background image

  VI 

 

All the designs and software are subject to change without prior written notice. The product 

updates might cause some differences between the actual product and the Manual. Please 

contact the customer service for the latest program and supplementary documentation. 

 

There  still  might  be  deviation  in  technical  data,  functions  and  operations  description,  or 

errors in print. If there is any doubt or dispute, please refer to our final explanation. 

 

Upgrade the reader software or try other mainstream reader software if the Guide (in PDF 

format) cannot be opened. 

 

All  trademarks,  registered  trademarks  and  the  company  names  in  the  Manual  are  the 

properties of their respective owners.   

 

Please visit our website, contact the supplier or customer service if there is any problem 

occurred when using the device. 

 

If there is any uncertainty or controversy, please refer to our final explanation. 

 

Summary of Contents for DHI-ASA4214F

Page 1: ...Face Recognition Access and Time Attendance Terminal Quick Start Guide V1 0 1...

Page 2: ...the credentials to your devices to help ensure that only authorized users are able to access the system 2 Change Default HTTP and TCP Ports Change default HTTP and TCP ports for systems These are the...

Page 3: ...or multiple users ensure that each user only has rights to features and functions they need to use to perform their job 10 UPnP UPnP will automatically try to forward ports in your router or modem Nor...

Page 4: ...Ports on the Back of an NVR Cameras connected to the PoE ports on the back of an NVR are isolated from the outside world and cannot be accessed directly 16 Isolate NVR and IP Camera Network The networ...

Page 5: ...ler you might collect personal data of others such as face fingerprints car plate number Email address phone number GPS and so on You need to be in compliance with the local privacy protection laws an...

Page 6: ...s description or errors in print If there is any doubt or dispute please refer to our final explanation Upgrade the reader software or try other mainstream reader software if the Guide in PDF format c...

Page 7: ...ase don t dismantle the device arbitrarily Please transport use and store the device within allowed humidity and temperature range Power Requirement Please make sure to use batteries according to requ...

Page 8: ...Description of Wiegand RS485 Input output 7 2 5 2 Wiring Description of Lock Door Sensor and Exit Button 7 2 5 3 Wiring Description of Power and Network Port 9 2 5 4 Wiring Description of External Al...

Page 9: ...t Support 1 N face recognition advanced face recognition algorithm max 1 000 or 3 000 face library depending on model quick recognition speed and high accuracy rate Face comparison time is 1s face ver...

Page 10: ...2 1 2 External Dimension External dimension of the device is shown in Figure 1 1 The unit is mm Figure 1 1...

Page 11: ...apter 1 DC12V 2A 3 Cable 4 4 M4 30 cross recessed pan head flat end screw 2 Fix the bracket to concealed mount 5 Screw bag 1 bag ST3 18 self tapping screw 4 Expansion pipe 4 Without concealed mount fi...

Page 12: ...4 2 3 Installation Installation of the device is shown in Figure 2 2 and Figure 2 4 Figure 2 2 Figure 2 3...

Page 13: ...e concealed mount or good fixation fix the bracket onto the wall directly with screw B Before fixing embed expansion pipes at corresponding positions of the wall Step 3 Hang the device onto the hook o...

Page 14: ...6 Figure 2 5 Figure 2 6 Figure 2 7...

Page 15: ...or Wiegand In CON1 corresponding terminals are described in Table 2 3 Port No Mark Cable Color Note CON1 Wiega nd RS45 8 input o utput 1 RD Red Positive pole of power Power output 2 RD Black Negative...

Page 16: ...ON2 lock door contact and exit button 1 COM Lock control output 2 NC 3 NO 4 SR Door sensor 5 PUSH Exit button 6 GND GND shared by door sensor and exit button 7 RX Reserved 8 TX Table 2 5 Figure 2 8 Fi...

Page 17: ...CON4 corresponding terminals are described in Table 2 7 Port No Mark Note CON4 external alarm input output 1 COM2 External alarm output 2 External alarm output port is able to connect siren etc 2 NO2...

Page 18: ...10 Figure 2 12 Figure 2 13 External alarm input is shown in Figure 2 14 Figure 2 14...

Page 19: ...orm will fail to add the device Admin and Password are only used to add the device without admin authority in personnel management If the admin password is forgotten the password can be reset at the p...

Page 20: ...on t operate in one interface for over 30s it will return to standby interface Figure 3 2 Customize the attendance event in Features Fn Key Please refer to the user s manual for details 3 4 Main Menu...

Page 21: ...e fingerprint card number password and face so the user can unlock or check attendance with fingerprint card or password The system supports max 30 000 users Select User New User and the screen displa...

Page 22: ...No Enter card no or put the card in card swiping area the system will recognize the card no automatically Pwd Enter password supporting 1 8 digits of number Access Period select preset access period...

Page 23: ...This authority is valid globally not just valid to attendance management User only have use authority Admin login the system to configure Table 3 1 After parameter configuration is completed press Ste...

Page 24: ...3 6 Figure 3 6 Select a corresponding parameter to edit and modify it and press Step 2 The screen prompts Do you want to save settings Press Yes to save and complete configuration Step 3 Search User C...

Page 25: ...ans that the door can be unlocked by swiping card first and then pressing the fingerprint Press The screen prompts Do you want to save settings Step 3 Press Yes The system returns to Unlock Mode inter...

Page 26: ...enable disable 3 6 3 Group Combination Set to unlock after authorized by multiple users or user groups Select Access Unlock Mode Group Combination Step 1 The screen displays Figure 3 8 Figure 3 8 Pre...

Page 27: ...ed after valid users unlock Valid user cannot be greater than total number of user When valid user equals to total number of user the door can be unlocked after all members of the group unlock When va...

Page 28: ...ection Network Configuration and the screen displays Figure 3 11 Step 1 Figure 3 11 Select adding mode according to actual situation Step 2 IP Address Select IP Address and the screen displays Figure...

Page 29: ...Dynamic Host Configuration Protocol Enable DHCP function and obtain IP address automatically Then IP Address Subnet Mask and Gateway IP Address cannot be set Enable Disable P2P During use it is unnec...

Reviews: