Table of Contents III
Table of Contents
Foreword .................................................................................................................................................... I
Important Safeguards and Warnings ..................................................................................................... II
1 Dimensions and Components ........................................................................................................... 1
2 Installation .............................................................................................................................................. 2
Installation Notes........................................................................................................................... 2
2.1
Installation Drawings ..................................................................................................................... 3
2.2
Cable Connections ........................................................................................................................ 3
2.3
Installation ..................................................................................................................................... 5
2.4
3 System Operation .................................................................................................................................. 6
Initialization ................................................................................................................................... 6
3.1
Adding New Users ........................................................................................................................ 6
3.2
4 Web Operation ....................................................................................................................................... 9
Notes of Face Recording .................................................................................................. 10
Appendix 1
Cybersecurity Recommendations ................................................................................... 13
Appendix 2
Page 1: ...Face Recognition Terminal Quick Start Guide V1 0 0...
Page 2: ...egulations of related regions For detailed information see the paper manual CD ROM QR code or our official website If there is inconsistency between paper manual and the electronic version the electro...
Page 3: ...f the terminal Operate the terminal within the rated range of power input and output Do not dissemble the terminal Transport use and store the terminal under the allowed humidity and temperature condi...
Page 4: ...ns and Components 1 2 Installation 2 Installation Notes 2 2 1 Installation Drawings 3 2 2 Cable Connections 3 2 3 Installation 5 2 4 3 System Operation 6 Initialization 6 3 1 Adding New Users 6 3 2 4...
Page 5: ...s and Components 1 1 Dimensions and Components Dimensions and components mm inch Figure 1 1 Table 1 1 Component description No Name 1 Dual camera 2 IR light 3 Phototransistor 4 White fill light 5 Disp...
Page 6: ...be no less than 100Lux It is recommended that the device is installed indoors at least 3 meters away from windows and doors and 2 meters away from lights Avoid back light and direct sunlight Ambient...
Page 7: ...the access control security module is enabled in Function Security Module If the security module is enabled you need to purchase access control security module separately The security module needs sep...
Page 8: ...Installation 4 Cable connection Figure 2 5 Table 2 1 Component description No Name 1 USB port 2 Power port 3 Ethernet port...
Page 9: ...ation Procedure Thread cable through the turnstile Step 1 Put the waterproof silica gel plug on the cable Step 2 Fix the terminal onto the turnstile with M5 screw Step 3 Connect cables for terminal Se...
Page 10: ...ould consist of 8 to 32 non blank characters and contain at least two types of characters among upper case lower case number and special character excluding For terminal without touch screen initializ...
Page 11: ...mes with at most 32 characters including numbers symbols and letters Face Make sure that your face is centered on the picture capturing frame and then a picture of your face will be automatically capt...
Page 12: ...id User Level There are six levels General General users can unlock the door normally Blacklist When users in the blacklist unlock the door service personnel will get a prompt Guest Guests are allowed...
Page 13: ...and the email is used to retrieve passwords Open IE web browser enter the IP address 192 168 1 108 by default of the terminal Step 1 in the address bar and then press Enter Login Figure 4 1 Enter the...
Page 14: ...face clean Keep the device at least two meters away from light source and at least three meters away from windows or doors otherwise backlight direct sunlight might influence face recognition perform...
Page 15: ...be influenced Appendix figure 1 2 Appropriate face position Requirements of Faces Make sure that the face is clean and forehead is not covered by hair Do not wear glasses hats heavy beards or other f...
Page 16: ...rting face images through the management platform make sure that image resolution is within the range 150 300 600 1200 image pixels are more than 500 500 image size is less than 75 KB and image name a...
Page 17: ...ed to enable the auto check for updates function to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client softwar...
Page 18: ...llowing services SNMP Choose SNMP v3 and set up strong encryption passwords and authentication passwords SMTP Choose TLS to access mailbox server FTP Choose SFTP and set up strong passwords AP hotspot...
Page 19: ...s If there are no communication requirements between two sub networks it is suggested to use VLAN network GAP and other technologies to partition the network so as to achieve the network isolation eff...