User's Manual
Table Of Contents
- Foreword
- Important Safeguards and Warnings
- 1 Overview
- 2 Local Operations
- 2.1 Basic Configuration Procedure
- 2.2 Common Icons
- 2.3 Standby Screen
- 2.4 Initialization
- 2.5 Logging In
- 2.6 Network Communication
- 2.7 User Management
- 2.8 Access Management
- 2.9 Attendance Management
- 2.10 System
- 2.11 USB Management
- 2.12 Configuring Features
- 2.13 Unlocking the Door
- 2.14 Viewing Unlock Logs
- 2.15 System Information
- 3 Web Operations
- 3.1 Initialization
- 3.2 Logging In
- 3.3 Resetting the Password
- 3.4 Configuring Door Parameter
- 3.5 Intercom Configuration
- 3.6 Configuring Time Sections
- 3.7 Data Capacity
- 3.8 Configuring Video and Image
- 3.9 Configuring Face Detection
- 3.10 Configuring Network
- 3.11 Safety Management
- 3.12 User Management
- 3.13 Configuring Voice Prompts
- 3.14 Maintenance
- 3.15 Configuration Management
- 3.16 Upgrading System
- 3.17 Viewing Version Information
- 3.18 Viewing Logs
- 4 Smart PSS Lite Configuration
- Appendix 1 Important Points of Intercom Operation
- Appendix 2 Important Points of QR Code Scanning
- Appendix 3 Important Points of Fingerprint Registration Instructions
- Appendix 4 Important Points of Face Registration
- Appendix 5 Cybersecurity Recommendations
VIII
4.1 Installing and Logging In
..................................................................................................................................................... 69
4.2 Adding Devices
......................................................................................................................................................................... 69
4.2.1 Adding Individually
..................................................................................................................................................... 69
4.2.2 Adding in Batches
......................................................................................................................................................... 70
4.3 User Management
................................................................................................................................................................... 71
4.3.1 Configuring Card Type
............................................................................................................................................... 71
4.3.2 Adding Users
................................................................................................................................................................... 72
4.3.2.1 Adding Individually
.......................................................................................................................................... 72
4.3.2.2 Adding in Batches
.............................................................................................................................................. 73
4.3.3 Assigning Access Permission
.................................................................................................................................. 74
4.4 Access Management
.............................................................................................................................................................. 76
4.4.1 Remotely Opening and Closing Door
................................................................................................................. 76
4.4.2 Setting Always Open and Always Close
............................................................................................................ 77
4.4.3 Monitoring Door Status
............................................................................................................................................. 77
Appendix 1 Important Points of Intercom Operation
.......................................................................................................... 79
Appendix 2 Important Points of QR Code Scanning
............................................................................................................. 80
Appendix 3 Important Points of Fingerprint Registration Instructions
..................................................................... 81
Appendix 4 Important Points of Face Registration
............................................................................................................... 83
Appendix 5 Cybersecurity Recommendations
........................................................................................................................ 86