LT Security LXK3411MF Face Recognition Access Controller
Мушаххасоти
- Номи маҳсулот: Face Recognition Access Controller
- Модели: V1.0
Маълумот оид ба маҳсулот
The Face Recognition Access Controller is a device designed to control access using face recognition technology. It allows authorized individuals to gain access to secure areas by scanning and verifying their faces.
Дастурҳои истифодаи маҳсулот
Талабот барои насб
- Ҳангоми фаъол будани адаптер адаптери барқро ба Controller Access пайваст накунед.
- Comply with local electric safety codes and standards.
- Ҳаҷми мӯътадили муҳити атрофро таъмин кунедtage and meet power supply requirements.
- Take necessary safety measures when working at heights.
- Avoid exposure to sunlight or heat sources.
- Аз дampчанг, чанг ва дуд.
- Install on a stable surface to prevent falling.
- Place in a well-ventilated area and do not block ventilation.
- Ensure power supply conforms to specified requirements.
Талаботи амалиёт
- Check power supply correctness before use.
- Do not unplug the power cord while the adapter is on.
- Operate within rated power input and output range.
- Use under allowed humidity and temperature conditions.
- Avoid dropping or splashing liquids on the device.
- Do not disassemble without professional instruction.
- Not suitable for locations with children present.
«`
Назорати дастрасии шинохти чеҳра
Дастури истифодабаранда
V1.0
Пешгуфтор
Генерал
Ин дастур вазифаҳо ва амалиёти Назорати дастрасии шинохти чеҳраро (минбаъд “Назоратчии дастрасӣ” номида мешавад) муаррифӣ мекунад. Пеш аз истифодаи дастгоҳ бодиққат хонед ва дастурро барои истинод дар оянда бехатар нигоҳ доред.
Дар бораи Дастур
The manual is for reference only. The manual will be updated according to the latest laws and regulations of related jurisdictions. There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation. All trademarks, registered trademarks and company names in the manual are properties of their
соҳибони мувофиқ.
Огоҳии FCC
FCC 1. This device complies with Part 15 of the FCC Rules.
Фаъолият ба ду шарти зерин вобаста аст: (1) Ин дастгоҳ метавонад халали зарароварро ба вуҷуд наорад. (2) Ин дастгоҳ бояд ҳама гуна дахолати гирифташударо қабул кунад, аз ҷумла дахолате, ки боиси фаъолияти номатлуб мегардад.
2. Тағйирот ё таѓйироте, ки аз љониби тарафи масъули риояи он ба таври аниќ тасдиќ нашудаанд, метавонад ваколати корбарро барои идора кардани таљњизот бекор кунад.
NOTE: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. I f this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
— Reorient or relocate the receiving antenna. — Increase the separation between the equipment and receiver. — Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. — Consult the dealer or an experienced radio/TV technician for help. FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment . This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. This equipment should be installed and operated with minimum distance 20cm between the radiator &your body.
I
Кафолатҳо ва огоҳиҳои муҳим
Ин бахш мундариҷаеро пешниҳод мекунад, ки коркарди дурусти Назорати дастрасӣ, пешгирии хатар ва пешгирии зарари амволро дар бар мегирад. Пеш аз истифода бурдани Controller Access бодиққат хонед ва ҳангоми истифодаи он дастурҳоро риоя кунед.
Талабот барои насб
Ҳангоми фаъол будани адаптер адаптери барқро ба Controller Access пайваст накунед. Ба кодекс ва стандартхои бехатарии электрикии махаллй катъиян риоя кунед. Боварӣ ҳосил кунед, ки ҳаҷми муҳити атрофtage
is stable and meets the power supply requirements of the Access Controller. Improper use of the battery might result in a fire or explosion. Personnel working at heights must take all necessary measures to ensure personal safety
including wearing a helmet and safety belts. Do not place the Access Controller in a place exposed to sunlight or near heat sources. Keep the Access Controller away from dampness, dust, and soot. Install the Access Controller on a stable surface to prevent it from falling. Install the Access Controller in a well-ventilated place, and do not block its ventilation. The power supply must conform to the requirements of ES1 in IEC 62368-1 standard and be no
higher than PS2. Please note that the power supply requirements are subject to the Access Controller label.
Талаботи амалиёт
Пеш аз истифода бурдани қувваи барқро санҷед, ки оё дуруст аст. Ҳангоми фаъол будани адаптер сими барқро, ки дар паҳлӯи Контроллер дастрас аст, ҷудо накунед
on. Operate the Access Controller within the rated range of power input and output. Use the Access Controller under allowed humidity and temperature conditions. Do not drop or splash liquid onto the Access Controller, and make sure that there is no object
filled with liquid on the Access Controller to prevent liquid from flowing into it. Do not disassemble the Access Controller without professional instruction. This product is professional equipment. This equipment is not suitable for use in locations where children are likely to be present.
II
Мундариҷа
Foreword ………………………………………………………………………………………………………………………………………………………………………………..I Important Safeguards and Warnings………………………………………………………………………………………………………………………….. III 1 Overview …………………………………………………………………………………………………………………………………………………………………………… 1
1.1 Introduction …………………………………………………………………………………………………………………………………………………………… 1 1.2 Features …………………………………………………………………………………………………………………………………………………………………… 1 2 Local Operations …………………………………………………………………………………………………………………………………………………………….. 2 2.1 Basic Configuration Procedure………………………………………………………………………………………………………………………….2 2.2 Standby Screen………………………………………………………………………………………………………………………………………………………2 2.3 Initialization …………………………………………………………………………………………………………………………………………………………… 2 2.4 Logging In ……………………………………………………………………………………………………………………………………………………………… 3 2.5User Management …………………………………………………………………………………………………………………………………………….. 3-6 2.6 Network Communication ………………………………………………………………………………………………………………………………… 6-9 2.7 Access Management …………………………………………………………………………………………………………………………………….. 9. -12 2.8 System ………………………………………………………………………………………………………………………………………………………………..12-16 2.9 USB Management ……………………………………………………………………………………………………………………………………………16-17 2.10 Configuring Features ……………………………………………………………………………………………………………………………………17-19 2.11 Unlocking the Door………………………………………………………………………………………………………………………………………..19-20 2.12 System Information …………………………………………………………………………………………………………………………………………2. 0
III
1 Бештарview
1.1 Муқаддима
The access controller is an access control panel that supports unlock through faces, passwords, fingerprint, cards, QR code, and their combinations. Based on the deep-learning algorithm, it features faster recognition and higher accuracy. It can work with management platform which meets various needs of customers.
1.2 Хусусиятҳо
4.3 inch glass touch screen with a resolution of 272 × 480. 2-MP wide-angle dual-lens camera with IR illumination and DWDR. Multiple unlock methods including face, IC card and password. Supports 6,000 users, 6,000 faces, 6,000 passwords, 6,000 fingerprints, 10,000 cards, 50
administrators, and 300,000 records. Recognizes faces 0.3 m to 1.5 m away (0.98 ft-4.92 ft); face recognition accuracy rate of 99.9% and
the 1:N comparison time is 0.2 s per person. Supports improved security and to protect against the device being forcefully opened, security
module expansion is supported. TCP/IP and Wi-Fi connection. PoE power supply. IP65.
1
2 Амалиёти маҳаллӣ
2.1 Basic Configuration Procedure
Basic configuration procedure
2.2 Standby Screen
You can unlock the door through faces, passwords, and IC CARD. If there is no operation in 30 seconds, the Access Controller will go to the standby mode. This manual is for reference only. Slight differences might be found between the standby screen in this manual and the actual device.
2.3 Оғозсозӣ
For the first-time use or after restoring factory defaults, you need to select a language on Access Controller, and then set the password and email address for the admin account. You can use the admin account to enter the main menu of the Access Controller and the web-page. NOTE: If you forget the administrator password, send a reset request to your registered e-mail address. The password must consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special character (excluding ‘ ” ; : &).
2
2.4 Воридшавӣ
Log in to the main menu to configure the Access Controller. Only admin account and administrator account can enter the main menu of the Access Controller. For the first-time use, use the admin account to enter the main menu screen and then you can create the other administrator accounts.
Маълумоти замина
Admin account: Can log in to the main menu screen of the Access Controller, but has no door access permission.
Administration account: Can log in to the main menu of the Access Controller and has door access permissions.
Тартиб
Қадами 1 Қадами 2
Press and hold the standby screen for 3 seconds.
Select a verification method to enter the main menu.
Face: Enter the main menu by face recognition. Card Punch: Enter the main menu by swiping card. PWD: Enter the user ID and password of the
administrator account. Admin: Enter the admin password to enter the main
меню.
2.5 Идоракунии корбар
Шумо метавонед корбарони нав илова кунед, view user/admin list and edit user information.
2.5.1 Adding New Users
Тартиб
Қадами 1 Қадами 2
On the Main Menu, select User > New User. Configure the parameters on the interface.
3
Илова кардани корбари нав
Parameter User ID Name Face
Корт
PWD
Тавсифи параметрҳо
Тавсифи
ID-и корбарро ворид кунед. Идентификаторҳо метавонанд рақамҳо, ҳарфҳо ва таркиби онҳо бошанд ва дарозии максималии ID 32 аломат аст. Ҳар як ID беназир аст.
Номро бо ҳадди аксар 32 аломат ворид кунед (аз ҷумла рақамҳо, аломатҳо ва ҳарфҳо).
Боварӣ ҳосил кунед, ки чеҳраи шумо дар чаҳорчӯбаи аксбардорӣ ҷойгир аст ва тасвири чеҳра ба таври худкор гирифта ва таҳлил карда мешавад.
A user can register five cards at most. Enter your card number or swipe your card, and then the card information will be read by the access controller. You can enable the Duress Card function. An alarm will be triggered if a duress card is used to unlock the door.
Рамзи корбарро ворид кунед. Дарозии максималии парол 8 рақам аст.
4
Parameter User Level Period Holiday Plan Valid Date
Навъи корбар
Dept. Shift Mode Step 3 Tap .
Тавсифи
You can select a user level for new users. User: Users only have door access permission. Admin: Administrators can unlock the door and
configure the access controller.
Одамон метавонанд дарро фацат дар мудлати муайяншуда кушоянд.
Одамон метавонанд дарро фацат дар давраи таъ-тили муайяншуда кушоянд.
Санаеро таъин кунед, ки дар он иҷозатҳои дастрасии шахс ба охир мерасад.
General: General users can unlock the door. Blocklist: When users in the blocklist unlock the door,
service personnel will receive a notification. Guest: Guests can unlock the door within a defined
period or for certain amount of times. After the defined period expires or the unlocking times runs out, they cannot unlock the door. Patrol: Patrol users will have their attendance tracked, but they have no unlocking permissions. VIP: When VIP unlock the door, service personnel will receive a notice. Others: When they unlock the door, the door will stay unlocked for 5 more seconds. Custom User 1/Custom User 2: Same with general users.
Set departments.
Select shift modes.
2.5.2 ViewМаълумоти корбар
Ту метавонӣ view user/admin list and edit user information.
Тартиб
Қадами 1 Қадами 2
On the Main Menu, select User > User List, or select User > Admin List. View all added users and admin accounts. : Unlock through password. : Unlock through swiping card. : Unlock through face recognition.
Амалиёти марбут
Дар экрани корбар шумо метавонед корбарони иловашударо идора кунед. Ҷустуҷӯ users: Tap and then enter the username. Edit users: Tap the user to edit user information. Delete users
Delete individually: Select a user, and then tap .
5
Delete in batches: On the User List screen, tap to delete all users. On the Admin List screen, tap to delete all admin users.
2.5.3 Configuring Administrator Password
You can unlock the door by only entering the admin password. Admin password is not limited by user types. Only one admin password is allowed for one device.
Тартиб
Step 1 On the Main Menu screen, select User > Administrator PWD. Set admin password
Қадами 2 Қадами 3 Қадами 4
Tap Administrator PWD, and then enter the administrator password. Tap . Turn on the administrator function.
2.6 Муоширати шабакавӣ
Configure the network, serial port and Wiegand port to connect the Access Controller to the network.
2.6.1 Configuring IP
Set IP address for the Access Controller to connect it to the network. After that, you can log in to the webpage and the management platform to manage the Access Controller.
Тартиб
Қадами 1 Қадами 2
On the Main Menu, select Connection > Network > IP Address. Configure IP Address.
6
Конфигуратсияи суроғаи IP
IP configuration parameters
Параметр
Тавсифи
IP Address/Subnet Mask/Gateway Address
DHCP
The IP address, subnet mask, and gateway IP address must be on the same network segment.
It stands for Dynamic Host Configuration Protocol.
When DHCP is turned on, the Access Controller will automatically be assigned with IP address, subnet mask, and gateway.
P2P (peer-to-peer) technology enables users to manage
P2P
devices without applying for DDNS, setting port mapping
or deploying transit server.
2.6.2 Танзими Wi-Fi
You can connect the Access Controller to the network through Wi-Fi network.
Тартиб
Қадами 1 Қадами 2 Қадами 3 Қадами 4
Қадами 5
On the Main Menu, select Connection > Network > WiFi. Turn on Wi-Fi. Tap to search available wireless networks. Select a wireless network and enter the password. If no Wi-Fi is searched, tap SSID to enter the name of Wi-Fi. Tap .
7
2.6.3 Танзими порти силсилавӣ
Тартиб
Қадами 1 Қадами 2
On the Main Menu, select Connection > Serial Port. Select a port type. Select Reader when the Access Controller connects to a card reader. Select Controller when the Access Controller functions as a card reader, and the Access
Controller will send data to the Access Controller to control access. Output Data type: Card: Outputs data based on card number when users swipe card to unlock door;
outputs data based on user’s first card number when they use other unlock methods. No.: Outputs data based on the user ID. Select Reader (OSDP) when the Access Controller is connected to a card reader based on OSDP protocol. Security Module: When a security module is connected, the exit button, lock will be not effective.
2.6.4 Configuring Wiegand
The access controller allows for both Wiegand input and output mode.
Тартиб
Қадами 1 Қадами 2
On the Main Menu, select Connection > Wiegand. Select a Wiegand. Select Wiegand Input when you connect an external card reader to the Access
Controller. Select Wiegand Output when the Access Controller functions as a card reader, and you
need to connect it to a controller or another access terminal.
Баромади Wiegand
8
Параметр
Wiegand Output Type Pulse Width Pulse Interval Output Data Type
Description of Wiegand output
Description Select a Wiegand format to read card numbers or ID numbers. Wiegand26: Reads three bytes or six digits. Wiegand34: Reads four bytes or eight digits. Wiegand66: Reads eight bytes or sixteen digits.
Enter the pulse width and pulse interval of Wiegand output.
Select the type of output data. User ID: Outputs data based on user ID. Card No.: Outputs data based on user’s first card number,
and the data format is hexadecimal or decimal.
2.7 Access Management
You can configure door access parameters, such as unlocking modes, alarm linkage, door schedules.
2.7.1 Configuring Unlock Combinations
Use card, face or password or their combinations to unlock the door.
Маълумоти замина
Unlock modes might differ depending on the actual product.
Тартиб
Қадами 1 Қадами 2 Қадами 3
Қадами 4
Select Access > Unlock Mode > Unlock Mode. Select unlocking methods. Tap +And or /Or to configure combinations. +And: Verify all the selected unlocking methods to open the door. /Or: Verify one of the selected unlocking methods to open the door. Tap to save changes.
2.7.2 Танзими ҳушдор
An alarm will be triggered when abnormal access events occur.
Тартиб
Қадами 1 Қадами 2
Select Access > Alarm. Enable the alarm type.
9
Description of alarm parameters
Параметр
Тавсифи
Анти-пасбе
Users need to verify their identities both for entry and exit; otherwise an alarm will be triggered. It helps prevents a card holder from passing an access card back to another person so they gain entry. When anti-passback is enabled, the card holder must leave the secured area through an exit reader before system will grant another entry.
If a person enters after authorization and exits without authorization, an alarm will be triggered when they
attempt to enter again, and access is denied at the
ҳамон вақт.
If a person enters without authorization and exits after authorization, an alarm will be triggered when the they attempt to enter again, and access is denied at the same time.
Маҷбур кардан
Вақте ки корти маҷбурӣ, пароли маҷбуркунӣ ё изи ангушти маҷбурӣ барои кушодани дар истифода мешавад, ҳушдор дода мешавад.
Интрузия
When door sensor is enabled, an intrusion alarm will be triggered if the door is opened abnormally.
Door Sensor Timeout
A timeout alarm will be triggered if the door remains unlocked longer than the defined door sensor timeout, which ranges from 1 to 9999 seconds.
Door Sensor On
Intrusion and timeout alarms can be triggered only after door sensor is enabled.
2.7.3 Configuring Door Status
Тартиб
Қадами 1 Қадами 2
On the Main Menu screen, select Access > Door Status. Set door status. NO: The door remains unlocked all the time. NC: The door remains locked all the time. Normal: If Normal is selected, the door will be unlocked and locked according to your
танзимот.
2.7.4 Configuring Lock Holding Time
After a person is granted access, the door will remain unlocked for a defined time for them to pass through.
Тартиб
Қадами 1 Қадами 2 Қадами 3
On the Main Menu, select Access > Lock Holding Time. Enter the unlock duration. Tap to save changes.
10
individuals or departments, and then employees must follow the established work schedules.
Тартиб
Қадами 1 Қадами 2
Select Attendance > Schedule.
Set works schedules for individuals. 1. Tap Personal Schedule 2. enter the user ID, and then tap . 3. On the calendar, select the date, and then configure shifts.
You can only set work schedules for the current month and the next month.
0 indicates break. 1 to 24 indicates the number of the pre-defined shifts. 25 indicates the business trip. 26 indicates the leave of absence. 4. Tap .
Қадами 3
Set works schedules for the department. 1. Tap Dept Schedule. 2. Tap a department, set shifts for a week. 0 indicates break. 1 to 24 indicates the number of the pre-defined shifts. 25 indicates the business trip. 26 indicates the leave of absence.
Department shifts
Қадами 4
The defined work schedule is in one-week cycle and will be applied to all employees in the department. Tap .
11
2.7.5 Configuring Verification Interval Time
the employee repeats punch-in/out within a set time, the earliest punch-in/out will be recorded.
Тартиб
Қадами 1 Қадами 2
Select Attendance > Schedule > Verification Interval Time(s). enter the time interval, and then tap .
2.8 Система
2.8.1 Танзими вақт
Configure system time, such as date, time, and NTP.
Тартиб
Қадами 1 Қадами 2
On the Main Menu, select System > Time. Configure system time.
Parameter 24-hour System Date Setting Time Date Format
Description of time parameters Description The time is displayed in 24-hour format. Set up the date. Set up the time. Select a date format.
12
Parameter DST Setting
NTP Check Time Zone
Тавсифи
1. Tap DST Setting 2. Enable DST. 3. Select Date or Week from the DST Type list. 4. Enter start time and end time. 5. tap .
A network time protocol (NTP) server is a machine dedicated as the time sync server for all client computers. If your computer is set to sync with a time server on the network, your clock will show the same time as the server. When the administrator changes the time (for daylight savings), all client machines on the network will also update. 1. Tap NTP Check. 2. Turn on the NTP check function and configure parameters.
Server IP Address: Enter the IP address of the NTP server, and the Access Controller will automatically sync time with NTP server.
Port: Enter the port of the NTP server. Interval (min): Enter the time synchronization interval.
Минтақаи вақтро интихоб кунед.
2.8.2 Configuring Face Parameters
Тартиб
Қадами 1 Қадами 2
On the main menu, select System > Face Parameter. Configure the face parameters, and then tap .
13
Face parameter
Description of face parameters
Ном
Тавсифи
Face Threshold
Adjust the face recognition accuracy. Higher threshold means higher accuracy.
Max. Angle of Face
Set the maximum face pose angle for face detection. Larger value means larger face angle range. If the face pose angle is out of the defined range, the face detection box will not appear.
Pupillary Distance
Face images require desired pixels between the eyes (called pupillary distance) for successful recognition. The default pixel is 45. The pixel changes according to the face size and the distance between faces and the lens. If an adult is 1.5 meters away from the lens, the pupillary distance can be 50 px-70 px.
Recognition Timeout (S)
If a person with access permission has their face successfully recognized, the Access Controller will prompt face recognition success. You can enter the prompt interval time.
Invalid Face Prompt Interval (S)
If a person without access permission attempts to unlock the door for several times in the defined interval, the Access Controller will prompt face recognition failure. You can enter the prompt interval time.
14
Name Anti-fake Threshold BeautyEnable SafeHat Enable
Mask Parameters
Multi-face Recognition
Тавсифи
Avoid false face recognition by using a photo, video, mask or a different substitute for an authorized person’s face. Close: Turns off this function. General: Normal level of anti-spoofing detection means
higher door access rate for people with face masks. High: Higher level of anti-spoofing detection means higher
accuracy and security. Extremely High: Extremely high level of anti-spoofing
detection means extremely high accuracy and security.
Beautify captured face images.
Detects safehats.
Ҳолати маска:
No detect: Mask is not detected during face recognition. Mask reminder: Mask is detected during face
recognition. If the person is not wearing a mask, the system will remind them to wear masks, and access is allowed. Mask intercept: Mask is detected during face recognition. If a person is not wearing a mask, the system will remind them to wear masks, and access is denied. Mask Recognition Threshold: Higher threshold means higher mask detection accuracy.
Supports detecting 4 face images at the same time, and the unlock combinations mode become invalid. The door is unlocked after any one of them gain access.
2.8.3 Танзими баландии овоз
You can adjust the volume of the speaker and microphone.
Тартиб
Step 1 On the Main Menu, select System > Volume. Step 2 Select Beep Volume or Mic Volume, and then tap or to adjust the volume.
2.8.4 (Optional) Configuring Fingerprint Parameters
Configure fingerprint detection accuracy. Higher value means that higher threshold of similarity and higher accuracy. This function is only available on Access Controller that supports fingerprint unlock.
Тартиб
Қадами 1 Қадами 2
On the Main Menu, select System > FP Parameter. Tap or to adjust the value.
15
2.8.5 Танзимоти экран
Configure screen off time and logout time.
Тартиб
Step 1 On the Main Menu, select System > Screen settings. Step 2 Tap Logout Time or Screen Off Timeout, and then tap or to adjust the time.
2.8.6 Барқарор кардани пешфарзҳои заводӣ
Тартиб
Қадами 1 Қадами 2
On the Main Menu, select System > Restore Factory. Restore factory defaults if necessary. Restore Factory: Resets all configurations and data. Restore Factory (Save user & log): Resets configurations except for user information
and logs.
2.8.7 Restart the Device
On the Main Menu, select System > Reboot, and the Access Controller will be restarted.
2.8.8 Configuring the Language
Change the language on the Access Controller. On the Main Menu, select System > Language, select the language for the Access Controller.
2.9 USB Management
You can use a USB to update the Access Controller, and export or import user information through USB.
Make sure that a USB is inserted to the Access Controller before you export data or update the system. To avoid failure, do not pull out the USB or perform any operation of the Access Controller during the process.
You have to use a USB to export the information from an Access Controller to other devices. Face images are not allowed to be imported through USB.
2.9.1 Exporting to USB
You can export data from the Access Controller to a USB. The exported data is encrypted and cannot be edited.
Тартиб
Қадами 1 Қадами 2
On the Main Menu, select USB > USB Export. Select the data type you want to export, and then tap OK.
16
2.9.2 Importing From USB
You can import data from USB to the Access Controller.
Тартиб
Қадами 1 Қадами 2
On the Main Menu, select USB > USB Import. Select the data type that you want to export, and then tap OK.
