background image

 

11

 

 

  Enter the new password (press 

– to change the bit, and press + to change the value), 

Step 4

and then press Program to save and go next. 

 Change password 

Figure 3-5

 

3.1.3 Configuring Function 

Configure functions and parameters. 

 

 

The values that you set at last are automatically saved when you go to the next interface.   

 

Press Program to save when finishing each configuration. 

 Function configuration 

Figure 3-6

 

Table 3-1 Function description 

 

No.

 

Function description

 

 

Number of passes. 

 

Number of alarms. 

 

Function configuration. 

 

Parameter configuration. 

 

 

To select a function, press PROG/Program. 

 

To set a value, press 

  to increase and 

  to reduce. 

Table 3-2 Single-zone function parameter configuration 

Function

 

Parameter

 

Description

 

Enter password 

— 

— 

Configure operating 

frequency 

1

–50 

50 levels available. 

Configure detector 

sensitivity 

0

–99 

100 levels available. 

Содержание ISC-D218

Страница 1: ...Walk through Metal Detector Quick Start Guide V1 0 0...

Страница 2: ...result in property damage data loss lower performance or unpredictable result TIPS Provides methods to help you solve a problem or save you time NOTE Provides additional information as the emphasis an...

Страница 3: ...tual product and the manual Please contact the customer service for the latest program and supplementary documentation There still might be deviation in technical data functions and operations descrip...

Страница 4: ...not disassemble the Device Transport use and store the Device under the allowed humidity and temperature conditions Electrical Safety Use the battery of specified manufacturer otherwise there might re...

Страница 5: ...ecking List 3 2 1 Structure 3 2 2 Installation Environment 4 2 3 Installing the Device 5 2 4 3 Configuration 9 ISC D206 9 3 1 3 1 1 Configuration Panel 9 3 1 2 Basic Operations 10 3 1 3 Configuring Fu...

Страница 6: ...to use it The Device can be widely used in sports meetings conferences schools and other occasions It adopts electromagnetic field to detect carry on metal articles and uses sound and light alarm to i...

Страница 7: ...regnant women floppy disks film and videotapes Application Scenario 1 4 The Device is used to detect the metal items carried by the person going through the detection door Typical application scenario...

Страница 8: ...ales service personnel Table 2 1 Checking list Order List Description 1 Overall packaging Appearance Obvious damage Packaging Accidental impact Accessories list of accessories on warranty card Complet...

Страница 9: ...ance The actual installation distance depends on the installation site conditions Keep away from moving metal objects Large moving metal objects should be kept 0 5 m to 2 m away from the detection doo...

Страница 10: ...her the package is complete and open the box Step 1 Open the box Figure 2 2 Take out the left and right door panels from the box Step 2 Take out door panels Figure 2 3 Take out the manual beam host bo...

Страница 11: ...wer supply Figure 2 4 Follow the previous figure to prepare the door panels beams host box and bolts Step 4 Prepare the parts and the tools Figure 2 5 Install the beams and the host box Step 5 Install...

Страница 12: ...box to the left and right door panels Step 6 Connect the detection wire Figure 2 7 Stand the Device up Step 7 Stand the Device up Figure 2 8 Connect the power supply to the Device and then turn on the...

Страница 13: ...8 Start the Device Figure 2 9...

Страница 14: ...tion Panel Single zone panel ISC D206 Figure 3 1 Single zone panel description ISC D206 Figure 3 2 No Name Four in one digital tube Four in one digital tube Working indicator light Save and exit Progr...

Страница 15: ...ws 0000 0000 press Program and then the screen shows P 0000 enter the password press to change the value of the corresponding bit 0 to 9 in cycle press To change the bit press If the password is corre...

Страница 16: ...ogram to save when finishing each configuration Function configuration Figure 3 6 Table 3 1 Function description No Function description Number of passes Number of alarms Function configuration Parame...

Страница 17: ...s available for Zone 3 0 200 200 levels available for Zone 4 0 200 200 levels available for Zone 5 Configure the duration of the alarm sound 1 3 3 levels available Configure alarm volume 0 2 2 levels...

Страница 18: ...it 0 to 9 in cycle Press to change the bit If the password is wrong you get the prompt C333 Press and enter the password again Only when the password is correct can you press to enter the parameter ad...

Страница 19: ...available for Detector 5 Configure alarm volume 0 99 100 levels available Configure alarm tone 0 99 100 levels available Configure the duration of the alarm sound 0 99 100 levels available Configure s...

Страница 20: ...nter 14 Metals factory 38 Meeting room 62 Subway station 15 Electronics factory 39 VIP room 63 Villa 16 Precision instrument factory 40 Office 64 Community 17 Industry mine 41 Rescue station 65 Opera...

Страница 21: ...or code Figure 4 1 Table 4 1 Error code description Code Description E R R Error 1 L Detector 1 on the left door 2 L Detector 2 on the left door 1 R Detector 1 on the right door 2 R Detector 2 on the...

Страница 22: ...ed on 1 Check whether the power cable between the host box and the detection door and the door 220V AC power cord are well connected 2 Check the power adapter for breakage or poor contact and whether...

Страница 23: ...ration False alarm Automatic alarms occur when no one goes through the machine 1 Check whether the environment around the detection door affects the detection door and try to change the frequency 2 Fa...

Страница 24: ...s function to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice to have recommendations to impr...

Страница 25: ...TLS to access mailbox server FTP Choose SFTP and set up strong passwords AP hotspot Choose WPA2 PSK encryption mode and set up strong passwords 11 Audio and Video Encrypted Transmission If your audio...

Страница 26: ...achieve the network isolation effect Establish the 802 1x access authentication system to reduce the risk of unauthorized access to private networks It is recommended that you enable your device s fir...

Отзывы: