LT-Security-LOGO

LT Security LXK3411MF Face Recognition Access Controller

LT-Security-LXK3411MF-Face-Recognition-Access-Controller-PRODUCT

Sonraíochtaí

  • Ainm Táirge: Face Recognition Access Controller
  • Múnla: v1.0

Eolas Táirge
The Face Recognition Access Controller is a device designed to control access using face recognition technology. It allows authorized individuals to gain access to secure areas by scanning and verifying their faces.

Treoracha Úsáide Táirge

Riachtanais Suiteála

  • Ná ceangail an t-oiriúnóir cumhachta leis an Rialaitheoir Rochtana agus an cuibheoir á thiomáint air.
  • Cloí le cóid agus caighdeáin sábháilteachta leictreacha áitiúla.
  • Cinntigh toirt chomhthimpeallach cobhsaítage and meet power supply requirements.
  • Take necessary safety measures when working at heights.
  • Avoid exposure to sunlight or heat sources.
  • Coinnigh ar shiúl ó dampness, deannach, agus súiche.
  • Install on a stable surface to prevent falling.
  • Place in a well-ventilated area and do not block ventilation.
  • Ensure power supply conforms to specified requirements.

Riachtanais Oibriúcháin

  • Check power supply correctness before use.
  • Do not unplug the power cord while the adapter is on.
  • Operate within rated power input and output range.
  • Use under allowed humidity and temperature conditions.
  • Avoid dropping or splashing liquids on the device.
  • Do not disassemble without professional instruction.
  • Not suitable for locations with children present.

“`

Rialaitheoir Rochtana Aitheanta Aghaidhe
Lámhleabhar Úsáideora
v1.0

Brollach
Ginearálta
Tugann an lámhleabhar seo isteach feidhmeanna agus oibríochtaí an Rialaitheora Rochtana Aitheantais Aghaidhe (dá ngairtear an “Rialaitheoir Rochtana” anseo feasta). Léigh go cúramach sula n-úsáideann tú an gléas, agus coinnigh an lámhleabhar sábháilte le haghaidh tagartha sa todhchaí.
Maidir leis an Lámhleabhar
The manual is for reference only. The manual will be updated according to the latest laws and regulations of related jurisdictions. There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation. All trademarks, registered trademarks and company names in the manual are properties of their
úinéirí faoi seach.
Rabhadh CCFG
FCC 1. This device complies with Part 15 of the FCC Rules.
Tá an oibríocht faoi réir an dá choinníoll seo a leanas: (1) Ní fhéadfaidh an gléas seo a bheith ina chúis le cur isteach díobhálach. (2) Ní mór don fheiste seo glacadh le haon chur isteach a fhaightear, lena n-áirítear cur isteach a d'fhéadfadh a bheith ina chúis le hoibriú neamh-inmhianaithe.
2. D'fhéadfadh athruithe nó modhnuithe nach bhfuil ceadaithe go sainráite ag an bpáirtí atá freagrach as comhlíonadh údarás an úsáideora chun an trealamh a oibriú a chur ar neamhní.
NOTE: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. I f this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
— Reorient or relocate the receiving antenna. — Increase the separation between the equipment and receiver. — Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. — Consult the dealer or an experienced radio/TV technician for help. FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment . This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. This equipment should be installed and operated with minimum distance 20cm between the radiator &your body.LT-Security-LXK3411MF-Face-Recognition-Access-Controller-FIG-1
I

Cosaintí agus Rabhaidh Tábhachtacha
Tugtar isteach sa chuid seo ábhar a chlúdaíonn láimhseáil cheart an Rialaitheora Rochtana, cosc ​​ar ghuaiseacha, agus damáiste maoine a chosc. Léigh go cúramach sula n-úsáideann tú an Rialaitheoir Rochtana, agus cloí leis na treoirlínte agus é á úsáid.
Riachtanais Suiteála
Ná ceangail an t-oiriúnóir cumhachta leis an Rialaitheoir Rochtana agus an cuibheoir á thiomáint air. Cloí go docht leis an gcód agus na caighdeáin sábháilteachta leictreacha áitiúla. Bí cinnte go bhfuil an toirt comhthimpeallachtage
is stable and meets the power supply requirements of the Access Controller. Improper use of the battery might result in a fire or explosion. Personnel working at heights must take all necessary measures to ensure personal safety
including wearing a helmet and safety belts. Do not place the Access Controller in a place exposed to sunlight or near heat sources. Keep the Access Controller away from dampness, dust, and soot. Install the Access Controller on a stable surface to prevent it from falling. Install the Access Controller in a well-ventilated place, and do not block its ventilation. The power supply must conform to the requirements of ES1 in IEC 62368-1 standard and be no
higher than PS2. Please note that the power supply requirements are subject to the Access Controller label.
Riachtanais Oibriúcháin
Seiceáil an bhfuil an soláthar cumhachta ceart roimh úsáid. Ná díphlugáil an téad cumhachta ar thaobh an Rialaitheora Rochtana agus an cuibheoir á thiomáint
on. Operate the Access Controller within the rated range of power input and output. Use the Access Controller under allowed humidity and temperature conditions. Do not drop or splash liquid onto the Access Controller, and make sure that there is no object
filled with liquid on the Access Controller to prevent liquid from flowing into it. Do not disassemble the Access Controller without professional instruction. This product is professional equipment. This equipment is not suitable for use in locations where children are likely to be present.LT-Security-LXK3411MF-Face-Recognition-Access-Controller-FIG-2
II

Clár na nÁbhar
Foreword ………………………………………………………………………………………………………………………………………………………………………………..I Important Safeguards and Warnings………………………………………………………………………………………………………………………….. III 1 Overview …………………………………………………………………………………………………………………………………………………………………………… 1
1.1 Introduction …………………………………………………………………………………………………………………………………………………………… 1 1.2 Features …………………………………………………………………………………………………………………………………………………………………… 1 2 Local Operations …………………………………………………………………………………………………………………………………………………………….. 2 2.1 Basic Configuration Procedure………………………………………………………………………………………………………………………….2 2.2 Standby Screen………………………………………………………………………………………………………………………………………………………2 2.3 Initialization …………………………………………………………………………………………………………………………………………………………… 2 2.4 Logging In ……………………………………………………………………………………………………………………………………………………………… 3 2.5User Management …………………………………………………………………………………………………………………………………………….. 3-6 2.6 Network Communication ………………………………………………………………………………………………………………………………… 6-9 2.7 Access Management …………………………………………………………………………………………………………………………………….. 9. -12 2.8 System ………………………………………………………………………………………………………………………………………………………………..12-16 2.9 USB Management ……………………………………………………………………………………………………………………………………………16-17 2.10 Configuring Features ……………………………………………………………………………………………………………………………………17-19 2.11 Unlocking the Door………………………………………………………………………………………………………………………………………..19-20 2.12 System Information …………………………………………………………………………………………………………………………………………2. 0
III

1 Tharview
1.1 Réamhrá
The access controller is an access control panel that supports unlock through faces, passwords, fingerprint, cards, QR code, and their combinations. Based on the deep-learning algorithm, it features faster recognition and higher accuracy. It can work with management platform which meets various needs of customers.
1.2 Gnéithe
4.3 inch glass touch screen with a resolution of 272 × 480. 2-MP wide-angle dual-lens camera with IR illumination and DWDR. Multiple unlock methods including face, IC card and password. Supports 6,000 users, 6,000 faces, 6,000 passwords, 6,000 fingerprints, 10,000 cards, 50
administrators, and 300,000 records. Recognizes faces 0.3 m to 1.5 m away (0.98 ft-4.92 ft); face recognition accuracy rate of 99.9% and
the 1:N comparison time is 0.2 s per person. Supports improved security and to protect against the device being forcefully opened, security
module expansion is supported. TCP/IP and Wi-Fi connection. PoE power supply. IP65.LT-Security-LXK3411MF-Face-Recognition-Access-Controller-FIG-3
1

2 Oibríocht Áitiúil
2.1 Basic Configuration Procedure
Basic configuration procedure
2.2 Standby Screen
You can unlock the door through faces, passwords, and IC CARD. If there is no operation in 30 seconds, the Access Controller will go to the standby mode. This manual is for reference only. Slight differences might be found between the standby screen in this manual and the actual device.
2.3 Túsú
For the first-time use or after restoring factory defaults, you need to select a language on Access Controller, and then set the password and email address for the admin account. You can use the admin account to enter the main menu of the Access Controller and the web-page. NOTE: If you forget the administrator password, send a reset request to your registered e-mail address. The password must consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special character (excluding ‘ ” ; : &).LT-Security-LXK3411MF-Face-Recognition-Access-Controller-FIG-4
2

2.4 Logáil Isteach

Log in to the main menu to configure the Access Controller. Only admin account and administrator account can enter the main menu of the Access Controller. For the first-time use, use the admin account to enter the main menu screen and then you can create the other administrator accounts.

Eolas Cúlra
Admin account: Can log in to the main menu screen of the Access Controller, but has no door access permission.
Administration account: Can log in to the main menu of the Access Controller and has door access permissions.LT-Security-LXK3411MF-Face-Recognition-Access-Controller-FIG-5

Nós imeachta
Céim 1 Céim 2

Press and hold the standby screen for 3 seconds.
Select a verification method to enter the main menu.
Face: Enter the main menu by face recognition. Card Punch: Enter the main menu by swiping card. PWD: Enter the user ID and password of the
administrator account. Admin: Enter the admin password to enter the main
roghchlár.

2.5 Bainistíocht Úsáideora
Is féidir leat úsáideoirí nua a chur leis, view user/admin list and edit user information.

2.5.1 Adding New Users

Nós imeachta
Céim 1 Céim 2

On the Main Menu, select User > New User. Configure the parameters on the interface.

3

Cuir úsáideoir nua leis

Parameter User ID Name Face
Cárta
PWD

Cur síos ar pharaiméadair
Cur síos
Cuir isteach aitheantais úsáideora. Is féidir leis na haitheantais a bheith ina n-uimhreacha, ina litreacha, agus ina gcomhcheangail, agus is é 32 carachtar fad uasta an aitheantais. Tá gach ID uathúil.
Cuir isteach ainm le 32 carachtar ar a mhéad (lena n-áirítear uimhreacha, siombailí, agus litreacha).
Déan cinnte go bhfuil d’aghaidh dírithe ar an bhfráma gabhála íomhá, agus déanfar íomhá den aghaidh a ghabháil agus a anailísiú go huathoibríoch.
A user can register five cards at most. Enter your card number or swipe your card, and then the card information will be read by the access controller. You can enable the Duress Card function. An alarm will be triggered if a duress card is used to unlock the door.
Cuir isteach an focal faire úsáideora. Is é 8 ndigit uasfhad an fhocail faire.

4

Parameter User Level Period Holiday Plan Valid Date
Cineál Úsáideora
Dept. Shift Mode Step 3 Tap .

Cur síos
You can select a user level for new users. User: Users only have door access permission. Admin: Administrators can unlock the door and
configure the access controller.
Ní féidir le daoine an doras a dhíghlasáil ach amháin le linn na tréimhse sainithe.
Ní féidir le daoine an doras a dhíghlasáil ach amháin le linn an phlean saoire sainithe.
Socraigh dáta ar a rachaidh cead rochtana an duine in éag.
General: General users can unlock the door. Blocklist: When users in the blocklist unlock the door,
service personnel will receive a notification. Guest: Guests can unlock the door within a defined
period or for certain amount of times. After the defined period expires or the unlocking times runs out, they cannot unlock the door. Patrol: Patrol users will have their attendance tracked, but they have no unlocking permissions. VIP: When VIP unlock the door, service personnel will receive a notice. Others: When they unlock the door, the door will stay unlocked for 5 more seconds. Custom User 1/Custom User 2: Same with general users.
Set departments.
Select shift modes.

2.5.2 Viewle Faisnéis Úsáideora

Is féidir leat view user/admin list and edit user information.

Nós imeachta
Céim 1 Céim 2

On the Main Menu, select User > User List, or select User > Admin List. View all added users and admin accounts. : Unlock through password. : Unlock through swiping card. : Unlock through face recognition.

Oibríochtaí Gaolmhara
Ar an scáileán Úsáideoir, is féidir leat na húsáideoirí breise a bhainistiú. Cuardaigh le haghaidh users: Tap and then enter the username. Edit users: Tap the user to edit user information. Delete users
Delete individually: Select a user, and then tap .

5

Delete in batches: On the User List screen, tap to delete all users. On the Admin List screen, tap to delete all admin users.
2.5.3 Configuring Administrator Password
You can unlock the door by only entering the admin password. Admin password is not limited by user types. Only one admin password is allowed for one device.
Nós imeachta
Step 1 On the Main Menu screen, select User > Administrator PWD. Set admin password

Céim 2 Céim 3 Céim 4

Tap Administrator PWD, and then enter the administrator password. Tap . Turn on the administrator function.

2.6 Cumarsáid Líonra
Configure the network, serial port and Wiegand port to connect the Access Controller to the network.

2.6.1 Configuring IP

Set IP address for the Access Controller to connect it to the network. After that, you can log in to the webpage and the management platform to manage the Access Controller.

Nós imeachta
Céim 1 Céim 2

On the Main Menu, select Connection > Network > IP Address. Configure IP Address.

6

Cumraíocht seoladh IP

IP configuration parameters

Paraiméadar

Cur síos

IP Address/Subnet Mask/Gateway Address
DHCP

The IP address, subnet mask, and gateway IP address must be on the same network segment.
It stands for Dynamic Host Configuration Protocol.
When DHCP is turned on, the Access Controller will automatically be assigned with IP address, subnet mask, and gateway.

P2P (peer-to-peer) technology enables users to manage

P2P

devices without applying for DDNS, setting port mapping

or deploying transit server.

2.6.2 Wi-Fi a chumrú

You can connect the Access Controller to the network through Wi-Fi network.

Nós imeachta
Céim 1 Céim 2 Céim 3 Céim 4
Céim 5

On the Main Menu, select Connection > Network > WiFi. Turn on Wi-Fi. Tap to search available wireless networks. Select a wireless network and enter the password. If no Wi-Fi is searched, tap SSID to enter the name of Wi-Fi. Tap .

7

2.6.3 Configuring Serial Port

Nós imeachta
Céim 1 Céim 2

On the Main Menu, select Connection > Serial Port. Select a port type. Select Reader when the Access Controller connects to a card reader. Select Controller when the Access Controller functions as a card reader, and the Access
Controller will send data to the Access Controller to control access. Output Data type: Card: Outputs data based on card number when users swipe card to unlock door;
outputs data based on user’s first card number when they use other unlock methods. No.: Outputs data based on the user ID. Select Reader (OSDP) when the Access Controller is connected to a card reader based on OSDP protocol. Security Module: When a security module is connected, the exit button, lock will be not effective.

2.6.4 Configuring Wiegand

The access controller allows for both Wiegand input and output mode.

Nós imeachta
Céim 1 Céim 2

On the Main Menu, select Connection > Wiegand. Select a Wiegand. Select Wiegand Input when you connect an external card reader to the Access
Controller. Select Wiegand Output when the Access Controller functions as a card reader, and you
need to connect it to a controller or another access terminal.

Aschur Wiegand

8

Paraiméadar
Wiegand Output Type Pulse Width Pulse Interval Output Data Type

Description of Wiegand output
Description Select a Wiegand format to read card numbers or ID numbers. Wiegand26: Reads three bytes or six digits. Wiegand34: Reads four bytes or eight digits. Wiegand66: Reads eight bytes or sixteen digits.
Enter the pulse width and pulse interval of Wiegand output.
Select the type of output data. User ID: Outputs data based on user ID. Card No.: Outputs data based on user’s first card number,
and the data format is hexadecimal or decimal.

2.7 Access Management

You can configure door access parameters, such as unlocking modes, alarm linkage, door schedules.

2.7.1 Configuring Unlock Combinations

Use card, face or password or their combinations to unlock the door.

Eolas Cúlra
Unlock modes might differ depending on the actual product.

Nós imeachta
Céim 1 Céim 2 Céim 3
Céim 4

Select Access > Unlock Mode > Unlock Mode. Select unlocking methods. Tap +And or /Or to configure combinations. +And: Verify all the selected unlocking methods to open the door. /Or: Verify one of the selected unlocking methods to open the door. Tap to save changes.

2.7.2 Aláram a Chumrú

An alarm will be triggered when abnormal access events occur.

Nós imeachta
Céim 1 Céim 2

Select Access > Alarm. Enable the alarm type.

9

Description of alarm parameters

Paraiméadar

Cur síos

Frith-passback

Users need to verify their identities both for entry and exit; otherwise an alarm will be triggered. It helps prevents a card holder from passing an access card back to another person so they gain entry. When anti-passback is enabled, the card holder must leave the secured area through an exit reader before system will grant another entry.
If a person enters after authorization and exits without authorization, an alarm will be triggered when they
attempt to enter again, and access is denied at the
am céanna.
If a person enters without authorization and exits after authorization, an alarm will be triggered when the they attempt to enter again, and access is denied at the same time.

éigeantas

Cuirfear tús le haláram nuair a úsáidtear cárta éigeantais, pasfhocal éigeantais nó méarlorg éigeantais chun an doras a dhíghlasáil.

Cur isteach

When door sensor is enabled, an intrusion alarm will be triggered if the door is opened abnormally.

Door Sensor Timeout

A timeout alarm will be triggered if the door remains unlocked longer than the defined door sensor timeout, which ranges from 1 to 9999 seconds.

Door Sensor On

Intrusion and timeout alarms can be triggered only after door sensor is enabled.

2.7.3 Configuring Door Status

Nós imeachta
Céim 1 Céim 2

On the Main Menu screen, select Access > Door Status. Set door status. NO: The door remains unlocked all the time. NC: The door remains locked all the time. Normal: If Normal is selected, the door will be unlocked and locked according to your
socruithe.

2.7.4 Configuring Lock Holding Time

After a person is granted access, the door will remain unlocked for a defined time for them to pass through.

Nós imeachta
Céim 1 Céim 2 Céim 3

On the Main Menu, select Access > Lock Holding Time. Enter the unlock duration. Tap to save changes.

10

individuals or departments, and then employees must follow the established work schedules.

Nós imeachta
Céim 1 Céim 2

Select Attendance > Schedule.
Set works schedules for individuals. 1. Tap Personal Schedule 2. enter the user ID, and then tap . 3. On the calendar, select the date, and then configure shifts.
You can only set work schedules for the current month and the next month.
0 indicates break. 1 to 24 indicates the number of the pre-defined shifts. 25 indicates the business trip. 26 indicates the leave of absence. 4. Tap .

Céim 3

Set works schedules for the department. 1. Tap Dept Schedule. 2. Tap a department, set shifts for a week. 0 indicates break. 1 to 24 indicates the number of the pre-defined shifts. 25 indicates the business trip. 26 indicates the leave of absence.

Department shifts

Céim 4

The defined work schedule is in one-week cycle and will be applied to all employees in the department. Tap .

11

2.7.5 Configuring Verification Interval Time

the employee repeats punch-in/out within a set time, the earliest punch-in/out will be recorded.

Nós imeachta
Céim 1 Céim 2

Select Attendance > Schedule > Verification Interval Time(s). enter the time interval, and then tap .

2.8 Córas

2.8.1 Am a Chumrú

Configure system time, such as date, time, and NTP.

Nós imeachta
Céim 1 Céim 2

On the Main Menu, select System > Time. Configure system time.

Parameter 24-hour System Date Setting Time Date Format

Description of time parameters Description The time is displayed in 24-hour format. Set up the date. Set up the time. Select a date format.

12

Parameter DST Setting
NTP Check Time Zone

Cur síos
1. Tap DST Setting 2. Enable DST. 3. Select Date or Week from the DST Type list. 4. Enter start time and end time. 5. tap .
A network time protocol (NTP) server is a machine dedicated as the time sync server for all client computers. If your computer is set to sync with a time server on the network, your clock will show the same time as the server. When the administrator changes the time (for daylight savings), all client machines on the network will also update. 1. Tap NTP Check. 2. Turn on the NTP check function and configure parameters.
Server IP Address: Enter the IP address of the NTP server, and the Access Controller will automatically sync time with NTP server.
Port: Enter the port of the NTP server. Interval (min): Enter the time synchronization interval.
Roghnaigh an crios ama.

2.8.2 Configuring Face Parameters

Nós imeachta
Céim 1 Céim 2

On the main menu, select System > Face Parameter. Configure the face parameters, and then tap .

13

Face parameter

Description of face parameters

Ainm

Cur síos

Face Threshold

Adjust the face recognition accuracy. Higher threshold means higher accuracy.

Max. Angle of Face

Set the maximum face pose angle for face detection. Larger value means larger face angle range. If the face pose angle is out of the defined range, the face detection box will not appear.

Pupillary Distance

Face images require desired pixels between the eyes (called pupillary distance) for successful recognition. The default pixel is 45. The pixel changes according to the face size and the distance between faces and the lens. If an adult is 1.5 meters away from the lens, the pupillary distance can be 50 px-70 px.

Recognition Timeout (S)

If a person with access permission has their face successfully recognized, the Access Controller will prompt face recognition success. You can enter the prompt interval time.

Invalid Face Prompt Interval (S)

If a person without access permission attempts to unlock the door for several times in the defined interval, the Access Controller will prompt face recognition failure. You can enter the prompt interval time.

14

Name Anti-fake Threshold BeautyEnable SafeHat Enable
Mask Parameters
Multi-face Recognition

Cur síos
Avoid false face recognition by using a photo, video, mask or a different substitute for an authorized person’s face. Close: Turns off this function. General: Normal level of anti-spoofing detection means
higher door access rate for people with face masks. High: Higher level of anti-spoofing detection means higher
accuracy and security. Extremely High: Extremely high level of anti-spoofing
detection means extremely high accuracy and security.
Beautify captured face images.
Detects safehats.
Modh masc:
No detect: Mask is not detected during face recognition. Mask reminder: Mask is detected during face
recognition. If the person is not wearing a mask, the system will remind them to wear masks, and access is allowed. Mask intercept: Mask is detected during face recognition. If a person is not wearing a mask, the system will remind them to wear masks, and access is denied. Mask Recognition Threshold: Higher threshold means higher mask detection accuracy.
Supports detecting 4 face images at the same time, and the unlock combinations mode become invalid. The door is unlocked after any one of them gain access.

2.8.3 Socrú an Toirte
You can adjust the volume of the speaker and microphone.
Nós imeachta
Step 1 On the Main Menu, select System > Volume. Step 2 Select Beep Volume or Mic Volume, and then tap or to adjust the volume.

2.8.4 (Optional) Configuring Fingerprint Parameters

Configure fingerprint detection accuracy. Higher value means that higher threshold of similarity and higher accuracy. This function is only available on Access Controller that supports fingerprint unlock.

Nós imeachta
Céim 1 Céim 2

On the Main Menu, select System > FP Parameter. Tap or to adjust the value.

15

2.8.5 Socruithe Scáileáin

Configure screen off time and logout time.
Nós imeachta
Step 1 On the Main Menu, select System > Screen settings. Step 2 Tap Logout Time or Screen Off Timeout, and then tap or to adjust the time.

2.8.6 Réamhshocruithe Monarcha a Athbhunú

Nós imeachta
Céim 1 Céim 2

On the Main Menu, select System > Restore Factory. Restore factory defaults if necessary. Restore Factory: Resets all configurations and data. Restore Factory (Save user & log): Resets configurations except for user information
and logs.

2.8.7 Restart the Device

On the Main Menu, select System > Reboot, and the Access Controller will be restarted.

2.8.8 Configuring the Language

Change the language on the Access Controller. On the Main Menu, select System > Language, select the language for the Access Controller.

2.9 USB Management
You can use a USB to update the Access Controller, and export or import user information through USB.

Make sure that a USB is inserted to the Access Controller before you export data or update the system. To avoid failure, do not pull out the USB or perform any operation of the Access Controller during the process.
You have to use a USB to export the information from an Access Controller to other devices. Face images are not allowed to be imported through USB.

2.9.1 Exporting to USB

You can export data from the Access Controller to a USB. The exported data is encrypted and cannot be edited.

Nós imeachta
Céim 1 Céim 2

On the Main Menu, select USB > USB Export. Select the data type you want to export, and then tap OK.

16

2.9.2 Importing From USB

You can import data from USB to the Access Controller.

Nós imeachta
Céim 1 Céim 2

On the Main Menu, select USB > USB Import. Select the data type that you want to export, and then tap OK.

2.9.3 Updating System

Use a USB to update the system of the Access Controller.

Nós imeachta
Céim 1
Céim 2 Céim 3

Rename the update file to “update.bin”, put it in the root directory of the USB, and then insert the USB to the Access Controller. On the Main Menu, select USB > USB Update. Tap OK. The Access Controller will restart when the updating completes.

2.10 Configuring Features
On the Main Menu screen, select Features. Features

17

Paraiméadar
Private Setting
Card No. Reverse Door Sensor Result Feedback

Cur síos ar ghnéithe
Cur síos
PWD Reset Enable: You can enable this function to reset password. The PWD Reset function is enabled by default.
HTTPS: Hypertext Transfer Protocol Secure (HTTPS) is a protocol for secure communication over a computer network. When HTTPS is enabled, HTTPS will be used to access CGI commands; otherwise HTTP will be used.
When HTTPS is enabled, the access controller will restart automatically.
CGI: Common Gateway Interface (CGI) offers a standard protocol for web servers to execute programs similarly to console applications running on a server that dynamically generates web pages. The CG I is enabled by default.
SSH: Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.
Capture Photos: Face images will be captured automatically when people unlock the door. The function is enabled by default.
Clear Captured Photos: Delete all automatically captured photos.
When the Access Controller connects to a third-party device through Wiegand input, and the card number read by the Access Terminal is in the reserve order from the actual card number, you need to turn on the Card No. Reverse function.
NC: When the door opens, the circuit of the door sensor circuit is closed. NO: When the door opens, the circuit of the door sensor circuit is open. Intrusion and overtime alarms are triggered only after door detector is turned on.
Success/Failure: Only displays success or failure on the standby screen.
Only Name: Displays user ID, name and authorization time after access granted; displays not authorized message and authorization time after access denied.
Photo&Name: Displays user’s registered face image, user ID, name and authorization time after access granted; displays not authorized message and authorization time after access denied.
Photos&Name: Displays the captured face image and a registered face image of a user, user ID, name and authorization time after access granted; displays not authorized message and authorization time after access denied.
18

Parameter Shortcut

Cur síos
Select identity verification methods on the standby screen. Password: The icon of the password unlock method is
displayed on the standby screen.

2.11 An Doras a Dhíghlasáil
You can unlock the door through faces, passwords, fingerprint, cards, and more.
2.11.1 Unlocking by Cards
Place the card at the swiping area to unlock the door.
2.11.2 Unlocking by Face
Verify the identity of an individual by detecting their faces. Make sure that the face is centered on the face detection frame.
19

2.11.3 Unlocking by User Password

Enter the user ID and password to unlock the door.

Nós imeachta
Céim 1 Céim 2 Céim 3

Tap on the standby screen. tap PWD Unlock, and then enter the user ID and password. Tap Yes.

2.11.4 Unlocking by Administrator Password

Enter only the administrator password to unlock the door. The access controller only allows for one administrator password. Using administrator password to unlock the door without being subject to user levels, unlock modes, periods, holiday plans, and anti-passback except for normally closed door. One device allows for only one admin password.

Réamhriachtanais
The administrator password was configured. For details, see: Configuring Administrator
Passwor.

Nós imeachta
Céim 1 Céim 2 Céim 3

Tap on the standby screen. Tap Admin PWD, and then enter the admin password. Tap .

2.12 Faisnéis an Chórais
Is féidir leat view data capacity and device version.
2.12.1 Viewing Data Capacity
On the Main Menu, select System Info > Data Capacity, you can view storage capacity of each data type.
2.12.2 Viewing Device Version
On the Main Menu, select System Info > Data Capacity, you can view the device version, such as serial No., software version and more.

20

Doiciméid / Acmhainní

LT Security LXK3411MF Face Recognition Access Controller [pdfLámhleabhar Úsáideora
LXK3411MF, 2A2TG-LXK3411MF, 2A2TGLXK3411MF, LXK3411MF Face Recognition Access Controller, LXK3411MF, Face Recognition Access Controller, Access Controller, Controller

Tagairtí

Fág trácht

Ní fhoilseofar do sheoladh ríomhphoist. Tá réimsí riachtanacha marcáilte *