background image

 

Access Control Extension Module 

User's Manual 

   

 

V1.0.1 

Содержание DEE1010B-S2

Страница 1: ...Access Control Extension Module User s Manual V1 0 1...

Страница 2: ...ht collect the personal data of others such as their face fingerprints and license plate number You need to be in compliance with your local privacy protection laws and regulations to protect the legi...

Страница 3: ...right of final explanation Upgrade the reader software or try other mainstream reader software if the manual in PDF format cannot be opened All trademarks registered trademarks and company names in th...

Страница 4: ...e all necessary measures to ensure personal safety including wearing a helmet and safety belts Do not place the Extension Module in a place exposed to sunlight or near heat sources Keep the Extension...

Страница 5: ...ure conditions Do not drop or splash liquid onto the Extension Module and make sure that there is no object filled with liquid on the Extension Module to prevent liquid from flowing into it Do not dis...

Страница 6: ...nts Foreword I Important Safeguards and Warnings III 1 Product Introduction 1 1 1 Product Overview 1 1 2 Networking Diagram 1 2 Ports Description 2 3 FAQ 3 4 Packing List 4 Appendix 1 Cybersecurity Re...

Страница 7: ...mmunicates with the access control terminal or door station through RS 485 BUS and connects with door detector exit button card reader and lock The Extension Module transmits card information door ope...

Страница 8: ...2 2 Ports Description Figure 2 1 Ports...

Страница 9: ...ther the security module fucntion is turned on the web interface of the access control terminal or check whether the second lock function is turned on on web interface of the door station 3 The door c...

Страница 10: ...4 4 Packing List Check the items in the packaging box according to the packing list Table 4 1 Packing list Item Quantity Access control extension module 1 User s manual 1...

Страница 11: ...ment to prevent unauthorized personnel from carrying out physical contacts such as damaging hardware unauthorized connection of removable equipment such as USB flash disk serial port etc 2 Change Pass...

Страница 12: ...in without authorization Check equipment log By viewing the logs you can know the IP addresses that were used to log in to your devices and their key operations 12 Network Log Due to the limited stora...

Отзывы: