background image

User’s Manual 

 

 

 

Declarations 

 

By connecting the product into Internet, you have to bear related risks on your own account, 

including but not limited to those related to cyber attacks, hacker attacks, and virus 

infections. It is advised to enhance the protection for your network data, device data, and 

personal information. We recommend you to take necessary actions to enhance the 

security of your devices and network, such as changing passwords and using strong 

passwords whenever possible, changing passwords regularly, and updating firmware to 

the latest version. We are not liable for any malfunction, information leak or other problems 

of the product caused thereby, but we will provide security services for the product against 

these risks. 

 

To the extent not explicitly prohibited by applicable laws, we, our employees, licensors, or 

affiliated companies are not liable for any loss of profit, revenue, sales, or data, or the cost 

for purchasing substitute goods or services, property loss, personal injury, business 

discontinuity, commercial information loss, or any special, direct, indirect, incidental, 

consequential, economic, covering, or punitive damages caused by using or not able to 

use this product or service, regardless of on which liability theory (contract, tort, fault, or 

others) these damages are based, even if we, our employees, licensors, or affiliated 

companies have been advised of the possibility of such damages. Some jurisdictions do 

not allow limitations on liabilities for personal injuries, incidental or consequential damages. 

If you are in one of these jurisdictions, these limitations might not apply to you. 

 

Our total compensation for all your damages is limited to the amount you paid for buying 

our products or services, except where relevant laws apply if our negligence has caused 

personal injuries or deaths. 

Recommendations 

Mandatory actions to be taken towards cybersecurity 

Use a strong password 

Refer to the following recommendations for setting up the password: 

 

A strong password contains at least eight characters. 

 

A strong password is comprised of at least two of these three character types: letters 

in upper and lower cases, numbers, and special characters. 

 

Do not contain the username in its forward or reverse sequence. 

 

Do not use continuous characters, such as 123 and abc. 

 

Do not use repeated characters, such as 111 and aaa. 

Timely update firmware and client software 

 

As is standard procedure in the tech-industry, the firmware of devices should be timely 

updated to the latest version to ensure the system is current with the latest security 

patches and fixes. With the device connected into Internet, it is recommended to turn 

on automatic online update detection to timely get firmware updates launched by 

providers. 

 

It is recommended to download and use the latest client software. 

Recommended measures to enhance cybersecurity: 

Summary of Contents for DHI-IPMECD-2031-RM1515-T20

Page 1: ...I Boom Barrier User s Manual V1 0 0 ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD...

Page 2: ...PMECD 2031 LM2020 T20 Variable frequency boom barrier with 4 m 13 12 ft folding arm at the left side each of the two sections of the arm is 2 m 6 56 ft Opening closing time 2 s DHI IPMECD 2031 RM2525...

Page 3: ...2032 LM45 T25 Variable frequency boom barrier with 4 5 m 14 76 ft straight arm at the left side Opening closing time 2 5 s DHI IPMECD 2032 RM50 T30 Variable frequency boom barrier with 5 m 16 40 ft s...

Page 4: ...gions For detailed information see the paper manual CD ROM QR code or our official website If there is inconsistency between paper manual and the electronic version the electronic version shall prevai...

Page 5: ...g it Application Environment Requirements Do not aim the Barrier at strong light such as lighting sunlight to focus Transport use and store the Barrier under the allowed humidity and temperature condi...

Page 6: ...rimer will rust easily Do not disassemble the Barrier by yourself Use a soft dry and clean cloth dipped in a small amount of neutral detergent to clean the Barrier Use accessories specified by the man...

Page 7: ...omponents 5 2 3 3 Installation 6 Installation Position Requirements 6 3 1 Installing Casing 6 3 2 Installing Barrier Arm 7 3 3 Adjusting Barrier Arm Length 9 3 4 Electrical Wiring 9 3 5 4 Control Boar...

Page 8: ...this way user experience can be improved and the mechanical and electrical service life of the Barrier can be greatly extended Free of Sensor and Electrical Maintenance The Barrier uses brushless mot...

Page 9: ...position between horizontal and vertical positions When the barrier motor stops swipe down the locking button on the manual handle or locking handle to lock the Barrier It will not be unlocked even i...

Page 10: ...3 2 Structure Appearance 2 1 Straight Arm Barrier Straight arm barrier Figure 2 1 Folding Arm Barrier Folding arm barrier Figure 2 2...

Page 11: ...User s Manual 4 Dimensions 2 2 Dimensions mm inch Figure 2 3...

Page 12: ...escription of components No Description No Description 1 Cover 9 Lever 2 Spring rod 10 Base 3 Driven counterweight rocker arm 11 Motor 4 Mainshaft 12 Driving rocker arm 5 Connecting rod 13 Casing 6 Co...

Page 13: ...expansion bolts that come with the Barrier Installing Casing 3 2 Take out the accessories that come with the Barrier Step 1 Place the casing at the selected position Open the door and use a screwdrive...

Page 14: ...cription 1 Two metal plates 4 Casing of the Barrier 2 Four M12 120 anchor bolts 5 Concrete foundation or pavement 3 Two sets of M12 nuts spring gaskets and flat gaskets Installing Barrier Arm 3 3 Take...

Page 15: ...alling straight arm Figure 3 3 Table 3 2 Description No Description No Description 1 Four M8 16 countersunk bolts 3 Lever 2 Two sets of M8 120 bolts flat gaskets and nuts 4 Straight arm Installing fol...

Page 16: ...ine whether to shorten the barrier arm as required on site and then install the Step 1 barrier arm on the Barrier See 3 3 Installing Barrier Arm In power off state select the right number of springs a...

Page 17: ...Opened 18 Radar loop 8 Closed 19 GND 9 COM 20 RS485_A 10 Open Barrier 21 RS485_B 11 Close Barrier Opening and Closing Control Opening priority falling barrier arm will rise if there is a rise signal a...

Page 18: ...t Auto Closing by Triggering Loop 1 If neither rising nor falling inputs are triggered the risen barrier arm will automatically fall to original position after vehicle leaves loop 1 Auto Opening by Tr...

Page 19: ...lowly or violently shake Factory default 35 F2 Falling deceleration point Incorrect value might cause the barrier arm to fall too slowly or violently shake Factory default 60 F3 Rebound threshold 12 9...

Page 20: ...able default 1 Enable C4 Reduction ratio settings 0 indicates reduction ratio is 50 1 indicates 100 Factory default As required by the user C5 Reserved The settings cannot be modified C6 Reserved The...

Page 21: ...n smash vehicles If the screws are loose first cut off the power manually tighten the screws and then power on Screw looseness Figure 5 1 Table 5 1 Description of screw looseness No Description No Des...

Page 22: ...keep the barrier arm at 40 45 from the horizontal plane to check whether the barrier arm can be still and balanced If not adjust the spring tightness For details see 3 4 Adjusting Barrier Arm Length D...

Page 23: ...0 seconds is considered as an error E7 Software smooth mode code E8 Power failure opening code EE Memory opening code Analysis of Common Faults 6 2 Table 6 2 Analysis of Common Faults FAQ Possible Cau...

Page 24: ...w one of the same specifications The controller rather than the remote control can control the barrier arm to rise or fall The battery of remote control has run out of power Check whether the indicato...

Page 25: ...able the auto check for updates function to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice t...

Page 26: ...ed Transmission If your audio and video data contents are very important or sensitive we recommend that you use encrypted transmission function to reduce the risk of audio and video data being stolen...

Page 27: ...20 Establish the 802 1x access authentication system to reduce the risk of unauthorized access to private networks Enable IP MAC address filtering function to limit the range of hosts allowed to acce...

Page 28: ...icensors or affiliated companies have been advised of the possibility of such damages Some jurisdictions do not allow limitations on liabilities for personal injuries incidental or consequential damag...

Reviews: