background image

Figure 3-16 Lock 1 (door 1)

2. Select Fail Secure  from the 12V list for door 2.

Figure 3-17 Lock 2 (door 2)

3. Wiring the locks according to the diagram below.

Quick Start Guide

18

Summary of Contents for ASC3202B

Page 1: ...ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD V1 0 3 Access Controller Quick Start Guide...

Page 2: ...ave time Provides additional information as a supplement to the text Revision History Version Revision Content Release Time V1 0 3 Updated adding users and configuring permissions June 2023 V1 0 2 Upd...

Page 3: ...itten notice Product updates might result in some differences appearing between the actual product and the manual Please contact customer service for the latest program and supplementary documentation...

Page 4: ...Controller Improper use of the battery might result in a fire or explosion Personnel working at heights must take all necessary measures to ensure personal safety including wearing a helmet and safet...

Page 5: ...ler within the rated range of power input and output Use the Access Controller under allowed humidity and temperature conditions Do not drop or splash liquid onto the Access Controller and make sure t...

Page 6: ...trikes with PoE 16 3 2 2 Wring of Dual Electric Strikes with 12 V External Power Supply 17 4 Installation 20 4 1 Wall Mount 20 4 2 DIN Rail Mount 22 5 Access Control Configurations 25 5 1 Networking D...

Page 7: ...1 Dimensions and Appearance Figure 1 1 Dimensions mm inch Quick Start Guide 1...

Page 8: ...Figure 1 2 Front view Table 1 1 Components description No Description 1 Guiding mark 2 Front panel 3 Screw Quick Start Guide 2...

Page 9: ...Figure 1 3 Back cover Table 1 2 Back cover description No Description 1 Tamper alarm switch 2 Upper DIN clip 3 Lower DIN clip 4 Wiring outlet Quick Start Guide 3...

Page 10: ...ader connector 2 READER2 Reader connector 3 AUX Auxiliary connector including door detector door exit button and alarm input 4 DC IN Power connector 5 ALM_OUT Alarm output connector 6 RJ45 Network con...

Page 11: ...grounding wire CASE Connects the reader tampering alarm D1 Connects a Wiegand reader D0 LED1 Signal response Connects to the signal wire of the Wiegand reader RS485B Connects a RS 485 reader RS485A B...

Page 12: ...lid yellow and green Lock open Figure 2 4 Auxiliary I O ports Table 2 4 Description of auxiliary I O ports Ports Description SR1 Door detector for door 1 REX1 Exit button for door 1 ALM1 Alarm input 1...

Page 13: ...Power ports Table 2 5 Description of power ports Ports Description Grounding wire 12 VDC For powering the Access Controller when not using Power over Ethernet Figure 2 6 Alarm output ports Quick Star...

Page 14: ...re 2 7 Relay ports Table 2 7 Description of relay ports Ports Description REL1 Connects to relay devices Max voltage 12 VDC Max load 500 mA Connect locks to the pins according to the wiring diagram ge...

Page 15: ...n also be used to power external devices Connects to lock 12 VDC Max total load 1000 mA For controlling up to 12 V lock Connect locks and loads to the pins according to the wiring diagram generated th...

Page 16: ...on 485A 485B Reserved port Not used GND Grounding wire Figure 2 10 Audio ports Table 2 10 Description of audio ports Ports Description MIC Reserved port Not used MIC Grounding wire SPK Reserved port N...

Page 17: ...locked during power outages Fail Safe Sets the lock to unlock during power outages 3 1 Wiring of Magnetic Locks 3 1 1 Wring of Dual Magnetic Locks with PoE 12V and Relay Supplies power for the Access...

Page 18: ...r for the Access Controller through 12 V external power supply One door uses the external power supply and the other uses the Access Controller to supply power 1 Select Relay Open Unlocked from the Re...

Page 19: ...Wiring of locks 3 1 3 Wring of Dual Magnetic Locks with 12 V External Power Supply Relay Supply power for the Access Controller through 12 V external power supply Both doors use the external power sup...

Page 20: ...3 7 Lock 1 door 1 2 Select Relay Open Unlocked from the Relay list for lock 2 door 2 Figure 3 8 Lock 2 door 2 3 Wiring the locks according to the diagram below Figure 3 9 Wiring of locks Quick Start G...

Page 21: ...12 V external power supply Both doors use the external power supply 1 Select Relay Open Unlocked from the Relay for lock 1 door 1 Figure 3 10 Lock 1 door 1 2 Select Relay Open Unlocked from the Relay...

Page 22: ...c Strikes with PoE Supplies power for the Access Controller over the same Ethernet cable Both doors use the external power supply 1 Select Fail Secure from the 12V list for lock 1 door 1 Figure 3 13 L...

Page 23: ...3 15 Wiring of locks 3 2 2 Wring of Dual Electric Strikes with 12 V External Power Supply Supply power for the Access Controller through 12 V external power supply Both doors use the external power su...

Page 24: ...Figure 3 16 Lock 1 door 1 2 Select Fail Secure from the 12V list for door 2 Figure 3 17 Lock 2 door 2 3 Wiring the locks according to the diagram below Quick Start Guide 18...

Page 25: ...Figure 3 18 Wiring of locks Quick Start Guide 19...

Page 26: ...wall at an appropriate position Step 2 Drill holes through the marks on the map Step 3 Hammer in the expansion tubes and then remove the map Figure 4 0 Hammer in the expansion tubes Step 4 Slide up th...

Page 27: ...e Access Controller bind the wires with nylon cable ties and then cut off the excess part of the ties Step 7 Align the marks on the front panel with the marks on the back panel and then slide down the...

Page 28: ...of the DIN rail slightly push upwards the back panel and then push the back panel backwards to hook the upper DIN clip onto the top of the DIN rail Make sure the clips grip the rail on both the top an...

Page 29: ...IN clips to the rail Step 3 Slide up the front panel of the Access Controller to remove the cover Step 4 Wire the Access Controller bind the wires with nylon cable ties and then cut off the excessive...

Page 30: ...the marks on the back panel and then slide down the front cover to attach it Figure 4 5 slide down the front cover Step 6 Screw a screw into the bottom of the Access Controller to secure it Step 7 Re...

Page 31: ...eferred as the platform Sub controller needs to be added to the management platform of the main controller The main controller can manage up to 19 sub controllers Figure 5 0 Networking diagram 5 2 Con...

Page 32: ...ep 3 Read the software license agreement and privacy policy carefully select I have read and agree to the terms of the Software License Agreement and Privacy Policy and then click Next Step 4 Set the...

Page 33: ...e is admin and the password is the one you set during initialization We recommend you change the administrator password regularly to increase the security of the platform If you forget the administrat...

Page 34: ...unlocks OSDP Connects to an OSDP reader RS 485 Connects to a RS 485 reader Exit Button Connects to an exit button Door Detector Connects to a door detector Power Supply of Locks 12 V The controller pr...

Page 35: ...e combination method to And Step 7 Select the unlock methods and then configure the other parameters Figure 5 5 Unlock settings Table 5 2 Unlock settings description Parameter Description Unlock Metho...

Page 36: ...ion Duress Alarm An alarm will be triggered when a duress card duress password or duress fingerprint is used to unlock the door Door Detector Select the type of door detector Intrusion Alarm When the...

Page 37: ...Config Hardware to change the settings after you successfully log in to the platform Click Download Image to download the diagram to your computer Related Operations If you want to change the settings...

Page 38: ...e Step 1 On the home page click Device Management and then click Add Step 2 Enter the device information Figure 5 8 Device information Table 5 4 Device parameters Description Parameter Description Dev...

Page 39: ...e below operations Go to the webpage of the sub controller Log out of the device Delete the device 5 2 4 2 Adding Devices in Batches We recommend you use the auto search function when you add sub cont...

Page 40: ...Enter basic information for users and set verification methods to verify their identities Related Operations Export all the users to Excel On the Person Management page click Export to export all use...

Page 41: ...user type with manager role has the highest authority and it is not limited by advanced access rules such as first card unlock multi person unlock anti passback always closed door and unlock methods...

Page 42: ...p for DMSS To Set a date on which the access permissions of the person will expire User Name The name of the user User Type The type of user General User General users can unlock the door VIP User Whe...

Page 43: ...ser template b Enter user information in the template and then save it c Click Import and upload the template to the Platform The users are added to the Platform automatically Use Quick Add to easily...

Page 44: ...d Issue cards to the users in batches You can manually enter the card number or use the enrollment reader or card reader to read the card number For details see 5 2 5 4 2 Adding Cards Related Operati...

Page 45: ...he door through authentication Each user can have up to 1 password 5 IC ID cards 3 fingerprints and 5 Bluetooth cards 5 2 5 4 1 Adding Passwords Add passwords to users for them to gain access by enter...

Page 46: ...ails see Click Add Click Modify and then select Enrollment Reader Make sure that the card enrollment reader is connected to your computer Follow the on screen instructions to download and install the...

Page 47: ...der is connected to your computer c Follow the on screen instructions to download and install the plug in d Click Read Card and then swipe the cards on the enrollment reader A 60 second countdown is d...

Page 48: ...remind you to swipe the card and the system will read the card number automatically If the 60 second countdown expires click Read Card again to start a new countdown c Click Add Add cards in batches...

Page 49: ...e card Set the card to duress card An alarm is triggered when people use the duress card to unlock the door Delete the card 5 2 5 4 3 Adding Fingerprints Add fingerprints to users for them to use thei...

Page 50: ...he Access Controller For details see 5 2 5 3 Configuring Basic User Information General users such as company employees have installed and signed up for DMSS with their email The email that users use...

Page 51: ...Figure 5 19 Flowchart for configuring Bluetooth unlock Procedure Step 1 On the tab click Bluetooth Card 3 methods are available to add Bluetooth cards Quick Start Guide 45...

Page 52: ...ugh Email Issue Bluetooth cards to all the users on the list Click Issue Cards to All Users Issue Bluetooth cards to selected users Select users and then click Issue Cards to Selected Users b Click Bl...

Page 53: ...d the Bluetooth cards through registration code using registration codes Figure 5 22 The flowchart for requesting through registration code a On DMSS tap Registration Code of a Bluetooth card The regi...

Page 54: ...ls see the user s manual of DMSS Auto Unlock The door automatically unlocks when you are in the defined Bluetooth range which allows the Bluetooth card to transmit signals to the card reader In auto u...

Page 55: ...multiple Bluetooth cards have been added you can move cards to the top that are currently in use Rename Rename the Bluetooth card Delete Delete the Bluetooth card Export users that lack emails Click E...

Page 56: ...sers Request Again Request again for failed users 5 2 6 Adding Weekly Plans The weekly plan is used to set the unlock schedule for the week The platform offers a default template with a full daytime s...

Page 57: ...configure up to 4 time sections for each day Step 4 Click Apply 5 2 7 Adding Areas An area is a collection of door access permissions Create an area and then link users to the area so that they can g...

Page 58: ...l allow authorized personnel to gain access to secure areas Procedure Step 1 On the home page select Access Control Config Permission Settings Step 2 Click to add a permission rule Figure 5 28 Assign...

Page 59: ...ew person or change access permissions for an existing person you can simply add the user in a existing department or link them with a existing role they will be automatically assigned access permissi...

Page 60: ...Config Authorization Progress Step 2 View the authorization progress Sync SubControl Person Sync personnel on the main controller to the sub controller Sync Local Person Sync personnel on the managem...

Page 61: ...ed to the factory defaults we recommended you restore the sub controller to factory defaults at the same time Step 2 Configure the alarm output a Select an alarm input from the alarm input channel lis...

Page 62: ...Click Apply You can click Copy to to apply the pre configured alarm linkages to other alarm input channels 5 2 11 Configuring Cloud Service Add the Main Controller to DMSS before you request Bluetooth...

Page 63: ...loud Service Step 2 Turn on the cloud service function The cloud service function is turned on by default Figure 5 35 Cloud service Step 3 Click Apply Step 4 Download DMSS and sign up with Email scan...

Page 64: ...troller when you log in to the webpage for the first time or after the sub controller is restored to its factory default settings For details on how to initialize the sub controller see 5 2 2 Initiali...

Page 65: ...nt software Nice to have recommendations to improve your device network security 1 Physical Protection We suggest that you perform physical protection to device especially storage devices For example...

Page 66: ...users regularly to see if the device is logged in without authorization Check device log By viewing the logs you can know the IP addresses that were used to log in to your devices and their key opera...

Page 67: ......

Reviews: