................................................................................................................................................16
2.10.2 Volume .........................................................................................................................................................................17
2.10.3 Restoring to Default Settings...............................................................................................................................17
2.10.4 Restarting the Device .............................................................................................................................................18
USB Management..................................................................................................................................................................18
2.11.1 Exporting to USB ......................................................................................................................................................18
2.11.2 Importing From USB ...............................................................................................................................................18
2.11.3 Updating System ......................................................................................................................................................19
2.11.4 Exporting Unlocking Records ..............................................................................................................................19
2.11.5 Exporting/Importing User Information ...........................................................................................................20
System Information ..............................................................................................................................................................20
V
3 Web Configuration ...................................................................................................................................... 21
Web on Computer....................................................................................................................................................................21
3.1.1 Initialization ..................................................................................................................................................................21
3.1.2 Logging In .....................................................................................................................................................................22
3.1.3 Resetting the Password ............................................................................................................................................23
3.1.4 Configuring Door Parameter ..................................................................................................................................25
3.1.5 Alarm Linkage ..............................................................................................................................................................27
3.1.6 Time Section .................................................................................................................................................................29
3.1.7 Data Capacity ...............................................................................................................................................................32
3.1.8 Setting Volume ............................................................................................................................................................32
3.1.9 Configuring Network.................................................................................................................................................33
3.1.10 Setting Date................................................................................................................................................................36
3.1.11 Safety Management ................................................................................................................................................37
3.1.12 User Management ...................................................................................................................................................44
3.1.13 Maintenance ..............................................................................................................................................................47
3.1.14 Configuration Management ................................................................................................................................48
3.1.15 Updating System ......................................................................................................................................................50
3.1.16 Version Information .................................................................................................................................................51
3.1.17 Viewing Online User ................................................................................................................................................51
3.1.18 Viewing System Logs ..............................................................................................................................................52
3.1.19 Logging Out ...............................................................................................................................................................53
Web on Phone ...........................................................................................................................................................................54
4 SmartPSS AC Configuration ........................................................................................................................ 55
Logging in ...................................................................................................................................................................................55
Adding Devices .........................................................................................................................................................................55
4.2.1 Adding Individually ....................................................................................................................................................55
4.2.2 Adding in Batch ...........................................................................................................................................................56
User Management ...................................................................................................................................................................57
4.3.1 Setting Card Type ........................................................................................................................................................57
4.3.2 Adding User ..................................................................................................................................................................58
Assigning Permissions............................................................................................................................................................61
Fingerprint Registration Instructions ....................................................................................... 63
Cybersecurity Recommendations ............................................................................................. 64
VI
1 Product Overview
Introduction
Integrated with a powerful processor and a deep-learning algorithm, the Device can identify
fingerprints instantly and accurately. The Device also supports unlocking the door by cards, passwords,
fingerprints, or their combinations. To meet different needs, it also works with a management software
to perform more functions.
Features
LCD display.
PC + ABS/acrylic panel that is suitable for outdoor use.
Supports card reader and controller modes to adapt to different situations.
Supports unlocking the door remotely on SmartPSS AC, or by cards, passwords, fingerprints, or
their combinations.
Supports multiple alarm types, such as duress, intrusion and tamper.
Supports various types of users, including guest, patrol, blocklist, VIP, normal users, and other user
types.
You can log in to the web browser with a PC or a phone.
Supports door bell.
Works with SmartPSS AC and DSS Pro.
1
Dimensions
Dimensions (1) (mm [inch])
2
Application
The Device is applicable to a variety of scenarios, such as office buildings, schools, industrial parks,
apartment complexes, factories, public stadiums, and business centers. This user manual mainly
describes the Device with the fingerprint function in the controller mode.
The user manual is for reference only, and might differ from the actual product.
Network diagram
3
2 Local Configuration
Configuration Process
Configuration workflow
Keypad Function
Table 2-1 Description of keypad
Item Description
Number
Used to enter information or password.
or letter
∧
Navigate the page.
∨
Initialization
For first-time use or after restoring factory defaults, you need to set a password and associate your
email address for the admin account. You also need to set the time zone of the Device. You can use the
admin account to log in to the main menu of the Device, configure the Device, and log in to the web
browser and SmartPSS AC.
4
Initialization
If you forget the administrator password, send a reset request to your associated e-mail address.
The password must consist of 8 to 32 non-blank characters and contain at least two types of the
following characters: Upper case, lower case, numbers, and special characters (excluding ' " ; : &).
Set a high-security password by following the password strength prompt.
Standby Screen
You can unlock the door on the standby page with your card, password, or fingerprint.
The Device goes back to the standby page if there is no operation in 30 seconds.
The Device turns off the screen if it stays on the standby page for 30 seconds.
The screen in the user manual is for reference only.
Standby screen
5
No. Item Description
Unlock the
Enter the user ID and password, or the administrator password (for details,
3 door with
see "2.6.4 Administrator Password") to unlock the door.
password
Unlocking
4 Displays the unlocking methods you configured.
methods
Tap to enter the main menu. Only Admin and users with
5 Main menu
administrator permission can log in to the main menu. See "2.5 Logging in
to the Main Menu".
Only the administrator and admin users can log in to the main menu.
On the standby screen, tap .
On the main menu, tap ∧/∨ to navigate the page, and then tap OK to configure parameters
of the Device.
6
To configure system, tap 4.
To configure USB, tap 5.
To view system information, tap 6.
Main menu
Unlocking Methods
2.6.1 Card
Swipe your card to unlock the door.
For the Access Standalone with ID function, if it is connected with an external ID card reader, the
distance between the Access Standalone and the card reader must be larger than 10 cm. Otherwise,
the card reader might malfunction because it is too close to the Access Standalone.
2.6.2 Fingerprint
Press your enrolled fingerprint on the fingerprint scanner to unlock the door.
To enter the user ID, you need to select the input box of user ID and tap OK.
You can directly enter the password on the keypad.
7
Select OK, and then tap OK.
The system will prompt that the door is unlocked.
To use the administrator password for door access, you need to enable the function. See "2.7.3
Setting Administrator Password".
User Management
You can add new users, view the user list or admin list on the User screen.
The screens in this manual are only for reference, and might differ from the actual product.
Add a new user
8
Table 2-3 Description of user parameters
Parameter Description
Each user ID is unique. It can be 18 characters of numbers, letters, or their
ID
combination.
Enter the name ( a maximum of 32 characters, including numbers, symbols,
Name
and letters).
Each user can add up to 3 fingerprints. Follow the on-screen prompts and
voice prompts to add fingerprints.
You can enable the duress fingerprint function under each fingerprint. After
the duress alarm function is enabled, an alarm will be triggered if the door is
Fingerprint unlocked by the duress fingerprint.
9
2.7.2 User/Admin List
You can view and search all the general users and admin users, and edit user information.
On the main menu, select User > User List/Admin List.
User list
Admin list
Unlocking method
: Fingerprint.
: Card.
: Password.
Searching Users
10
Enter the user ID, swipe a card, or press a fingerprint to search the user.
Deleting Users
Select the user, tap OK, and then select to delete the user.
11
2.8.1 Configuring Unlocking Mode
Configure the unlocking combinations. The unlocking methods vary with different device types.
Use card, fingerprint, password, or any of their combinations to unlock the door.
On the main menu, select Access > Unlock Mode, and then tap OK.
Tap OK to configure the unlocking combinations.
And: You have to verify all the selected unlocking methods to open the door.
Or: You can verify one of the selected unlocking methods to open the door.
Element (Multiple Choice)
Tap Esc.
Tap OK to save changes.
Communication
Configure the network, serial port and Wiegand port parameters to connect the Device to the network
or other devices.
2.9.1 Configuring IP
Set IP address for the Device to connect it to the network. After that, you can log in to the web portal
to configure the Device, and add it to SmartPSS AC.
On the main menu, select Comm > IP Address, and then tap OK.
12
Select IP Address and tap OK to configure parameters.
Configure IP
13
The Device will search for and display available wireless networks.
Select a wireless network, tap OK, and then enter the password.
Select Wiegand Input when you need to connect a card reader to the Device.
Select Wiegand Output when the Device functions as a card reader, and you need to connect it
to another access controller.
Wiegand
14
Serial port settings
Select Serial Input when the Device connects to a card reader. The card reader will send the card
number to the Device or SmartPSS AC.
Select Serial Output when the Device functions as a card reader. The Device will send the card
number to the controller, and the controller controls the door access.
UserID: Outputs the ID of the user who swipes a card.
Card No.: Outputs the card number that is used.
Select OSDP Input when the Device connects a card reader through OSDP protocol. The card
reader will send the card information to the Device or SmartPSS AC.
Mode
Controller: The Device works as an access controller. You can connect it to a card reader, and
the card reader sends the card information to the Device or SmartPSS AC.
Card Reader: The Device functions as a card reader, and it can be connected to a controller
or another access standalone.
The serial port input cannot be configured in the card reader mode.
15
For the card reader mode, refer to the wiring method of a card reader. You can connect
the Device to an external controller or another access standalone via RS485 protocol. It
does not support Wiegand.
For card reader mode, the two wires A/B (RS-485) are connected to the A/B wires of the
controller. To realize the tamper alarm function, DOOR1_COM and DOOR1_NC should
be connected to the CASE and GND wires of the external controller.
Baud Rate Setting
9600: By default.
115200: Applicable to the controller and card reader with this baud rate.
For the card reader mode, the baud rate will automatically adjust according to the
external controller. We recommend you not to modify other configurations on the web
portal and on the device.
For the controller mode, you need to manually set the same baud rate as the external
device.
System
2.10.1 Time
Configure the time of the Device, such as date, time, and date format.
On the main menu, select System > Time, and then tap OK.
Select a parameter, and then tap OK.
Time settings
16
2.10.2 Volume
Adjust the volume of the voice prompt.
On the main menu, select System > Volume, and then tap OK.
Tap the up arrow or down arrow to adjust the volume.
Adjust the volume
Data will be lost if you restore the Device to factory defaults. Please be advised.
On the main menu, select System > Restore Factory, and then tap OK.
Select an option, and then tap OK.
Default: Restores factory defaults and deletes all data, including users, device
information, and logs.
Default (Save user&log): Restores factory defaults and deletes all data except user
information and logs.
Restore to default settings
17
2.10.4 Restarting the Device
On the main menu, select System > Reboot, and then tap OK to restart the Device.
USB Management
Make sure that a USB flash drive is inserted to the Device before exporting user information or
upgrading system. To avoid failure, do not pull out the USB flash drive or perform any operation
during the process.
If you want to import data from one device to another, you must export the data to a USB flash
drive first.
You can use a USB flash drive to update the Device, and export or import user information.
Tap OK.
The selected data is exported to the USB flash drive.
18
Import data from the USB flash drive
Tap OK.
The selected data is imported to the Device.
19
2.11.5 Exporting/Importing User Information
You can use one-click function to import or export user information, including cards and fingerprints.
On the main menu, select USB > One-click Operation, and then tap OK.
Import: Import user information, including cards and fingerprints.
Export: Export user information, including cards and fingerprints.
Select Import or Export, and then tap OK.
One-click operation
System Information
On the main menu, select Info, and then tap OK. You can view data capacity and system information
of the Device.
Data Capacity: Displays the number of general users, admin users, cards, fingerprints, unlocking
records, and alarm records that have been stored, and the storage capacity.
Device Version: Displays software and hardware information of the Device.
20
3 Web Configuration
Open the web browser on your computer or phone. Log in to the web page to configure and update
the Device.
Web on Computer
3.1.1 Initialization
You need to set a password and link an email address before logging in to the web for the first time.
Go to the IP address (192.168.1.108 by default) of the Device in the browser.
Enter the new password, confirm password, enable Bind Email, enter an email address, and
then click Next.
The password must consist of 8 to 32 non-blank characters and contain at least two
types of the following characters: Upper case, lower case, numbers, and special
characters (excluding ' " ; : &). Set a high-security password by following the password
strength prompt.
Keep the password properly after initialization and change the password regularly to
improve security.
When you need to reset the administrator password by scanning the QR code, you need
the associated email address to receive the security code.
21
Click Next.
Auto check
We recommend you select Auto Check to get the latest version in time.
Click Next.
Finish initialization
Click Complete.
3.1.2 Logging In
Go to the IP address (192.168.1.108 by default) of the Device in the browser, and press the
22
Enter key.
Make sure that the computer is on the same LAN as the Device.
The default IP address is 192.168.1.108.
Login
The default administrator name is admin, and the password is the one you set during
initialization. We recommend you to change the administrator password regularly to
increase security.
If you forgot the administrator password, click Forget Password? to reset it. See "3.3
Resetting the Password".
Click Login.
23
Reset prompt
Scan the QR code on the window, and you will get the security code.
A maximum of two security codes will be generated by scanning the same QR code. If
security codes become invalid, refresh the QR code and scan again.
After you scanned the QR code, send the content that you received to the designated
email address, and then you will receive a security code.
Use the security code within 24 hours after you receive it. Otherwise, it will become
invalid. If wrong security codes are entered for consecutive five times, the administrator
will be frozen for five minutes.
Reset Password
24
Enter the security code you have received.
Click Next.
Reset and confirm the new password.
The password must consist of 8 to 32 non-blank characters and contain at least two types of
the following characters: Upper case, lower case, numbers, and special characters (excluding
' " ; : &). Set a high-security password by following the password strength prompt.
Click OK to complete resetting.
25
Parameter Description
A timeout alarm will be triggered if the door remains unlocked for longer time
Timeout (Sec.)
than this value.
Set the remote verification door opening period. For details, see "3.6.1
Remote
Configuring Time Section". When opening a door is authorized on the device, it
Verification
needs to be confirmed on the platform before it can be opened.
An alarm will be triggered when a duress card or duress password is used to
Duress Alarm
unlock the door.
Intrusion and overtime alarms can be triggered only after Door Sensor is
Door Sensor
enabled.
When Door Sensor is enabled, an intrusion alarm will be triggered if the door
Intrusion Alarm
is opened abnormally.
A timeout alarm will be triggered if the door remains unlocked for longer time
Overtime Alarm
than the Timeout(Sec), which ranges from 1 to 9999 seconds.
If enabled, users need to verify identities both for entry and exit; otherwise an
alarm will be triggered.
If a person enters with verification and exits without verification, an alarm
Anti-passback will be triggered when they attempt to unlock again, and access is denied
Alarm at the same time.
If a person enters without verification and exits with verification, an alarm
will be triggered when the they attempt to unlock again, and access is
denied at the same time.
Configure unlock method.
Time section
1) In the Opening Method list, select Time Section, and then click .
Time section parameter
2) Configure the time and opening method for a time section. You can configure up to four
time sections for a single day.
3) (Optional) Select Apply to the whole week to copy the configuration to the rest of days.
4) Click OK.
Multi-card
1) In the Opening Method list, select Multi-card, and then click .
2) Click Add.
3) Select an unlocking method in the Opening Method list., and enter a number for the
valid user.
26
Multi-card parameter
4) In the User List area, enter user ID. For details, see "2.7.1 Adding New User".
Alarm input devices can be connected to the Device, and you can modify the alarm linkage parameters.
Log in to the web page.
Select Alarm Linkage > Alarm Linkage.
Alarm linkage
27
Modify linkage parameters
If fire link is enabled, alarm output and access linkage are NO by default.
Alarm Output Enable If alarm output is enabled, the relay can generate alarm messages.
Duration (Sec.) Alarm duration. It ranges from 1 s through 300 s.
The Device has only one output channel. Select the output channel
Alarm Output Channel
according to your alarm device.
If access linkage is enabled, the Device will be normally on or normally
Access Link Enable
closed when there are input alarm signals.
Channel Type There are two options: NO and NC.
Click OK to save changes.
The configurations on the web will be synchronized with the software client if the Device is
added to the client.
28
Select Alarm Linkage > Alarm Log.
Alarm log
Select a time range and alarm type, and then click Query.
Query results
You can configure up to 128 groups (from No.0 through No.127) of time section. In each group, you
need to configure door access schedules for a whole week. A user can only unlock the door during the
scheduled time.
Log in to the web page.
Select Time Section > Time Section.
Click Add.
29
Time section parameters
Set time sections for different holiday groups. You can configure up to 128 holiday groups (from No.0
through No.127). and up to 16 time sections for a single holiday group. Users can unlock doors in the
defined time sections.
Log in to the web page.
Select Time Section > Holiday Group Config.
Click Add.
30
Add a holiday group
Click OK.
Assign the configured holiday groups to the holiday plan. Users can only unlock the door in the
defined time in the holiday plan.
Log in to the web page.
31
Select Time Section > Holiday Plan Config.
Click Add.
Add a holiday plan
32
Volume setting
Click OK.
You need to configure IP address and DNS server so that the Device can communicate with other
devices.
Prerequisite
Configure parameters.
33
Table 3-3 Description of TCP/IP
Parameter Description
IP Version IPv4.
MAC Address MAC address of the Device.
Static: Set IP address, subnet mask, and gateway address manually.
DHCP
After DHCP is enabled, IP address, subnet mask, and gateway
Mode address cannot be configured.
If DHCP is effective, IP address, subnet mask, and gateway address
will be assigned by DHCP automatically.
If you disable DHCP, the default IP will be displayed.
IP Address Enter IP address, and then configure subnet mask and gateway address.
Subnet Mask
Default Gateway IP address and gateway address must be in the same network segment.
Preferred/
Alternate DNS Set IP address of the preferred DNS server.
Server
You can limit access to the Device at the same time by web, software and phone, and configure port
numbers of the Device.
Log in to the web page.
Select Network Setting > Port.
Configure the port number.
Except Max Connection, you need to restart the Device to make your configurations effective.
34
3.1.9.3 Register
The Device reports its address to the designated server so that clients can access.
Log in to the web page.
Select Network Setting > Auto Register.
Select Enable, and enter host IP, port, and sub device ID.
3.1.9.4 P2P
If you want to use P2P, you must connect the Device to the Internet; otherwise this function cannot
work properly.
P2P
Scan the QR code on your web page to get the serial number of the Device.
35
3.1.10 Setting Date
You can configure time zone, system time, DST (Daylight Saving Time) or NTP (Network Time Protocol).
Log in to the web page.
Click Date Setting.
Date setting
36
3.1.11 Safety Management
Procedure
Select the Enable checkbox.
37
Network access
Configure parameters.
38
Parameter Description
Device Start Port
If you clear All Ports checkbox, set the device start port and device end port.
Device End Port
Click Save, and the IP Authority window is displayed.
Click OK.
Related Operations
Click OK.
Click OK.
39
3.1.11.2 Configuring System
40
Parameter Description
Hypertext Transfer Protocol Secure (HTTPS) is a protocol for secure
communication over a computer network.
When HTTPS is enabled, HTTPS will be used to access CGI commands;
HTTPS otherwise HTTP will be used.
If you use HTTPS for the first time or the IP address of the Device is changed, create a server
certificate and install a root certificate.
If you change PC to log in to web, you need to download and install the root certificate again on
the new PC or copy it to the new PC.
On the System Service page, click Create Server Certificate.
Enter information and click OK, and then the Device will restart.
Create server certificate
41
3.1.11.2.3 Downloading Root Certificate
On the System Service page, click Download Root Certificate.
Double-click the file that you have downloaded, and then click Open.
File download
42
Store Location
Click Finish.
43
Certificate store selected
3.1.12.1 User
44
User management
Click Add.
Add user
45
Modify user information
Select the Bind Email checkbox and enter the email address.
Select the Modify Password checkbox, and then enter the old password, new password and
confirm password.
Click OK.
Open Network Video Interface Forum (ONVIF), a global and open industry forum that is established for
the development of a global open standard for the interface of physical IP-based security products.
Create ONVIF users and have their identities verified via ONVIF protocol.
Click Add.
46
Add ONVIF user
Select the Modify Password checkbox, and then enter the old password, new password and
confirm password.
Click OK.
3.1.13 Maintenance
You can regularly restart the Device during idle time to improve its performance.
Log in to the web page.
Select Maintenance.
47
Maintenance
It is Never by default.
(Optional) Click Reboot Device, and the Device will restart immediately.
You can export the configuration file of the Device for backup.
Log in to the web page.
Select Config Mgmt > Config Mgmt.
Configuration management
You can export the configuration file from the Device to another one with the same device model.
Log in to the web page.
Select Config Mgmt > Config Mgmt.
Click Browse to select the configuration file, and then click Import configuration.
The Device will restart after importing configuration file.
48
3.1.14.3 Setting Features
You can set the fingerprint identity level to adjust recognition accuracy rate.
Log in to the web page.
Select Config Mgmt > Config Mgmt.
In the Fingerprint area, set the identity level.
The higher identity level means higher recognition accuracy and higher recognition threshold.
Fingerprint identity level
49
Click OK.
Restoring the Device to default configurations will cause data loss. Please be advised.
Log in to the web page.
Select Config Mgmt. >Default.
Default
Export the configuration file for backup before updating, and then import the file after the update
completes.
Use the correct update file. Make sure to get the correct update file from the technical support.
Do not disconnect the power or network, or restart or shut down the Device during the update.
Log in to the web page.
Select Upgrade.
50
Upgrade
We need to collect the data such as device name, firmware version, and device serial
number to proceed auto-check. The collected information is only used for verifying the
legality of cameras and giving upgrade notification.
2) If there is any new version available, click Upgrade.
The Device will restart after the upgrading completes.
51
Online user
52
3.1.18.2 Admin Logs
Click at the upper-left corner, and then click OK to log out of the web page.
53
Web on Phone
Make sure the Device is on the same LAN as your phone. Connect the Device to your phone hotspot
or connect the Device and your phone to the same router.
Only certain parameters can be configured on the web portal if you log in on a phone.
Go to the IP address (192.168.1.108 by default) of the Device in the browser.
Login
The default administrator name is admin, and the password is the one you set during
initialization. We recommend you to change the administrator password regularly to increase
security.
Click Login.
54
4 SmartPSS AC Configuration
This chapter introduces how to manage and configure the Device by using SmartPSS AC. For details,
see the user's manual of SmartPSS AC.
Use Smart PSS AC as an example for configurations. The windows in the user manual are only for
reference, and might differ from the actual product.
Logging in
Double-click , and then follow the prompts to complete initialization and log in.
Adding Devices
You need to add the Device to SmartPSS AC. You can in batch or individually.
55
Table 4-1 Description of device parameters
Parameter Description
Enter a name of the device. We recommend naming the device according to
Device Name
its installation area.
Method to add Select IP to add device through IP address.
IP Enter IP address of the device.
Port The port number is 37777 by default.
User Name,
Enter the username and password of the device.
Password
Click Add, and then you can see the added device on the Devices page.
The device automatically logs in after being added. Online is displayed after successful login.
56
Enter the network segment, and then click Search.
A device list will be displayed.
The device automatically logs in after being added. Online is displayed after successful
login.
Related Operation
: Edit the device information, including device name, IP address, port number, username, and
password.
You can also double-click the device to edit its information.
: Configure the device. You can set up the time, update the device, restart the device, and
extract user information or attendance records from the device.
User Management
Add users, issue cards to them, and configure their access permissions.
Card types must be the same as card issuer types; otherwise, card numbers cannot be read.
Log in to SmartPSS AC.
Click Personnel Manager.
Personnel manager
57
Click , and then click .
On the Setting Card Type window, select a card type.
Click OK.
58
Add basic information
The card number can be read automatically or entered manually. To read the card
number automatically, select a card reader, and then place the card on the card reader.
1) Click , set Card Reader to Device, and then select the device you add from Device.
2) Click Add, swipe a card on the device, and then the card number will be displayed.
3) Click OK.
4) (Optional) After adding a card, you can set the card to main card or duress card, or replace
the card with a new one, or delete the card.
Configure fingerprint.
59
Add password, card, and fingerprint
Click Finish.
60
Effective Time and Expired Time: The users can unlock the door within the defined
period.
Click Issue.
The card number will be read automatically.
Click Stop when you finish issuing cards.
Click OK.
Add users in batches
In the user list, click to edit the information of the added users.
Assigning Permissions
Add devices to a permission group, and then users in the group can unlock corresponding doors.
Log in to SmartPSS AC.
Click Personnel Manger > Permission configuration.
Click .
Enter the group name, remarks (optional), and select a time template.
Select the devices.
Click OK.
Create a permission group
61
Select the users you want to add to the permission group.
Click OK.
Users in the permission group can swipe their cards, or use other unlock methods to unlock
the door.
Add users to a permission group
62
Fingerprint Registration Instructions
When you register the fingerprint, pay attention to the following points:
Make sure that your fingers and the scanner surface are clean and dry.
Press your finger on the center of the fingerprint scanner.
Do not put the fingerprint sensor in a place with intense light, high temperature, and high
humidity.
If your fingerprints are unclear, use other unlocking methods.
Fingers Recommended
Forefingers, middle fingers, and ring fingers are recommended. Thumbs and little fingers cannot be
put at the recording center easily.
Appendix Figure 1-1 Recommended fingers
63
Cybersecurity Recommendations
64
the risk of ARP spoofing.
9. Assign Accounts and Privileges Reasonably
According to business and management requirements, reasonably add users and assign a
minimum set of permissions to them.
10. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to
reduce risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to the
following services:
SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.
SMTP: Choose TLS to access mailbox server.
FTP: Choose SFTP, and set up strong passwords.
AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords.
11. Audio and Video Encrypted Transmission
If your audio and video data contents are very important or sensitive, we recommend that you
use encrypted transmission function, to reduce the risk of audio and video data being stolen
during transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.
12. Secure Auditing
Check online users: we suggest that you check online users regularly to see if the device is
logged in without authorization.
Check device log: By viewing the logs, you can know the IP addresses that were used to log
in to your devices and their key operations.
13. Network Log
Due to the limited storage capacity of the device, the stored log is limited. If you need to save the
log for a long time, it is recommended that you enable the network log function to ensure that
the critical logs are synchronized to the network log server for tracing.
14. Construct a Safe Network Environment
In order to better ensure the safety of device and reduce potential cyber risks, we recommend:
Disable the port mapping function of the router to avoid direct access to the intranet devices
from external network.
The network should be partitioned and isolated according to the actual network needs. If
there are no communication requirements between two sub networks, it is suggested to use
VLAN, network GAP and other technologies to partition the network, so as to achieve the
network isolation effect.
Establish the 802.1x access authentication system to reduce the risk of unauthorized access
to private networks.
Enable IP/MAC address filtering function to limit the range of hosts allowed to access the
device.
65