Walk-through Metal Detector Quick Start Guide V1.0.
Foreword General This manual introduces the functions and operations of the walk-through metal detector (hereinafter referred to as the "Detector"). Safety Instructions The following signal words might appear in the manual. Signal Words Meaning Indicates a high potential hazard which, if not avoided, will result in death or serious injury. Indicates a medium or low potential hazard which, if not avoided, could result in slight or moderate injury.
● ● ● ● ● ● For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or visit our official website. The manual is for reference only. Slight differences might be found between the electronic version and the paper version. All designs and software are subject to change without prior written notice. Product updates might result in some differences appearing between the actual product and the manual.
Important Safeguards and Warnings This chapter describes the contents covering proper handling of the Device, hazard prevention, and prevention of property damage. Read these contents carefully before using the Device, comply with them when using, and keep the manual well for future reference. Transportation Requirements Transport the Device under the allowed humidity and temperature conditions. Storage Requirements ● Keep the Device away from dampness, dust or soot.
Table of Contents Foreword ........................................................................................................................................................................................................I Important Safeguards and Warnings............................................................................................................................................ III 1 Overview ..............................................................................................
1 Overview 1.1 Introduction The device is a high-performance walk-through metal detector. It is light-weighted and has high metal detection sensitivity, strong anti-interference capabilities and stable performance. The device, made of high-strength special materials, is light-weighted and easy to transport and install. The device has a modular design and is manufactured on unified assembly lines, ensuring the good stability. It also delivers a simplicity and user-friendly interface.
2 Structure 2.
2.
Table 2-1 Port description No. Name Description 1 Power supply switch Turns on or off the Device. 2 Power input port Connects to power cable to get power supply. 3 Reset button Long press the button for more than 5 s to restore the detector to factory default. Connects to network with network cable. 4 Ethernet port Ethernet port is only available on 18-zone detectors. 5 Alarm in + 6 Alarm in– Receives the signal of external alarm source. Alarm in is only available on 18-zone detectors.
3 Installation 3.1 Checklist After receiving the product, check against the table below. If there are any problems, contact the after-sales service personnel. Table 3-1 Checklist No.
The distance in this section is the recommended distance. The actual installation distance depends on the installation site conditions. ● Keep away from moving metal objects Large moving metal objects should be kept 0.5 m to 2 m away from the detector to avoid false alarms. Depending on the size of the metal object, the distance between the moving metal object and the detector might vary.
Figure 3-2 Run DB25 cables Step 4 Attach the host box to the front beam with four M6 × 50 cross pan head screws. Figure 3-3 Attach host box Step 5 Connect one end of the two DB25 cables and power cable to one detector panel, and then attach the front beam and rear beam to the detector panel with four M8 × 8 screws.
Figure 3-5 Fix beams (2) Step 7 Stand the Detector up. Figure 3-6 Stand the Detector up Step 8 Connect the power supply to the Detector, and then turn on the power switch to start the Detector. 3.4 Multiple Walk-through Detectors Site Installation When installing multiple devices, space the devices at least 50 cm, and also space the device and Xray security screening machine larger than 50 cm. This recommended spacing can make the little metal objects (such as coin) detected.
Figure 3-7 Multiple walk-through detectors site installation 3.5 Stabilizing Detector To make the Device work normally, stabilize the Device before use by tightening the fixing screws.
4 Detector Configuration 4.1 Configuration Panel Figure 4-1 Configuration panel Table 4-1 Configuration panel description No. Description Displays number of passes, alarm times, signal strength bar, mode (normal, test, or alarm), current working frequency, volume and time. 1 ● With increase of the detected metals, the color will grow from green to red. There are 10 degrees: Degree 1-4 is green, degree 5-7 is yellow, and degree 810 is red. When the degree is up to 8, an alarm will be triggered.
No. Description Displays metal position indication with 18 indicators (red zone). 5 This function is only available on 18-zone detectors. 4.2 (Optional) Remote Control You can set the parameters of the Device remotely through the remote control. Install the batteries before using the remote control. Figure 4-2 Remote control Table 4-2 Operation description No. Name Description 1 Power Turn on or off the Device. 2 Reset Press the button, and the number of passes and alarm times will be cleared.
4.3 Detector Operations 4.3.1 Login You can log in to the Device with the default password (000000). Change the password the first time you use it. Procedure Step 1 Step 2 Step 3 Connect the power supply, press the switch button. The main interface is displayed. Enter the password. Press or to move the cursor, and then press Press to move the cursor to OK, and the press to set the number. to confirm the password. If the password is wrong, the error note will be displayed.
Figure 4-4 Sensitivity setting Step 2 Press or to move the cursor to Sensitivity, and then press to go to the sensitivity setting interface. Figure 4-5 Set sensitivity Step 3 Select the zone that needs to be set, and then set sensitivity. Press or to move the cursor to a zone (for example, L1Zo), and then press to set the value. ● L1Zo–L6Zo: The detection sensitivity of left detector panel (models with 12 zones and 18 zones) and models with 6 zones.
Figure 4-6 Setting security level Step 4 Press to move the cursor to OK, and then press to save the setting. Result When both the defined threshold of security level and sensitivity are reached, an alarm will be triggered. When both the defined threshold of security level and sensitivity are reached, an alarm will be triggered. 4.3.3 Setting Frequency Electromagnetic interference from ambient environment varies with different frequencies.
Figure 4-7 Frequency setting Step 3 Set the frequency. or to move the cursor, and press to enable ● Auto search frequency: Press the auto search frequency function. The Device will set the suitable working frequency automatically. If the working frequency still needs to be adjusted, you can set the value manually. Do not pass or approach to the detector during auto searching. Alarm might be triggered during auto searching.
Figure 4-9 System Step 3 Press or to move the cursor to Alarm, and then press . Figure 4-10 Alarm Step 4 Press or to move the cursor to ON, and then press to enable the temperature overlay function. Press , ON becomes OFF, and then press to disable the function. Figure 4-11 Set Temp Overlay Step 5 Press or to move the cursor to OK, and then press . Body temperature and the total number of temperature alarms are displayed on the screen.
Figure 4-12 Temperature Alarm 17
Appendix 1 Cybersecurity Recommendations Mandatory actions to be taken for basic equipment network security: 1. Use Strong Passwords Please refer to the following suggestions to set passwords: ● The length should not be less than 8 characters. ● Include at least two types of characters; character types include upper and lower case letters, numbers and symbols. ● Do not contain the account name or the account name in reverse order. ● Do not use continuous characters, such as 123, abc, etc.
According to business and management requirements, reasonably add users and assign a minimum set of permissions to them. 9. Disable Unnecessary Services and Choose Secure Modes If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to reduce risks. If necessary, it is highly recommended that you use safe modes, including but not limited to the following services: ● SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication passwords.