Dahua Technology ASC3202B Manual


Læs gratis den danske manual til Dahua Technology ASC3202B (64 sider) i kategorien Adgangskontrolsystem. Denne vejledning er vurderet som hjælpsom af 12 personer og har en gennemsnitlig bedømmelse på 4.3 stjerner ud af 6.5 anmeldelser. Har du et spørgsmål om Dahua Technology ASC3202B, eller vil du spørge andre brugere om produktet?

Side 1/64
Access Controller
User's Manual
ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD. V1.0.2
User's Manual
I
Foreword
General
This manual introduces the functions and operations of the Access Controller. Read carefully before
using the device, and keep the manual safe for future reference.
Safety Instructions
The following signal words might appear in the manual.
Signal Words Meaning
Indicates a high potential hazard which, if not avoided, will result in
death or serious injury.
Indicates a medium or low potential hazard which, if not avoided,
could result in slight or moderate injury.
Indicates a potential risk which, if not avoided, could result in
property damage, data loss, reductions in performance, or
unpredictable results.
Provides methods to help you solve a problem or save time.
Provides additional information as a supplement to the text.
Revision History
Version Revision Content Release Time
V1.0.2 Updated the webpage December operations. 2022
V1.0.1 Updated the wiring. September 2022
V1.0.0 First release. September 2022
Privacy Protection Notice
As the device user or data controller, you might collect the personal data of others such as their face,
fingerprints, and license plate number. You need to be in compliance with your local privacy
protection laws and regulations to protect the legitimate rights and interests of other people by
implementing measures which include but are not limited: Providing clear and visible identification
to inform people of the existence of the surveillance area and provide required contact information.
About the Manual
The manual is for reference only. Slight differences might be found between the manual and the
product.
We are not liable for losses incurred due to operating the product in ways that are not in
compliance with the manual.
The manual will be updated according to the latest laws and regulations of related jurisdictions.
For detailed -information, see the paper user’s manual, use our CD ROM, scan the QR code or visit
our official website. The manual is for reference only. Slight differences might be found between
the electronic version and the paper version.
User's Manual
II
All designs and software are subject to change without prior written notice. Product updates
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation.
Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
If there is any uncertainty or controversy, we reserve the right of final explanation.
User's Manual
III
Important Safeguards and Warnings
This section introduces content covering the proper handling of the Access Controller, hazard
prevention, and prevention of property damage. Read carefully before using the Access Controller,
and comply with the guidelines when using it.
Transportation Requirement
Transport, use and store the Access Controller under allowed humidity and temperature conditions.
S torage Requirement
Store the Access Controller under allowed humidity and temperature conditions.
Installation Requirements
Do not connect the power adapter to the Access Controller while the adapter is powered on.
Strictly comply with the local electric safety code and standards. Make sure the ambient voltage
is stable and meets the power supply requirements of the Access Controller.
Do not connect the Access Controller to two or more kinds of power supplies, to avoid damage
to the Access Controller.
Improper use of the battery might result in a fire or explosion.
Personnel working at heights must take all necessary measures to ensure personal safety
including wearing a helmet and safety belts.
Do not place the Access Controller in a place exposed to sunlight or near heat sources.
Keep the Access Controller away from dampness, dust, and soot.
Install the Access Controller on a stable surface to prevent it from falling.
- Install the Access Controller in a well ventilated place, and do not block its ventilation.
Use an adapter or cabinet power supply provided by the manufacturer.
Use the power cords that are recommended for the region and conform to the rated power
specifications.
-The power supply must conform to the requirements of ES1 in IEC 62368 1 standard and be no
higher than PS2. Please note that the power supply requirements are subject to the Access
Controller label.
The Access Controller is a class I electrical appliance. Make sure that the power supply of the
Access Controller is connected to a power socket with protective earthing.
Operation Requirements
Check whether the power supply is correct before use.
Do not unplug the power cord on the side of the Access Controller while the adapter is powered
on.
User's Manual
IV
Operate the Access Controller within the rated range of power input and output.
Use the Access Controller under allowed humidity and temperature conditions.
Do not drop or splash liquid onto the Access Controller, and make sure that there is no object
filled with liquid on the Access Controller to prevent liquid from flowing into it.
Do not disassemble the Access Controller without professional instruction.
User's Manual
V
Table of Contents
Foreword ........................................................................................................................................................................................................I
Important Safeguards and Warnings ............................................................................................................................................ III
1 Product Overview ................................................................................................................................................................................. 1
1.1 Product Introduction ............................................................................................................................................................... 1
1.2 Main Features .............................................................................................................................................................................. 1
1.3 Application Scenarios .............................................................................................................................................................. 1
2 Main Controller Sub Controller- ..................................................................................................................................................... 3
2.1 Networking Diagram ............................................................................................................................................................... 3
2.2 Configurations of Main Controller .................................................................................................................................... 3
2.2.1 Configuration Flowchart ............................................................................................................................................. 3
2.2.2 Initialization ...................................................................................................................................................................... 3
2.2.3 Logging In ........................................................................................................................................................................... 4
2.2.4 Dashboard .......................................................................................................................................................................... 8
2.2.5 Home Page ....................................................................................................................................................................... 10
2.2.6 Adding Devices .............................................................................................................................................................. 10
2.2.6.1 Adding Device Individually .......................................................................................................................... 10
2.2.6.2 Adding Devices in Batches ............................................................................................................................ 11
2.2.7 Adding Users ................................................................................................................................................................... 12
2.2.8 Adding Time Templates ............................................................................................................................................ 17
2.2.9 Adding Area Permissions .......................................................................................................................................... 18
2.2.10 Assigning Access Permissions ............................................................................................................................. 19
2.2.11 Viewing Authorization Progress ........................................................................................................................ 20
2.2.12 Configuring Access Control (Optional) ........................................................................................................... 21
2.2.12.1 Configuring Basic Parameters .................................................................................................................. 21
2.2.12.2 Configuring Unlock Methods .................................................................................................................... 22
2.2.12.3 Configuring Alarms ........................................................................................................................................ 23
2.2.13 Configuring Global Alarm linkages (Optional) ........................................................................................... 24
2.2.14 Access Monitoring (Optional) .............................................................................................................................. 26
2.2.14.1 Remotely Opening and Closing Doors ................................................................................................. 26
2.2.14.2 Setting Always Open and Always Closed ............................................................................................ 26
2.2.15 Local Device Configurations (Optional) .........................................................................................................27
2.2.15.1 Configure Local Alarm Linkages .............................................................................................................. 27
2.2.15.2 Configuring Card Rules ................................................................................................................................ 28
2.2.15.3 Backing up System Logs .............................................................................................................................. 29
2.2.15.4 Configuring Network ....................................................................................................................................29
2.2.15.4.1 Configuring TCP/IP .............................................................................................................................. 29
2.2.15.4.2 Configuring Ports ................................................................................................................................. 30
User's Manual
VI
2.2.15.4.3 Configuring Cloud Service ............................................................................................................... 31
2.2.15.4.4 Configuring Automatic Registration .......................................................................................... 32
2.2.15.4.5 Configuring Basic Service ................................................................................................................ 33
2.2.15.5 Configuring Time ............................................................................................................................................ 34
2.2.15.6 Account Management ..................................................................................................................................36
2.2.15.6.1 Adding Users .......................................................................................................................................... 36
2.2.15.6.2 Resetting the Password ..................................................................................................................... 36
2.2.15.6.3 Adding ONVIF Users ...........................................................................................................................37
2.2.15.7 Maintenance ...................................................................................................................................................... 38
2.2.15.8 Advanced Management ............................................................................................................................... 38
2.2.15.8.1 Exporting and Importing Configuration Files ....................................................................... 38
2.2.15.8.2 Configuring the Card reader ........................................................................................................... 39
2.2.15.8.3 Configuring the Fingerprint Level ............................................................................................... 39
2.2.15.8.4 Restoring the Factory Default Settings ..................................................................................... 40
2.2.15.9 Updating the System ..................................................................................................................................... 40
2.2.15.9.1 File Update ..............................................................................................................................................40
2.2.15.9.2 Online Update ........................................................................................................................................ 40
2.2.15.10 Configuring Hardware ............................................................................................................................... 41
2.2.15.11 Viewing Version Information ................................................................................................................. 41
2.2.15.12 Viewing Legal Information ...................................................................................................................... 41
2.2.16 Viewing Records ......................................................................................................................................................... 42
2.2.16.1 Viewing Alarm Records ................................................................................................................................ 42
2.2.16.2 Viewing Unlock Records .............................................................................................................................. 42
2.2.17 Security Settings(Optional) .................................................................................................................................. 42
2.2.17.1 Security Status .................................................................................................................................................. 42
2.2.17.2 Configuring HTTPS ......................................................................................................................................... 43
2.2.17.3 Attack Defense ................................................................................................................................................. 44
2.2.17.3.1 Configuring Firewall ........................................................................................................................... 44
2.2.17.3.2 Configuring Account Lockout ........................................................................................................ 45
2.2.17.3.3 Configuring DoS AttackAnti- .......................................................................................................... 46
2.2.17.4 Installing Device Certificate ....................................................................................................................... 47
2.2.17.4.1 Creating Certificate ............................................................................................................................. 47
2.2.17.4.2 Applying for and Importing CA Certificate ............................................................................. 48
2.2.17.4.3 Installing Existing Certificate ......................................................................................................... 50
2.2.17.5 Installing the Trusted CA Certificate ..................................................................................................... 50
2.2.17.6 Security Warning ............................................................................................................................................. 51
2.3 Configurations of Sub Controller .................................................................................................................................... 52
2.3.1 Initialization .................................................................................................................................................................... 52
2.3.2 Logging In ......................................................................................................................................................................... 52
2.3.3 Home Page ....................................................................................................................................................................... 52
User's Manual
VII
3 Smart PSS Lite-Sub Controllers ................................................................................................................................................... 53
3.1 Networking Diagram ............................................................................................................................................................. 53
3.2 Configurations on SmartPSS Lite .................................................................................................................................... 53
3.3 Configurations on Sub Controller ................................................................................................................................... 53
Appendix 1 Cybersecurity Recommendations ........................................................................................................................ 54
User's Manual
1
1 Product Overview
1.1 Product Introduction
Flexible and convenient, the Access Controller has a user friendly system that allows you to access
controllers on the webpage through IP address. It comes with a professional access management
system, and makes the networking of main and sub control modes quick and easy, meeting the
needs of small and advanced systems.
1.2 Main Features
- Built of flame retardant PC and ABS material, it is both sturdy and elegant with an IK06 rating.
Supports TCP and IP connection, and standard PoE.
- Accesses card readers through Wiegand and RS 485 protocols.
Supplies power to the lock through its 12 VDC output power supply, which has a maximum
output current of 1000 mA.
Supports 1000 users, 5000 cards, 3000 fingerprints, and 300,000 records.
Multiple unlock methods including card, password, fingerprint and more. You can also combine
these methods to create your own personal unlock methods.
Multiple types of alarms events are supported, such as duress, tampering, intrusion, unlock
timeout, and illegal card.
Supports a wide range of users including general, patrol, VIP, guest, blocklisted, and more users.
Manual and automatic time synchronization.
Retains stored data even while powered off.
Offers a variety of functions and the system can be configured. Devices can also be updated
through the webpage.
Features main and sub control modes. The main control mode offers user management, access
control device management and configuration, and more options. Devices under sub-control
modes can be added to multiple platforms.
A main controller can connect with and manage up to 19 sub controllers.
Watchdog protects the system to allow the device to be stable and perform efficiently.
Sub controllers can be added to SmartPSS Lite and DSS Pro.
1.3 Application Scenarios
It is widely used in parks, communities, business centers and factories, and ideal for places such as
office buildings, government buildings, schools and stadiums.
The Access Controller can be set to the main access controller (herein referred to as main controller)
or the Sub Access Controller (herein referred to as controller). 2 different networking methods -sub
are available for the Access Controller. You can select a networking method based on your needs.
User's Manual
3
2 Main Controller-Sub Controller
2.1 Networking Diagram
The main controller comes with a management platform (herein referred as the platform). Sub
controller needs to be added to the management platform of the main controller. The main
controller can manage up to 19 sub controllers.
Figure 2- 1 Networking diagram
2.2 Configurations of Main Controller
2.2.1 Configuration Flowchart
Figure 2 2 Configuration flowchart-
2.2.2 Initialization
Initialize the main controller when you log in to the webpage for the first time or after it is restored
to its factory defaults.
Prerequisites
Make sure that the computer used to log in to the webpage is on the same LAN as the main
User's Manual
4
controller.
Procedure
Step 1 Open a browser, go to the IP address (the IP address is 192.168.1.108 by default) of the
main controller.
We recommend you use the latest version of Chrome or Firefox.
Step 2 Select a language, and then click Next.
Step 3 Read the software license agreement and privacy policy carefully, select I have read and
agree to the terms of the Software License Agreement and Privacy Policy. , and then
click Next.
Step 4 Set the password and email address.
-The password must consist of 8 to 32 non blank characters and contain at least two
types of the following characters: upper case and lower case letters, numbers, and
special characters (excluding ' " ; : &). Set a high security password by following the -
password strength prompt.
Keep the password safe after initialization and change the password regularly to
improve security.
Step 5 Configure the system time, and then click Next.
Figure 2- 3 Configure the time
Step 6 (Optional) Select Auto Check for Updates, and then click Completed.
The system automatically check is there any higher version available, and inform the user
to update the system. The system automatically checks for new updates, and informs you
when a new update is available.
Step 7 Click Completed.
The system automatically goes to the login page after initialization is successful.
2.2.3 Logging In
For first-time login initialization, you need to follow the login wizard to configure the type of the
main controller and its hardware.
User's Manual
5
Step 1 On the login page, enter the username and password.
The default administrator name is admin, and the password is the one you set during
initialization. We recommend you change the administrator password regularly to
increase security of the platform.
If you forget the administrator login password, you can click Forget password?.
Step 2 Select Main Control, and then click Next.
Figure 2- 4 Type of access controller
Main Control: The main controller comes with a management platform. You can
manage all sub-controllers, configure access control, access personal management on
the platform, and more.
Sub Control: Sub controllers needs to be added to the management platform of the
main controller or other management platforms such as DSS Pro or SmartPSS Lite. You
can only perform the local configurations on the webpage of the sub-controller. For
details, see "2.3 Configurations of Sub Controller".
Step 3 Select the number of doors, and then enter the name of the door.
Step 4 Configure the parameters of the doors.
User's Manual
6
Figure 2 5 Configure door parameters-
Table 2- 1 Parameter description
Parameter Description
Entry Card Reader
Select the card reader protocol.
Wiegand: Connects to a wiegand reader. You can connect the
LED wire to the LED port of the controller, and the reader will
beep and flash when the door unlocks.
OSDP: Connects to an OSDP reader.
-4 RS 85: Connects to an OSDP reader.
Exit Button Connects to a exit button.
Door Detector Connects to a door detector.
Power Supply of Locks
12 V: The controller provides power for the lock.
Fail secure: When the power is interrupted or fails, the door
stays locked.
Fail safe: When the power be interrupted or fails, the door
automatically unlocks to let people leave.
Relay: The relay supplies power for the lock.
Relay open = locked: Sets the lock to remain locked when
the relay is open.
Relay open = unlocked: Sets the lock to unlock when the
relay is open.
Step 5 Configure access control parameters.
Step 6 In Unlock Settings, select Or or And from Combination Method.
Or: Use one of the selected unlock methods to authorize opening the door.
And: Use all of the selected unlock methods to authorize opening the door.
The Controller supports unlock through card, fingerprint, and password.
User's Manual
7
Step 7 Select the unlock methods, and configure the other parameters.
Figure 2- 6 Element (multiple choice)
Table 2- 2 Unlock settings description
Parameter Description
Door Unlock Duration
After a person is granted access, the door will remain
unlocked for a defined time for them to pass through. It
ranges from 0.2 s to 600 seconds.
Unlock Timeout A timeout alarm is triggered when the door remains
unlocked for longer than the defined value.
Step 8 In Alarm Settings, configure the alarm parameters.
Figure 2- 7 Alarm
Table 2- 3 Description of alarm parameters
Parameter Description
Duress Alarm An alarm will be triggered when a duress card, duress
password or duress fingerprint is used to unlock the door.
Door Detector the type of door detector. Select
Intrusion Alarm When door detector is enabled, an intrusion alarm will
be triggered if the door is opened abnormally.
A timeout alarm is triggered when the door remains
unlocked for longer than the defined unlock time.
When Card reader beeps is enabled, the card reader
beeps when the intrusion alarm or timeout alarm is
triggered.
Unlock Timeout Alarm
Step 9 Click Next.
A wiring diagram is generated based on your configurations. You can wire the device
according to the diagram.
User's Manual
8
The image below is for reference only.
Figure 2- 8 Wiring diagram
Step 10 Click Apply.
You can go to Local Device Config > Hardware to change the settings after you
successfully log in to the platform.
Click Download Image to download the diagram to your computer.
2.2.4 Dashboard
After you successfully log in, the dashboard page of the platform is displayed. The dashboard is
User's Manual
9
displayed showing visualized data.
Figure 2- 9 Dashboard
Table 2-4 Home page description
No. Description
1 Displays the unlock methods used for the day. Hover over a day to see the type
of unlocks used for that day.
2 Displays the total number of alarms.
3 Click to go to the dashboard page.
Click to go to the home page of the platform.
4 Displays the status of devices, including offline devices and online devices.
5 Displays the data capacity of cards, fingerprints and users.
6
The number of doors of the controller.
: Double door
: Single door
The type of the controller.
: Main controller.
: Sub controller.
: Select the language of the platform.
: Goes to the Security page directly.
: Restart or log out of the platform.
: Display the webpage in full screen.
User's Manual
10
2.2.5 Home Page
After you successfully log in, the home page of the main controller is displayed.
Figure 2- 10 Home page
Table 2-5 Home page description
Menu Description
Device Management Add devices to the platform of the main controller.
Person Management them. Add personnel and assign area permissions to
Access Control Config
Add time templates, create and assign area permissions,
configure door parameters and global alarm linkages,
and view the permission authorization progress.
Access Monitoring Remotely control the doors and view event logs.
Reporting View and export alarm records and unlock records.
Local Device Config Configure parameters for the local device, such as
network and local alarm linkage.
2.2.6 Adding Devices
You can add devices to the management platform of the main controller in batches or one by one. If
the controller was set to the main controller while you were going through the login wizard, you can
add and manage sub controllers through the Platform.
Only the main controller comes with a management platform.
2.2.6.1 Adding Device Individually
You can add sub controllers one by one by entering their IP addresses or domain names.
Procedure
Step 1 On the home page, Click Device Management, and then click Add.
Step 2 Enter the device information.
User's Manual
11
Figure 2 11 Device infor- mation
Table 2- 6 Device parameters Description
Parameter Description
Device Name Enter the name of the Controller. We recommend you name it
after its installation area.
Add Mode Select IP to add the Access Controller by entering its IP address.
IP Address Enter the IP address of the controller.
Port The port number is 37777 by default.
Username/Password Enter the username and password of the Controller.
Step 3 Click OK.
The added controllers are displayed on the Device Management page.
Figure 2-12 Successfully add devices
If the controller was set as the main controller while you were going through the login
wizard, the controller will be added to the management platform automatically and
function as both the main controller and sub controller.
Related Operations
: Edit the information on the device.
Only sub controllers support the below operations.
: Go to the webpage of the sub controller.
: Log out of the device.
: Delete the device.
2.2.6.2 Adding Devices in Batches
We -recommend you use the auto search function when you add sub controllers in batches. Make
sure the sub controllers you want to add are on the same network segment.
User's Manual
12
Procedure
Step 1 On the home page, Click Device Management, and then click Search Device.
Click Start Search to search for devices on the same LAN.
Enter a range for the network segment, and then click Search.
Figure 2- 13 Auto search
All devices that were searched for will be displayed.
You can select devices from the list, and click Device Initialization to initialize them in
batches.
To ensure the security of devices, initialization is not supported for devices on different
segments.
Step 2 Select the Controllers that you want to add to the Platform, and then click Add.
Step 3 Enter the username and password of the sub controller, and then click OK.
The added sub controllers are displayed on the Device Management page.
Related Operations
Modify IP: Select added devices, and then click Modify IP to change their IP addresses.
Sync Time: Select added devices, and then click Sync Time to sync the time of the devices with
the NTP server.
Delete: Select the devices, and then click Delete to delete them.
2.2.7 Adding Users
Add users to departments. Enter basic information for users and set verification methods to verify
their identities.
Procedure
Step 1 On the home page, select Person Management.
User's Manual
13
Step 2 Create a department.
1. . Click
2. Enter the name of the department, and then click Add.
The default company cannot be deleted.
Figure 2- 14 Add department
Step 3 (Optional) Before you assign cards to users, set the card type and the type of the card
number.
1. On the Person Management page, select More > Card Type.
2. Select ID or IC Card, and then click
OK.
Make sure that the card type is same as the card type that will be assigned; otherwise,
the card number cannot be read. For example, if the assigned card is an ID card, set
card type to ID card.
3. Select More > Card No. System.
4. Select decimal format or hexadecimal format for the card number.
Step 4 Add users.
Add users one by one.
When you want to assign access permissions to one person, you can add users
individually. For details on how to assign access permissions, see "2.2.9 Adding Area
Permissions".
1. Click
Add, and then enter the basic information for the user.
User's Manual
14
Figure 2- 15 Basic information on the user
Table 2- 7 parameters description
Parameter Description
User ID The ID of the user.
Department The department that the user belongs to.
Validity Period Set a date on which the access permissions of the person will become
effective.
To Set a date on which the access permissions of the person will expire.
User Name The name of the user.
User Type
The type of the user.
General User: General users can unlock the door.
VIP User: When VIP unlocks the door, service personnel will receive
a notice.
Guest User: Guests can unlock the door within a defined period or
for set number of times. After the defined period expires or the
unlocking times runs out, they cannot unlock the door.
Patrol User: Patrol users will have their attendance tracked, but
they have no unlocking permissions.
Blocklist User: When users in the blocklist unlock the door, service
personnel will receive a notification.
Other User: When they unlock the door, the door will stay
unlocked for 5 more seconds.
Unlock Attempts The times of unlock attempts for guest users.
2. Click Add.
You can click Add More to add more users.
Add users in batches.
1. Click Import > Download Template to download the user template.
2. Enter user information in the template, and then save it.
3. Click Import, and upload the template to the Platform.
The users are added to the Platform automatically.
Step 5 Click the Authentication tab, set the authentication method to verify the identity of
people.
User's Manual
15
Each user can have 1 password, 5 cards, and 3 fingerprints.
Table 2- 8 Set authentication methods
Authentication
Methods Description
Password Enter and confirm the password.
Card
Enter the card number manually.
1. Click Add.
2. Enter the card number, and then click Add.
Read the number automatically through a card enrollment reader.
1. . Click
2. Select Enrollment Reader, and click OK.
Make sure that the card enrollment reader is connected to your
computer.
3. Click Add, and follow the on-screen instructions to download and
install the plug-in.
4. Swipe the card on the enrollment reader.
A 20-second countdown is displayed to remind you to swipe the
card, and the system will read the card number automatically. If the
20-second countdown expires, click Read Card to start a new
countdown.
5. Click Add.
Read the number automatically through a card reader.
1. . Click
2. Select Device, select the card reader, and click OK.
Make sure the card reader is connected to the access controller.
3. Swipe the card on the card reader.
A 20-second countdown is displayed to remind you to swipe the
card, and the system will read the card number automatically. .If the
20-second countdown expires, click Read Card to start a new
countdown.
4. Click Add.
Fingerprint Connect a fingerprint scanner to the computer, and follow the on-screen
instructions to register the fingerprint.
User's Manual
16
Figure 2- 16 Authentication method
Table 2- 9 Authentication method
Parameter Description
Password Users can gain access by entering the password.
Card
Users can gain access by swiping the card.
: Change the number of the card.
: Set the card to duress card.
An alarm is triggered when people use duress card to unlock the
door.
: Delete the card.
Fingerprint User can gain access through verifying the fingerprint.
Step 6 Click OK.
Related Operations
On the Person Management page, click Export to export all users in the Excel format.
On the Person Management page, click More > Extract, and select a device to extract all users
from the sub controller to the Platform of the main controller.
On the Person Management page, click More > Card Type, set the card type before you assign
cards to users. For example, if the assigned card is an ID card, set the card type to ID card.
On the Person Management page, click More > Card No. System, set the card system to the
decimal or hexadecimal format.
User's Manual
17
2.2.8 Adding Time Templates
Time template defines the unlock schedules of the Controller. The platform offers 4 time templates
by default. The template is also customizable.
The default templates cannot be changed.
Step 1 n the home page, select O Access Control Config > Time Template, and then click .
Step 2 Enter the name of the time template.
Figure 2- 17 Create time templates
- modified. The default full day time template cannot be
You can only create up to 128 time templates.
Step 3 Drag the slider to adjust the time period for each day.
You can also click Copy to apply the configured time period to other days.
You can only configure up to 4 time sections for each day.
Step 4 Click Apply.
Step 5 Configure holiday plans.
1. Click the Holiday Plan tab, and then click Add to add holidays.
You can add up to 64 holidays.
2. Select a holiday.
3. Drag the slider to adjust the time period for the holiday.
4. Click Apply.
User's Manual
21
Sync Local Person: Sync personnel on the management platform of the main controller
to its server.
- Sync Local Time: Sync the time templates in the area permissions to the sub controller.
Figure 2- 22 Authorization progress
Step 3 (Optional) If authorization failed, click to try again.
You can click to view details on the failed authorization task.
2.2.12 Configuring Access Control (Optional)
2.2.12.1 Configuring Basic Parameters
Step 1 Select Access Control Config > Door Parameters.
Step 2 In Basic Settings, configure basic parameters for the access control.
Figure 2- 23 Basic parameters
Table 2 10 Basic parameters description-
Parameter Description
Name The name of the door.
User's Manual
23
Figure 2- 24 Unlock Settings
Table 2- 11 Unlock settings description
Parameter Description
Door Unlock Duration
After a person is granted access, the door will remain
unlocked for a defined time for them to pass through. It
ranges from 0.2 to 600 seconds.
Unlock Timeout A timeout alarm can be triggered if the door remains
unlocked for longer than this value.
Unlock by period
1. In the Unlock Mode list, select Unlock by Period.
2. Drag the slider to the adjust time period for each day.
You can also click Copy to apply the configured time period to other days.
3. Select an unlock method for the time period, and then configure other parameters.
Figure 2- 25 Unlock by period
Step 3 Click Apply.
2.2.12.3 Configuring Alarms
An alarm will be triggered when an abnormal access event occurs.
Step 1 Select Access Control Config > Door Parameters > Alarm Settings.
User's Manual
24
Step 2 Configure alarm parameters.
Figure 2- 26 Alarm
Table 2- 12 Description of alarm parameters
Parameter Description
Duress Alarm An alarm will be triggered when a duress card, duress
password or duress fingerprint is used to unlock the door.
Door Detector of door detector. Select the type
Intrusion Alarm When door detector is enabled, an intrusion alarm will
be triggered if the door is opened abnormally.
A timeout alarm will be triggered if the door remains
unlocked longer than the defined unlock time.
When Card reader beeps is enabled, the card reader
beeps when the intrusion alarm or timeout alarm is
triggered.
Unlock Timeout Alarm
Step 3 Click Apply.
2.2.13 Configuring Global Alarm linkages (Optional)
You can configure global alarm linkages across different Access Controllers.
Background Information
When you have configured both global alarm linkages and local alarm linkages, and if the global
alarm linkages conflict with the local alarm linkages, the last alarm linkages you have configured will
take effective.
Procedure
Step 1 Select Access Control Config > Global Alarm Linkage.
Step 2 Configure the alarm output.
1. Select an alarm input from the alarm input channel list, and then click Link Alarm
Output.
2. Click Add, select an alarm output channel, and then click OK.
User's Manual
25
Figure 2- 27 Alarm output
3. Turn on the alarm output function and then enter the alarm duration.
4. Click Apply.
Step 3 Configure the door linkage.
1. Select an alarm input from the channel list, and then click Add.
2. Select the linkage door, select the door status, and then click OK.
Always Closed: The door automatically locks when an alarm is triggered.
Always Open: The door automatically unlocks when an alarm is triggered.
Figure 2- 28 Door linkage
3. Click Enable to turn on the door linkage function.
If you turn on link fire safety control, all door linkages automatically change to Always
Open status, and all doors will open when the fire alarm is triggered.
4. Click Apply.
You can click Copy to to apply the pre-configured alarm linkages to other alarm input
channels.
User's Manual
26
2.2.14 Access Monitoring (Optional)
2.2.14.1 Remotely Opening and Closing Doors
You can remotely monitor and control the door. For example, you can remotely open or close the
doo r.
Procedure
Step 1 Click Access Monitoring on the home page.
Step 2 Select the door, and then click Open or Close to remotely control the door.
Figure 2- 29 Remotely control the door
Related Operations
Event filtering: Select the event type in Event Info, and the event list displays the selected event
types, such as alarm events and abnormal events.
Event deleting: Click to clear all events from the event list.
2.2.14.2 Setting Always Open and Always Closed
After setting always open or always close, the door remains open or closed all the time.
Step 1 Click Access Monitoring on the home page.
Step 2 Click Always Open or Always Closed to open or close the door.
Figure 2- 30 Always open or close
The door will remain open or closed all the time. You can click Normal to restore access
control to its normal status, and the door will be open or closed based on the configured
verification methods.
User's Manual
27
2.2.15 Local Device Configurations (Optional)
Local device configurations can only be applied to the local Access Controllers.
2.2.15.1 Configure Local Alarm Linkages
You can only configure local alarm linkages on the same access controller. Each controller has 2
alarm inputs and 2 alarm outputs.
Step 1 On the home page, select Local Device Config > Local Alarm Linkage.
Step 2 Click to configure local alarm linkage.
Figure 2- 31 Local alarm linkage
Table 2 13 Local alarm linkage-
Parameter Description
Alarm input channel
The number of the alarm input channel.
Each controller has 2 alarm inputs and 2 alarm outputs.
Alarm Input Name The name of the alarm input.
Alarm Input Type
The type of the alarm input.
Normally Open
Normally Closed
Link Fire Safety Control If you turn on the link fire safety control, all the doors will open
when the fire alarm is triggered.
Alarm Output You can turn on the alarm output function.
Duration When an alarm is triggered, the alarm remains on for a defined
time.
User's Manual
28
Parameter Description
Alarm Output Channel
Select the alarm output channel.
Each controller has 2 alarm inputs and 2 alarm outputs.
AC Linkage Turn on AC Linkage to configure the door linkage. Set the door
to always open or always closed status. When an alarm is
triggered, the door will automatically open or close.
Door1/Door2
Step 3 Click OK.
2.2.15.2 Configuring Card Rules
The platform supports 5 types of Wiegand formats by default. You can also add custom Wiegand
formats.
Step 1 On the home page, select Local Device Config > Access Card Rule Config.
Step 2 Click Add, and then configure new Wiegand formats.
Figure 2 Add new Wiegand formats- 32
Table 2- 14 Configure the Wiegand format
Parameter Description
Wiegand format The name of the Wiegand format.
Total bits Enter the total number of bits.
Facility Code Enter the start bit and the end bit for the facility code.
Card number Enter the start bit and the end bit for the card number.
User's Manual
29
Parameter Description
Parity Code
1. Enter the even parity start bit and even parity end bit.
2. Enter the odd parity start bit and odd parity end bit.
Step 3 Click OK.
2.2.15.3 Backing up System Logs
Step 1 On the home page, select Local Device Config > System Logs.
Step 2 Select the type of log, and then select the time range.
Figure 2- 33 Back up logs
Step 3 Click Encrypt Log Backup to back up encrypted logs.
Step 4 (Optional) You can also click Export t o export logs.
2.2.15.4 Configuring Network
2.2.15.4.1 Configuring TCP/IP
You need to configure the IP address of the Access Controller to make sure that it can communicate
with other devices.
Step 1 Select Local Device Config > Network Setting > TCP/IP.
Step 2 Configure the parameters.
User's Manual
30
Figure 2- 34 TCP/IP
Table 2- 15 Description of TCP/IP
Parameter Description
IP Version IPv4.
MAC Address MAC address of the Access Controller.
Mode
Static: Manually enter IP address, subnet mask, and gateway.
DHCP: Dynamic Host Configuration Protocol.
When DHCP is turned on, the Access Controller will
automatically be assigned IP address, subnet mask, and
gateway.
IP Address If you select static mode, configure the IP address, subnet mask
and gateway.
IP address and gateway must be on the same network segment.
Subnet Mask
Default Gateway
Preferred DNS Set the IP address of the preferred DNS server.
Alternate DNS Set the IP address of the alternate DNS server.
Step 3 Click OK.
2.2.15.4.2 Configuring Ports
You can limit access to the Access Controller at the same time through web, desktop client and
phone.
Step 1 Select Local Device Config > Network Setting > Port.
Step 2 Configure port numbers.
User's Manual
31
You need to restart the controller to make the configurations effective for all the
parameters except Max Connection and RTSP Port.
Figure 2 35 Configure ports-
Table 2- 16 Description of ports
Parameter Description
Max Connection
You can set the maximum number of clients that can access
the Access Controller at the same time, such as the web
client, desktop client and phone.
TCP Port It is 37777 by default.
HTTP Port
It is 80 by default. If you want to change the port number,
add the new port number after the IP address when you log
in to the webpage.
HTTPS Port It is 443 by default.
Step 3 Click OK.
2.2.15.4.3 Configuring Cloud Service
The cloud service provides a NAT penetration service. Users can manage multiple devices through
DMSS (For details, see the user's manual of DMSS). You do not have to apply for dynamic domain
name, configure port mapping or deploy a server.
Step 1 On the home page, select Local Device Config > Network Setting > Cloud Service.
Step 2 Turn on the cloud service function.
User's Manual
33
Figure 2- 37 Register
Table 2- 17 Automatic registration description
Parameter Description
Server Address The IP address of the server.
Port The port of the server used for automatic registration.
Sub- Device ID
Enter the sub-device ID (user defined).
When you add the Access Controller to the management platform,
the sub-device ID on the management platform must conform to
the defined sub-device ID on the Access Controller.
Step 3 Click Apply.
2.2.15.4.5 Configuring Basic Service
When you want to connect the Access Controller to a third-party platform, turn on the CGI and
ONVIF functions.
Step 1 Select Network Settings > Basic Service.
Step 2 Configure the basic service.
User's Manual
34
Figure 2- 38 Basic service
Table 2 18 Basic service parameter description-
Parameter Description
SSH
SSH, or Secure Shell Protocol, is a remote administration
protocol that allows users to access, control, and modify their
remote servers over the internet.
CGI
In computing, Common Gateway Interface (CGI) is an interface
specification for web servers to execute programs like console
applications (also called command-line interface programs)
running on a server that generates web pages dynamically.
Such programs are known as CGI scripts or simply as CGIs. The
specifics of how the script is executed by the server are
determined by the server. In the common case, a CGI script
executes at the time a request is made and generates HTML.
When CGI is enabled, CGI commands can be used. The CGI is
enabled by default.
ONVIF Enable other devices to acquire video stream of the VTO
through the ONVIF protocol.
Emergency Maintenance It is turned on by default.
Private Protocol
Authentication Mode
Security Mode (recommended)
Compatible Mode
Step 3 Click Apply.
2.2.15.5 Configuring Time
Step 1 On the home page, select Local Device Config > Time.
Step 2 Configure the time of the Platform.
User's Manual
36
2.2.15.6 Account Management
You can add or delete users, change user password, and enter an email address for resetting your
password if you forget it.
2.2.15.6.1 Adding Users
You can add new users and then they can log in to the webpage of the Access Controller.
Procedure
Step 1 On the home page, select Local Device Config > Account Management > Account.
Step 2 Click Add, and then enter the user information.
The username cannot be the same as the existing account. The username can contain
up to 31 characters, and supports numbers, letters, underlines, dots, and @.
-The password must contain 8 to 32 non blank characters and contain at least 2 types of
the following characters: upper case and lower case letters, numbers, and special
characters (excluding ' " ; : &).
Set a high security password by following the password strength prompt.-
Figure 2- 40 Add user
Step 3 Click OK.
Only admin account can change password and the admin account cannot be deleted.
2.2.15.6.2 Resetting the Password
Reset the password through the linked e- mail when you forget your password.
Step 1 Select Local Device Config > Account Management > Account.
Step 2 Enter the email address, and set the password expiration time.
Step 3 Turn on the password reset function.
User's Manual
37
Figure 2-4 1 Reset Password
If you forgot the password, you can receive security codes through the linked email
address to reset the password.
Step 4 Click Apply.
2.2.15.6.3 Adding ONVIF Users
Open Network Video Interface Forum (ONVIF), a global and open industry forum that was
established for the development of a global open standard for the interface of physical IP-based
security products, which allows the compatibility from different manufactures. ONVIF users have
their identities verified through ONVIF protocol. The default ONVIF user is admin.
Step 1 On the home page, select Local Device Config > Account Management > ONVIF
Account.
Step 2 Click Add and then configure parameters.
Figure 2- 42 Add the ONVIF user
Step 3 Click OK.
User's Manual
39
The IP will not be exported.
Import the configuration file.
1. Click Browse to select the configuration file.
2. Click Import configuration.
Configuration files can only be imported to devices that have the same model.
2.2.15.8.2 Configuring the Card reader
Step 1 On the home page, select Local Device Config > Advanced Settings.
Step 2 Configure the card reader.
Figure 2 45 Configure the card reader-
2.2.15.8.3 Configuring the Fingerprint Level
On the home page, select Local Device Config > Advanced Settings, and then enter the fingerprint
threshold. The value ranges from 1 to 10, and higher value means higher recognition accuracy.
User's Manual
40
Figure 2 46 Fingerprint Level-
2.2.15.8.4 Restoring the Factory Default Settings
Restoring the Access Controller to its default configurations will result in data loss. Please be
advised.
Step 1 Select Local Device Config > Advanced Settings
Step 2 Restore to the factory default settings if necessary.
Factory Defaults: Resets all the configurations of the Controller and delete all the data.
Restore to Default (Except for User Info and Logs) : Resets the configurations of the
Access Controller and deletes all the data except for user information, logs, and
information that was configured during the login wizard).
Only the main controller supports Restore to Default (Except for User Info and Logs) .
2.2.15.9 Updating the System
Use the correct update file. Make sure that you get the correct update file from technical support.
Do not disconnect the power supply or network, and do not restart or shutdown the Access
Controller during the update.
2.2.15.9.1 File Update
Step 1 On the home page, select Local Device Config > System Update.
Step 2 In File Update, click Browse, and then upload the update file.
The update file should be a .bin file.
Step 3 Click Update.
The Access Controller will restart after the update finishes.
2.2.15.9.2 Online Update
Step 1 On the home page, select Local Device Config > System Update.
Step 2 In the Online Update area, select an update method.
Select Auto Check for Updates, and the Access Controller will automatically check for
the latest version update.
User's Manual
41
Select Manual Check, and you can immediately check whether the latest version is
available.
Step 3 Click Manual Check to update the Access Controller when the latest version update is
available.
2.2.15.10 Configuring Hardware
On the home page, select Local Device Config > Hardware. You can view the hardware you have
configured when you log in to the platform for the first time. You can also re-configure the
hardware. For details, see Table 2 -1 . "Parameter description"
When you switch between single door and double door, the Access Controller will restart.
The wring diagram is generated for your reference. You can download it to your computer.
Figure 2 47 Hardware-
2.2.15.11 Viewing Version Information
On the home page, select Local Device Config > Version Info, and you can view information on the
version, such as device model, serial number, hardware version, legal information and more.
2.2.15.12 Viewing Legal Information
On the home page, select Local Device Config > Legal Info, and you can view the software license


Produkt Specifikationer

Mærke: Dahua Technology
Kategori: Adgangskontrolsystem
Model: ASC3202B

Har du brug for hjælp?

Hvis du har brug for hjælp til Dahua Technology ASC3202B stil et spørgsmål nedenfor, og andre brugere vil svare dig




Adgangskontrolsystem Dahua Technology Manualer

Adgangskontrolsystem Manualer

Nyeste Adgangskontrolsystem Manualer

Abus

Abus BRIDGE One Manual

5 Januar 2025
ACTi

ACTi LACS3000 Manual

31 December 2025
EQ-3

EQ-3 HM-LC-BL1-SM Manual

29 December 2024
Abus

Abus FG500 HZ Manual

22 December 2024
Vimar

Vimar 14470 Manual

15 December 2024
Vimar

Vimar 14470.SL Manual

15 December 2024
Vimar

Vimar ELVOX 80CN Manual

15 December 2024
Vimar

Vimar ELVOX 80C3 Manual

15 December 2024
Abus

Abus CodeLoxx Manual

9 December 2024
Abus

Abus AE255F Manual

9 December 2024