EasyManua.ls Logo

Dahua DHI-ASI7213Y-V3-T1P User Manual

Dahua DHI-ASI7213Y-V3-T1P
80 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Users Manual
Face Recognition Access Controller
Users Manual
V1.0.
1

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Dahua DHI-ASI7213Y-V3-T1P and is the answer not in the manual?

Dahua DHI-ASI7213Y-V3-T1P Specifications

General IconGeneral
ModelDHI-ASI7213Y-V3-T1P
TypeIP Access Controller
ROM8 GB
Operating SystemLinux
Screen Size7 inch
Screen TypeLCD
Camera2 MP
FAR≤0.001%
FRR≤0.1%
Network ProtocolTCP/IP
Communication InterfaceRS-485, Wiegand
RS-4851
Alarm Input2
Alarm Output2
Exit Button1
Door Contact Detection1
Lock Control1
Operating Voltage12 VDC
Protection GradeIP65
InstallationSurface Mount
ProcessorEmbedded Processor
Unlock ModeFace, Fingerprint, Password, Card
Card TypeIC card
Card Reading Distance0-5 cm
Fingerprint ReaderOptical
Fingerprint Verification Mode1:N
Fingerprint Verification Time<0.5 s
Face Verification Distance0.3 m–1.5 m
Face Verification Height Range1.2-2m
Network10/100 Mbps Ethernet
WiegandWiegand input/output
Doorbell1
Access Control InterfaceElectric lock, Exit button, Door sensor
Input Voltage12 VDC
Operating Temperature-10°C to +55°C (+14°F to +131°F)
Operating Humidity10% to 90%
Humidity10% to 90%
Supported ReadersIC/ID card, Fingerprint, Face
CertificationsCE, FCC

Summary

Foreword

General

Manual introduction to the access controller and usage guidelines.

Safety Instructions

Explains signal words used in the manual for hazard identification.

Revision History

Details versions of the manual and their release dates.

Privacy Protection Notice

Outlines responsibilities regarding personal data collection and privacy laws.

About the Manual

Important Safeguards and Warnings

Transportation Requirement

Guidelines for transporting the access controller under specific conditions.

Storage Requirement

Instructions for storing the access controller under specific conditions.

Installation Requirements

Critical safety and operational requirements for installing the device.

Overview

Introduction

Basic description of the face recognition access controller.

Features

Lists the key functionalities and specifications of the device.

Application

Describes where the access controller can be used.

Dimension and Component

Details the physical size and parts of the device.

Connection and Installation

Cable Connections

Describes how to connect various external devices to the controller.

Installation Notes

Provides recommendations for optimal device placement and environment.

Installation

Step-by-step guide for physically mounting the access controller.

System Operations

Basic Configuration Procedure

Outlines the initial setup steps for the system.

Common Icons

Explains the meaning of icons used in the system interface.

Initialization

Details the first-time setup process for administrator and email.

Standby Interface

Describes the idle state of the device and unlock methods.

Main Menu

Overview of the primary navigation and functions available.

Unlocking Methods

Explains how users can unlock the door using different credentials.

User Management

Covers adding, viewing, and managing user accounts.

Access Management

Details controlling access via periods, unlock modes, and alarms.

Network Communication

Configuration for network connectivity, ports, and protocols.

System

Covers system-level settings like time, face parameters, and image modes.

Web Operations

Initialization

Steps to configure the device via a web browser for the first time.

Login

How to access and log into the web interface.

Resetting the Password

Procedure to recover or change the administrator password.

Alarm Linkage

Configuration of how the system responds to alarm events.

Data Capacity

Information on the maximum number of users, cards, and faces stored.

Video Setting

Configuration of video parameters like data rate and image quality.

Face Detect

Settings to optimize face recognition accuracy and performance.

Network Setting

Configuration of IP address, DNS, and other network parameters.

Date Setting

How to configure time, date, and NTP synchronization.

Safety Management

Settings related to IP authority and system services for security.

User Management

Managing user accounts and their permissions via the web interface.

Maintenance

Procedures for rebooting and testing the device.

Configuration Management

Importing/exporting configuration files and feature settings.

Upgrade

Methods for updating the device firmware.

Version Information

Displays details about the device's software and hardware versions.

Online User

Shows currently logged-in users on the system.

System Log

Viewing and backing up system event logs.

FAQ

Appendix 1 Notes of Temperature Monitoring

Appendix 2 Notes of Face Recording/Comparison

Before Registration

Tips for optimal face capture quality and recognition.

During Registration

Steps and guidance for capturing user faces.

Face Position

Guidance on proper user positioning for face recognition.

Requirements of Faces

Specific criteria for faces to ensure successful recognition.

Appendix 3 Cybersecurity Recommendations

Use Strong Passwords

Guidelines for creating secure and robust passwords.

Update Firmware and Client Software in Time

Importance of keeping software up-to-date for security.

Physical Protection

Recommendations for securing the physical device.

Change Passwords Regularly

Advice on regularly updating passwords.

Set and Update Passwords Reset Information Timely

Guidance on password recovery setup.

Enable Account Lock

How to enhance account security by enabling lock features.

Change Default HTTP and Other Service Ports

Recommendations for securing network ports.

Enable HTTPS

Importance of using secure HTTPS for web access.

MAC Address Binding

How to prevent spoofing by binding IP and MAC addresses.

Assign Accounts and Privileges Reasonably

Best practices for user account management.

Disable Unnecessary Services and Choose Secure Modes

Recommendations for minimizing security risks.

Audio and Video Encrypted Transmission

Securing data transmission through encryption.

Secure Auditing

Tips for monitoring user activity and system logs.

Network Log

Importance of network logging for tracing and security.

Construct a Safe Network Environment

General advice for building a secure network.

Related product manuals