Dahua DHI-DEE1010B-S2 Скачать руководство пользователя страница 2

Foreword 

General 

This manual introduces the functions, networking and FAQ of the Access Control Extension Module 
(hereinafter referred to as "the Extension Module"). Read carefully before using the device, and keep 
the manual safe for future reference. 

Safety Instructions 

The following signal words might appear in the manual. 

Signal Words 

Meaning 

Indicates a high potential hazard which, if not avoided, will result in 
death or serious injury. 

Indicates a medium or low potential hazard which, if not avoided, 

could result in slight or moderate injury. 

Indicates a potential risk which, if not avoided, could result in 
property damage, data loss, reductions in performance, or 

unpredictable results. 

Provides methods to help you solve a problem or save time. 

Provides additional information as a supplement to the text. 

Revision History 

Version 

Revision Content 

Release Time 

V1.0.0 

First Release. 

March 2022 

Privacy Protection Notice 

As the device user or data controller, you might collect the personal data of others such as their face, 
fingerprints, and license plate number. You need to be in compliance with your local privacy 
protection laws and regulations to protect the legitimate rights and interests of other people by 
implementing measures which include but are not limited: Providing clear and visible identification 
to inform people of the existence of the surveillance area and provide required contact information. 

About the Manual 

The manual is for reference only. Slight differences might be found between the manual and the
product.

We are not liable for losses incurred due to operating the product in ways that are not in
compliance with the manual.

The manual will be updated according to the latest laws and regulations of related jurisdictions.
For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or visit
our official website. The manual is for reference only. Slight differences might be found between
the electronic version and the paper version.

All designs and software are subject to change without prior written notice. Product updates

Содержание DHI-DEE1010B-S2

Страница 1: ...Access Control Extension Module User s Manual V1 0 0...

Страница 2: ...or data controller you might collect the personal data of others such as their face fingerprints and license plate number You need to be in compliance with your local privacy protection laws and regul...

Страница 3: ...there is any doubt or dispute we reserve the right of final explanation Upgrade the reader software or try other mainstream reader software if the manual in PDF format cannot be opened All trademarks...

Страница 4: ...ion Personnel working at heights must take all necessary measures to ensure personal safety including wearing a helmet and safety belts Do not place the Extension Module in a place exposed to sunlight...

Страница 5: ...odule under allowed humidity and temperature conditions Do not drop or splash liquid onto the Extension Module and make sure that there is no object filled with liquid on the Extension Module to preve...

Страница 6: ...nts Foreword I Important Safeguards and Warnings III 1 Product Introduction 1 1 1 Product Overview 1 1 2 Networking Diagram 1 2 Ports Description 2 3 FAQ 3 4 Packing List 4 Appendix 1 Cybersecurity Re...

Страница 7: ...mmunicates with the access control terminal or door station through RS 485 BUS and connects with door detector exit button card reader and lock The Extension Module transmits card information door ope...

Страница 8: ...2 2 Ports Description Figure 2 1 Ports...

Страница 9: ...ther the security module fucntion is turned on the web interface of the access control terminal or check whether the second lock function is turned on on web interface of the door station 3 The door c...

Страница 10: ...4 4 Packing List Check the items in the packaging box according to the packing list Table 4 1 Packing list Item Quantity Access control extension module 1 User s manual 1...

Страница 11: ...room and cabinet and implement well done access control permission and key management to prevent unauthorized personnel from carrying out physical contacts such as damaging hardware unauthorized conne...

Страница 12: ...we suggest that you check online users regularly to see if the device is logged in without authorization Check equipment log By viewing the logs you can know the IP addresses that were used to log in...

Отзывы: