background image

 

27 

We suggest you to enable HTTPS, so that you visit Web service through a secure communication 
channel. 

7.

 

MAC Address Binding 

We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing the 
risk of ARP spoofing. 

8.

 

Assign Accounts and Privileges Reasonably 

According to business and management requirements, reasonably add users and assign a minimum 
set of permissions to them. 

9.

 

Disable Unnecessary Services and Choose Secure Modes 

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to reduce 
risks. 
If necessary, it is highly recommended that you use safe modes, including but not limited to the 
following services: 

 

SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication 
passwords. 

 

SMTP: Choose TLS to access mailbox server. 

 

FTP: Choose SFTP, and set up strong passwords. 

 

AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 

10.

 

Audio and Video Encrypted Transmission 

If your audio and video data contents are very important or sensitive, we recommend that you use 
encrypted transmission function, to reduce the risk of audio and video data being stolen during 
transmission. 
Reminder: encrypted transmission will cause some loss in transmission efficiency. 

11.

 

Secure Auditing 

 

Check online users: we suggest that you check online users regularly to see if the device is 
logged in without authorization. 

 

Check device log: By viewing the logs, you can know the IP addresses that were used to log 
in to your devices and their key operations. 

12.

 

Network Log 

Due to the limited storage capacity of the device, the stored log is limited. If you need to save the log 
for a long time, it is recommended that you enable the network log function to ensure that the 
critical logs are synchronized to the network log server for tracing. 

13.

 

Construct a Safe Network Environment 

In order to better ensure the safety of device and reduce potential cyber risks, we recommend: 

 

Disable the port mapping function of the router to avoid direct access to the intranet 
devices from external network. 

 

The network should be partitioned and isolated according to the actual network needs. If 
there are no communication requirements between two sub networks, it is suggested to 
use VLAN, network GAP and other technologies to partition the network, so as to achieve 
the network isolation effect. 

 

Establish the 802.1x access authentication system to reduce the risk of unauthorized access 
to private networks. 

 

Enable IP/MAC address filtering function to limit the range of hosts allowed to access the 
device. 

Summary of Contents for DHI-ASG2900C

Page 1: ...Tripod Turnstile User s Manual V1 0 0...

Page 2: ...e V1 0 0 First release February 2021 About the Manual The manual is for reference only If there is inconsistency between the manual and the actual product the actual product shall prevail We are not l...

Page 3: ...rademarks registered trademarks and the company names in the manual are the properties of their respective owners Please visit our website contact the supplier or customer service if there is any prob...

Page 4: ...construction sites and more the stainless cover must be maintained more frequently Do not use paint thinner or any other organic agent during maintenance When using a face recognition component apply...

Page 5: ...ng and anti reverse intrusion functions If you force your way in the passage the turnstile will lock the arms which might cause personal injury The turnstile will not correctly recognize the authorize...

Page 6: ...e 11 4 3 1 Drilling Holes 11 4 3 2 Adjusting Turnstile Position 13 4 3 3 Fixing the Turnstiles 15 4 3 4 Optional Drilling for a Face Recognition Access Controller 15 5 Cable Connection 17 Control Boar...

Page 7: ...wo IC card readers and one face recognition access controller are provided Enter and exit through swiping card or face recognition Two IC card readers and two access controllers are provided Features...

Page 8: ...2 Access Control Mode Access Control Mode People can pass the turnstile through swiping card or face recognition Passing Mode Identity verification is needed when entering and exiting...

Page 9: ...3 2 Application Cards and faces are collected and imported to turnstiles through the network Application...

Page 10: ...4 3 Structure Appearance Appearance 1 Appearance 2...

Page 11: ...5 Dimensions Dimensions mm inch Inner Components Inner components...

Page 12: ...up again When the power is off the arms will be automatically folded 4 Control board Receives and processes signals from the access controller and controls the electromagnets and direction indicator...

Page 13: ...ss necessary otherwise people injury or property damage might occur Firmly fix the turnstile Make sure that the ground cable works properly before powering on the turnstile Before making the turnstile...

Page 14: ...l a hole first apply cooling water and then keep drilling until the hole is deeper Remove the dust inside the hole with water and then use the percussion drill for the dimensions you need 4 2 2 Wiring...

Page 15: ...te base 3 Power cable pipe 4 Signal cable pipe 5 Communication cable pipe 6 Signal and communication cables are connected to the security booth For needed cables and their specification see the figure...

Page 16: ...entry Two Cat5 Ethernet cable for two card readers and two face recognition access controllers Reserve 3 m of each cable outside the cable entry Power cable One 220 V RVV3 2 5 power cable for each tur...

Page 17: ...re 4 3 1 Drilling Holes Before installing the turnstiles make sure that the distance M between buildings and the turnstile is no less than 60 mm and no more than 100 mm Adjust it according to the actu...

Page 18: ...sition and mark the holes Mark the holes on the installation surface mm inch Drill holes See the table below for hole diameters and depth and expansion bolt diameters Table 4 3 Expansion bolt specific...

Page 19: ...n Use the key to open the top panel Open the top panel Tug all the cables inside the turnstile through the cable entry and keep them organized to avoid damage Cable entry Carefully lift the turnstile...

Page 20: ...le of inclination of the three points See the figure below for acceptable flatness error Acceptable flatness error mm inch Repeat Step 1 Step 5 to install other turnstiles The arms of different turnst...

Page 21: ...iles 4 3 4 Optional Drilling for a Face Recognition Access Controller If you need to install a face recognition access controller you need to drill a hole on the top cover of the turnstile Prerequisit...

Page 22: ...16 Position for drilling mm inch Drill a hole on the mark with a diameter shown above Use a file to clean off the burrs around the hole Remove the iron dust inside the turnstile...

Page 23: ...s to the arm electromagnet 2 Connects to the right unlocking electromagnet 3 Connects to the left unlocking electromagnet 4 Connects to 12 V DC power supply 5 Connects to signal to unlock the left unl...

Page 24: ...18 For Two IC Card Readers and One Access Controller Cable connection for two IC card readers and one access controller...

Page 25: ...19 For Two IC Card Readers and One ASI7 8 Series Face Recognition Access Controller Cable connection for two IC card readers and one ASI7 8 series face recognition access controller...

Page 26: ...20 For Two IC Card Readers and Two ASI7 8 Series Face Recognition Access Controllers Cable connection for two IC card readers and two ASI7 8 series face recognition access controllers...

Page 27: ...e arms cannot be lifted up you need to move the arm electromagnet to the appropriate position by adjust the screws on it Check if the arms can be folded away after the turnstile is powered off and can...

Page 28: ...owered off or the arms cannot be lifted up after the turnstile is powered on Move the arm electromagnet to the appropriate position by adjusting the screws on it The direction indicator is not on Chec...

Page 29: ...r a construction site we recommend Outdoor Once every two days and every time after rain Indoor Once every five days Removing Rust on the Surface Maintenance cycle for a good environment adjustable ac...

Page 30: ...rface Use scour pads to clean the surface apply stainless steel maintenance agent along the lines on the surface and then use scour pads to clean the surface again If certain rust cannot be removed se...

Page 31: ...pair it Check if the screws of the arms are loose If yes tighten them Check if the motor bearing fastening pieces and drive shaft are loose If yes tighten them Apply anti corrosion grease to the linka...

Page 32: ...hat you download and use the latest version of client software Nice to have recommendations to improve your device network security 1 Physical Protection We suggest that you perform physical protectio...

Page 33: ...ncrypted transmission will cause some loss in transmission efficiency 11 Secure Auditing Check online users we suggest that you check online users regularly to see if the device is logged in without a...

Reviews: