Access Reader User's Manual V1.0.
Foreword General This manual introduces the functions and operations of the Access Reader. Read carefully before using the device, and keep the manual safe for future reference. Safety Instructions The following signal words might appear in the manual. Signal Words Meaning Indicates a high potential hazard which, if not avoided, will result in death or serious injury. Indicates a medium or low potential hazard which, if not avoided, could result in slight or moderate injury.
About the Manual ● The manual is for reference only. Slight differences might be found between the manual and the product. ● We are not liable for losses incurred due to operating the product in ways that are not in compliance with the manual. ● The manual will be updated according to the latest laws and regulations of related jurisdictions. For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or visit our official website. The manual is for reference only.
Important Safeguards and Warnings This section introduces content covering the proper handling of the Device, hazard prevention, and prevention of property damage. Read carefully before using the Device, and comply with the guidelines when using it. Transportation Requirement Transport, use and store the Device under allowed humidity and temperature conditions. Storage Requirement Store the Device under allowed humidity and temperature conditions.
● The power supply must conform to the requirements of ES1 in IEC 62368-1 standard and be no higher than PS2. Please note that the power supply requirements are subject to the Device label. ● The Device is a class I electrical appliance. Make sure that the power supply of the Device is connected to a power socket with protective earthing. Operation Requirements ● Check whether the power supply is correct before use. ● Do not unplug the power cord on the side of the Device while the adapter is powered on.
Table of Contents 1 Overview................................................................................................................................................. 1 2 Device Structure..................................................................................................................................... 2 3 Device Installation ................................................................................................................................. 4 4 System Structure .........
1 Overview Fingerprint Access Control Reader is a biometric recognition device achieving video surveillance and also a complement to video monitoring and visual talk. Its appearance is neat and fashionable, and its function is enhanced. It is designed for commercial building, corporation property and intelligent community. ⚫ Blue light ⚫ Non-contact reader (read-only), reading distance 3cm~5cm, response time <0.3s ⚫ Fingerprint verification response time≤0.5s, fingerprint response time ≤1.5s.
2 Device Structure The device’s structure and dimension are shown in Error! Reference source not found.and Error! Reference source not found.. Unit is mm.
Figure 2-2 Side view 3
3 Device Installation Step 1. Remove front cover, fix the device on wall through screws. Figure 3-1 Installation Step 2. Remove front cover, fix the device on wall through screws.
Figure 3-2 Installation 5
4 System Structure 4.1 Wiring Wiring of the device includes two groups of wires, as 8-pin and 3-pin. Table 4-1 8-pin wires No.
4.
Appendix 1 Cybersecurity Recommendations Mandatory actions to be taken for basic device network security: 1. Use Strong Passwords Please refer to the following suggestions to set passwords: The length should not be less than 8 characters. Include at least two types of characters; character types include upper and lower case letters, numbers and symbols. Do not contain the account name or the account name in reverse order. Do not use continuous characters, such as 123, abc, etc.
7. 8. 9. 10. 11. 12. 13. MAC Address Binding We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing the risk of ARP spoofing. Assign Accounts and Privileges Reasonably According to business and management requirements, reasonably add users and assign a minimum set of permissions to them. Disable Unnecessary Services and Choose Secure Modes If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to reduce risks.