background image

 

15

 

 

No.

 

Scenario

 

No.

 

Scenario

 

No.

 

Scenario

 

Railway station 

33 

Gold and silver 

jewelry 

57 

Courtroom 

10 

Bus station 

34 

Electroplating plant 

58 

Food factory 

11 

Wharf 

35 

Die casting 

59 

Bank. 

12 

Reeducation-through-

labor center 

36 

Precious metal 

60 

Vault 

13 

Printing plant 

37 

Communication room 

61 

Convention and 

Exhibition Center 

14 

Metals factory 

38 

Meeting room 

62 

Subway station 

15 

Electronics factory 

39 

VIP room 

63 

Villa 

16 

Precision instrument 

factory 

40 

Office 

64 

Community 

17 

Industry mine 

41 

Rescue station 

65 

Opera house 

18 

Oil depot 

42 

Club 

66 

Cinema 

19 

Research and 

development center 

43 

Library 

67 

School 

20 

Archives office 

44 

Radio and television 

station 

68 

Laboratory 

21 

Museum 

45 

Hospital 

69 

Detention house 

22 

Safe room 

46 

Weather stations 

70 

Asylum 

23 

Gym 

47 

Radar station 

71 

Gallery 

24 

Venue 

48 

Troops base 

72 

Amusement park 

Summary of Contents for ISC-D218

Page 1: ...Walk through Metal Detector Quick Start Guide V1 0 0...

Page 2: ...result in property damage data loss lower performance or unpredictable result TIPS Provides methods to help you solve a problem or save you time NOTE Provides additional information as the emphasis an...

Page 3: ...tual product and the manual Please contact the customer service for the latest program and supplementary documentation There still might be deviation in technical data functions and operations descrip...

Page 4: ...not disassemble the Device Transport use and store the Device under the allowed humidity and temperature conditions Electrical Safety Use the battery of specified manufacturer otherwise there might re...

Page 5: ...ecking List 3 2 1 Structure 3 2 2 Installation Environment 4 2 3 Installing the Device 5 2 4 3 Configuration 9 ISC D206 9 3 1 3 1 1 Configuration Panel 9 3 1 2 Basic Operations 10 3 1 3 Configuring Fu...

Page 6: ...to use it The Device can be widely used in sports meetings conferences schools and other occasions It adopts electromagnetic field to detect carry on metal articles and uses sound and light alarm to i...

Page 7: ...regnant women floppy disks film and videotapes Application Scenario 1 4 The Device is used to detect the metal items carried by the person going through the detection door Typical application scenario...

Page 8: ...ales service personnel Table 2 1 Checking list Order List Description 1 Overall packaging Appearance Obvious damage Packaging Accidental impact Accessories list of accessories on warranty card Complet...

Page 9: ...ance The actual installation distance depends on the installation site conditions Keep away from moving metal objects Large moving metal objects should be kept 0 5 m to 2 m away from the detection doo...

Page 10: ...her the package is complete and open the box Step 1 Open the box Figure 2 2 Take out the left and right door panels from the box Step 2 Take out door panels Figure 2 3 Take out the manual beam host bo...

Page 11: ...wer supply Figure 2 4 Follow the previous figure to prepare the door panels beams host box and bolts Step 4 Prepare the parts and the tools Figure 2 5 Install the beams and the host box Step 5 Install...

Page 12: ...box to the left and right door panels Step 6 Connect the detection wire Figure 2 7 Stand the Device up Step 7 Stand the Device up Figure 2 8 Connect the power supply to the Device and then turn on the...

Page 13: ...8 Start the Device Figure 2 9...

Page 14: ...tion Panel Single zone panel ISC D206 Figure 3 1 Single zone panel description ISC D206 Figure 3 2 No Name Four in one digital tube Four in one digital tube Working indicator light Save and exit Progr...

Page 15: ...ws 0000 0000 press Program and then the screen shows P 0000 enter the password press to change the value of the corresponding bit 0 to 9 in cycle press To change the bit press If the password is corre...

Page 16: ...ogram to save when finishing each configuration Function configuration Figure 3 6 Table 3 1 Function description No Function description Number of passes Number of alarms Function configuration Parame...

Page 17: ...s available for Zone 3 0 200 200 levels available for Zone 4 0 200 200 levels available for Zone 5 Configure the duration of the alarm sound 1 3 3 levels available Configure alarm volume 0 2 2 levels...

Page 18: ...it 0 to 9 in cycle Press to change the bit If the password is wrong you get the prompt C333 Press and enter the password again Only when the password is correct can you press to enter the parameter ad...

Page 19: ...available for Detector 5 Configure alarm volume 0 99 100 levels available Configure alarm tone 0 99 100 levels available Configure the duration of the alarm sound 0 99 100 levels available Configure s...

Page 20: ...nter 14 Metals factory 38 Meeting room 62 Subway station 15 Electronics factory 39 VIP room 63 Villa 16 Precision instrument factory 40 Office 64 Community 17 Industry mine 41 Rescue station 65 Opera...

Page 21: ...or code Figure 4 1 Table 4 1 Error code description Code Description E R R Error 1 L Detector 1 on the left door 2 L Detector 2 on the left door 1 R Detector 1 on the right door 2 R Detector 2 on the...

Page 22: ...ed on 1 Check whether the power cable between the host box and the detection door and the door 220V AC power cord are well connected 2 Check the power adapter for breakage or poor contact and whether...

Page 23: ...ration False alarm Automatic alarms occur when no one goes through the machine 1 Check whether the environment around the detection door affects the detection door and try to change the frequency 2 Fa...

Page 24: ...s function to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice to have recommendations to impr...

Page 25: ...TLS to access mailbox server FTP Choose SFTP and set up strong passwords AP hotspot Choose WPA2 PSK encryption mode and set up strong passwords 11 Audio and Video Encrypted Transmission If your audio...

Page 26: ...achieve the network isolation effect Establish the 802 1x access authentication system to reduce the risk of unauthorized access to private networks It is recommended that you enable your device s fir...

Reviews: