Access Reader
User's Manual
V1.0.2
Page 1: ...Access Reader User s Manual V1 0 2...
Page 2: ...privacy protection laws and regulations to protect the legitimate rights and interests of other people by implementing measures which include but are not limited Providing clear and visible identific...
Page 3: ...ftware if the manual in PDF format cannot be opened All trademarks registered trademarks and company names in the manual are properties of their respective owners Please visit our website contact the...
Page 4: ...nsure personal safety including wearing a helmet and safety belts Do not place the Card Reader in a place exposed to sunlight or near heat sources Keep the Card Reader away from dampness dust and soot...
Page 5: ...splash liquid onto the Card Reader and make sure that there is no object filled with liquid on the Card Reader to prevent liquid from flowing into it Do not disassemble the Card Reader without profess...
Page 6: ...Product Overview 1 1 1 Introduction 1 1 2 Dimensions 2 2 Wiring and Installation 3 2 1 Ports Overview 3 2 2 Installation Procedure 3 3 Updating the System 5 3 1 Updating through SmartPSS Lite 5 3 2 Up...
Page 7: ...ommunities factories public venues business centers and government buildings Non contact reader read only card reading distance is 3 cm 5 cm and response time is 0 3 s Supports Wiegand Protocol and RS...
Page 8: ...2 1 2 Dimensions Figure 1 1 Dimensions of card reader unit mm inch...
Page 9: ...nds transmission signals for Wiegand card reader Green D0 Brown LED BELL_CTRL Wiegand responsive signals for Wiegand card reader Yellow RS 485_B RS 485 card reader Purple RS 485_A 2 2 Installation Pro...
Page 10: ...4 Figure 2 1 Drill holes unit mm inch Step 4 Apply silica gel to the gap between the device and the wall to prevent water leakage...
Page 11: ...Click Upgrade The indicator of the Card Reader flashes blue until the update is completed and then the Card Reader automatically restarts 3 2 Updating through Config Tool Prerequisites The Card Reade...
Page 12: ...ment to prevent unauthorized personnel from carrying out physical contacts such as damaging hardware unauthorized connection of removable equipment such as USB flash disk serial port etc 2 Change Pass...
Page 13: ...in without authorization Check equipment log By viewing the logs you can know the IP addresses that were used to log in to your devices and their key operations 12 Network Log Due to the limited stora...