2.9.3 Updating System
Use a USB to update the system of the Access Controller.
Тартиб
Қадами 1
Қадами 2 Қадами 3
Rename the update file to “update.bin”, put it in the root directory of the USB, and then insert the USB to the Access Controller. On the Main Menu, select USB > USB Update. Tap OK. The Access Controller will restart when the updating completes.
2.10 Configuring Features
On the Main Menu screen, select Features. Features
17
Параметр
Private Setting
Card No. Reverse Door Sensor Result Feedback
Тавсифи хусусиятҳо
Тавсифи
PWD Reset Enable: You can enable this function to reset password. The PWD Reset function is enabled by default.
HTTPS: Hypertext Transfer Protocol Secure (HTTPS) is a protocol for secure communication over a computer network. When HTTPS is enabled, HTTPS will be used to access CGI commands; otherwise HTTP will be used.
When HTTPS is enabled, the access controller will restart automatically.
CGI: Common Gateway Interface (CGI) offers a standard protocol for web servers to execute programs similarly to console applications running on a server that dynamically generates web pages. The CG I is enabled by default.
SSH: Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.
Capture Photos: Face images will be captured automatically when people unlock the door. The function is enabled by default.
Clear Captured Photos: Delete all automatically captured photos.
When the Access Controller connects to a third-party device through Wiegand input, and the card number read by the Access Terminal is in the reserve order from the actual card number, you need to turn on the Card No. Reverse function.
NC: When the door opens, the circuit of the door sensor circuit is closed. NO: When the door opens, the circuit of the door sensor circuit is open. Intrusion and overtime alarms are triggered only after door detector is turned on.
Success/Failure: Only displays success or failure on the standby screen.
Only Name: Displays user ID, name and authorization time after access granted; displays not authorized message and authorization time after access denied.
Photo&Name: Displays user’s registered face image, user ID, name and authorization time after access granted; displays not authorized message and authorization time after access denied.
Photos&Name: Displays the captured face image and a registered face image of a user, user ID, name and authorization time after access granted; displays not authorized message and authorization time after access denied.
18
Parameter Shortcut
Тавсифи
Select identity verification methods on the standby screen. Password: The icon of the password unlock method is
displayed on the standby screen.
2.11 Кушодани дар
You can unlock the door through faces, passwords, fingerprint, cards, and more.
2.11.1 Unlocking by Cards
Place the card at the swiping area to unlock the door.
2.11.2 Unlocking by Face
Verify the identity of an individual by detecting their faces. Make sure that the face is centered on the face detection frame.
19
2.11.3 Unlocking by User Password
Enter the user ID and password to unlock the door.
Тартиб
Қадами 1 Қадами 2 Қадами 3
Tap on the standby screen. tap PWD Unlock, and then enter the user ID and password. Tap Yes.
2.11.4 Unlocking by Administrator Password
Enter only the administrator password to unlock the door. The access controller only allows for one administrator password. Using administrator password to unlock the door without being subject to user levels, unlock modes, periods, holiday plans, and anti-passback except for normally closed door. One device allows for only one admin password.
Шартҳои пешакӣ
The administrator password was configured. For details, see: Configuring Administrator
Passwor.
Тартиб
Қадами 1 Қадами 2 Қадами 3
Tap on the standby screen. Tap Admin PWD, and then enter the admin password. Tap .
2.12 Маълумот дар бораи система
Ту метавонӣ view data capacity and device version.
2.12.1 Viewing Data Capacity
On the Main Menu, select System Info > Data Capacity, you can view storage capacity of each data type.
2.12.2 Viewing Device Version
On the Main Menu, select System Info > Data Capacity, you can view the device version, such as serial No., software version and more.
20
Ҳуҷҷатҳо / Сарчашмаҳо
![]() |
LT Security LXK3411MF Face Recognition Access Controller [pdf] Дастури корбар LXK3411MF, 2A2TG-LXK3411MF, 2A2TGLXK3411MF, LXK3411MF Face Recognition Access Controller, LXK3411MF, Face Recognition Access Controller, Access Controller, Controller |