Dahua ASI7223X-A-T1 Skrócona instrukcja obsługi - Strona 4
Przeglądaj online lub pobierz pdf Skrócona instrukcja obsługi dla Kontrolery dostępu IP Dahua ASI7223X-A-T1. Dahua ASI7223X-A-T1 19 stron. Face recognition terminal
Foreword .................................................................................................................................................... I
Important Safeguards and Warnings ..................................................................................................... II
1 Dimensions and Components ........................................................................................................... 1
2 Installation .............................................................................................................................................. 2
2.1
Installation Notes........................................................................................................................... 2
2.2
Installation Drawings ..................................................................................................................... 3
2.3
Cable Connections ........................................................................................................................ 3
2.4
Installation ..................................................................................................................................... 5
3 System Operation .................................................................................................................................. 6
3.1
Initialization ................................................................................................................................... 6
3.2
Adding New Users ........................................................................................................................ 6
4 Web Operation ....................................................................................................................................... 9
Notes of Face Recording .................................................................................................. 10
Cybersecurity Recommendations ................................................................................... 13
Table of Contents
Table of Contents
III