background image

Figure 1-7 Power On

5. Connect the Ethernet cable to an internet outlet. While the

device is added to a Hik-Connect account, the Link indicator

turns green.

Figure 1-8 Connect to the Ethernet

6. Secure the rear cover to the installation position with the

supplied screws. Attach the control panel on the rear cover,

and tighten the rear cover screw to complete the installation.

Figure 1-9 Complete the Installation

Note

• Blue Star: Side Opening. If you need to route the cable

though the botton of the panel, remove the sheet of the

side opening.

• Red Star: TAMPER Screw. It is compulsory to secure the

TAMPER screw.

1.5 Activation

In order to protect personal security and privacy and improve the

network security level, you should activate the device the first

time you connect the device to a network.
You can create an activation password to protect your device

from logging in by other persons.

1.5.1 Activate Device via Web Browser

Use web browser to activate the device. Use SADP software or PC

client to search the online device to get the IP address of the

device, and activate the device on the web page.
Before You Start

Make sure your device and your PC connect to the same LAN.

7

Summary of Contents for AX DS-PW32-H Series

Page 1: ...AX Security Control Panel User Manual UD11739B...

Page 2: ...DING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE REGARDING THIS MANUAL HIKVISION DOES NOT WARRANT GUARANTEE OR MAKE ANY REPRESENTATIONS REGARDING...

Page 3: ...tuation which if not avoided will or could result in death or serious injury Caution Indicates a potentially hazardous situation which if not avoided could result in equipment damage data loss perform...

Page 4: ...municipal waste in the European Union For proper recycling return this product to your local supplier upon the purchase of equivalent new equipment or dispose of it at designated collection points Fo...

Page 5: ...MS 4200 8 1 5 3 Activate via SADP 9 1 6 Configuration 10 1 6 1 Use the Client Software 10 1 6 2 Use the Web Client 10 1 6 3 Configuration via Mobile Client 32 1 7 Input Types 38 1 8 Output Types 41 1...

Page 6: ...1 5 Failed to Add Device on APP 84 A 1 6 Alarm Information is Not Reported to APP 4200 Alarm Center 84 A 2 Mutual Exclusion of Functions 85 A 2 1 Unable to Enter Registration Mode 85 A 2 2 Unable to...

Page 7: ...A 6 1 Failed to Send Test Mail 86 A 6 2 Failed to Send Mail during Use 86 A 6 3 Failed to Send Mails to Gmail 86 A 6 4 Failed to Send Mails to QQ or Foxmail 86 A 6 5 Failed to Send Mails to Yahoo 86 A...

Page 8: ...ll when it is triggered in disarming status Voice prompt Wi Fi settings in AP mode Configuration via Web client or mobile client Pushes alarm notification via messages or phone calls Note Only device...

Page 9: ...and audio notification via phone call Wi Fi Standard 802 11b g n Encryption Supported Channel 2 4 G Application Protocol Application iVMS 4200 and mobile APP Protocol SIA Contact ID User IC Card 12 Us...

Page 10: ...quirement 3 Link Solid Green The panel is bound to Hik connect account Off The panel is not bound to Hik connect account 4 Arm Disarm Solid Blue for 5 s Armed Note You can set the arming indicator con...

Page 11: ...the device 7 TAMPER 8 Reset Button 9 AP STA Switch 10 Battery Connector 11 Network Interface 12 Power Interface Function Button The function button is on the side of the control panel Figure 1 3 Funct...

Page 12: ...s the function button on the side of the control panel once and trigger a peripheral device Connect via Client Software Add a control panel to the client software In the client software click Device M...

Page 13: ...e screw on the rear cover Slide down the rear cover and remove it from the control panel Figure 1 4 Remove the Rear Cover 2 Insert a SIM card into the SIM card slot Figure 1 5 Insert SIM Card 3 Connec...

Page 14: ...of the panel remove the sheet of the side opening Red Star TAMPER Screw It is compulsory to secure the TAMPER screw 1 5 Activation In order to protect personal security and privacy and improve the net...

Page 15: ...dress 3 Save the settings 1 5 2 Activate Device via iVMS 4200 is a PC client to manage and operate your devices Security control panel activation is supported by the software Before You Start Get the...

Page 16: ...y its IP address For batch activation and IP addresses modification refer to User Manual of SADP for details Steps 1 Run the SADP software and search the online devices 2 Find and select your device i...

Page 17: ...Client Steps 1 Connect the device to the Ethernet 2 Search the device IP address via the client software and the SADP software 3 Enter the searched IP address in the address bar Note When using mobil...

Page 18: ...80 which is not editable 5 Optional Set correct DNS server address if the device needs to visit Hik Connect server via a domain name 6 Click Save Wi Fi You can set the Wi Fi parameters if there are se...

Page 19: ...can upload alarm notifications to the alarm center Before You Start Insert a SIM card into the device SIM card slot Steps 1 Click Communication Parameters Cellular Data Network Parameters to enter th...

Page 20: ...network via wired connection dial up connection or Wi Fi connection Set the device IP address subnet mask gateway and DNS server in the LAN Steps 1 Click Communication Parameters Hik Connect Registra...

Page 21: ...lular data network only 5 Optional Change the authentication password Note By default the authentication password is displayed in the text box The authentication password should contain 6 to 12 letter...

Page 22: ...ter is selected as 2 3 Select the Protocol Type as ADM CID EHome SIA DCS SIA DCS or ADM CID to set uploading mode ADM CID or SIA DCS You should select the Alarm Receiver Type as IP or Domain name and...

Page 23: ...alarm is triggered System Status Notification The device will push notifications when any status in the system is changed Operation Event Notification The device will push notifications when the user...

Page 24: ...gurable interval between alarm and siren output which allows you to check the alarm and cancel the siren output during the interval time in case of false alarm It is usually used in the perimeter area...

Page 25: ...actual zone to set the function 6 Enable Link Wireless Detector input the serial No and set the linked camera No Note 868 Devices do not support inputting serial No 7 Click OK Note After setting the...

Page 26: ...ming start time The zone will be disarmed according to the configured time Note The auto arming time and the auto disarming time cannot be the same Late to Disarm Enable the function and set the time...

Page 27: ...ge 2 Add a wireless output module 1 Click Wireless Output Module Figure 1 20 Wireless Output Module Settings 2 Select a wireless output module number from the drop down list 3 Input the serial No of t...

Page 28: ...reless Device Siren to enter the Siren page Figure 1 22 Siren Page 2 Click to enter the Siren Settings page 3 Set the siren name and the volume Note The available siren volume range is from 0 to 3 4 O...

Page 29: ...n also receive and view the event video via client and Email Add Cameras to the Security Control Panel Steps 1 Click System Network Camera to enter the network camera management page Figure 1 25 Netwo...

Page 30: ...to the configured email Steps 1 Click Communication Parameters Event Video Transfer via Email to enter the page Figure 1 28 Event Video Transfer via Email 2 Click the block to enable the function 3 E...

Page 31: ...n the SMS video Bitrate Type Select the Bitrate type as constant or variable Resolution Select the resolution of the video output Video Bitrate The higher value corresponds to the higher video quality...

Page 32: ...r in the Enable User column to allow the enabled user operating the device 8 Optional Select an user and click Edit and you can edit the user s information and permission 9 Optional Delete a single us...

Page 33: ...nd you can control the security control panel via the keyfob You can also edit the keyfob information or delete the keyfob from the security control panel Steps 1 Click User Management Keyfob to enter...

Page 34: ...aintenance Diagnosis 2 Select system alarm wireless device Wi Fi or cloud platform as the diagnosis module 3 Click Diagnosis to start the operation 4 View the diagnosis result in the information box S...

Page 35: ...ion is enabled when battery is disconnected or out of charge the device will not upload events System Volume The available system volume range is from 0 to 10 Time Settings You can set the device time...

Page 36: ...ed Duration Set the locking duration when the card reader is locked After the configured duration the card reader will be unlocked 3 Click Save Locking User Settings Set user locking You can view the...

Page 37: ...PC and click Import Configuration File to import configuration parameters to the device Export Parameters Click Export Configuration File to export the device configuration parameters to the PC Upgra...

Page 38: ...s in the fault checklist during the arming procedure Enable Arming with Fault Check the faults in the Enable Arming with Fault list and the device will not stop the arming procedure when faults occurr...

Page 39: ...and Login the Mobile Client Download the Hik Connect mobile client from Google Play for Android or App store for iOS and login the client before operating the security control panel Steps 1 Search an...

Page 40: ...ce Verification Code The verification code is normally printed on the device label 5 Return to the mobile client and create a device password for device activation Note We highly recommend you to crea...

Page 41: ...ser manual of the wireless device 1 Tap to enter the Scan QR Code page 2 Scan the peripheral s QR code to add the peripheral 3 Select a peripheral type and create a name for the peripheral Note When t...

Page 42: ...stay or away status Chime Enable the function and the zone will be start audible alarm when it is triggered Enable Silent Zone Enable the function and no siren will be triggered if an event or alarm o...

Page 43: ...cular zone automatically Tap a security control panel to enter the control page and tap or to enter the Settings page Enable the auto arm disarm function and set the auto arm time auto disarm time You...

Page 44: ...card is displayed in the Card Tag Management page Add Keyfob You can add keyfobs to the control panel and control partition arming disarming status You can also clear alarm when an alarm is triggered...

Page 45: ...interval Voice Prompt Zone X perimeter alarm Delayed Zone The system provides you time to leave through or enter the defense area without alarm Audible Response Trigger the system sound and siren Voic...

Page 46: ...alarm Timeout Zone The zone activates all the time It alarms when the event you defined does happen throughout a configurable period Audible Response Trigger the system sound and siren Voice Prompt Zo...

Page 47: ...armed Arm When aremed Voice prompt for fault You can handle the fault according to the voice prompt System sound for arming with card or keyfob Voice prompt for fault You can handle the fault accordi...

Page 48: ...ing Disarm the control panel after the configured output delay Alarm When alarm event occurs The alarm output will be actived after the configured exit enter delay after the configured output delay di...

Page 49: ...Event Types Evnet Types Custo m Default 1 client softwa re notific ation Default 2 alarm receivi ng center 1 2 Default 3 mobil e client Default 4 teleph one Alarm and Tamper Life Safety Event System S...

Page 50: ...Verification Code No Yesd Yesd Yesd Adding Editing Level 2 User and Verification Code No Yes Yes No Adding Editing Configuration Data No No Yes No Replacing software and firmware No No No Yes Note a B...

Page 51: ...ssed the user level 3 can login the controller without the permission assignment of the user level 2 The user level 4 can login the controller only when the user level 2 or level 3 has assigned permis...

Page 52: ...BH 3780 Timeout Alarm Restored PA 1120 Panic Alarm PH 3120 Panic Alarm Restored BA 1131 Perimeter Alarm BH 3131 Perimeter Alarm Restored BA 1134 Entry Exit Alarm BH 3134 Entry Exit Alarm Restored TA 1...

Page 53: ...d GA 1151 Gas Leakage Alarm GH 3151 Gas Leakage Alarm Restored FA 1110 Fire Alarm FH 3110 Fire Alarm Restored OP 1401 Disarming CL 3401 Away Arming OA 1403 Auto Disarming CA 3403 Auto Arming BC 1406 A...

Page 54: ...eypad Unlocked 1607 Test Mode Entered 3607 Test Mode Exited 1305 Control Panel Reset RN 1305 Control Panel Reset UY 1321 Wireless Siren Disconnected UJ 3321 Wireless Siren Connected UY 1381 Wireless D...

Page 55: ...52 SIM Card Exception NR 3352 SIM Card Restored NT 1352 Network Flow Exceeded NT 1352 IP Address Conflicted NR 3352 Normal IP address NT 1352 Wired Network Exception NR 3352 Normal Wired Network YX 13...

Page 56: ...s and 2 sirens Supports up to 13 network users including 1 installer 1 administrator 1 manufacturer and 10 normal users Supports doorbell function The detector rings like a doorbell when it is trigger...

Page 57: ...you will need to choose whether to arm the system with fault While the system is armed the control panel will prompt the result in 5s and upload the arming report Figure 2 1 Arming Process Access leve...

Page 58: ...e entry exit route The system will report the disarming result after the operation completed Entry Delay Duration Set the entry delay duration within 45s to compliant the EN requirement Early Aalrm If...

Page 59: ...Operation failed The keyfob has no arming permission Yellow LED Flashes 4 Times Fault Checking Finished No Voice Prompt Yellow LED Flashes 4 Times Alarm Cleared Alarm cleared Green LED Flashes Once N...

Page 60: ...with the Enrolled Card No Voice Prompt Disarming with Enrolled Card Disarmed No Disarming Permission for the Enrolled Card No Voice Prompt Unenrolled Card Operation Invalid access 2 2 5 Use Mobile Cl...

Page 61: ...ster a new account if it is the first time you use the Hik Connect mobile client Note For details see User Manual of Hik Connect Mobile Client 3 Run and login the client Add Control Panel to the Mobil...

Page 62: ...a minimum of 8 characters including at least three kinds of following categories upper case letters lower case letters numbers and special characters in order to increase the security of your product...

Page 63: ...You can add keyfobs to the control panel and control partition arming disarming status You can also clear alarm when an alarm is triggered Steps Note Make sure the keyfob s frequency is the same as th...

Page 64: ...when an alarm is triggered Figure 2 4 Control Panel Management Page Bypass Zone When the partition is armed you can bypass a particular zone as you desired Before You Start Link a detector to the zone...

Page 65: ...ers as you desired Zone Type Select a zone type from the zone type list You can tap to view each zones definition Zone Bypass Enable the function and the zone will be bypassed No alarm will be receive...

Page 66: ...the mobile client View Zone Status In the Partition page tap Zone to enter the Zone tab You can view the each zone s status in the list Communication Mode Tap to enter the control panel settings page...

Page 67: ...to the Zone You can link a camera to the zone to monitor the zone You can view the alarm videos when an alarm is triggered Before You Start Make sure you have installed the camera in the target zone a...

Page 68: ...ce are the activation user name and password 3 Click Remote Configuration to enter the device configuration page after the device is completely added Accessing the Operation Page Control partitions an...

Page 69: ...ontrol the selected partition related zones such as arming disarming bypass or bypass restoring Figure 2 13 Zone Operation 2 2 7 Use the Web Client Steps 1 Connect the device to the Ethernet 2 Search...

Page 70: ...gement page Figure 2 14 Card Management 2 Click Add and place a card on the card swiping area 3 Customize a name for the card in the pop up window 4 Click OK and the card information will be displayed...

Page 71: ...ions 4 Click OK 5 Optional Click to edit the keyfob information 6 Optional Delete a single keyfob or check multiple keyfobs and click Delete to delete the keyfobs in batch Add Edit Delete User Adminis...

Page 72: ...device 8 Optional Select an user and click Edit and you can edit the user s information and permission 9 Optional Delete a single user or check multiple users and click Delete to delete users in batch...

Page 73: ...hat runs the software should be in the same subnet Steps 1 Run the client software 2 Enter Device Management or Online Device 3 Check the device status from the device list and select an inactive devi...

Page 74: ...ng upper case letters lower case letters numbers and special characters in order to increase the security of your product And we recommend you reset your password regularly especially in the high secu...

Page 75: ...word monthly or weekly can better protect your product 3 Click OK to complete activation 4 Edit IP address of the device 1 Enter IP address modification page Configuration Network TCP IP 2 Change IP a...

Page 76: ...Fi parameters if there are secure and credible Wi Fi networks nearby Steps 1 Click Communication Parameters Wi Fi Parameters 2 Click Wi Fi to enter the Wi Fi page Figure 2 19 Wi Fi Settings Page 3 Co...

Page 77: ...2 21 Cellular Data Network Settings Page 2 Enable Wireless Dial 3 Set the cellular data network parameters Access Number Input the operator dialing number User Name Ask the network carrier and input t...

Page 78: ...tus that in the Hik Connect server 3 Enable Custom Server Address The server address is displayed in the Server Address text box 4 Select a communication mode from the drop down list according to the...

Page 79: ...igured alarm center Steps 1 Click Communication Parameters Alarm Receiving Center to enter the Alarm Receiving Center page Figure 2 23 Alarm Receiving Center Parameters 2 Select the Alarm Receiver Cen...

Page 80: ...otification The device will push notifications when the zone alarm is triggered or the device tamper alarm is triggered or restored Safety Event Notification The device will push notifications when fi...

Page 81: ...ed time duration in System Schedule Timer Follow Zone The zone acts as delayed zone when it detects triggering event during system Entry Delay while it acts as instant zone otherwise It is usually set...

Page 82: ...hroughout a configurable period It is usually used in places equipped with magnetic contacts e g fire hydrant box s door Shield Zone Alarms will not be activated when the zone is triggered or tampered...

Page 83: ...600 s 3 Optional Set the following parameters according to actual needs Auto Arming Enable the function and set the arming start time The zone will be armed according to the configured time Note The...

Page 84: ...the delayed time for the zone Note The available time duration range is from 0 s to 600 s Alarm Duration Set the time duration of the alarm Note The available time duration range is from 5 s to 600 s...

Page 85: ...ion will be displayed in the Link Wireless Output Module area 5 Click OK Note After the relay is configured you can click Status Relay to view the output status Siren If you want to link the security...

Page 86: ...ameters Figure 2 31 Repeater Settings 3 Edit the repeater s name 4 Enable Link Wireless Repeater and input the repeater serial No 5 Click OK Note After setting the repeater you can enter Status Repeat...

Page 87: ...torDeleteto edit or delete the selected camera Link a Camera with the Zone Steps 1 Click Wireless Device Zone to enter the configuration page Figure 2 33 Zone Management 2 Select a zone needs video mo...

Page 88: ...used in recording and HD preview it has a high resolution code rate and picture quality Sub Stream It is used to transmit network and preview pictures as a video streaming with features of lower resol...

Page 89: ...nize the device time with the computer time DST Management Click System Device Time DST Management to enter the Time Management page Figure 2 38 DST Management You can enable the DST and set the DST b...

Page 90: ...Select a major type and a minor type from the drop down list set the log start time and end time and click Filter All filtered log information will be displayed in the list You can also click Reset t...

Page 91: ...Hik connect is offline Solution Network configuration of the panel is error unable to access extranet A 1 4 Network Camera Drops off Frequently Fault Description System reports multiple event logs of...

Page 92: ...ck whether the detector reports undervoltage Replace the detector battery A 3 2 Zone Tamper proof Fault Description View status of zones which displays tamper proof Solution Recovery detector tamper p...

Page 93: ...Send Mails to Gmail Fault Description The receiver s mailbox is gmail Click Test Inbox and prompt test fails 1 Google prevents users from accessing gmail using apps devices that do not meet their sec...

Page 94: ...TARTTLS TLS Hotmail smtp office 365 com 587 STARTTLS TLS QQ smtp qq co m 587 STARTTLS TLSv1 2 Yahoo smtp mail y ahoo com 587 STARTTLS TLSv1 2 126 smtp 126 com 465 SSL TLS Sina smtp sina c om 25 465 58...

Reviews: