Dahua ASR2200A-D User Manual Download Page 1

 

 
 

 
Access Reader 

User's Manual 

   

V1.0.3 

Summary of Contents for ASR2200A-D

Page 1: ...Access Reader User s Manual V1 0 3...

Page 2: ...2 Added unlock methods and system updating December 2022 V1 0 1 Updated device models December 2021 V1 0 0 First release October 2020 Privacy Protection Notice As the device user or data controller yo...

Page 3: ...here might be errors in the print or deviations in the description of the functions operations and technical data If there is any doubt or dispute we reserve the right of final explanation Upgrade the...

Page 4: ...nsure personal safety including wearing a helmet and safety belts Do not place the Card Reader in a place exposed to sunlight or near heat sources Keep the Card Reader away from dampness dust and soot...

Page 5: ...splash liquid onto the Card Reader and make sure that there is no object filled with liquid on the Card Reader to prevent liquid from flowing into it Do not disassemble the Card Reader without profess...

Page 6: ...orts Overview 3 3 Installation 4 3 1 Installing the 86 Box Model 4 3 2 Installing the Slim Model 5 3 3 Installing the Fingerprint Model 7 4 Sound and Light Prompt 10 4 1 86 Box and Slim Models 10 4 2...

Page 7: ...n through RS 485 and Wiegand fingerprint card reader and QR code reader only support RS 485 Supports online update Supports tamper alarm Built in buzzer and indicator light Built in watchdog to ensure...

Page 8: ...r divided into QR code card reader and general card reader according to their functions 1 2 2 Slim Model Figure 1 2 Dimensions of the slim model mm inch 1 2 3 Fingerprint Model Figure 1 3 Dimensions o...

Page 9: ...n using Wiegand protocol Green D0 Brown LED Wiegand responsive signal effective only when using Wiegand protocol Yellow RS 485_B Purple RS 485_A 5 core Cables for the Fingerprint Model Table 2 2 Cable...

Page 10: ...h the card reader to the bracket from top down 5 Screw in 2 screws on the bottom of the card reader Figure 3 1 Wall mount Wall mount 1 Drill holes on the wall 2 Put 4 expansion bolts into the holes 3...

Page 11: ...ing cable outlet is not required Step 2 Put 3 expansion bolts into the holes Step 3 Wires of the card reader and pass the wires through the slot of the bracket Step 4 Use three M3 screws to mount the...

Page 12: ...6 Figure 3 3 In wall wiring...

Page 13: ...ll 4 holes and one cable outlet on the wall For surface mounted wiring cable outlet is not required Step 2 Put 3 expansion bolts into the holes Step 3 Use three M3 screws to mount the bracket to the w...

Page 14: ...8 Figure 3 5 In wall wiring Figure 3 6 Surface mounted wiring Step 6 Press the card reader toward until you hear a click sound and the installation completes...

Page 15: ...3 7 Secure the card reader Related Operations To remove the card reader from the wall use the screwdriver pry the card reader open from the bottom until you hear a click sound Figure 3 8 Remove the ca...

Page 16: ...d blue as standby mode Wiegand communication and swiping an authorized card Buzz once The indicator flashes green once and then turns to solid blue as standby mode Wiegand communication and swiping an...

Page 17: ...d interval The indicator flashes green once and then turns to solid blue as standby mode 485 communication and swiping an unauthorized fingerprint Buzz once and then four times The indicator flashes r...

Page 18: ...tap Unlock the door through user password Enter the user ID and tap and then enter the user password and tap Unlock the door through card password Swipe card enter the password and then tap If the pa...

Page 19: ...4 Click Upgrade The indicator of the Card Reader flashes blue until the update is completed and then the Card Reader automatically restarts 6 2 Updating through Config Tool Prerequisites The Card Read...

Page 20: ...ement to prevent unauthorized personnel from carrying out physical contacts such as damaging hardware unauthorized connection of removable equipment such as USB flash disk serial port etc 2 Change Pas...

Page 21: ...in without authorization Check equipment log By viewing the logs you can know the IP addresses that were used to log in to your devices and their key operations 12 Network Log Due to the limited stora...

Reviews: