background image

Figure 5-21 Batch issue cards

If you have requested Bluetooth cards for the user before, you can add the Bluetooth

cards through registration code. using registration codes.

Figure 5-22 The flowchart for requesting through registration code

a. On DMSS, tap Registration Code  of a Bluetooth card.

The registration code is automatically generated by DMSS.

b. Copy the registration code.

Quick Start Guide

47

Содержание ASC3202B

Страница 1: ...ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD V1 0 3 Access Controller Quick Start Guide...

Страница 2: ...ave time Provides additional information as a supplement to the text Revision History Version Revision Content Release Time V1 0 3 Updated adding users and configuring permissions June 2023 V1 0 2 Upd...

Страница 3: ...itten notice Product updates might result in some differences appearing between the actual product and the manual Please contact customer service for the latest program and supplementary documentation...

Страница 4: ...Controller Improper use of the battery might result in a fire or explosion Personnel working at heights must take all necessary measures to ensure personal safety including wearing a helmet and safet...

Страница 5: ...ler within the rated range of power input and output Use the Access Controller under allowed humidity and temperature conditions Do not drop or splash liquid onto the Access Controller and make sure t...

Страница 6: ...trikes with PoE 16 3 2 2 Wring of Dual Electric Strikes with 12 V External Power Supply 17 4 Installation 20 4 1 Wall Mount 20 4 2 DIN Rail Mount 22 5 Access Control Configurations 25 5 1 Networking D...

Страница 7: ...1 Dimensions and Appearance Figure 1 1 Dimensions mm inch Quick Start Guide 1...

Страница 8: ...Figure 1 2 Front view Table 1 1 Components description No Description 1 Guiding mark 2 Front panel 3 Screw Quick Start Guide 2...

Страница 9: ...Figure 1 3 Back cover Table 1 2 Back cover description No Description 1 Tamper alarm switch 2 Upper DIN clip 3 Lower DIN clip 4 Wiring outlet Quick Start Guide 3...

Страница 10: ...ader connector 2 READER2 Reader connector 3 AUX Auxiliary connector including door detector door exit button and alarm input 4 DC IN Power connector 5 ALM_OUT Alarm output connector 6 RJ45 Network con...

Страница 11: ...grounding wire CASE Connects the reader tampering alarm D1 Connects a Wiegand reader D0 LED1 Signal response Connects to the signal wire of the Wiegand reader RS485B Connects a RS 485 reader RS485A B...

Страница 12: ...lid yellow and green Lock open Figure 2 4 Auxiliary I O ports Table 2 4 Description of auxiliary I O ports Ports Description SR1 Door detector for door 1 REX1 Exit button for door 1 ALM1 Alarm input 1...

Страница 13: ...Power ports Table 2 5 Description of power ports Ports Description Grounding wire 12 VDC For powering the Access Controller when not using Power over Ethernet Figure 2 6 Alarm output ports Quick Star...

Страница 14: ...re 2 7 Relay ports Table 2 7 Description of relay ports Ports Description REL1 Connects to relay devices Max voltage 12 VDC Max load 500 mA Connect locks to the pins according to the wiring diagram ge...

Страница 15: ...n also be used to power external devices Connects to lock 12 VDC Max total load 1000 mA For controlling up to 12 V lock Connect locks and loads to the pins according to the wiring diagram generated th...

Страница 16: ...on 485A 485B Reserved port Not used GND Grounding wire Figure 2 10 Audio ports Table 2 10 Description of audio ports Ports Description MIC Reserved port Not used MIC Grounding wire SPK Reserved port N...

Страница 17: ...locked during power outages Fail Safe Sets the lock to unlock during power outages 3 1 Wiring of Magnetic Locks 3 1 1 Wring of Dual Magnetic Locks with PoE 12V and Relay Supplies power for the Access...

Страница 18: ...r for the Access Controller through 12 V external power supply One door uses the external power supply and the other uses the Access Controller to supply power 1 Select Relay Open Unlocked from the Re...

Страница 19: ...Wiring of locks 3 1 3 Wring of Dual Magnetic Locks with 12 V External Power Supply Relay Supply power for the Access Controller through 12 V external power supply Both doors use the external power sup...

Страница 20: ...3 7 Lock 1 door 1 2 Select Relay Open Unlocked from the Relay list for lock 2 door 2 Figure 3 8 Lock 2 door 2 3 Wiring the locks according to the diagram below Figure 3 9 Wiring of locks Quick Start G...

Страница 21: ...12 V external power supply Both doors use the external power supply 1 Select Relay Open Unlocked from the Relay for lock 1 door 1 Figure 3 10 Lock 1 door 1 2 Select Relay Open Unlocked from the Relay...

Страница 22: ...c Strikes with PoE Supplies power for the Access Controller over the same Ethernet cable Both doors use the external power supply 1 Select Fail Secure from the 12V list for lock 1 door 1 Figure 3 13 L...

Страница 23: ...3 15 Wiring of locks 3 2 2 Wring of Dual Electric Strikes with 12 V External Power Supply Supply power for the Access Controller through 12 V external power supply Both doors use the external power su...

Страница 24: ...Figure 3 16 Lock 1 door 1 2 Select Fail Secure from the 12V list for door 2 Figure 3 17 Lock 2 door 2 3 Wiring the locks according to the diagram below Quick Start Guide 18...

Страница 25: ...Figure 3 18 Wiring of locks Quick Start Guide 19...

Страница 26: ...wall at an appropriate position Step 2 Drill holes through the marks on the map Step 3 Hammer in the expansion tubes and then remove the map Figure 4 0 Hammer in the expansion tubes Step 4 Slide up th...

Страница 27: ...e Access Controller bind the wires with nylon cable ties and then cut off the excess part of the ties Step 7 Align the marks on the front panel with the marks on the back panel and then slide down the...

Страница 28: ...of the DIN rail slightly push upwards the back panel and then push the back panel backwards to hook the upper DIN clip onto the top of the DIN rail Make sure the clips grip the rail on both the top an...

Страница 29: ...IN clips to the rail Step 3 Slide up the front panel of the Access Controller to remove the cover Step 4 Wire the Access Controller bind the wires with nylon cable ties and then cut off the excessive...

Страница 30: ...the marks on the back panel and then slide down the front cover to attach it Figure 4 5 slide down the front cover Step 6 Screw a screw into the bottom of the Access Controller to secure it Step 7 Re...

Страница 31: ...eferred as the platform Sub controller needs to be added to the management platform of the main controller The main controller can manage up to 19 sub controllers Figure 5 0 Networking diagram 5 2 Con...

Страница 32: ...ep 3 Read the software license agreement and privacy policy carefully select I have read and agree to the terms of the Software License Agreement and Privacy Policy and then click Next Step 4 Set the...

Страница 33: ...e is admin and the password is the one you set during initialization We recommend you change the administrator password regularly to increase the security of the platform If you forget the administrat...

Страница 34: ...unlocks OSDP Connects to an OSDP reader RS 485 Connects to a RS 485 reader Exit Button Connects to an exit button Door Detector Connects to a door detector Power Supply of Locks 12 V The controller pr...

Страница 35: ...e combination method to And Step 7 Select the unlock methods and then configure the other parameters Figure 5 5 Unlock settings Table 5 2 Unlock settings description Parameter Description Unlock Metho...

Страница 36: ...ion Duress Alarm An alarm will be triggered when a duress card duress password or duress fingerprint is used to unlock the door Door Detector Select the type of door detector Intrusion Alarm When the...

Страница 37: ...Config Hardware to change the settings after you successfully log in to the platform Click Download Image to download the diagram to your computer Related Operations If you want to change the settings...

Страница 38: ...e Step 1 On the home page click Device Management and then click Add Step 2 Enter the device information Figure 5 8 Device information Table 5 4 Device parameters Description Parameter Description Dev...

Страница 39: ...e below operations Go to the webpage of the sub controller Log out of the device Delete the device 5 2 4 2 Adding Devices in Batches We recommend you use the auto search function when you add sub cont...

Страница 40: ...Enter basic information for users and set verification methods to verify their identities Related Operations Export all the users to Excel On the Person Management page click Export to export all use...

Страница 41: ...user type with manager role has the highest authority and it is not limited by advanced access rules such as first card unlock multi person unlock anti passback always closed door and unlock methods...

Страница 42: ...p for DMSS To Set a date on which the access permissions of the person will expire User Name The name of the user User Type The type of user General User General users can unlock the door VIP User Whe...

Страница 43: ...ser template b Enter user information in the template and then save it c Click Import and upload the template to the Platform The users are added to the Platform automatically Use Quick Add to easily...

Страница 44: ...d Issue cards to the users in batches You can manually enter the card number or use the enrollment reader or card reader to read the card number For details see 5 2 5 4 2 Adding Cards Related Operati...

Страница 45: ...he door through authentication Each user can have up to 1 password 5 IC ID cards 3 fingerprints and 5 Bluetooth cards 5 2 5 4 1 Adding Passwords Add passwords to users for them to gain access by enter...

Страница 46: ...ails see Click Add Click Modify and then select Enrollment Reader Make sure that the card enrollment reader is connected to your computer Follow the on screen instructions to download and install the...

Страница 47: ...der is connected to your computer c Follow the on screen instructions to download and install the plug in d Click Read Card and then swipe the cards on the enrollment reader A 60 second countdown is d...

Страница 48: ...remind you to swipe the card and the system will read the card number automatically If the 60 second countdown expires click Read Card again to start a new countdown c Click Add Add cards in batches...

Страница 49: ...e card Set the card to duress card An alarm is triggered when people use the duress card to unlock the door Delete the card 5 2 5 4 3 Adding Fingerprints Add fingerprints to users for them to use thei...

Страница 50: ...he Access Controller For details see 5 2 5 3 Configuring Basic User Information General users such as company employees have installed and signed up for DMSS with their email The email that users use...

Страница 51: ...Figure 5 19 Flowchart for configuring Bluetooth unlock Procedure Step 1 On the tab click Bluetooth Card 3 methods are available to add Bluetooth cards Quick Start Guide 45...

Страница 52: ...ugh Email Issue Bluetooth cards to all the users on the list Click Issue Cards to All Users Issue Bluetooth cards to selected users Select users and then click Issue Cards to Selected Users b Click Bl...

Страница 53: ...d the Bluetooth cards through registration code using registration codes Figure 5 22 The flowchart for requesting through registration code a On DMSS tap Registration Code of a Bluetooth card The regi...

Страница 54: ...ls see the user s manual of DMSS Auto Unlock The door automatically unlocks when you are in the defined Bluetooth range which allows the Bluetooth card to transmit signals to the card reader In auto u...

Страница 55: ...multiple Bluetooth cards have been added you can move cards to the top that are currently in use Rename Rename the Bluetooth card Delete Delete the Bluetooth card Export users that lack emails Click E...

Страница 56: ...sers Request Again Request again for failed users 5 2 6 Adding Weekly Plans The weekly plan is used to set the unlock schedule for the week The platform offers a default template with a full daytime s...

Страница 57: ...configure up to 4 time sections for each day Step 4 Click Apply 5 2 7 Adding Areas An area is a collection of door access permissions Create an area and then link users to the area so that they can g...

Страница 58: ...l allow authorized personnel to gain access to secure areas Procedure Step 1 On the home page select Access Control Config Permission Settings Step 2 Click to add a permission rule Figure 5 28 Assign...

Страница 59: ...ew person or change access permissions for an existing person you can simply add the user in a existing department or link them with a existing role they will be automatically assigned access permissi...

Страница 60: ...Config Authorization Progress Step 2 View the authorization progress Sync SubControl Person Sync personnel on the main controller to the sub controller Sync Local Person Sync personnel on the managem...

Страница 61: ...ed to the factory defaults we recommended you restore the sub controller to factory defaults at the same time Step 2 Configure the alarm output a Select an alarm input from the alarm input channel lis...

Страница 62: ...Click Apply You can click Copy to to apply the pre configured alarm linkages to other alarm input channels 5 2 11 Configuring Cloud Service Add the Main Controller to DMSS before you request Bluetooth...

Страница 63: ...loud Service Step 2 Turn on the cloud service function The cloud service function is turned on by default Figure 5 35 Cloud service Step 3 Click Apply Step 4 Download DMSS and sign up with Email scan...

Страница 64: ...troller when you log in to the webpage for the first time or after the sub controller is restored to its factory default settings For details on how to initialize the sub controller see 5 2 2 Initiali...

Страница 65: ...nt software Nice to have recommendations to improve your device network security 1 Physical Protection We suggest that you perform physical protection to device especially storage devices For example...

Страница 66: ...users regularly to see if the device is logged in without authorization Check device log By viewing the logs you can know the IP addresses that were used to log in to your devices and their key opera...

Страница 67: ......

Отзывы: