background image

 

5 Updating the System 

5.1 Updating through SmartPSS Lite 

Prerequisites 

  The Card Reader was added to the access controller through RS-485 wires. 

  The access controller and Card Reader are powered on. 

Procedure 

Step 1 

Install and log in to SmartPSS Lite, and then select 

Device Manager

Step 2 

Click  . 

Figure 5-1 Select the access controller 

 

Step 3 

Click 

  and    to select the update file. 

Step 4 

Click 

Upgrade. 

 

The indicator of the Card Reader flashes blue until the update is completed, and then the 
Card Reader automatically restarts. 

5.2 Updating through Config Tool 

Prerequisites 

  The Card Reader was added to the access controller through RS-485 wires. 

  The access controller and Card Reader are powered on. 

Procedure 

Step 1 

Install and open the Configtool, and then select 

Device upgrade

Step 2 

Click 

  of an access controller, and then click 

Step 3 

Click 

Upgrade

The indicator of the Card Reader flashes blue until update is completed, and then the Card 
Reader automatically restarts. 

Содержание ASR2101H-D

Страница 1: ...Access Reader User s Manual V1 0 0...

Страница 2: ...roller you might collect the personal data of others such as their face fingerprints and license plate number You need to be in compliance with your local privacy protection laws and regulations to pr...

Страница 3: ...there is any doubt or dispute we reserve the right of final explanation Upgrade the reader software or try other mainstream reader software if the manual in PDF format cannot be opened All trademarks...

Страница 4: ...sion Personnel working at heights must take all necessary measures to ensure personal safety including wearing a helmet and safety belts Do not place the Card Reader in a place exposed to sunlight or...

Страница 5: ...Reader under allowed humidity and temperature conditions Do not drop or splash liquid onto the Card Reader and make sure that there is no object filled with liquid on the Card Reader to prevent liquid...

Страница 6: ...ensions 1 2 Wiring and Installation 2 2 1 Ports Overview 2 2 2 Wiring Requirements 2 2 3 Wiring 3 2 4 Installation Procedure 4 3 Unlocking the Door 7 4 Light and Voice Prompt 8 5 Updating the System 9...

Страница 7: ...requires a swipe of a credential card to verify the person entering the room space is cleared It is suitable for a wide variety of scenes such as office buildings schools compounds communities factor...

Страница 8: ...A 2 2 Wiring Requirements Connect the card reader to the Wiegand ports or the RS 485 ports according to the type of the card reader Select proper wires according to the requirements on wires Table 2 2...

Страница 9: ...3 2 3 Wiring Figure 2 1 Wiring of Wiegand card reader...

Страница 10: ...mizable For Wiegand card reader with keypad tap 0034 to switch to the Wiegand 34 format and tap 0026 to switch to the Wiegand 26 format Figure 2 2 Wiring of RS 485 card reader 2 4 Installation Procedu...

Страница 11: ...2 Put 3 expansion bolts into the holes Figure 2 3 Drill holes unit mm inch Step 3 Pass the wires of the Card Reader through the slot of the bracket Step 4 Use 3 screws to fix the bracket on the wall...

Страница 12: ...6 Figure 2 4 Drill holes unit mm inch...

Страница 13: ...nlock the door through user password Enter the user ID and tap and then enter the user password and tap Unlock the door through card password Swipe card enter the password and then tap If the password...

Страница 14: ...d lasts for 15 seconds Swipe the authenticated card RS 485 communication Beeps once and the indicator lights green Swipe the unauthenticated card RS 485 communication Beeps 4 times and the indicator l...

Страница 15: ...Click Upgrade The indicator of the Card Reader flashes blue until the update is completed and then the Card Reader automatically restarts 5 2 Updating through Config Tool Prerequisites The Card Reade...

Страница 16: ...room and cabinet and implement well done access control permission and key management to prevent unauthorized personnel from carrying out physical contacts such as damaging hardware unauthorized conn...

Страница 17: ...we suggest that you check online users regularly to see if the device is logged in without authorization Check equipment log By viewing the logs you can know the IP addresses that were used to log in...

Отзывы: