background image

FaceStation F2

INSTALLATION GUIDE

EN 101.00.FSF2_DB, FSF2_AB V1.0

1

A

Version 1.0

1

English

Содержание FaceStation F2

Страница 1: ...FaceStation F2 INSTALLATION GUIDE EN 101 00 FSF2_DB FSF2_AB V1 01A Version 1 01 English ...

Страница 2: ... 13 Network connection 14 TCP IP 14 TTL input connection 15 Relay connection 16 Fail Safe Lock 16 Fail Secure Lock 16 Automatic door connection 17 Connecting as a standalone 18 Connecting to Secure I O 2 19 Wiegand connection 20 Product specifications 21 Dimensions 22 FCC compliance information 23 EU Declaration of Conformity CE 23 Appendices 24 Disclaimers 24 Copyright notice 24 Open Source Licen...

Страница 3: ...y may occur If the product has been damaged due to independent installation or repair of the product by the user free A S service will not be provided Operation Do not allow liquids such as water beverages or chemicals get into the product A fire electric shock or product damage may occur Caution Noncompliance of instructions could lead to minor injury or product damage Installation Do not install...

Страница 4: ...ct failure may occur When cleaning the product wipe the product with a soft and dry cloth and no water benzene or alcohol Otherwise a product failure may occur FaceStation F2 uses capacitive buttons If the environment is moist from wet weather or the product surface is smeared with a lot of water wipe off the product with a dry towel before using it RTC battery Replacing the battery with an incorr...

Страница 5: ...bracket you can use the included bracket fixing screw Star Shaped instead of the product fixing screw for enhanced security FaceStation F2 Wall Bracket Fixing Screw x6 PVC Anchor x6 Diode Connection Cable 1x2 pin 1x3 pin 3x4 pin Drilling Template Quick Guide 120Ω resistor Open Source Software Guide Bracket Fixing Screw Star Shaped Cable Cover ...

Страница 6: ...ual face image LCD screen Provides UI for operation RF card mobile access card authentication unit Part to scan the card for entrance Speaker Delivers sound Speaker USB Type C cable slot Relay 3 pins Visual camera SAM card slot Power Supply 2 pins RS 485 4 pins TTL Input 4 pins Wiegand Input Output 4 pins Ethernet RF card mobile access card authentication unit LCD screen Infrared camera LED lamp ...

Страница 7: ...pins Connect the relay cable Wiegand input output 4 pins Connect the Wiegand input output cable Power supply 2 pins Connect the power supply cable RS 485 4 pins Connect the RS 485 cable SAM card slot Insert the SAM card SAM card slot is only supported in FSF2 DB USB Type C cable slot Connect the USB cable ...

Страница 8: ...Pin Name Color 1 RLY NO White 2 RLY COM Blue 3 RLY NC Orange RS 485 Pin Name Color 1 485 TRXP Blue 2 485 TRXN Yellow 3 485 GND Black 4 SH GND Gray TTL input Pin Name Color 1 TTL IN0 Red 2 TTL IN1 Yellow 3 TTL GND Black 4 SH GND Gray Wiegand input and output Pin Name Color 1 WG D0 Green 2 WG D1 White 3 WG GND Black 4 SH GND Gray ...

Страница 9: ...ul not to display two faces on the screen Register one person at a time If you do not follow the instructions on the screen the face registration may take longer or may fail Cautions for authenticating a face Ensure that the face appears in the center of the device s screen When the guideline is displayed follow the instructions shown on the screen to authenticate the face If a part of the face is...

Страница 10: ...The optimal height for installing device is 127 cm Install the device where it does not reach the direct sunlight or UV light Adjust the installation position so that the face is not exposed to direct sunlight when a user tries to authenticate 2 Fix the bracket firmly using fixing screws through the bracket to the position where FaceStation F2 will be installed ...

Страница 11: ...void RF interference a minimum separation distance must be maintained Wall thickness Distance 100 mm 200 mm 120 mm 180 mm 150 mm 150 mm When using Suprema Mobile Access install a minimum distance of 1 m between devices to avoid BLE interference 3 Install FaceStation F2 onto the fixed bracket Wall 300 mm Distance Wall thickness Wall Wall ...

Страница 12: ...Installation 12 4 Connect FaceStation F2 to the bracket by rotating the product fixing screw of FaceStation F2 Wall ...

Страница 13: ...uld be connected as close as possible to the power supply so that the length of the connecting cable is kept to a minimum If cable connections are made improperly it may cause the device to malfunction It is recommended to use a 16 AWG or 18 AWG cable if the FaceStation F2 is far from the power supply The connection distance may differ depending on the standard of the cable used and the installati...

Страница 14: ... F2 has an automatic MDI MDIX function so that it can be connected to a PC directly using a normal straight type CAT 5e cable or a cross cable NOTE When you use a gigabit network switch please see below information Use a Cat5e UTP Unshielded Twisted Pair cable Use all 4 pairs 8 lines of cable for network connection DO NOT use the pair of cable for other purpose Hub FaceStation F2 PC FaceStation F2...

Страница 15: ...Installation 15 TTL input connection Door sensor FaceStation F2 Door button Cable shield optional 1 TTL IN0 Red 2 TTL IN1 Yellow 3 TTL GND Black 4 SH GND Gray ...

Страница 16: ...ys that can directly lock unlock doors without external controllers for added convenience For access control applications in need of security however it is NOT recommended to use the internal relay of a reader to prevent any tampering attacks which can potentially trigger the door unlock For such applications it is highly recommended to use a separate relay unit for a lock control such as Suprema ...

Страница 17: ... that can directly lock unlock doors without external controllers for added convenience For access control applications in need of security however it is NOT recommended to use the internal relay of a reader to prevent any tampering attacks which can potentially trigger the door unlock For such applications it is highly recommended to use a separate relay unit for a lock control such as Suprema s ...

Страница 18: ...aries according to the authentication method number of users and number of devices Also note that the number of slave devices affects the authentication speed A master device can control 31 slave devices The bandwidth of RS 485 allows for up to 7 fingerprint authentication devices to be connected Suprema s standalone intelligent readers contain internal relays that can directly lock unlock doors w...

Страница 19: ... fingerprint authentication device is the master device FaceStation F2 cannot be added as a slave device When you connect FaceStation F2 as a slave device while FaceStation F2 is the master device only one FaceStation F2 can be added as a slave device If FaceStation F2 is configured as a slave device for the face recognition terminal you can connect one additional Secure I O 1 and DM 20 each If Fa...

Страница 20: ...Installation 20 Wiegand connection RFID reader or Controller Cable shield optional FaceStation F2 Use as a Wiegand input or output device 1 WG D0 Green 2 WG D1 White 3 WG GND Black 4 SH GND Gray ...

Страница 21: ...on Height 1 4 1 9m Matching speed Less than 0 5 sec Live Face Detection Supported Capacity Max User 1 1 Based on one face enrollment per user 100 000 Max User 1 N Based on one face enrollment per user Face 50 000 Card 100 000 Max Text Log 5 000 000 Max Image Log 50 000 Interface Ethernet 10 100 Mbps auto MDI MDI X RS 485 1ch Host or Slave Selectable Wiegand 1ch Input or 1ch Output Selectable TTL i...

Страница 22: ...Product specifications 22 Dimensions Unit mm 98 4 233 233 119 8 23 5 ...

Страница 23: ...e receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help Modifications not expressly approved by the manufacturer could void the user s authority to operate the equipment under FCC rules This appliance and i...

Страница 24: ...ma accepts no responsibility for compatibility issues and any other problems arising from such compatibility issues If you wish to obtain the newest specifications before ordering the product contact Suprema through a Sales Representative or local distributor of Suprema Copyright notice The copyright of this document is vested in Suprema The rights of other product names trademarks and registered ...

Страница 25: ... is fundamentally incompatible with the aim of protecting users freedom to change the software The systematic pattern of such abuse occurs in the area of products for individuals to use which is precisely where it is most unacceptable Therefore we have designed this version of the GPL to prohibit the practice for those products If such problems arise substantially in other domains we stand ready t...

Страница 26: ...ion files associated with source files for the work and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require such as by intimate data communication or control flow between those subprograms and other parts of the work The Corresponding Source need not include anything that users can regenerate automatically from other parts of th...

Страница 27: ...at the individual works permit Inclusion of a covered work in an aggregate does not cause this License to apply to the other parts of the aggregate 6 Conveying Non Source Forms You may convey a covered work in object code form under the terms of sections 4 and 5 provided that you also convey the machine readable Corresponding Source under the terms of this License in one of these ways a Convey the...

Страница 28: ...y documented and with an implementation available to the public in source code form and must require no special password or key for unpacking reading or copying 7 Additional Terms Additional permissions are terms that supplement the terms of this License by making exceptions from one or more of its conditions Additional permissions that are applicable to the entire Program shall be treated as thou...

Страница 29: ...fy any covered work These actions infringe copyright if you do not accept this License Therefore by modifying or propagating a covered work you indicate your acceptance of this License to do so 10 Automatic Licensing of Downstream Recipients Each time you convey a covered work the recipient automatically receives a license from the original licensors to run modify and propagate that work subject t...

Страница 30: ...e the covered work from you a discriminatory patent license a in connection with copies of the covered work conveyed by you or copies made from those copies or b primarily for and in connection with specific products or compilations that contain the covered work unless you entered into that arrangement or that patent license was granted prior to 28 March 2007 Nothing in this License shall be const...

Страница 31: ...7 Interpretation of Sections 15 and 16 If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program unless a warranty or assumption of liability accompanies a copy of the Program in ret...

Страница 32: ...e implementation was written so as to conform with Netscapes SSL This library is free for commercial and non commercial use as long as the following conditions are aheared to The following conditions apply to all code found in this distribution be it the RC4 RSA lhash DES etc code not just the SSL code The SSL documentation included with this distribution is covered by the same copyright terms exc...

Страница 33: ...IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE The licence and distribution terms for any publically available version or derivative of this code cannot be changed i e this code cannot simply be copied and put under another distribution licence including the GNU Public Licence ...

Страница 34: ...TION OF CONTRACT TORT OR OTHERWISE ARISING FROM OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE The code in third_party sike also carries the MIT license Copyright c Microsoft Corporation All rights reserved Permission is hereby granted free of charge to any person obtaining a copy of this software and associated documentation files the Software to deal in th...

Страница 35: ...cense Source form shall mean the preferred form for making modifications including but not limited to software source code documentation source and configuration files Object form shall mean any form resulting from mechanical transformation or translation of a Source form including but not limited to compiled object code generated documentation and conversions to other media types Work shall mean ...

Страница 36: ...nerated by the Derivative Works if and wherever such third party notices normally appear The contents of the NOTICE file are for informational purposes only and do not modify the License You may add Your own attribution notices within Derivative Works that You distribute alongside or as an addendum to the NOTICE text from the Work provided that such additional attribution notices cannot be constru...

Страница 37: ...and or rights consistent with this License However in accepting such obligations You may act only on Your own behalf and on Your sole responsibility not on behalf of any other Contributor and only if You agree to indemnify defend and hold each Contributor harmless for any liability incurred by or claims asserted against such Contributor by reason of your accepting any such warranty or additional l...

Страница 38: ...quiry sales_sys supremainc com 2020 Suprema Inc Suprema and identifying product names and numbers herein are registered trade marks of Suprema Inc All non Suprema brands and product names are trademarks or registered trademarks of their respective companies Product appearance build status and or specifications are subject to change without notice ...

Отзывы: