dahua ASC3202B Access Controller User Manual
- June 9, 2024
- Dahua
Table of Contents
ASC3202B Access Controller
Access Controller
User’s Manual
ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD.
V1.0.2
Foreword
User’s Manual
General
This manual introduces the functions and operations of the Access Controller. Read carefully before using the device, and keep the manual safe for future reference.
Safety Instructions
The following signal words might appear in the manual.
Signal Words
Meaning
Indicates a high potential hazard which, if not avoided, will result in death or serious injury.
Indicates a medium or low potential hazard which, if not avoided, could result
in slight or moderate injury.
Indicates a potential risk which, if not avoided, could result in property
damage, data loss, reductions in performance, or unpredictable results.
Provides methods to help you solve a problem or save time.
Provides additional information as a supplement to the text.
Revision History
Version V1.0.2 V1.0.1 V1.0.0
Revision Content Updated the webpage operations. Updated the wiring. First release.
Release Time December 2022 September 2022 September 2022
Privacy Protection Notice
As the device user or data controller, you might collect the personal data of
others such as their face, fingerprints, and license plate number. You need to
be in compliance with your local privacy protection laws and regulations to
protect the legitimate rights and interests of other people by implementing
measures which include but are not limited: Providing clear and visible
identification to inform people of the existence of the surveillance area and
provide required contact information.
About the Manual
The manual is for reference only. Slight differences might be found between
the manual and the product.
We are not liable for losses incurred due to operating the product in ways
that are not in compliance with the manual.
The manual will be updated according to the latest laws and regulations of
related jurisdictions. For detailed information, see the paper user’s manual,
use our CD-ROM, scan the QR code or visit our official website. The manual is
for reference only. Slight differences might be found between the electronic
version and the paper version.
I
User’s Manual All designs and software are subject to change without prior
written notice. Product updates
might result in some differences appearing between the actual product and the
manual. Please contact customer service for the latest program and
supplementary documentation. There might be errors in the print or deviations
in the description of the functions, operations and technical data. If there
is any doubt or dispute, we reserve the right of final explanation. Upgrade
the reader software or try other mainstream reader software if the manual (in
PDF format) cannot be opened. All trademarks, registered trademarks and
company names in the manual are properties of their respective owners. Please
visit our website, contact the supplier or customer service if any problems
occur while using the device. If there is any uncertainty or controversy, we
reserve the right of final explanation.
II
User’s Manual
Important Safeguards and Warnings
This section introduces content covering the proper handling of the Access
Controller, hazard prevention, and prevention of property damage. Read
carefully before using the Access Controller, and comply with the guidelines
when using it.
Transportation Requirement
Transport, use and store the Access Controller under allowed humidity and
temperature conditions.
Storage Requirement
Store the Access Controller under allowed humidity and temperature conditions.
Installation Requirements
Do not connect the power adapter to the Access Controller while the adapter is
powered on. Strictly comply with the local electric safety code and standards.
Make sure the ambient voltage
is stable and meets the power supply requirements of the Access Controller. Do
not connect the Access Controller to two or more kinds of power supplies, to
avoid damage
to the Access Controller. Improper use of the battery might result in a fire
or explosion.
Personnel working at heights must take all necessary measures to ensure
personal safety including wearing a helmet and safety belts.
Do not place the Access Controller in a place exposed to sunlight or near heat
sources. Keep the Access Controller away from dampness, dust, and soot.
Install the Access Controller on a stable surface to prevent it from falling.
Install the Access Controller in a well-ventilated place, and do not block its
ventilation. Use an adapter or cabinet power supply provided by the
manufacturer. Use the power cords that are recommended for the region and
conform to the rated power
specifications. The power supply must conform to the requirements of ES1 in
IEC 62368-1 standard and be no
higher than PS2. Please note that the power supply requirements are subject to
the Access Controller label. The Access Controller is a class I electrical
appliance. Make sure that the power supply of the Access Controller is
connected to a power socket with protective earthing.
Operation Requirements
Check whether the power supply is correct before use. Do not unplug the power
cord on the side of the Access Controller while the adapter is powered
on.
III
User’s Manual Operate the Access Controller within the rated range of power
input and output. Use the Access Controller under allowed humidity and
temperature conditions. Do not drop or splash liquid onto the Access
Controller, and make sure that there is no object
filled with liquid on the Access Controller to prevent liquid from flowing
into it. Do not disassemble the Access Controller without professional
instruction.
IV
Table of Contents
User’s Manual
Foreword ………………………………………………………………………………………………………………………………………………………………………………..I
Important Safeguards and
Warnings………………………………………………………………………………………………………………………….. III 1 Product
Overview……………………………………………………………………………………………………………………………………………………………1
1.1 Product Introduction ……………………………………………………………………………………………………………………………………………
1 1.2 Main Features …………………………………………………………………………………………………………………………………………………………
1 1.3 Application
Scenarios…………………………………………………………………………………………………………………………………………..1 2 Main
Controller-Sub Controller…………………………………………………………………………………………………………………………………..3
2.1 Networking Diagram …………………………………………………………………………………………………………………………………………… 3
2.2 Configurations of Main
Controller……………………………………………………………………………………………………………………3
2.2.1 Configuration Flowchart……………………………………………………………………………………………………………………………3
2.2.2 Initialization ………………………………………………………………………………………………………………………………………………….
3 2.2.3 Logging In………………………………………………………………………………………………………………………………………………………4
2.2.4 Dashboard……………………………………………………………………………………………………………………………………………………..8
2.2.5 Home Page …………………………………………………………………………………………………………………………………………………..10
2.2.6 Adding Devices …………………………………………………………………………………………………………………………………………..10
2.2.6.1 Adding Device Individually
…………………………………………………………………………………………………………..10 2.2.6.2 Adding Devices in
Batches…………………………………………………………………………………………………………….11 2.2.7 Adding
Users……………………………………………………………………………………………………………………………………………….12 2.2.8 Adding
Time Templates …………………………………………………………………………………………………………………………..17 2.2.9 Adding
Area Permissions…………………………………………………………………………………………………………………………18 2.2.10
Assigning Access Permissions ……………………………………………………………………………………………………………..19
2.2.11 Viewing Authorization Progress
…………………………………………………………………………………………………………20 2.2.12 Configuring Access Control
(Optional) ……………………………………………………………………………………………..21 2.2.12.1 Configuring Basic
Parameters ……………………………………………………………………………………………………21 2.2.12.2 Configuring
Unlock Methods……………………………………………………………………………………………………..22 2.2.12.3 Configuring
Alarms……………………………………………………………………………………………………………………….23 2.2.13 Configuring
Global Alarm linkages (Optional) ……………………………………………………………………………….24 2.2.14
Access Monitoring (Optional) ………………………………………………………………………………………………………………26
2.2.14.1 Remotely Opening and Closing Doors
…………………………………………………………………………………….26 2.2.14.2 Setting Always Open and Always
Closed………………………………………………………………………………..26 2.2.15 Local Device Configurations
(Optional) ……………………………………………………………………………………………27 2.2.15.1 Configure Local
Alarm Linkages………………………………………………………………………………………………..27 2.2.15.2 Configuring
Card Rules ………………………………………………………………………………………………………………..28 2.2.15.3 Backing up
System Logs ………………………………………………………………………………………………………………29 2.2.15.4 Configuring
Network ……………………………………………………………………………………………………………………29
2.2.15.4.1 Configuring TCP/IP ………………………………………………………………………………………………………………29
2.2.15.4.2 Configuring Ports…………………………………………………………………………………………………………………30
V
User’s Manual 2.2.15.4.3 Configuring Cloud
Service…………………………………………………………………………………………………31 2.2.15.4.4 Configuring
Automatic Registration………………………………………………………………………………32 2.2.15.4.5 Configuring
Basic Service ………………………………………………………………………………………………….33 2.2.15.5 Configuring
Time …………………………………………………………………………………………………………………………..34 2.2.15.6 Account
Management ………………………………………………………………………………………………………………….36 2.2.15.6.1 Adding
Users …………………………………………………………………………………………………………………………36 2.2.15.6.2 Resetting
the Password………………………………………………………………………………………………………36 2.2.15.6.3 Adding ONVIF
Users ……………………………………………………………………………………………………………37 2.2.15.7
Maintenance……………………………………………………………………………………………………………………………………38 2.2.15.8
Advanced Management……………………………………………………………………………………………………………….38 2.2.15.8.1
Exporting and Importing Configuration Files ……………………………………………………………..38
2.2.15.8.2 Configuring the Card reader……………………………………………………………………………………………..39
2.2.15.8.3 Configuring the Fingerprint
Level…………………………………………………………………………………..39 2.2.15.8.4 Restoring the Factory
Default Settings………………………………………………………………………….40 2.2.15.9 Updating the
System…………………………………………………………………………………………………………………….40 2.2.15.9.1 File Update
…………………………………………………………………………………………………………………………….40 2.2.15.9.2 Online
Update……………………………………………………………………………………………………………………….40 2.2.15.10 Configuring
Hardware ……………………………………………………………………………………………………………….41 2.2.15.11 Viewing
Version Information …………………………………………………………………………………………………..41 2.2.15.12
Viewing Legal Information……………………………………………………………………………………………………….41 2.2.16
Viewing Records ………………………………………………………………………………………………………………………………………42 2.2.16.1
Viewing Alarm Records ………………………………………………………………………………………………………………..42 2.2.16.2
Viewing Unlock Records ………………………………………………………………………………………………………………42 2.2.17
Security Settings(Optional) ………………………………………………………………………………………………………………….42
2.2.17.1 Security Status………………………………………………………………………………………………………………………………..42
2.2.17.2 Configuring HTTPS………………………………………………………………………………………………………………………..43
2.2.17.3 Attack Defense ……………………………………………………………………………………………………………………………….44
2.2.17.3.1 Configuring Firewall……………………………………………………………………………………………………………44
2.2.17.3.2 Configuring Account Lockout…………………………………………………………………………………………..45
2.2.17.3.3 Configuring Anti-DoS Attack…………………………………………………………………………………………….46
2.2.17.4 Installing Device
Certificate………………………………………………………………………………………………………..47 2.2.17.4.1 Creating
Certificate ……………………………………………………………………………………………………………..47 2.2.17.4.2 Applying
for and Importing CA Certificate …………………………………………………………………..48 2.2.17.4.3
Installing Existing Certificate ……………………………………………………………………………………………50 2.2.17.5
Installing the Trusted CA Certificate ………………………………………………………………………………………..50
2.2.17.6 Security Warning……………………………………………………………………………………………………………………………51 2.3
Configurations of Sub Controller
……………………………………………………………………………………………………………………52 2.3.1 Initialization
………………………………………………………………………………………………………………………………………………..52 2.3.2 Logging
In…………………………………………………………………………………………………………………………………………………….52 2.3.3 Home Page
…………………………………………………………………………………………………………………………………………………..52
VI
User’s Manual 3 Smart PSS Lite-Sub Controllers
…………………………………………………………………………………………………………………………………53
3.1 Networking Diagram ………………………………………………………………………………………………………………………………………….53
3.2 Configurations on SmartPSS Lite
……………………………………………………………………………………………………………………53 3.3 Configurations on Sub
Controller …………………………………………………………………………………………………………………..53 Appendix 1
Cybersecurity Recommendations…………………………………………………………………………………………………………54
VII
1 Product Overview
User’s Manual
1.1 Product Introduction
Flexible and convenient, the Access Controller has a user friendly system that
allows you to access controllers on the webpage through IP address. It comes
with a professional access management system, and makes the networking of main
and sub control modes quick and easy, meeting the needs of small and advanced
systems.
1.2 Main Features
Built of flame-retardant PC and ABS material, it is both sturdy and elegant
with an IK06 rating. Supports TCP and IP connection, and standard PoE.
Accesses card readers through Wiegand and RS-485 protocols. Supplies power to
the lock through its 12 VDC output power supply, which has a maximum
output current of 1000 mA. Supports 1000 users, 5000 cards, 3000 fingerprints,
and 300,000 records. Multiple unlock methods including card, password,
fingerprint and more. You can also combine
these methods to create your own personal unlock methods. Multiple types of
alarms events are supported, such as duress, tampering, intrusion, unlock
timeout, and illegal card. Supports a wide range of users including general,
patrol, VIP, guest, blocklisted, and more users. Manual and automatic time
synchronization. Retains stored data even while powered off. Offers a variety
of functions and the system can be configured. Devices can also be updated
through the webpage. Features main and sub control modes. The main control
mode offers user management, access
control device management and configuration, and more options. Devices under
sub-control modes can be added to multiple platforms. A main controller can
connect with and manage up to 19 sub controllers. Watchdog protects the system
to allow the device to be stable and perform efficiently. Sub controllers can
be added to SmartPSS Lite and DSS Pro.
1.3 Application Scenarios
It is widely used in parks, communities, business centers and factories, and
ideal for places such as office buildings, government buildings, schools and
stadiums. The Access Controller can be set to the main access controller
(herein referred to as main controller) or the Sub Access Controller (herein
referred to as sub-controller). 2 different networking methods are available
for the Access Controller. You can select a networking method based on your
needs.
1
User’s Manual
Table 1-1 Networking methods of access controller
Networking methods
Description
Main Controller–Sub Controller
The main controller comes with a management platform (herein referred to as the Platform). Sub-controllers must be added to the Platform of the main controller. The main controller can manage up to 19 sub controllers. For details, see “2 Main Controller-Sub Controller”.
SmartPSS Lite–Sub Controller
Sub controllers needs to be added to a standalone management platform, such as SmartPSS Lite. The platform can manage up to 32 sub controllers. For details, see “3 Smart PSS Lite-Sub Controllers”.
2
User’s Manual
2 Main Controller-Sub Controller
2.1 Networking Diagram
The main controller comes with a management platform (herein referred as the
platform). Sub controller needs to be added to the management platform of the
main controller. The main controller can manage up to 19 sub controllers.
Figure 2-1 Networking diagram
2.2 Configurations of Main Controller
2.2.1 Configuration Flowchart
Figure 2-2 Configuration flowchart
2.2.2 Initialization
Initialize the main controller when you log in to the webpage for the first
time or after it is restored to its factory defaults.
Prerequisites
Make sure that the computer used to log in to the webpage is on the same LAN
as the main 3
User’s Manual
controller.
Procedure
Step 1
Open a browser, go to the IP address (the IP address is 192.168.1.108 by default) of the main controller.
Step 2 Step 3
Step 4
We recommend you use the latest version of Chrome or Firefox. Select a language, and then click Next. Read the software license agreement and privacy policy carefully, select I have read and agree to the terms of the Software License Agreement and Privacy Policy., and then click Next. Set the password and email address.
Step 5
The password must consist of 8 to 32 non-blank characters and contain at least
two types of the following characters: upper case and lower case letters,
numbers, and special characters (excluding ‘ ” ; : &). Set a high-security
password by following the password strength prompt.
Keep the password safe after initialization and change the password regularly
to improve security.
Configure the system time, and then click Next.
Figure 2-3 Configure the time
Step 6 Step 7
(Optional) Select Auto Check for Updates, and then click Completed. The system automatically check is there any higher version available, and inform the user to update the system. The system automatically checks for new updates, and informs you when a new update is available. Click Completed. The system automatically goes to the login page after initialization is successful.
2.2.3 Logging In
For first-time login initialization, you need to follow the login wizard to
configure the type of the main controller and its hardware.
4
Step 1 On the login page, enter the username and password.
User’s Manual
The default administrator name is admin, and the password is the one you set
during initialization. We recommend you change the administrator password
regularly to increase security of the platform.
If you forget the administrator login password, you can click Forget
password?.
Step 2 Select Main Control, and then click Next.
Figure 2-4 Type of access controller
Step 3 Step 4
Main Control: The main controller comes with a management platform. You can
manage all sub-controllers, configure access control, access personal
management on the platform, and more.
Sub Control: Sub controllers needs to be added to the management platform of
the main controller or other management platforms such as DSS Pro or SmartPSS
Lite. You can only perform the local configurations on the webpage of the sub-
controller. For details, see “2.3 Configurations of Sub Controller”.
Select the number of doors, and then enter the name of the door. Configure the
parameters of the doors.
5
Figure 2-5 Configure door parameters
User’s Manual
Table 2-1 Parameter description
Parameter
Description
Entry Card Reader Exit Button
Select the card reader protocol. Wiegand: Connects to a wiegand reader. You
can connect the
LED wire to the LED port of the controller, and the reader will beep and flash
when the door unlocks. OSDP: Connects to an OSDP reader. RS-485: Connects to
an OSDP reader.
Connects to a exit button.
Door Detector
Connects to a door detector.
12 V: The controller provides power for the lock.
Power Supply of Locks
Fail secure: When the power is interrupted or fails, the door stays locked.
Fail safe: When the power be interrupted or fails, the door automatically
unlocks to let people leave.
Relay: The relay supplies power for the lock.
Relay open = locked: Sets the lock to remain locked when the relay is open.
Relay open = unlocked: Sets the lock to unlock when the relay is open.
Step 5 Step 6
Configure access control parameters. In Unlock Settings, select Or or And from
Combination Method. Or: Use one of the selected unlock methods to authorize
opening the door. And: Use all of the selected unlock methods to authorize
opening the door.
The Controller supports unlock through card, fingerprint, and password.
6
Step 7 Select the unlock methods, and configure the other parameters. Figure 2-6 Element (multiple choice)
User’s Manual
Table 2-2 Unlock settings description
Parameter
Description
Door Unlock Duration
After a person is granted access, the door will remain unlocked for a defined time for them to pass through. It ranges from 0.2 s to 600 seconds.
Unlock Timeout
A timeout alarm is triggered when the door remains unlocked for longer than the defined value.
Step 8 In Alarm Settings, configure the alarm parameters.
Figure 2-7 Alarm
Table 2-3 Description of alarm parameters
Parameter
Description
Duress Alarm
An alarm will be triggered when a duress card, duress password or duress fingerprint is used to unlock the door.
Door Detector
Select the type of door detector.
Intrusion Alarm
When door detector is enabled, an intrusion alarm will
be triggered if the door is opened abnormally.
A timeout alarm is triggered when the door remains
Unlock Timeout Alarm
unlocked for longer than the defined unlock time.
When Card reader beeps is enabled, the card reader beeps when the intrusion
alarm or timeout alarm is triggered.
Step 9 Click Next.
A wiring diagram is generated based on your configurations. You can wire the device
according to the diagram.
7
The image below is for reference only. Figure 2-8 Wiring diagram
User’s Manual
Step 10
Click Apply. You can go to Local Device Config > Hardware to change the
settings after you
successfully log in to the platform. Click Download Image to download the
diagram to your computer.
2.2.4 Dashboard
After you successfully log in, the dashboard page of the platform is
displayed. The dashboard is
8
displayed showing visualized data. Figure 2-9 Dashboard
User’s Manual
Table 2-4 Home page description
No.
Description
1
Displays the unlock methods used for the day. Hover over a day to see the type of unlocks used for that day.
2
Displays the total number of alarms.
3
Click
to go to the dashboard page.
Click to go to the home page of the platform.
4
Displays the status of devices, including offline devices and online devices.
5
Displays the data capacity of cards, fingerprints and users.
The number of doors of the controller.
: Double door : Single door The type of the controller.
6
: Main controller.
: Sub controller.
: Select the language of the platform.
: Goes to the Security page directly.
: Restart or log out of the platform.
: Display the webpage in full screen.
9
2.2.5 Home Page
After you successfully log in, the home page of the main controller is
displayed. Figure 2-10 Home page
User’s Manual
Menu Device Management Person Management
Access Control Config
Access Monitoring Reporting Local Device Config
Table 2-5 Home page description
Description
Add devices to the platform of the main controller. Add personnel and assign
area permissions to them. Add time templates, create and assign area
permissions, configure door parameters and global alarm linkages, and view the
permission authorization progress. Remotely control the doors and view event
logs. View and export alarm records and unlock records. Configure parameters
for the local device, such as network and local alarm linkage.
2.2.6 Adding Devices
You can add devices to the management platform of the main controller in
batches or one by one. If the controller was set to the main controller while
you were going through the login wizard, you can add and manage sub
controllers through the Platform.
Only the main controller comes with a management platform.
2.2.6.1 Adding Device Individually
You can add sub controllers one by one by entering their IP addresses or domain names.
Procedure
Step 1 Step 2
On the home page, Click Device Management, and then click Add. Enter the device information.
10
Figure 2-11 Device information
User’s Manual
Table 2-6 Device parameters Description
Parameter
Description
Device Name
Enter the name of the Controller. We recommend you name it after its installation area.
Add Mode
Select IP to add the Access Controller by entering its IP address.
IP Address
Enter the IP address of the controller.
Port
The port number is 37777 by default.
Username/Password
Enter the username and password of the Controller.
Step 3 Click OK.
The added controllers are displayed on the Device Management page.
Figure 2-12 Successfully add devices
If the controller was set as the main controller while you were going through
the login wizard, the controller will be added to the management platform
automatically and function as both the main controller and sub controller.
Related Operations
: Edit the information on the device.
Only sub controllers support the below operations. : Go to the webpage of the
sub controller. : Log out of the device. : Delete the device.
2.2.6.2 Adding Devices in Batches
We recommend you use the auto-search function when you add sub controllers in
batches. Make sure the sub controllers you want to add are on the same network
segment.
11
Procedure
Step 1
User’s Manual
On the home page, Click Device Management, and then click Search Device. Click
Start Search to search for devices on the same LAN. Enter a range for the
network segment, and then click Search.
Figure 2-13 Auto search
All devices that were searched for will be displayed.
You can select devices from the list, and click Device Initialization to initialize them in batches.
Step 2 Step 3
To ensure the security of devices, initialization is not supported for devices on different segments. Select the Controllers that you want to add to the Platform, and then click Add. Enter the username and password of the sub controller, and then click OK. The added sub controllers are displayed on the Device Management page.
Related Operations
Modify IP: Select added devices, and then click Modify IP to change their IP
addresses. Sync Time: Select added devices, and then click Sync Time to sync
the time of the devices with
the NTP server. Delete: Select the devices, and then click Delete to delete
them.
2.2.7 Adding Users
Add users to departments. Enter basic information for users and set
verification methods to verify their identities.
Procedure
Step 1 On the home page, select Person Management.
12
Step 2
Create a department. 1. Click . 2. Enter the name of the department, and then click Add.
The default company cannot be deleted. Figure 2-14 Add department
User’s Manual
Step 3
(Optional) Before you assign cards to users, set the card type and the type of the card number. 1. On the Person Management page, select More > Card Type. 2. Select ID or IC Card, and then click OK.
Step 4
Make sure that the card type is same as the card type that will be assigned; otherwise, the card number cannot be read. For example, if the assigned card is an ID card, set card type to ID card. 3. Select More > Card No. System. 4. Select decimal format or hexadecimal format for the card number. Add users. Add users one by one.
When you want to assign access permissions to one person, you can add users individually. For details on how to assign access permissions, see “2.2.9 Adding Area Permissions”. 1. Click Add, and then enter the basic information for the user.
13
Figure 2-15 Basic information on the user
User’s Manual
Table 2-7 parameters description
Parameter
Description
User ID
The ID of the user.
Department
The department that the user belongs to.
Validity Period
Set a date on which the access permissions of the person will become effective.
To
Set a date on which the access permissions of the person will expire.
User Name
The name of the user.
User Type
The type of the user. General User: General users can unlock the door. VIP
User: When VIP unlocks the door, service personnel will receive
a notice. Guest User: Guests can unlock the door within a defined period or
for set number of times. After the defined period expires or the unlocking
times runs out, they cannot unlock the door. Patrol User: Patrol users will
have their attendance tracked, but they have no unlocking permissions.
Blocklist User: When users in the blocklist unlock the door, service personnel
will receive a notification. Other User: When they unlock the door, the door
will stay unlocked for 5 more seconds.
Unlock Attempts
The times of unlock attempts for guest users.
2. Click Add.
You can click Add More to add more users.
Add users in batches.
1. Click Import > Download Template to download the user template.
2. Enter user information in the template, and then save it.
3. Click Import, and upload the template to the Platform.
The users are added to the Platform automatically.
Step 5 Click the Authentication tab, set the authentication method to verify the identity of
people.
14
User’s Manual
Each user can have 1 password, 5 cards, and 3 fingerprints.
Authentication Methods Password
Card
Fingerprint
Table 2-8 Set authentication methods
Description
Enter and confirm the password.
Enter the card number manually. 1. Click Add. 2. Enter the card number, and
then click Add.
Read the number automatically through a card enrollment reader. 1. Click . 2.
Select Enrollment Reader, and click OK. Make sure that the card enrollment
reader is connected to your computer. 3. Click Add, and follow the on-screen
instructions to download and install the plug-in. 4. Swipe the card on the
enrollment reader. A 20-second countdown is displayed to remind you to swipe
the card, and the system will read the card number automatically. If the
20-second countdown expires, click Read Card to start a new countdown. 5.
Click Add.
Read the number automatically through a card reader. 1. Click . 2. Select
Device, select the card reader, and click OK. Make sure the card reader is
connected to the access controller. 3. Swipe the card on the card reader. A
20-second countdown is displayed to remind you to swipe the card, and the
system will read the card number automatically. .If the 20-second countdown
expires, click Read Card to start a new countdown. 4. Click Add.
Connect a fingerprint scanner to the computer, and follow the on-screen
instructions to register the fingerprint.
15
Figure 2-16 Authentication method
User’s Manual
Parameter Password
Table 2-9 Authentication method Description Users can gain access by entering the password. Users can gain access by swiping the card.
Card
Fingerprint Step 6 Click OK.
: Change the number of the card. : Set the card to duress card.
An alarm is triggered when people use duress card to unlock the door. : Delete
the card.
User can gain access through verifying the fingerprint.
Related Operations
On the Person Management page, click Export to export all users in the Excel
format. On the Person Management page, click More > Extract, and select a
device to extract all users
from the sub controller to the Platform of the main controller. On the Person
Management page, click More > Card Type, set the card type before you assign
cards to users. For example, if the assigned card is an ID card, set the card
type to ID card. On the Person Management page, click More > Card No. System,
set the card system to the
decimal or hexadecimal format.
16
2.2.8 Adding Time Templates
User’s Manual
Time template defines the unlock schedules of the Controller. The platform offers 4 time templates by default. The template is also customizable.
The default templates cannot be changed. Step 1 On the home page, select
Access Control Config > Time Template, and then click . Step 2 Enter the name
of the time template.
Figure 2-17 Create time templates
Step 3
The default full-day time template cannot be modified. You can only create up to 128 time templates. Drag the slider to adjust the time period for each day. You can also click Copy to apply the configured time period to other days.
Step 4 Step 5
You can only configure up to 4 time sections for each day. Click Apply.
Configure holiday plans. 1. Click the Holiday Plan tab, and then click Add to
add holidays.
You can add up to 64 holidays. 2. Select a holiday. 3. Drag the slider to
adjust the time period for the holiday. 4. Click Apply.
17
Figure 2-18 Create holiday plan
User’s Manual
2.2.9 Adding Area Permissions
An area permission group is a collection of door access permissions in a
defined time. Create a permission group, and then associate users with the
group so that users will be assigned with access permissions defined for the
group. Step 1 Click Access Control Config > Permission Settings. Step 2 Click
.
You can add up to 128 area permissions. Step 3 Enter the name of the area
permission group, remarks (optional), and select a time
template. Step 4 Select doors. Step 5 Click OK.
18
Figure 2-19 Create area permission groups
User’s Manual
2.2.10 Assigning Access Permissions
Assign access permissions to users by linking them to the area permission
group. This will allow the users to gain access to secure areas. Step 1 On the
home page, select Access Control Config > Permission Settings. Step 2 Click
for an existing permission group, and then select users from the department.
You can select a whole department. Figure 2-20 Select users
You can click to create new permission groups. For details on creating
permission groups, see “2.2.9 Adding Area Permissions”.
19
Figure 2-21 Assign permissions in batches
User’s Manual
Step 3 Click OK.
Related Operations
When you want to assign permission to a new person or change access
permissions for an existing person, you can assign access permission to them
one by one. 1. On the home page, select Person Management. 2. Select the
department, and then select an existing user.
If the user was not added before, click Add to add the user. For details on
creating users, see “2.2.7 Adding Users”. 3. Click corresponding to the user.
4. On the Permission tab, select existing permission groups.
You can click Add to create new area permissions. For details on creating area
permissions, see “2.2.9 Adding Area Permissions”.
You can link multiple area permissions to a user. 5. Click OK.
2.2.11 Viewing Authorization Progress
After you assign access permissions to users, you can view the authorization
process. Step 1 On the home page, select Access Control Config > Authorization
Progress. Step 2 View the authorization progress.
Sync SubControl Person: Sync personnel on the main controller to the sub-
controller.
20
User’s Manual Sync Local Person: Sync personnel on the management platform of
the main controller
to its server. Sync Local Time: Sync the time templates in the area
permissions to the sub-controller.
Figure 2-22 Authorization progress
Step 3 (Optional) If authorization failed, click to try again. You can click
to view details on the failed authorization task.
2.2.12 Configuring Access Control (Optional)
2.2.12.1 Configuring Basic Parameters
Step 1 Select Access Control Config > Door Parameters. Step 2 In Basic
Settings, configure basic parameters for the access control.
Figure 2-23 Basic parameters
Parameter Name
Table 2-10 Basic parameters description Description The name of the door.
21
Parameter
Unlock Type
Door Status Normally Open Period Normally Closed Period Admin Unlock Password
User’s Manual
Description
If you selected 12 V to supply power for the lock through the controller
during the log-in wizard, you can set fail secure or fail safe.
Fail secure: When the power is interrupted or fails, the door stays locked.
Fail safe: When the power is interrupted or fails, the door automatically
unlocks to allow people to leave.
If you selected Relay to supply power for the lock through the relay during
the login wizard, you can set relay open or relay close.
Relay open=locked: Set the lock to remain locked when the relay is open.
Relay open=unlocked: Set the lock to unlock when the relay is open.
Set the door status. Normal: The door will be unlocked and locked according to
your
settings. Always Open: The door remains unlocked all the time. Always Closed:
The door remains locked all the time.
When you select Normal, you can select a time template from the drop-down
list. The door remains open or closed during the defined time.
Turn on the admin unlock function, and then enter the password of the
administrator. Administrator can unlock the door by only entering the admin
password.
2.2.12.2 Configuring Unlock Methods
You can use multiple unlock methods to unlock the door, such as face,
fingerprint, card, and password unlock. You can also combine them to create
your own personal unlock method. Step 1 Select Access Control Config > Door
Parameters. Step 2 In Unlock Settings, select an unlock mode.
Combination unlock 1. Select Combination Unlock from the Unlock Mode list. 2.
Select Or or And. Or: Use one of the selected unlocking methods to open the
door. And: Use all the selected unlocking methods to open the door. The
Controller supports unlock through card, fingerprint or password. 3. Select
unlock methods, and then configure other parameters.
22
Figure 2-24 Unlock Settings
User’s Manual
Table 2-11 Unlock settings description
Parameter
Description
Door Unlock Duration
After a person is granted access, the door will remain unlocked for a defined time for them to pass through. It ranges from 0.2 to 600 seconds.
Unlock Timeout
A timeout alarm can be triggered if the door remains unlocked for longer than this value.
Unlock by period
1. In the Unlock Mode list, select Unlock by Period.
2. Drag the slider to the adjust time period for each day.
You can also click Copy to apply the configured time period to other days. 3.
Select an unlock method for the time period, and then configure other
parameters.
Figure 2-25 Unlock by period
Step 3 Click Apply.
2.2.12.3 Configuring Alarms
An alarm will be triggered when an abnormal access event occurs. Step 1 Select
Access Control Config > Door Parameters > Alarm Settings.
23
Step 2 Configure alarm parameters. Figure 2-26 Alarm
User’s Manual
Table 2-12 Description of alarm parameters
Parameter
Description
Duress Alarm
An alarm will be triggered when a duress card, duress password or duress fingerprint is used to unlock the door.
Door Detector
Select the type of door detector.
Intrusion Alarm Unlock Timeout Alarm Step 3 Click Apply.
When door detector is enabled, an intrusion alarm will be triggered if the
door is opened abnormally.
A timeout alarm will be triggered if the door remains unlocked longer than the
defined unlock time.
When Card reader beeps is enabled, the card reader beeps when the intrusion
alarm or timeout alarm is triggered.
2.2.13 Configuring Global Alarm linkages (Optional)
You can configure global alarm linkages across different Access Controllers.
Background Information
When you have configured both global alarm linkages and local alarm linkages,
and if the global alarm linkages conflict with the local alarm linkages, the
last alarm linkages you have configured will take effective.
Procedure
Step 1 Step 2
Select Access Control Config > Global Alarm Linkage. Configure the alarm
output. 1. Select an alarm input from the alarm input channel list, and then
click Link Alarm
Output. 2. Click Add, select an alarm output channel, and then click OK.
24
Figure 2-27 Alarm output
User’s Manual
Step 3
3. Turn on the alarm output function and then enter the alarm duration. 4.
Click Apply. Configure the door linkage. 1. Select an alarm input from the
channel list, and then click Add. 2. Select the linkage door, select the door
status, and then click OK.
Always Closed: The door automatically locks when an alarm is triggered. Always
Open: The door automatically unlocks when an alarm is triggered.
Figure 2-28 Door linkage
3. Click Enable to turn on the door linkage function.
If you turn on link fire safety control, all door linkages automatically
change to Always Open status, and all doors will open when the fire alarm is
triggered. 4. Click Apply. You can click Copy to to apply the pre-configured
alarm linkages to other alarm input channels.
25
2.2.14 Access Monitoring (Optional)
User’s Manual
2.2.14.1 Remotely Opening and Closing Doors
You can remotely monitor and control the door. For example, you can remotely open or close the door.
Procedure
Step 1 Step 2
Click Access Monitoring on the home page. Select the door, and then click Open or Close to remotely control the door.
Figure 2-29 Remotely control the door
Related Operations
Event filtering: Select the event type in Event Info, and the event list
displays the selected event types, such as alarm events and abnormal events.
Event deleting: Click to clear all events from the event list.
2.2.14.2 Setting Always Open and Always Closed
After setting always open or always close, the door remains open or closed all
the time. Step 1 Click Access Monitoring on the home page. Step 2 Click Always
Open or Always Closed to open or close the door.
Figure 2-30 Always open or close
The door will remain open or closed all the time. You can click Normal to restore access control to its normal status, and the door will be open or closed based on the configured verification methods.
26
2.2.15 Local Device Configurations (Optional)
Local device configurations can only be applied to the local Access
Controllers.
User’s Manual
2.2.15.1 Configure Local Alarm Linkages
You can only configure local alarm linkages on the same access controller.
Each controller has 2 alarm inputs and 2 alarm outputs. Step 1 On the home
page, select Local Device Config > Local Alarm Linkage. Step 2 Click to
configure local alarm linkage.
Figure 2-31 Local alarm linkage
Parameter Alarm input channel Alarm Input Name Alarm Input Type
Link Fire Safety Control Alarm Output Duration
Table 2-13 Local alarm linkage Description The number of the alarm input
channel.
Each controller has 2 alarm inputs and 2 alarm outputs.
The name of the alarm input. The type of the alarm input. Normally Open
Normally Closed If you turn on the link fire safety control, all the doors
will open when the fire alarm is triggered. You can turn on the alarm output
function. When an alarm is triggered, the alarm remains on for a defined time.
27
Parameter
Alarm Output Channel
AC Linkage Door1/Door2 Step 3 Click OK.
Description Select the alarm output channel.
User’s Manual
Each controller has 2 alarm inputs and 2 alarm outputs.
Turn on AC Linkage to configure the door linkage. Set the door to always open
or always closed status. When an alarm is triggered, the door will
automatically open or close.
2.2.15.2 Configuring Card Rules
The platform supports 5 types of Wiegand formats by default. You can also add
custom Wiegand formats. Step 1 On the home page, select Local Device Config >
Access Card Rule Config. Step 2 Click Add, and then configure new Wiegand
formats.
Figure 2-32 Add new Wiegand formats
Parameter Wiegand format Total bits Facility Code Card number
Table 2-14 Configure the Wiegand format Description The name of the Wiegand format. Enter the total number of bits. Enter the start bit and the end bit for the facility code. Enter the start bit and the end bit for the card number.
28
Parameter Parity Code Step 3 Click OK.
User’s Manual
Description 1. Enter the even parity start bit and even parity end bit. 2.
Enter the odd parity start bit and odd parity end bit.
2.2.15.3 Backing up System Logs
Step 1 On the home page, select Local Device Config > System Logs. Step 2
Select the type of log, and then select the time range.
Figure 2-33 Back up logs
Step 3 Click Encrypt Log Backup to back up encrypted logs. Step 4 (Optional)
You can also click Export to export logs.
2.2.15.4 Configuring Network
2.2.15.4.1 Configuring TCP/IP
You need to configure the IP address of the Access Controller to make sure
that it can communicate with other devices. Step 1 Select Local Device Config
Network Setting > TCP/IP. Step 2 Configure the parameters.
29
Figure 2-34 TCP/IP
User’s Manual
Parameter IP Version MAC Address
Mode
IP Address Subnet Mask Default Gateway Preferred DNS Alternate DNS Step 3
Click OK.
Table 2-15 Description of TCP/IP Description IPv4. MAC address of the Access
Controller. Static: Manually enter IP address, subnet mask, and gateway. DHCP:
Dynamic Host Configuration Protocol. When DHCP is turned on, the Access
Controller will automatically be assigned IP address, subnet mask, and
gateway. If you select static mode, configure the IP address, subnet mask and
gateway.
IP address and gateway must be on the same network segment.
Set the IP address of the preferred DNS server. Set the IP address of the
alternate DNS server.
2.2.15.4.2 Configuring Ports
You can limit access to the Access Controller at the same time through web,
desktop client and phone. Step 1 Select Local Device Config > Network Setting
Port. Step 2 Configure port numbers.
30
User’s Manual
You need to restart the controller to make the configurations effective for
all the parameters except Max Connection and RTSP Port.
Figure 2-35 Configure ports
Parameter Max Connection TCP Port HTTP Port HTTPS Port Step 3 Click OK.
Table 2-16 Description of ports
Description
You can set the maximum number of clients that can access the Access
Controller at the same time, such as the web client, desktop client and phone.
It is 37777 by default.
It is 80 by default. If you want to change the port number, add the new port
number after the IP address when you log in to the webpage.
It is 443 by default.
2.2.15.4.3 Configuring Cloud Service
The cloud service provides a NAT penetration service. Users can manage
multiple devices through DMSS (For details, see the user’s manual of DMSS).
You do not have to apply for dynamic domain name, configure port mapping or
deploy a server. Step 1 On the home page, select Local Device Config > Network
Setting > Cloud Service. Step 2 Turn on the cloud service function.
31
Figure 2-36 Cloud service
User’s Manual
Step 3 Step 4
Click Apply. Download DMSS and sign up, you can scan the QR code through DMSS to add the Access Controller to it. For details, see the user’s manual of DMSS.
2.2.15.4.4 Configuring Automatic Registration
The Access Controller reports its address to the designated server so that you
can get access to the Access Controller through the management platform. Step
1 On the home page, select Network Setting > Register. Step 2 Enable the
automatic registration function, and then configure the parameters.
32
Figure 2-37 Register
User’s Manual
Parameter Server Address Port
Table 2-17 Automatic registration description Description The IP address of the server. The port of the server used for automatic registration. Enter the sub-device ID (user defined).
Sub-Device ID Step 3 Click Apply.
When you add the Access Controller to the management platform, the sub-device ID on the management platform must conform to the defined sub-device ID on the Access Controller.
2.2.15.4.5 Configuring Basic Service
When you want to connect the Access Controller to a third-party platform, turn
on the CGI and ONVIF functions. Step 1 Select Network Settings > Basic
Service. Step 2 Configure the basic service.
33
Figure 2-38 Basic service
User’s Manual
Table 2-18 Basic service parameter description
Parameter
Description
SSH, or Secure Shell Protocol, is a remote administration
SSH
protocol that allows users to access, control, and modify their
remote servers over the internet.
In computing, Common Gateway Interface (CGI) is an interface
specification for web servers to execute programs like console
applications (also called command-line interface programs)
running on a server that generates web pages dynamically.
CGI
Such programs are known as CGI scripts or simply as CGIs. The specifics of how the script is executed by the server are
determined by the server. In the common case, a CGI script
executes at the time a request is made and generates HTML.
When CGI is enabled, CGI commands can be used. The CGI is
enabled by default.
ONVIF
Enable other devices to acquire video stream of the VTO through the ONVIF protocol.
Emergency Maintenance
It is turned on by default.
Private Protocol Authentication Mode
Step 3 Click Apply.
Security Mode (recommended) Compatible Mode
2.2.15.5 Configuring Time
Step 1 On the home page, select Local Device Config > Time. Step 2 Configure
the time of the Platform.
34
Figure 2-39 Date settings
User’s Manual
Parameter
Time
Time format Time Zone DST Step 3 Click Apply.
Table 2-19 Time settings description
Description
Manual Settings: Manually enter the time or you can click Sync PC to sync time
with computer.
NTP: The Access Controller will automatically sync the time with the NTP
server.
Server: Enter the domain of the NTP server. Port: Enter the port of the NTP
server. Interval: Enter its time with the synchronization interval.
Select the time format for the Platform.
Enter the time zone of the Access Controller. 1. (Optional) Enable DST. 2.
Select Date or Week from the Type. 3. Configure start time and end time.
35
2.2.15.6 Account Management
User’s Manual
You can add or delete users, change user password, and enter an email address for resetting your password if you forget it.
2.2.15.6.1 Adding Users
You can add new users and then they can log in to the webpage of the Access Controller.
Procedure
Step 1 Step 2
On the home page, select Local Device Config > Account Management > Account. Click Add, and then enter the user information.
The username cannot be the same as the existing account. The username can
contain up to 31 characters, and supports numbers, letters, underlines, dots,
and @.
The password must contain 8 to 32 non-blank characters and contain at least 2
types of the following characters: upper case and lower case letters, numbers,
and special characters (excluding ‘ ” ; : &). Set a high-security password by
following the password strength prompt.
Figure 2-40 Add user
Step 3 Click OK. Only admin account can change password and the admin account
cannot be deleted.
2.2.15.6.2 Resetting the Password
Reset the password through the linked e-mail when you forget your password.
Step 1 Select Local Device Config > Account Management > Account. Step 2 Enter
the email address, and set the password expiration time. Step 3 Turn on the
password reset function.
36
Figure 2-41 Reset Password
User’s Manual
Step 4
If you forgot the password, you can receive security codes through the linked email address to reset the password. Click Apply.
2.2.15.6.3 Adding ONVIF Users
Open Network Video Interface Forum (ONVIF), a global and open industry forum
that was established for the development of a global open standard for the
interface of physical IP-based security products, which allows the
compatibility from different manufactures. ONVIF users have their identities
verified through ONVIF protocol. The default ONVIF user is admin. Step 1 On
the home page, select Local Device Config > Account Management > ONVIF
Account. Step 2 Click Add and then configure parameters.
Figure 2-42 Add the ONVIF user
Step 3 Click OK. 37
2.2.15.7 Maintenance
User’s Manual
You can regularly restart the Access Controller during its idle time to
improve its performance. Step 1 Log in to the webpage. Step 2 Select Local
Device Config > Maintenance.
Figure 2-43 Maintenance
Step 3 Set the restart time, and then click OK. Step 4 (Optional) Click
Restart, and the Access Controller will restart immediately.
2.2.15.8 Advanced Management
When more than one Access Controller requires the same configurations, you can
configure them quickly by importing or exporting configuration files.
2.2.15.8.1 Exporting and Importing Configuration Files
You can import and export the configuration file for the Access Controller.
When you want to apply the same configurations to multiple devices, you can
import the configuration file to them. Step 1 Log in to the webpage. Step 2
Select Local Device Config > Advanced Settings.
Figure 2-44 Configuration management
Step 3
Export or import configuration files. Export the configuration file.
Click Export Configuration File to download the file to the local computer.
38
User’s Manual The IP will not be exported. Import the configuration file. 1.
Click Browse to select the configuration file. 2. Click Import configuration.
Configuration files can only be imported to devices that have the same model.
2.2.15.8.2 Configuring the Card reader
Step 1 On the home page, select Local Device Config > Advanced Settings. Step
2 Configure the card reader.
Figure 2-45 Configure the card reader
2.2.15.8.3 Configuring the Fingerprint Level
On the home page, select Local Device Config > Advanced Settings, and then
enter the fingerprint threshold. The value ranges from 1 to 10, and higher
value means higher recognition accuracy.
39
Figure 2-46 Fingerprint Level
User’s Manual
2.2.15.8.4 Restoring the Factory Default Settings
Restoring the Access Controller to its default configurations will result in
data loss. Please be advised. Step 1 Select Local Device Config > Advanced
Settings Step 2 Restore to the factory default settings if necessary.
Factory Defaults: Resets all the configurations of the Controller and delete
all the data. Restore to Default (Except for User Info and Logs): Resets the
configurations of the
Access Controller and deletes all the data except for user information, logs,
and information that was configured during the login wizard).
Only the main controller supports Restore to Default (Except for User Info and
Logs).
2.2.15.9 Updating the System
Use the correct update file. Make sure that you get the correct update file
from technical support. Do not disconnect the power supply or network, and do
not restart or shutdown the Access
Controller during the update.
2.2.15.9.1 File Update
Step 1 On the home page, select Local Device Config > System Update. Step 2 In
File Update, click Browse, and then upload the update file.
Step 3
The update file should be a .bin file. Click Update. The Access Controller will restart after the update finishes.
2.2.15.9.2 Online Update
Step 1 Step 2
On the home page, select Local Device Config > System Update. In the Online
Update area, select an update method. Select Auto Check for Updates, and the
Access Controller will automatically check for
the latest version update.
40
Step 3
User’s Manual
Select Manual Check, and you can immediately check whether the latest version
is available.
Click Manual Check to update the Access Controller when the latest version
update is available.
2.2.15.10 Configuring Hardware
On the home page, select Local Device Config > Hardware. You can view the
hardware you have configured when you log in to the platform for the first
time. You can also re-configure the hardware. For details, see Table 2-1
“Parameter description”.
When you switch between single door and double door, the Access Controller
will restart. The wring diagram is generated for your reference. You can
download it to your computer.
Figure 2-47 Hardware
2.2.15.11 Viewing Version Information
On the home page, select Local Device Config > Version Info, and you can view
information on the version, such as device model, serial number, hardware
version, legal information and more.
2.2.15.12 Viewing Legal Information
On the home page, select Local Device Config > Legal Info, and you can view
the software license
41
agreement, privacy policy and open source software notice.
User’s Manual
2.2.16 Viewing Records
You can view alarm logs and unlock logs.
2.2.16.1 Viewing Alarm Records
Step 1 On the home page, select Reporting > Alarm Records. Step 2 Select the
device, department and the time range, and then click Search.
Figure 2-48 Alarm records
Export: Exports unlock logs on the main controller to a local computer.
Extract Device Records: When logs for sub controller are generated when they
go
online, you can extract logs from the sub controller to the main controller.
2.2.16.2 Viewing Unlock Records
Step 1 On the home page, select Reporting > Unlock Records Step 2 Select the
device, department and the time range, and then click Search.
Figure 2-49 Unlock logs
Export: Exports unlock logs. Extract Device Records: When logs on sub
controller are generated when they go
online, you extract logs on the sub controller to the main controller.
2.2.17 Security Settings(Optional)
2.2.17.1 Security Status Background Information
Scan the users, service, and security modules to check the security status of
the Access Controller. User and service detection: Check whether the current
configuration conforms to
recommendation. Security modules scanning: Scan the running status of security
modules, such as audio and video
transmission, trusted protection, securing warning and attack defense, not
detect whether they
42
are enabled.
Procedure
Step 1 Step 2
Select Security > Security Status. Click Rescan to perform a security scan of the Access Controller.
User’s Manual
Hover over the icons of the security modules to see their running status. Figure 2-50 Security Status
Related Operations
After you perform the scan, the results will be displayed in different colors.
Yellow indicates that the security modules are abnormal, and green indicates
that the security modules are normal. Click Details to view the details on the
results of the scan. Click Ignore to ignore the abnormality, and it will not
be scanned. The abnormality that was
ignored will be highlighted in grey. Click Rejoin Detection, and the
abnormality that was ignored will be scanned again. Click Optimize to
troubleshoot the abnormality.
2.2.17.2 Configuring HTTPS
Create a certificate or upload an authenticated certificate, and then you can log in to the webpage through HTTPS on your computer. HTTPS secures communication over a computer network.
Procedure
Step 1 Step 2
Select Security > System Service > HTTPS. Turn on the HTTPS service.
Step 3
If you turn on the compatible with TLS v1.1 and earlier versions, security risks might occur. Please be advised. Select the certificate.
43
User’s Manual
If there are no certificates in the list, click Certificate Management to
upload a certificate. For details, see “2.2.17.4 Installing Device
Certificate”.
Figure 2-51 HTTPS
Step 4
Click Apply. Enter”https://IP address: httpsport” in a web browser. If the certificate is installed, you can log in to the webpage successfully. If not, the webpage will display the certificate as wrong or untrusted.
2.2.17.3 Attack Defense
2.2.17.3.1 Configuring Firewall
Configure firewall to limit access to the Access Controller.
Procedure
Step 1 Step 2
Select Security > Attack Defense > Firewall. Click to enable the firewall function.
Figure 2-52 Firewall
Step 3 Step 4
Select the mode: Allowlist and Blocklist. Allowlist: Only IP/MAC addresses on the allowlist can access the Access Controller. Blocklist: The IP/MAC addresses on the blocklist cannot access the Access Controller. Click Add to enter the IP information.
44
Figure 2-53 Add IP information
User’s Manual
Step 5 Click OK.
Related Operations
Click to edit the IP information. Click to delete the IP address.
2.2.17.3.2 Configuring Account Lockout
If the incorrect password is entered for a defined number of times, the
account will be locked. Step 1 Select Security > Attack Defense > Account
Lockout. Step 2 Enter the number of login attempts and the time the
administrator account and ONVIF
user will be locked for. Login attempt: The limit of login attempts. If the
incorrect password is entered for a
defined number of times, the account will be locked. Lock time: The duration
during which you cannot log in after the account is locked.
45
Figure 2-54 Account lockout
User’s Manual
Step 3 Click Apply.
2.2.17.3.3 Configuring Anti-DoS Attack
You can enable SYN Flood Attack Defense and ICMP Flood Attack Defense to
defend the Access Controller against Dos attacks. Step 1 Select Security >
Attack Defense > Anti-DoS Attack. Step 2 Turn on SYN Flood Attack Defense or
ICMP Flood Attack Defense to protect the Access
Controller against Dos attack.
46
Figure 2-55 Anti-DoS attack
User’s Manual
Step 3 Click Apply.
2.2.17.4 Installing Device Certificate
Create a certificate or upload an authenticated certificate, and then you can
log in through HTTPS on your computer.
2.2.17.4.1 Creating Certificate
Create a certificate for the Access Controller.
Procedure
Step 1 Step 2 Step 3 Step 4
Select Security > CA Certificate > Device Certificate. Select Install Device Certificate. Select Create Certificate, and click Next. Enter the certificate information.
47
Figure 2-56 Certificate information
User’s Manual
Step 5
The name of region cannot exceed 2 characters. We recommend entering the abbreviation of the name of the region. Click Create and install certificate. The newly installed certificate is displayed on the Device Certificate page after the certificate is successfully installed.
Related Operations
Click Enter Edit Mode on the Device Certificate page to edit the name of the
certificate. Click to download the certificate. Click to delete the
certificate.
2.2.17.4.2 Applying for and Importing CA Certificate
Import the third-party CA certificate to the Access Controller.
Procedure
Step 1 Step 2
Select Security > CA Certificate > Device Certificate. Click Install Device Certificate.
48
User’s Manual
Step 3 Step 4
Select Apply for CA Certificate and Import (Recommended), and click Next.
Enter the certificate information. IP/Domain name: the IP address or domain
name of the Access Controller. Region: The name of region must not exceed 3
characters. We recommend you enter
the abbreviation of region name.
Figure 2-57 Certificate information (2)
Step 5
Step 6 Step 7
Click Create and Download. Save the request file to your computer. Apply to a
third-party CA authority for the certificate by using the request file. Import
the signed CA certificate. 1) Save the CA certificate to your computer. 2)
Click Installing Device Certificate. 3) Click Browse to select the CA
certificate. 4) Click Import and Install.
The newly installed certificate is displayed on the Device Certificate page
after the certificate is successfully installed. Click Recreate to create the
request file again. Click Import Later to import the certificate at another
time.
Related Operations
Click Enter Edit Mode on the Device Certificate page to edit the name of the
certificate. Click to download the certificate.
49
Click to delete the certificate.
User’s Manual
2.2.17.4.3 Installing Existing Certificate
If you already have a certificate and private key file, import the certificate and private key file.
Procedure
Step 1 Step 2 Step 3 Step 4
Select Security > CA Certificate > Device Certificate. Click Install Device Certificate. Select Install Existing Certificate, and click Next. Click Browse to select the certificate and private key file, and enter the private key password.
Figure 2-58 Certificate and private key
Step 5
Click Import and Install. The newly installed certificate is displayed on the Device Certificate page after the certificate is successfully installed.
Related Operations
Click Enter Edit Mode on the Device Certificate page to edit the name of the
certificate. Click to download the certificate. Click to delete the
certificate.
2.2.17.5 Installing the Trusted CA Certificate
A trusted CA certificate is a digital certificate that is used for validating
the identities of websites and servers. For example, when 802.1x protocol is
used, the CA certificate for switches is required to authenticate its
identity. 802.1X is a network authentication protocol that opens ports for
network access when an organization authenticates a user’s identity and
authorizes them access to the network.
50
Procedure
Step 1 Step 2 Step 3
Select Security > CA Certificate > Trusted CA Certificates. Select Install Trusted Certificate. Click Browse to select the trusted certificate.
Figure 2-59 Install the trusted certificate
User’s Manual
Step 4
Click OK. The newly installed certificate is displayed on the Trusted CA Certificates page after the certificate is successfully installed.
Related Operations
Click Enter Edit Mode on the Device Certificate page to edit the name of the
certificate. Click to download the certificate. Click to delete the
certificate.
2.2.17.6 Security Warning
Step 1 Step 2 Step 3
Select Security > CA Certificate > Security Warning. Enable the security warning function. Select the monitoring items.
Figure 2-60 Security warning
Step 4 Click Apply.
51
2.3 Configurations of Sub Controller
You can log in to the webpage of the sub controller to configure it locally.
User’s Manual
2.3.1 Initialization
Initialize the sub controller when you log in to the webpage for the first
time or after the sub controller is restored to its factory default settings.
For details on how to initialize the sub controller, see “2.2.2
Initialization”.
2.3.2 Logging In
Set the Access Control to sub controller while going through the login wizard.
For details, see “2.2.3 Logging In”.
2.3.3 Home Page
The webpage of the sub controller only includes Local Device Config and
Reporting menu. For details, see “2.2.15 Local Device Configurations
(Optional)” and “2.2.16 Viewing Records”.
Figure 2-61 Home page
52
User’s Manual
3 Smart PSS Lite-Sub Controllers
3.1 Networking Diagram
The sub controllers are added to a standalone management platform, such as
SmartPSS Lite. You can manage all sub controllers through SmartPSS Lite.
Figure 3-1 Networking Diagram
3.2 Configurations on SmartPSS Lite
Add sub controllers to SmartPSS Lite and configure them on the platform. For
details, see the user’s manual of SmartPSS Lite.
3.3 Configurations on Sub Controller
For details, see “2.3 Configurations of Sub Controller”.
53
User’s Manual
Appendix 1 Cybersecurity Recommendations
Cybersecurity is more than just a buzzword: it’s something that pertains to
every device that is connected to the internet. IP video surveillance is not
immune to cyber risks, but taking basic steps toward protecting and
strengthening networks and networked appliances will make them less
susceptible to attacks. Below are some tips and recommendations from Dahua on
how to create a more secured security system. Mandatory actions to be taken
for basic equipment network security: 1. Use Strong Passwords
Please refer to the following suggestions to set passwords: The length should
not be less than 8 characters. Include at least two types of characters;
character types include upper and lower case letters,
numbers and symbols. Do not contain the account name or the account name in
reverse order. Do not use continuous characters, such as 123, abc, etc. Do not
use overlapped characters, such as 111, aaa, etc. 2. Update Firmware and
Client Software in Time According to the standard procedure in Tech-industry,
we recommend to keep your
equipment (such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure
the system is equipped with the latest security patches and fixes. When the
equipment is connected to the public network, it is recommended to enable the
”auto-check for updates” function to obtain timely information of firmware
updates released by the manufacturer. We suggest that you download and use the
latest version of client software. “Nice to have” recommendations to improve
your equipment network security: 1. Physical Protection We suggest that you
perform physical protection to equipment, especially storage devices. For
example, place the equipment in a special computer room and cabinet, and
implement welldone access control permission and key management to prevent
unauthorized personnel from carrying out physical contacts such as damaging
hardware, unauthorized connection of removable equipment (such as USB flash
disk, serial port), etc. 2. Change Passwords Regularly We suggest that you
change passwords regularly to reduce the risk of being guessed or cracked. 3.
Set and Update Passwords Reset Information Timely The equipment supports
password reset function. Please set up related information for password reset
in time, including the end user’s mailbox and password protection questions.
If the information changes, please modify it in time. When setting password
protection questions, it is suggested not to use those that can be easily
guessed. 4. Enable Account Lock The account lock feature is enabled by
default, and we recommend you to keep it on to guarantee the account security.
If an attacker attempts to log in with the wrong password several times, the
corresponding account and the source IP address will be locked. 5. Change
Default HTTP and Other Service Ports We suggest you to change default HTTP and
other service ports into any set of numbers between 102465535, reducing the
risk of outsiders being able to guess which ports you are using. 6. Enable
HTTPS We suggest you to enable HTTPS, so that you visit Web service through a
secure communication
54
User’s Manual
channel. 7. MAC Address Binding
We recommend you to bind the IP and MAC address of the gateway to the
equipment, thus reducing the risk of ARP spoofing. 8. Assign Accounts and
Privileges Reasonably According to business and management requirements,
reasonably add users and assign a minimum set of permissions to them. 9.
Disable Unnecessary Services and Choose Secure Modes If not needed, it is
recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to
reduce risks. If necessary, it is highly recommended that you use safe modes,
including but not limited to the following services: SNMP: Choose SNMP v3, and
set up strong encryption passwords and authentication
passwords. SMTP: Choose TLS to access mailbox server. FTP: Choose SFTP, and
set up strong passwords. AP hotspot: Choose WPA2-PSK encryption mode, and set
up strong passwords. 10. Audio and Video Encrypted Transmission If your audio
and video data contents are very important or sensitive, we recommend that you
use encrypted transmission function, to reduce the risk of audio and video
data being stolen during transmission. Reminder: encrypted transmission will
cause some loss in transmission efficiency. 11. Secure Auditing Check online
users: we suggest that you check online users regularly to see if the device
is
logged in without authorization. Check equipment log: By viewing the logs, you
can know the IP addresses that were used to
log in to your devices and their key operations. 12. Network Log
Due to the limited storage capacity of the equipment, the stored log is
limited. If you need to save the log for a long time, it is recommended that
you enable the network log function to ensure that the critical logs are
synchronized to the network log server for tracing. 13. Construct a Safe
Network Environment In order to better ensure the safety of equipment and
reduce potential cyber risks, we recommend: Disable the port mapping function
of the router to avoid direct access to the intranet devices
from external network. The network should be partitioned and isolated
according to the actual network needs. If
there are no communication requirements between two sub networks, it is
suggested to use VLAN, network GAP and other technologies to partition the
network, so as to achieve the network isolation effect. Establish the 802.1x
access authentication system to reduce the risk of unauthorized access to
private networks. Enable IP/MAC address filtering function to limit the range
of hosts allowed to access the device.
More information
Please visit Dahua official website security emergency response center for
security announcements and the latest security recommendations.
55
User’s Manual
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>