background image

72 

In order to better ensure the safety of equipment and reduce potential cyber risks, we 

recommend: 

  Disable the port mapping function of the router to avoid direct access to the intranet devices 

from external network. 

  The network should be partitioned and isolated according to the actual network needs. If 

there are no communication requirements between two sub networks, it is suggested to use 

VLAN, network GAP and other technologies to partition the network, so as to achieve the 

network isolation effect. 

  Establish the 802.1x access authentication system to reduce the risk of unauthorized access to 

private networks. 

  Enable IP/MAC address filtering function to limit the range of hosts allowed to access the 

device. 

Summary of Contents for DHI-ASI7213Y-V3-T1P

Page 1: ...User s Manual Face Recognition Access Controller User s Manual V1 0 1...

Page 2: ...roperty damage data loss lower performance or unpredictable result TIPS Provides methods to help you solve a problem or save you time NOTE Provides additional information as the emphasis and supplemen...

Page 3: ...out prior written notice Product updates might result in some differences appearing between the actual product and the manual Please contact customer service for the latest program and supplementary d...

Page 4: ...connect the access controller to two or more kinds of power supplies to avoid damage to the access controller Improper use of the battery might result in a fire or explosion Personnel working at heigh...

Page 5: ...IV The access controller is a class I electrical appliance Make sure that the power supply of the access controller is connected to a power socket with protective earthing...

Page 6: ...sword 12 3 6 4 Administrator Password 13 User Management 13 3 7 1 Adding New Users 13 3 7 2 Viewing User information 15 Access Management 15 3 8 1 Period Management 15 3 8 2 Unlock 17 3 8 3 Alarm Conf...

Page 7: ...ting 45 4 6 1 Data Rate 45 4 6 2 Image 46 4 6 3 Exposure 47 4 6 4 Motion Detection 48 4 6 5 Volume Setting 49 4 6 6 Image Mode 50 Face Detect 50 Network Setting 53 4 8 1 TCP IP 53 4 8 2 Port 54 4 8 3...

Page 8: ...User 62 System Log 63 4 17 1 Querying Logs 63 4 17 2 Backup Logs 64 4 17 3 Admin Log 64 Exit 64 5 FAQ 65 Notes of Temperature Monitoring 66 Notes of Face Recording Comparison 67 Cybersecurity Recommen...

Page 9: ...controller can recognize more than 360 positions on human face Face verification accuracy 99 5 low false recognition rate Support profile recognition the profile angle is 0 90 Support liveness detecti...

Page 10: ...ent Dimensions and components of model Y mm inch Table 1 1 Component description 2 No Name No Name 1 Temperature monitoring unit 5 Display 2 IR light 6 Card swiping area 3 Phototransistor 7 White LED...

Page 11: ...control security module If the security module is enabled you need to purchase access control security module separately The security module needs separate power supply to provide power Once the secur...

Page 12: ...etection Black and green PUSH1 Door open button of door No 1 Black and brown DOOR1_COM Lock control common port Black and yellow DOOR1_NO Lock control normally open port Black and purple DOOR1_NC Lock...

Page 13: ...d the working status of the access controller which will cause the temperature deviation between the monitored temperature and the actual temperature Influencing factors of temperature monitoring Wind...

Page 14: ...6 Places Not Recommended Places not recommended Installation Make sure that the distance between the camera and ground is 1 4 meters Installation height...

Page 15: ...tion holes and one cable entry in the wall according to holes in the bracket Fix the bracket on the wall by installing the expansion screws into the four bracket installation holes Connect cables for...

Page 16: ...on Turn to the first page of the list Turn to the last page of the list Turn to the previous page of the list Turn to the next page of the list Return to the previous menu Enable Disable Initializatio...

Page 17: ...The password must consist of 8 to 32 non blank characters and contain at least two types of characters among upper case lower case number and special character excluding Standby Interface You can unlo...

Page 18: ...the current date and time 3 Display the network status and USB status 4 Main menu icon Only users with the administrator permission can enter the main menu 5 Password unlock icon 6 Administrator passw...

Page 19: ...11 Different modes support different unlock methods and the actual interface shall prevail Administrator login The main menu interface is displayed...

Page 20: ...words and cards 3 6 1 Cards Put the card at the card swiping area to unlock the door 3 6 2 Face Make sure that your face is centered on the face recognition frame and then you can unlock the door 3 6...

Page 21: ...plans and anti passback Administrator password cannot be used when NC is selected at 3 8 1 5 NC Period Tap on the homepage Tap Please Enter Administrator PWD Enter the administrator password and then...

Page 22: ...lly Card You can register five cards at most for each user On the card registration interface enter your card number or swipe your card and then the card information will be read by the access control...

Page 23: ...in times Once they exceed the maximum times they cannot unlock the door again Patrol Paroling users can get their attendance tracked but they have no unlock permission VIP When VIP unlocks the door se...

Page 24: ...holiday groups into holiday plans You can use holiday plans to manage user access permission in different holiday groups Users can only unlock the door in the period that you set 3 8 1 4 NO Period If...

Page 25: ...one of all the unlocking methods Select Access Unlock Mode Unlock Mode Element multiple choice Select unlock mode s Tap a selected unlock mode again the unlock mode will be deleted Select a combinati...

Page 26: ...ifferent periods For example in period 1 the door can only be unlocked through cards and in period 2 doors can only be locked through faces Select Access Unlock Mode Unlock by Period Unlock by period...

Page 27: ...displayed 2 Tap and then enter a user ID 3 Tap to save the settings Unlock Mode There are three options Card PWD and Face Valid User Valid users are the ones that have unlock permission Doors can be u...

Page 28: ...a person enters with the identity checked and exits without the identity checked an alarm will be triggered when the person tries to enter again and the person will have no permission to unlock the d...

Page 29: ...ver be closed NC If NC is selected the door status is normally closed which means the door will not be unlocked Normal If Normal is selected the door will be unlocked and locked depending on your sett...

Page 30: ...DDNS port mapping or transit server Make sure that the computer used to log in to the web is in the same LAN with the device 3 9 1 2 Active Register By active registering you can connect the access c...

Page 31: ...ent to the access controller and the management platform For access controllers with face recognition card reading and writing functions if you select Serial Output access controller will send lock un...

Page 32: ...pulse interval Pulse Interval Output Data Type You can select the types of output data User ID If User ID is selected and then user ID will be output Card No If Card No is selected and then card numbe...

Page 33: ...on and then tap Table 3 9 Face parameter Name Description Face Recognition Threshold Face recognition accuracy can be adjusted The larger the value is the higher the accuracy will be Max Angle of Face...

Page 34: ...erval Anti fake Threshold This function prevents people from unlocking by human face images or face models The larger the value is the more difficult face images can unlock the door The recommended va...

Page 35: ...r when the access controller is installed at places with backlights like corridors and hallways 3 10 4 Fill Light Mode Setting You can select fill light modes according to your needs There are three m...

Page 36: ...p Reboot and the access controller will be rebooted USB Make sure that the USB is inserted before exporting user information and updating During exporting or updating do not pull out the USB or do oth...

Page 37: ...Confirm to export is displayed Tap OK Data exported will be saved in the USB 3 11 2 USB Import Only data in the USB that was exported from one access controller can be imported into another access co...

Page 38: ...ve the update bin file in the root directory of the USB flash drive Make sure that the computer used to log in to the web is in the same LAN with the device Select USB USB Update The prompt Confirm to...

Page 39: ...mmunication between the access controller and the third party card reader might fail due to protocol discrepancy Security Module If the security module is enabled you need to purchase access control s...

Page 40: ...ess controller will restart automatically CGI Common Gateway Interface CGI offers a standard protocol for web servers to execute programs that execute like console applications running on a server tha...

Page 41: ...33 Parameter Description Clear all captured photos Tap the icon and you can delete all captured photos 3 12 2 Result Feedback You can select a result feedback mode as needed Mode 1 Mode 1...

Page 42: ...34 Mode 2 Mode 2 Mode 3 Mode 3...

Page 43: ...35 Mode 4 Mode 4 Record You can query all unlocking records...

Page 44: ...Test When you use the access controller for the first time or when the access controller malfunctioned you can use auto test function to check whether the access controller can work normally Do actio...

Page 45: ...you select Auto Test the access controller will guide you to do all the auto tests System Info You can view data capacity device version and firmware information of the access controller on the Syste...

Page 46: ...otherwise you might not log in to the web Make sure that the computer used to log in to the web is in the same LAN with the device Initialization Enter the new password confirm password enter an emai...

Page 47: ...her to select Auto Check or not It is recommended that Auto Check be selected to get the latest program in time Click Next Finished configuration Click Complete and the initialization is completed The...

Page 48: ...trator name is admin and the password is the login password after initializing the access controller Modify the administrator regularly and keep it properly for the sake of security If you forget the...

Page 49: ...you will get the security code At most two security codes will be generated by scanning the same QR code If security codes become invalid to get more security codes refresh the QR code You need to se...

Page 50: ...ew password The password should consist of 8 to 32 non blank characters and contain at least two types of characters among upper case lower case number and special character excluding Click OK and the...

Page 51: ...ult if fire link is enabled Alarm Output Enable The relay can output alarm information will be sent to the management platform if the Alarm Output is enabled Duration Sec The alarm duration and the ra...

Page 52: ...larm Linkage Alarm Log The Alarm Log interface is displayed Alarm log Select a time range and alarm type and then click Query The query results are displayed Query results Data Capacity You can see ho...

Page 53: ...and exposure on the Video Setting interface 4 6 1 Data Rate Data rate Table 4 2 Data rate parameter description Parameter Description Video Standard There are two options NTSC and PAL Select a standar...

Page 54: ...cessed per unit of time There are options 512Kbps 640Kbps 768Kbps 896Kbps 1024Kbps 1 25Mbps 1 5Mbps 1 75Mbps and 2Mbps 4 6 2 Image There are two channels and you need to configure parameters for each...

Page 55: ...C Highlight compensation is needed to compensate for overexposure of highlights or strong light sources like spotlights headlights porch lights etc to create an image that is usable and not overtaken...

Page 56: ...e If you select Customized Range you can customize the shutter value range Gain Value Range When the gain value range is set video quality will be improved Exposure Compensation You can increase video...

Page 57: ...he ability of each grid to sense motion The larger the value is the higher the sensitivity is Threshold is the condition of motion detection When grid number reaches the threshold motion detection wil...

Page 58: ...select Outdoor when the access controller is installed outdoors and select Other when the access controller is installed at places with backlights like corridors and hallways Image mode Face Detect Yo...

Page 59: ...ts people from unlocking by human face images or face models There are two options Enable and Close Fill Light Brightness Setting You can set fill light brightness Fill Light Mode Setting There are th...

Page 60: ...tection frame Click Remove All and you can remove all the frames you drew Detect Region Click Detect Region move your mouse and you can adjust the face detection region Click Remove All and you can re...

Page 61: ...during face recognition If the person is detected without wearing a mask the system will prompt mask reminder and passage is allowed Mask intercept Mask is detected during face recognition If the per...

Page 62: ...communications The link local address cannot be modified IP Address Enter IP address and then configure subnet mask and gateway address IP address and gateway address must be in the same network segm...

Page 63: ...evice ID Table 4 8 Auto register description Parameter Description Host IP Server IP address or server domain name Port Server port used for auto registeration Sub Device ID Access controller ID assig...

Page 64: ...omplete the setting Scan the QR code on your web interface to get the serial number of the access controller Date Setting You need to set time zone time DST and NTP for the access controller Only acce...

Page 65: ...T 2 Select Date or Week in Date Setting 3 Set Starting Time and Ending Time NTP Setting 1 Enable NTP Setting 2 Configure parameters Server Enter domain name of the NTP server The access controller tim...

Page 66: ...ct one or more than one of them The system service configuration done on the web page and the configuration on the Features interface of the access controller will be synchronized System service 4 10...

Page 67: ...4 11 1 Adding Users Click Add on the User Mgmt interface to add users and then enter username password confirmed password and remark Click OK to complete the user adding 4 11 2 Modifying User Informa...

Page 68: ...time The default reboot time is at 2 O clock in the morning on Tuesday Click Reboot Device the access controller will reboot immediately Click OK the access controller will reboot at 2 O clock in the...

Page 69: ...y importing or exporting configuration files Configuration management 4 13 2 Features Select result feedback mode as needed For details see 3 12 2 Result Feedback Features 4 13 3 Wiegand Serial Port S...

Page 70: ...also select Manual Check to upgrade the system manually Upgrade Version Information You can view information including MAC address serial number MCU version web version security baseline version and...

Page 71: ...e user System Log You can view and backup the system log on the System Log interface System log 4 17 1 Querying Logs Select a time range and its type click Query and logs meet the conditions will be d...

Page 72: ...g Enter Admin ID on the Admin Log interface click Query and then you will see the administrator s operation records Admin log Hover the mouse cursor over and then you can see detailed information of t...

Page 73: ...the Wiegand port Check whether the GND cable of access controller and the external controller are connected 4 Configurations cannot be made after the administrator and password are forgotten Delete ad...

Page 74: ...monitoring unit away from sources of thermal interference The factors such as sunlight wind cold air and air conditioning cold and warm air will affect the surface temperature of human body which wil...

Page 75: ...e device at least two meters away from light source and at least three meters away from windows or doors otherwise backlight and direct sunlight might influence face recognition performance of the dev...

Page 76: ...Appendix Figure 2 2 Appropriate face position Requirements of Faces Make sure that the face is clean and forehead is not covered by hair Do not wear glasses hats heavy beards or other face ornaments...

Page 77: ...h the management platform make sure that image resolution is within the range 150 300 600 1200 image pixels are more than 500 500 image size is less than 75 KB and image name and person ID are the sam...

Page 78: ...ommendations to improve your equipment network security 1 Physical Protection We suggest that you perform physical protection to equipment especially storage devices For example place the equipment in...

Page 79: ...up strong encryption passwords and authentication passwords SMTP Choose TLS to access mailbox server FTP Choose SFTP and set up strong passwords AP hotspot Choose WPA2 PSK encryption mode and set up...

Page 80: ...olated according to the actual network needs If there are no communication requirements between two sub networks it is suggested to use VLAN network GAP and other technologies to partition the network...

Reviews: