EasyManua.ls Logo

Dahua Technology DHI-ARK30T-W2 - Table of Contents

Dahua Technology DHI-ARK30T-W2
26 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
User’s Manual
IV
Table of Contents
Foreword
........................................................................................................................................................................................................I
Important Safeguards and Warnings
............................................................................................................................................ III
1 Introduction
............................................................................................................................................................................................ 1
1.1 Overview
........................................................................................................................................................................................ 1
1.2 Technical Specifications
......................................................................................................................................................... 1
2 Checklist
.................................................................................................................................................................................................... 3
3 Appearance
............................................................................................................................................................................................. 4
4 Adding the Keypad to the Hub
...................................................................................................................................................... 2
5 Installation
............................................................................................................................................................................................... 3
6 Configuration
......................................................................................................................................................................................... 5
6.1 Viewing Status
............................................................................................................................................................................ 5
6.2 Configuring the keypad
......................................................................................................................................................... 6
7 User Management
................................................................................................................................................................................ 8
7.1 Adding Users
................................................................................................................................................................................ 8
7.2 Adding Card
.................................................................................................................................................................................. 9
7.2.1 Adding Card on the User Manager
......................................................................................................................... 9
7.2.2 Adding Card in the Accessory List
.......................................................................................................................... 9
8 Operations
............................................................................................................................................................................................. 11
8.1 Frequently Used Commands
.............................................................................................................................................. 11
8.2 Waking Up the Keypad
......................................................................................................................................................... 11
8.3 Arming
.......................................................................................................................................................................................... 11
8.4 Disarming
.................................................................................................................................................................................... 12
8.5 Searching for the Room Status
......................................................................................................................................... 12
Appendix 1 Cybersecurity Recommendations
........................................................................................................................ 14