Dahua DHI-ASI7213Y-V3-T1P User manual

User’s Manual
Face Recognition Access Controller
User’s Manual
V1.0.
1

I
Foreword
General
This manual introduces the installation and basic operations of the Face Recognition Access
Controller (hereinafter referred to as "access controller"). Read carefully before using the device,
and keep the manual safe for future reference.
Safety Instructions
The following categorized signal words with defined meaning might appear in the manual.
Signal Words Meaning
DANGER
Indicates a high potential hazard which, if not avoided, will result in
death or serious injury.
WARNING
Indicates a medium or low potential hazard which, if not avoided,
could result in slight or moderate injury.
CAUTION
Indicates a potential risk which, if not avoided, could result in
property damage, data loss, lower performance, or unpredictable
result.
TIPS Provides methods to help you solve a problem or save you time.
NOTE
Provides additional information as the emphasis and supplement to
the text.
Revision History
Version Revision Content Release Time
V1.0.1 Updated pictures inthe manual. May 2022
V1.0.0 First release. December 2020
Privacy Protection Notice
As the device user or data controller, you might collect the personal data of others such as their face,
fingerprints, and license plate number. You need to be in compliance with your local privacy
protection laws and regulations to protect the legitimate rights and interests of other people by
implementing measures which include but are not limited: Providing clear and visible identification
to inform people of the existence of the surveillance area and provide required contact information.

II
About the Manual
●The manual is for reference only. Slight differences might be found between the manual and the
product.
●We are not liable for losses incurred due to operating the product in ways that are not in
compliance with the manual.
●The manual will be updated according to the latest laws and regulations of related jurisdictions.
For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or visit
our official website. The manual is for reference only. Slight differences might be found between
the electronic version and the paper version.
●All designs and software are subject to change without prior written notice. Product updates
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
●There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation.
●Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
●All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
●Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
●If there is any uncertainty or controversy, we reserve the right of final explanation.

III
Important Safeguards and Warnings
This section introduces content covering the proper handling of the access controller, hazard
prevention, and prevention of property damage. Read carefully before using the access controller,
and comply with the guidelines when using it.
Transportation Requirement
Transport, use and store the access controller under allowed humidity and temperature conditions.
Storage Requirement
Store the access controller under allowed humidity and temperature conditions.
Installation Requirements
●Do not connect the power adapter to the access controller while the adapter is powered on.
●Strictly comply with the local electric safety code and standards. Make sure the ambient voltage
is stable and meets the power supply requirements of the access controller.
●Do not connect the access controller to two or more kinds of power supplies, to avoid damage to
the access controller.
●Improper use of the battery might result in a fire or explosion.
●Personnel working at heights must take all necessary measures to ensure personal safety
including wearing a helmet and safety belts.
●Do not place the access controller in a place exposed to sunlight or near heat sources.
●Keep the access controller away from dampness, dust, and soot.
●Install the access controller on a stable surface to prevent it from falling.
●Install the access controller in a well-ventilated place, and do not block its ventilation.
●Use an adapter or cabinet power supply provided by the manufacturer.
●Use the power cords that are recommended for the region and conform to the rated power
specifications.
●The power supply must conform to the requirements of ES1 in IEC 62368-1 standard and be no
higher than PS2. Please note that the power supply requirements are subject to the Access
controller label.

IV
●The access controller is a class I electrical appliance. Make sure that the power supply of the
access controller is connected to a power socket with protective earthing.

V
Table of Contents
Foreword ...................................................................................................................................................I
Important Safeguards and Warnings.......................................................................................................III
1 Overview ...............................................................................................................................................1
Introduction ..................................................................................................................................1
Features ........................................................................................................................................1
Application....................................................................................................................................1
Dimension and Component............................................................................................................2
2 Connection and Installation...................................................................................................................3
Cable Connections .........................................................................................................................3
Installation Notes ...........................................................................................................................4
Installation ....................................................................................................................................6
3 System Operations.................................................................................................................................8
Basic Configuration Procedure ........................................................................................................8
Common Icons ..............................................................................................................................8
Initialization...................................................................................................................................8
Standby Interface...........................................................................................................................9
Main Menu ..................................................................................................................................10
Unlocking Methods......................................................................................................................12
3.6.1 Cards.................................................................................................................................12
3.6.2 Face...................................................................................................................................12
3.6.3 User Password....................................................................................................................12
3.6.4 Administrator Password......................................................................................................13
User Management .......................................................................................................................13
3.7.1 Adding New Users..............................................................................................................13
3.7.2 Viewing User information....................................................................................................15
Access Management ....................................................................................................................15
3.8.1 Period Management...........................................................................................................15
3.8.2 Unlock...............................................................................................................................17
3.8.3 Alarm Configuration...........................................................................................................20
3.8.4 Door Status........................................................................................................................21
3.8.5 Lock Holding Time..............................................................................................................21
Network Communication .............................................................................................................21
3.9.1 IP Address..........................................................................................................................21
3.9.2 Serial Port Settings .............................................................................................................23
3.9.3 Wiegand Configuration.......................................................................................................23
System ......................................................................................................................................24
3.10.1 Time ................................................................................................................................24
3.10.2 Face Parameter.................................................................................................................25
3.10.3 Image Mode.....................................................................................................................27
3.10.4 Fill Light Mode Setting......................................................................................................27
3.10.5 Fill Light Brightness Setting...............................................................................................27
3.10.6 Volume Adjustment..........................................................................................................27
3.10.7 IR Light Brightness Adjustment .........................................................................................27
3.10.8 Restore to Factory Settings................................................................................................27

VI
3.10.9 Reboot.............................................................................................................................28
USB ...........................................................................................................................................28
3.11.1 USB Export.......................................................................................................................28
3.11.2 USB Import ......................................................................................................................29
3.11.3 USB Update......................................................................................................................30
Features ....................................................................................................................................30
3.12.1 Privacy Setting .................................................................................................................32
3.12.2 Result Feedback ...............................................................................................................33
Record.......................................................................................................................................35
Auto Test ...................................................................................................................................36
System Info................................................................................................................................37
4 Web Operations ...................................................................................................................................38
Initialization.................................................................................................................................38
Login...........................................................................................................................................40
Resetting the Password ................................................................................................................40
Alarm Linkage..............................................................................................................................42
4.4.1 Setting Alarm Linkage ........................................................................................................42
4.4.2 Alarm Log ..........................................................................................................................44
Data Capacity ..............................................................................................................................44
Video Setting ...............................................................................................................................45
4.6.1 Data Rate...........................................................................................................................45
4.6.2 Image................................................................................................................................46
4.6.3 Exposure ...........................................................................................................................47
4.6.4 Motion Detection ...............................................................................................................48
4.6.5 Volume Setting ..................................................................................................................49
4.6.6 Image Mode ......................................................................................................................50
Face Detect..................................................................................................................................50
Network Setting...........................................................................................................................53
4.8.1 TCP/IP................................................................................................................................53
4.8.2 Port ...................................................................................................................................54
4.8.3 Register .............................................................................................................................55
4.8.4 P2P....................................................................................................................................55
Date Setting ................................................................................................................................56
Safety Management ...................................................................................................................57
4.10.1 IP Authority......................................................................................................................57
4.10.2 Systems ...........................................................................................................................58
User Management......................................................................................................................59
4.11.1 Adding Users....................................................................................................................59
4.11.2 Modifying User Information ..............................................................................................59
4.11.3 Onvif User ........................................................................................................................59
Maintenance..............................................................................................................................60
Configuration Management........................................................................................................60
4.13.1 Config Mgmt. ...................................................................................................................61
4.13.2 Features...........................................................................................................................61
4.13.3 Wiegand Serial Port Setting...............................................................................................61
Upgrade ....................................................................................................................................62
Version Information....................................................................................................................62

VII
Online User................................................................................................................................62
System Log ................................................................................................................................63
4.17.1 Querying Logs..................................................................................................................63
4.17.2 Backup Logs.....................................................................................................................64
4.17.3 Admin Log .......................................................................................................................64
Exit............................................................................................................................................64
5 FAQ ......................................................................................................................................................65
Notes of Temperature Monitoring ......................................................................................66
Notes of Face Recording/Comparison.................................................................................67
Cybersecurity Recommendations.......................................................................................70

1
1Overview
Introduction
The access controller is an access control panel that supports unlock through faces, passwords, cards,
and supports unlock through their combinations.
Features
LCD display, the resolution of 7-inch access controller is 1024 × 600.
Support face unlock, IC card unlock, and password unlock; unlock by period
With face detection box; the largest face among faces that appear at the same time is
recognized first; the maximum face size can be configured on the web
2MP wide-angle WDR lens; with auto/manual illuminator
With face recognition algorithm, the access controller can recognize more than 360 positions on
human face
Face verification accuracy > 99.5%; low false recognition rate
Support profile recognition; the profile angle is 0°–90°
Support liveness detection
Support duress alarm, tamper alarm, intrusion alarm, door contact timeout alarm, and illegal
card exceeding threshold alarm
Support general users, patrol users, blocklist users, VIP users, guest users, and special users
Various unlock status display modes protect user privacy
Support body temperature monitoring through peripheral temperature monitoring unit
Application
The access controller is applicable for parks, office buildings, schools, factories, residential areas and
other places. The identity is verified through face recognition to achieve passage without perception.

2
Networking
Dimension and Component
Dimensions and components of model Y (mm [inch])
Table 1-1 Component description (2)
No. Name No. Name
1 Temperature monitoring unit 5 Display
2 IR light 6 Card swiping area
3 Phototransistor 7 White LED illuminator
4 Dual cameras 8 Mic

3
2Connection and Installation
Cable Connections
The access controller needs to be connected to devices like sirens, readers, and door contacts.
Table 2-1 Port description
Port Cable color Cable name Description
CON1
Black RD– Negative electrode of external card reader.
Red RD+ Positive electrode of external card reader.
Blue CASE Tamper alarm input of the external card reader.
White D1 Wiegand D1 input (connected to external card
reader)/output (connected to controller).
Green D0 Wiegand D0 input (connected to external card
reader)/output (connected to controller).
Brown LED Connected to external reader indicator in
Yellow B
RS-485 negative electrode input
(connected to
external card reader)/output (connected to controller,
or connected to door control security module).
If the security module is enabled, you need to
purchase access control security module
separately. The security module
needs separate
power supply to provide power.
Once the security module is enabled, the exit
button, lock control and firefighting linkage will
be invalid.
Purple A
RS-485 positive electrode input (connected to external
card reader)/output (connected to controller
, or
connected to door control security module).
If the security module is enabled, you need to
purchase access control security module
separately. The security module needs separate
power supply to provide power.
Once the security module is
enabled, the exit
button, lock control and firefighting linkage will
be invalid.
CON2
White and
red ALARM1_NO Alarm 1 normally open output port.
White and
orange
ALARM1_CO
M Alarm 1 common output port.
White and
blue ALARM2_NO Alarm 2 normally open output port.
White and
ALARM2_CO Alarm 2 common output port.

4
Port Cable color Cable name Description
gray M
White and
green GND Connected to the common GND port.
White Brown ALARM1 Alarm 1 input port.
White and
yellow GND Connected to the common GND port.
White and
purple ALARM2 Alarm 2 input port.
CON3
Black and red RX RS-232 receiving port.
Black and
orange TX RS-232 sending portk.
Black and
blue GND Connected to the common GND port.
Black and
gray SR1 Used for door contact detection.
Black and
green PUSH1 Door open button of door No.1
Black and
brown DOOR1_COM Lock control common port.
Black and
yellow DOOR1_NO Lock control normally open port.
Black and
purple DOOR1_NC Lock control normally closed port.
Installation Notes
If there is light source 0.5 meters away from the access controller, the minimum illumination
should be no less than 100 Lux.
It is recommended that the access controller is installed indoors, at least 3 meters away from
windows and doors and 2 meters away from lights.
Avoid backlight and direct sunlight.
Ambient Illumination Requirement
Ambient illumination requirement

5
Temperature Monitoring Requirement
It is recommended to install the temperature monitoring unit in an indoor windless
environment (a relatively isolated area from the outdoor), and maintain the ambient
temperature at 10 °C to 35 °C.
Warm up the temperature monitoring unit for more than 20 minutes after power-on to enable
the temperature monitoring unit to reach thermal equilibrium.
If there is no suitable indoor environment (including areas directly facing indoor and outdoor
areas, and outdoor doorways), set up a temporary passage with stable ambient temperature for
temperature monitoring.
The factors such as sunlight, wind, cold air, and air conditioning cold and warm air can easily
affect the surface temperature of human body and the working status of the access controller,
which will cause the temperature deviation between the monitored temperature and the actual
temperature.
Influencing factors of temperature monitoring
Wind: Wind will take away the heat from the forehead, which will affect the accuracy of
temperature monitoring.
Sweating: Sweating is a way for the body to automatically cool down and dissipate heat.
When the body sweats, the temperature will also decrease.
Room temperature: If the room temperature is low, the surface temperature of human
body will decrease. If the room temperature is too high, the human body will start to sweat,
which will affect the accuracy of temperature monitoring.
The temperature monitoring unit is sensitive to light waves with a wavelength of 10um to
15um. Avoid using it in the sun, fluorescent light sources, air conditioning outlets, heating,
cold air outlets, and glass surfaces.
Places Recommended
Places recommended

6
Places Not Recommended
Places not recommended
Installation
Make sure that the distance between the camera and ground is 1.4 meters.
Installation height

7
Installation diagram
Installation Procedure
Fix the temperature monitoring unit to the bracket with 3 screws.
Drill five holes (four bracket installation holes and one cable entry) in the wall according to
holes in the bracket.
Fix the bracket on the wall by installing the expansion screws into the four bracket
installation holes.
Connect cables for access controller. See "2.1 Cable Connections."
Hang the access controller on the bracket hook.
Tighten the screws at the bottom of the access controller.

8
3System Operations
Basic Configuration Procedure
Basic configuration procedure
Common Icons
Table 3-1 Icon description
Icon Description
Main menu icon.
Confirm icon.
Turn to the first page of the list.
Turn to the last page of the list.
Turn to the previous page of the list.
Turn to the next page of the list.
Return to the previous menu.
Enable.
Disable.
Initialization
Administrator password and an email should be set the first time the access controller is turned on or
after reset; otherwise the access controller cannot be used.

9
Initialization
Administrator and password set on this interface are used to log in to the web management
platform.
The administrator password can be reset through the email address you entered if the
administrator forgets the password.
The password must consist of 8 to 32 non-blank characters and contain at least two types of
characters among upper case, lower case, number, and special character (excluding ' " ; : &).
Standby Interface
You can unlock the door through faces, passwords and cards. See Table 3-2.
If there are no operations in 30 seconds, the access controller will go to the standby mode.
The standby interface might vary with versions, and the actual interface shall prevail.

10
Homepage
Table 3-2 Homepage description
No. Description
1
Unlock methods: Card, face and password.
When card, face, and password are all set as unlock mode, the password icon will not be
displayed at the top left corner of the access controller.
2 Date & Time. Displays the current date and time.
3 Display the network status and USB status.
4
Main menu icon.
Only users with the administrator permission can enter the main menu.
5 Password unlock icon.
6 Administrator password unlock icon.
Main Menu
Administrators can add users of different levels, set access-related parameters, do network
configuration, view access records and system information, and more in the main menu.
Tap on the standby interface.
Select a main menu entering method.

11
Different modes support different unlock methods, and the actual interface shall prevail.
Administrator login
The main menu interface is displayed.

12
Main menu
Unlocking Methods
You can unlock the door through faces, passwords, and cards.
3.6.1 Cards
Put the card at the card swiping area to unlock the door.
3.6.2 Face
Make sure that your face is centered on the face recognition frame, and then you can unlock the
door.
3.6.3 User Password
Enter the user password, and then you can unlock the door.
Table of contents
Other Dahua IP Access Controllers manuals

Dahua
Dahua DHI-ASA4214F User manual

Dahua
Dahua ASI1201E-D User manual

Dahua
Dahua ASC3202B User manual

Dahua
Dahua ASI1212AD User manual

Dahua
Dahua ASI7214X User manual

Dahua
Dahua DHI-ASA2212A User manual

Dahua
Dahua ASA2212A User manual

Dahua
Dahua ASC1208C-S User manual

Dahua
Dahua DHI-IPMECS-2201C User manual

Dahua
Dahua VTO2101E-P User manual

Dahua
Dahua ASC1204B-S User manual

Dahua
Dahua ASI7223X-A-T1 User manual

Dahua
Dahua DHI-ASI7213X-T User manual

Dahua
Dahua ASI6213J-FT User manual

Dahua
Dahua ASR2101H-D User manual

Dahua
Dahua ASA1222E User manual

Dahua
Dahua ASC1204B User manual

Dahua
Dahua ASI7223X-A User manual

Dahua
Dahua ASC2102B-T User manual

Dahua
Dahua DHI-ASC1202C User manual