Foreword General This manual introduces the functions and operations of the Access Reader (herein referred as to Card Reader). Read carefully before using the device, and keep the manual safe for future reference. Safety Instructions The following signal words might appear in the manual. Signal Words Meaning Indicates a high potential hazard which, if not avoided, will result in...
Page 3
The manual will be updated according to the latest laws and regulations of related jurisdictions. ● For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or visit our official website. The manual is for reference only. Slight differences might be found between the electronic version and the paper version.
Important Safeguards and Warnings This section introduces content covering the proper handling of the Card Reader, hazard prevention, and prevention of property damage. Read carefully before using the Card Reader, and comply with the guidelines when using it. Transportation Requirement Transport, use and store the Card Reader under allowed humidity and temperature conditions.
Page 5
Operation Requirements Check whether the power supply is correct before use. ● Do not unplug the power cord on the side of the Card Reader while the adapter is powered on. ● Operate the Card Reader within the rated range of power input and output. ●...
Table of Contents Foreword................................I Important Safeguards and Warnings......................III 1 Introduction..............................6 1.1 Features..............................6 1.2 Appearance............................6 2 Ports Overview..............................7 3 Installation............................... 8 4 Sound and Light Prompt..........................10 5 Unlocking the Door............................11 5.1 Unlocking through IC Card......................... 11 5.2 Unlocking through Bluetooth......................11 6 Updating the System.............................22 6.1 Updating through the Access Controller...................
1 Introduction 1.1 Features PC material, tempered glass panel and IP66, suitable for indoor and outdoor use. ● Contactless card reading for IC cards (Mifare cards). ● Unlock through card swiping and Bluebooth. ● Communicates through the RS-485 port, wiegand port, and Bluetooth. ●...
2 Ports Overview Use RS–485 or Wiegand to connect the Device. Table 2-1 Cable connection description Color Port Description PWR (12 VDC) Black RD– Blue CASE Tamper alarm signal White Wiegand transmission signal (effective only when using Green Wiegand protocol) Wiegand responsive signal Brown (effective only when using...
3 Installation Procedure Step 1 Drill 4 holes and one cable outlet on the wall. For surface-mounted wiring, cable outlet is not required. Step 2 Put 3 expansion tubes into the holes. Step 3 Wire the card reader, and pass the wires through the slot of the bracket. Step 4 Use three M3 screws to mount the bracket on the wall.
4 Sound and Light Prompt Table 4-1 Sound and light prompt description Situation Sound and Light Prompt Buzz once. Power on. The indicator is solid blue. Removing the Device. Long buzz for 15 seconds. Pressing buttons. Short buzz once. Alarm triggered by the controller. Long buzz for 15 seconds.
5 Unlocking the Door Unlock the door through IC card or Bluetooth card. 5.1 Unlocking through IC Card Unlock the door by swiping the IC card. 5.2 Unlocking through Bluetooth Unlock the door through Bluetooth cards. The card reader must work with the Access controller (ASC3202B) to realize Bluetooth unlock.
Page 13
Figure 5-1 Flowchart of configuring Bluetooth unlock Administrator needs to perform Step 1 to Step 7 , and general users need to perform Step 8 .
Page 14
Procedure Step 1 Initialize and log in to the main access controller. Step 2 Turn on the Bluetooth card function and configure the Bluetooth range. Figure 5-2 Unlock settings The Bluetooth card must be a certain distance away from the access control device to exchange data and unlock the door.
Page 15
Figure 5-3 Cloud service Step 4 Add uses to the main controller. The email address you entered when adding users to the main controller must be same to the email account that users use to sign up to DMSS.
Page 16
Figure 5-4 Basic information on the user Step 5 On the tab, click Bluetooth Card. 3 methods are available to add Bluetooth cards. Request through Email one by one: Click Request through Email. ● A Bluetooth card is generated automatically. You can generate up to 5 cards for each user.
Page 17
Figure 5-5 Request through Email Request through Email in batches. ● 1. On the Person Management page, click Batch Issue Cards. Batch issue cards only supports requesting through Email. Issue Bluetooth cards to all the users on the list: Click Issue Cards to All Users. Issue Bluetooth cards to selected users: Select users, and then click Issue Cards to Selected Users.
Page 18
Figure 5-6 Batch issue cards If you have requested Bluetooth cards for the user before, you can add the Bluetooth ● cards through registration code. using registration codes. Figure 5-7 The flowchart for requesting through registration code 1. On DMSS, tap Registration Code of a Bluetooth card. The registration code is automatically generated by DMSS.
Page 19
3. On the Bluetooth Card tab, click Request through Registration Code, paste the registration code, and then click OK. Figure 5-8 Request through registration code 4. Click OK. The Bluetooth card is added. Step 6 Add area permissions. Create a permission group, and then associate users with the group so that users will be assigned with access permissions defined for the group.
Page 20
Figure 5-9 Create area permission groups Step 7 Add access permissions to users. Assign access permissions to users by linking them to the area permission group. This will allow the users to gain access to secure areas. Figure 5-10 Select users Step 8 After users sign up and log in to DMSS with the email address, they need to open DMSS to unlock the door through Bluetooth cards.
Page 21
In the auto unlock mode, the Buletooth card will frequently unlock the door if you are still in the Bluetooth range, and finally a failure might occur. Please turn off Bluetooth on the phone and turn it on again. Shake to Unlock: The door unlocks when you shake your phone to allow the ●...
Page 22
Results Successfully unlock: The green indicator flashes and the buzzer sounds once. ● Failed to unlock: The red indicator flashes and the buzzer sounds 4 times. ●...
6 Updating the System Update the system of the card reader through the Access Controller or Configtool. 6.1 Updating through the Access Controller Prerequisites Connect the card reader to the Access Controller (ASC3202B) through RS-485. Background Information Use the correct update file. Make sure that you get the correct update file from technical ●...
Appendix 1 Cybersecurity Recommendations Mandatory actions to be taken for basic equipment network security: 1. Use Strong Passwords Please refer to the following suggestions to set passwords: The length should not be less than 8 characters. ● Include at least two types of characters; character types include upper and lower case letters, ●...
Page 25
According to business and management requirements, reasonably add users and assign a minimum set of permissions to them. 9. Disable Unnecessary Services and Choose Secure Modes If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to reduce risks.
Need help?
Do you have a question about the ASR2200A-B and is the answer not in the manual?
Questions and answers