Dahua DHI-ASA4214F Quick Start Manual Download Page 5

  V 

  Foreword 

General 

This document elaborates on structure, installation and system function of face recognition 

access and time attendance terminal. 

Safety Instructions 

The following categorized signal words with defined meaning might appear in the Manual

.

 

Signal Words 

Meaning 

 

Indicates a high potential hazard which, if not avoided, will result in 

death or serious injury. 

 

Indicates a medium or low potential hazard which, if not avoided, 

could result in slight or moderate injury. 

 

Indicates a potential risk which, if not avoided, could result in 

property damage, data loss, lower performance, or unpredictable 

result. 

 

Provides methods to help you solve a problem or save you time. 

 

Provides additional information as the emphasis and supplement to 

the text. 

Privacy Protection Notice 

As the device user or data controller, you might collect personal data of others' such as face, 

fingerprints, car plate number, Email address, phone number, GPS and so on. You need to be 

in compliance with the local privacy protection laws and regulations to protect the legitimate 

rights and interests of other people by implementing measures include but not limited to: 

providing clear and visible identification to inform data subject the existence of surveillance 

area and providing related contact. 

About the Manual 

 

The  Manual  is  for  reference  only.  If  there  is  inconsistency  between  the  Manual  and  the 

actual product, the actual product shall prevail. 

 

We are not liable for any loss caused by the operations that do not comply with the Manual. 

 

The  Manual  would  be  updated  according  to  the  latest  laws  and  regulations  of  related 

regions. For detailed information, see the paper User's Manual, CD-ROM, QR code or our 

official website. If there is inconsistency between paper User's Manual and the electronic 

version, the electronic version shall prevail. 

Summary of Contents for DHI-ASA4214F

Page 1: ...Face Recognition Access and Time Attendance Terminal Quick Start Guide V1 0 1...

Page 2: ...the credentials to your devices to help ensure that only authorized users are able to access the system 2 Change Default HTTP and TCP Ports Change default HTTP and TCP ports for systems These are the...

Page 3: ...or multiple users ensure that each user only has rights to features and functions they need to use to perform their job 10 UPnP UPnP will automatically try to forward ports in your router or modem Nor...

Page 4: ...Ports on the Back of an NVR Cameras connected to the PoE ports on the back of an NVR are isolated from the outside world and cannot be accessed directly 16 Isolate NVR and IP Camera Network The networ...

Page 5: ...ler you might collect personal data of others such as face fingerprints car plate number Email address phone number GPS and so on You need to be in compliance with the local privacy protection laws an...

Page 6: ...s description or errors in print If there is any doubt or dispute please refer to our final explanation Upgrade the reader software or try other mainstream reader software if the Guide in PDF format c...

Page 7: ...ase don t dismantle the device arbitrarily Please transport use and store the device within allowed humidity and temperature range Power Requirement Please make sure to use batteries according to requ...

Page 8: ...Description of Wiegand RS485 Input output 7 2 5 2 Wiring Description of Lock Door Sensor and Exit Button 7 2 5 3 Wiring Description of Power and Network Port 9 2 5 4 Wiring Description of External Al...

Page 9: ...t Support 1 N face recognition advanced face recognition algorithm max 1 000 or 3 000 face library depending on model quick recognition speed and high accuracy rate Face comparison time is 1s face ver...

Page 10: ...2 1 2 External Dimension External dimension of the device is shown in Figure 1 1 The unit is mm Figure 1 1...

Page 11: ...apter 1 DC12V 2A 3 Cable 4 4 M4 30 cross recessed pan head flat end screw 2 Fix the bracket to concealed mount 5 Screw bag 1 bag ST3 18 self tapping screw 4 Expansion pipe 4 Without concealed mount fi...

Page 12: ...4 2 3 Installation Installation of the device is shown in Figure 2 2 and Figure 2 4 Figure 2 2 Figure 2 3...

Page 13: ...e concealed mount or good fixation fix the bracket onto the wall directly with screw B Before fixing embed expansion pipes at corresponding positions of the wall Step 3 Hang the device onto the hook o...

Page 14: ...6 Figure 2 5 Figure 2 6 Figure 2 7...

Page 15: ...or Wiegand In CON1 corresponding terminals are described in Table 2 3 Port No Mark Cable Color Note CON1 Wiega nd RS45 8 input o utput 1 RD Red Positive pole of power Power output 2 RD Black Negative...

Page 16: ...ON2 lock door contact and exit button 1 COM Lock control output 2 NC 3 NO 4 SR Door sensor 5 PUSH Exit button 6 GND GND shared by door sensor and exit button 7 RX Reserved 8 TX Table 2 5 Figure 2 8 Fi...

Page 17: ...CON4 corresponding terminals are described in Table 2 7 Port No Mark Note CON4 external alarm input output 1 COM2 External alarm output 2 External alarm output port is able to connect siren etc 2 NO2...

Page 18: ...10 Figure 2 12 Figure 2 13 External alarm input is shown in Figure 2 14 Figure 2 14...

Page 19: ...orm will fail to add the device Admin and Password are only used to add the device without admin authority in personnel management If the admin password is forgotten the password can be reset at the p...

Page 20: ...on t operate in one interface for over 30s it will return to standby interface Figure 3 2 Customize the attendance event in Features Fn Key Please refer to the user s manual for details 3 4 Main Menu...

Page 21: ...e fingerprint card number password and face so the user can unlock or check attendance with fingerprint card or password The system supports max 30 000 users Select User New User and the screen displa...

Page 22: ...No Enter card no or put the card in card swiping area the system will recognize the card no automatically Pwd Enter password supporting 1 8 digits of number Access Period select preset access period...

Page 23: ...This authority is valid globally not just valid to attendance management User only have use authority Admin login the system to configure Table 3 1 After parameter configuration is completed press Ste...

Page 24: ...3 6 Figure 3 6 Select a corresponding parameter to edit and modify it and press Step 2 The screen prompts Do you want to save settings Press Yes to save and complete configuration Step 3 Search User C...

Page 25: ...ans that the door can be unlocked by swiping card first and then pressing the fingerprint Press The screen prompts Do you want to save settings Step 3 Press Yes The system returns to Unlock Mode inter...

Page 26: ...enable disable 3 6 3 Group Combination Set to unlock after authorized by multiple users or user groups Select Access Unlock Mode Group Combination Step 1 The screen displays Figure 3 8 Figure 3 8 Pre...

Page 27: ...ed after valid users unlock Valid user cannot be greater than total number of user When valid user equals to total number of user the door can be unlocked after all members of the group unlock When va...

Page 28: ...ection Network Configuration and the screen displays Figure 3 11 Step 1 Figure 3 11 Select adding mode according to actual situation Step 2 IP Address Select IP Address and the screen displays Figure...

Page 29: ...Dynamic Host Configuration Protocol Enable DHCP function and obtain IP address automatically Then IP Address Subnet Mask and Gateway IP Address cannot be set Enable Disable P2P During use it is unnec...

Reviews: