Users Manual

Proper conguraon of all passwords and other security sengs is the responsibility of the
installer and/or end-user.
6. Oponal: Check T
ransmission Encrypon (TLS) to enable transmission encrypon using TLS
(Transport Layer Security) protocol for security purpose .
Note
This funcon should be supported by the device.
If you have enabled Cercate
Vericaon, you should click Open Cercate Folder to open
the default folder, and copy the cercate le exported from the device to this default
directory to strengthen the security. See for details about enabling cercate vericaon.
You can log into the device to get the cercate le by web browser.
7. Check S
ynchronize Time to synchronize the device me with the PC running the client aer
adding the device to the client.
8. Oponal: Check Import to Group to create a group by the device name, and import all the
channels of the device to the group.
9. Finish adding the device.
-
Click Add to add the device and back to the device list page.
-
Click Add and New to save the sengs and connue to add other device.
Add Device by ISUP Account
For access control devices supports ISUP 5.0 protocol, you can add them to the client by ISUP
protocol aer entering device ID and key, if you have congured their server addresses, port No.,
and device IDs.
Before You Start
Make sure the devices have connected to the network properly.
Steps
1. Enter Device Management module.
The added devices are displayed on the right panel.
2. Click Add to open the Add window.
3. Select ISUP as the adding mode.
4. Enter the required informaon.
Device Account
En
ter the account name registered on ISUP protocol.
ISUP Key
For ISUP 5.0 devices, enter the ISUP key if you have set it when conguring network center
parameter for the device.
Face Recognion Terminal User Manual
73