background image

Cybersecurity Recommendations    15 

 

The network should be partitioned and isolated according to the actual network needs. 

If  there  are  no  communication  requirements  between  two  sub  networks,  it  is 

suggested to use VLAN, network GAP and other technologies to partition the network, 

so as to achieve the network isolation effect. 

 

Establish the 802.1x access authentication system to reduce the risk of unauthorized 

access to private networks. 

Содержание ASI7223X-A-T1

Страница 1: ...Face Recognition Terminal Quick Start Guide V1 0 0...

Страница 2: ...egulations of related regions For detailed information see the paper manual CD ROM QR code or our official website If there is inconsistency between paper manual and the electronic version the electro...

Страница 3: ...f the terminal Operate the terminal within the rated range of power input and output Do not dissemble the terminal Transport use and store the terminal under the allowed humidity and temperature condi...

Страница 4: ...ns and Components 1 2 Installation 2 Installation Notes 2 2 1 Installation Drawings 3 2 2 Cable Connections 3 2 3 Installation 5 2 4 3 System Operation 6 Initialization 6 3 1 Adding New Users 6 3 2 4...

Страница 5: ...s and Components 1 1 Dimensions and Components Dimensions and components mm inch Figure 1 1 Table 1 1 Component description No Name 1 Dual camera 2 IR light 3 Phototransistor 4 White fill light 5 Disp...

Страница 6: ...be no less than 100Lux It is recommended that the device is installed indoors at least 3 meters away from windows and doors and 2 meters away from lights Avoid back light and direct sunlight Ambient...

Страница 7: ...the access control security module is enabled in Function Security Module If the security module is enabled you need to purchase access control security module separately The security module needs sep...

Страница 8: ...Installation 4 Cable connection Figure 2 5 Table 2 1 Component description No Name 1 USB port 2 Power port 3 Ethernet port...

Страница 9: ...ation Procedure Thread cable through the turnstile Step 1 Put the waterproof silica gel plug on the cable Step 2 Fix the terminal onto the turnstile with M5 screw Step 3 Connect cables for terminal Se...

Страница 10: ...ould consist of 8 to 32 non blank characters and contain at least two types of characters among upper case lower case number and special character excluding For terminal without touch screen initializ...

Страница 11: ...mes with at most 32 characters including numbers symbols and letters Face Make sure that your face is centered on the picture capturing frame and then a picture of your face will be automatically capt...

Страница 12: ...id User Level There are six levels General General users can unlock the door normally Blacklist When users in the blacklist unlock the door service personnel will get a prompt Guest Guests are allowed...

Страница 13: ...and the email is used to retrieve passwords Open IE web browser enter the IP address 192 168 1 108 by default of the terminal Step 1 in the address bar and then press Enter Login Figure 4 1 Enter the...

Страница 14: ...face clean Keep the device at least two meters away from light source and at least three meters away from windows or doors otherwise backlight direct sunlight might influence face recognition perform...

Страница 15: ...be influenced Appendix figure 1 2 Appropriate face position Requirements of Faces Make sure that the face is clean and forehead is not covered by hair Do not wear glasses hats heavy beards or other f...

Страница 16: ...rting face images through the management platform make sure that image resolution is within the range 150 300 600 1200 image pixels are more than 500 500 image size is less than 75 KB and image name a...

Страница 17: ...ed to enable the auto check for updates function to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client softwar...

Страница 18: ...llowing services SNMP Choose SNMP v3 and set up strong encryption passwords and authentication passwords SMTP Choose TLS to access mailbox server FTP Choose SFTP and set up strong passwords AP hotspot...

Страница 19: ...s If there are no communication requirements between two sub networks it is suggested to use VLAN network GAP and other technologies to partition the network so as to achieve the network isolation eff...

Отзывы: