1601 manual




















Additionally, a small but strong tightened thread made of steel connects sub chassis with a steel pin on the bottom and so prevents sub chassis from staggering and allows only vertical movement. An electrical lift is included, too and a contactless auto shut off. XLR jacks provide a real balanced connection to amplifiers. User manual TD The set of conditions that defines how and when the action is triggered is called an action rule.

If multiple conditions are defined, all of them must be met to trigger the action. This example describes how to set up an action rule to activate an output port when the door is forced open. Optionally, select a Schedule and Additional conditions. See below. Under Actions , select Output Port from the Type drop-down list. Select Duration and Go to opposite state after.

Then enter the desired duration of the action. To use more than one trigger for the action rule, select Additional conditions and click Add to add additional triggers. When using additional conditions, all conditions must be met to trigger the action. To prevent an action from being triggered repeatedly, a Wait at least time can be set.

Enter the time in hours, minutes and seconds, during which the trigger should be ignored before the action rule can be activated again. The product can send messages to notify recipients about events and alarms. But before the product can send notification messages, you must define one or more recipients. For information about available options, see Recipient types. Email recipients can be configured by selecting one of the listed email providers, or by specifying the SMTP server, port and authentication used by, for example, a corporate email server.

Some email providers have security filters that prevent users from receiving or viewing large attachments, from receiving scheduled emails and similar. Enter a Name and select Email from the Type list.

Enter the email addresses to send emails to in the To field. Use commas to separate multiple addresses. To set up an email recipient using for example a corporate email server, follow the instructions above but select User defined as Provider.

Enter the email address to appear as sender in the From field. Optionally, select Use encryption to send emails over an encrypted connection. The server certificate can be validated using the certificates available in the Axis product.

For information on how to upload certificates, see Certificates. Schedules can be used as action rule triggers or as additional conditions. Use one of the predefined schedules or create a new schedule as described below. Enter a descriptive name and the information needed for a daily, weekly, monthly or yearly schedule. To use the schedule in an action rule, select the schedule from the Schedule drop-down list in the Action Rule Setup page.

Recurrences are used to trigger action rules repeatedly, for example every 5 minutes or every hour. To use the recurrence in an action rule, first select Time from the Trigger drop-down list in the Action Rule Setup page and then select the recurrence from the second drop-down list.

To modify or remove recurrences, select the recurrence in the Recurrences List and click Modify or Remove. Readers use LEDs and beepers to send feedback messages to the user the person accessing or trying to access the door.

The door controller can trigger a number of feedback messages, some of which are preconfigured in the door controller and supported by most readers. Readers have different LED behaviors, but typically they use different sequences of steady lights and flashing lights in red, green, and amber.

Readers can also use one-pitch beepers to send messages, using different sequences of short and long beeper signals.

The table below shows the events that are preconfigured in the door controller to trigger reader feedback and their typical reader feedback signals. For more information, see the user information supplied by the access management system developer and reader manufacturer. An administrator can set up other users by giving them user names and passwords. Administrators have unrestricted access to all settings.

The administrator can add, modify and remove other users. This is the default option for a new unit or a unit reset to factory default settings. You may need to allow unencrypted passwords if there are viewing clients that do not support encryption, or if you upgraded the firmware and existing clients support encryption but need to log in again and be configured to use this functionality.

ONVIF is an open industry forum that provides and promotes standardized interfaces for effective interoperability of IP-based physical security products. For more information see www. Once enabled, the listed IP address are allowed or denied access to the Axis product. The administrator can add up to IP address entries to the list a single entry can contain multiple IP addresses. HTTPS can also be used by users and clients to verify that the correct device is being accessed.

See Certificates. IEEE To access a network protected by IEEE The certificates are provided by a Certification Authority CA. You need:. For authentication to work properly, the date and time settings in the Axis product should be synchronized with an NTP server.

Certificates are used to authenticate devices on a network. Two types of certificates can be used with the Axis product:. Create a self-signed certificate, see How to create a self-signed certificate. When the signed certificate is returned, click Install certificate and upload the certificate. If DHCP is enabled and the product cannot be accessed, run AXIS IP Utility to search the network for connected Axis products, or reset the product to the factory default settings and then perform the installation again.

For information about how to reset to factory default, see Reset to factory default settings. AVHS used in conjunction with an AVHS service, provides easy and secure Internet access to controller management and logs accessible from any location. The possibility to connect to an AVHS service is enabled by default. AVHS support is dependent on the availability of subscriptions from service providers. For more information, see www. To make manual settings, select Use the following DNS server address and specify the following:.

The Axis product can be accessed using a host name instead of an IP address. The host name is usually the same as the assigned DNS name. For more information, see the online help. Link-Local Address is enabled by default and assigns the Axis product an additional IP address which can be used to access the product from other hosts on the same segment on the local network.

In addition to the default setting, which is 80, any port in the range — can be used. In addition to the default setting, which is , any port in the range — can be used. A network router allows devices on a private network LAN to share a single connection to the internet. Security on the private network LAN is increased since most routers are pre-configured to stop attempts to access the private network LAN from the public network internet. The FTP server running in the Axis product enables upload of new firmware, user applications, etc.

The default port is SOCKS is a networking proxy protocol. The Axis product can be configured to use a SOCKS server to reach networks on the other side of a firewall or proxy server. This functionality is useful if the Axis product is located on a local network behind a firewall, and notifications, uploads, alarms, etc need to be sent to a destination outside the local network for example the Internet. QoS Quality of Service guarantees a certain level of a specified resource to selected traffic on a network.

A QoS-aware network prioritizes network traffic and provides a greater network reliability by controlling the amount of bandwidth an application may use.

Community names are used to identify groups. Traps are used by the Axis product to send messages to a management system on important events and status changes. Check Enable traps and enter the IP address where the trap message should be sent and the Trap community that should receive the message.

SNMP v3 provides encryption and secure passwords. To enable SNMP v3, check the box and provide the initial user password. The initial password can only be set once. If the password is lost, the Axis product must be reset to factory default, see Reset to factory default settings.

UPnP is enabled by default and the product is automatically detected by operating systems and clients that support this protocol. The Axis product includes support for Bonjour. Bonjour is enabled by default and the product is automatically detected by operating systems and clients that support this protocol. The auxiliary connector provides four configurable input and output ports for connection of external devices. The external connector provides two configurable input and output ports for connection of external devices.

Select the port direction Input or Output. You can give the ports descriptive names and their Normal states can be configured as Open circuit or Grounded circuit.

The Axis product provides several maintenance functions. Click Restart to perform a correct restart if the Axis product is not behaving as expected. This will not affect any of the current settings. Click Restore to reset most settings to the factory default values. The following settings are not affected:.

Click Default to reset all settings, including the IP address, to the factory default values. This button should be used with caution. The Axis product can also be reset to factory default using the control button, see Reset to factory default settings. For information about firmware upgrade, see How to upgrade the firmware. Information that can be found here includes firmware version, IP address, network and security settings, event settings, and recent log items.

If contacting Axis Support, please provide a server report with your query. Improper use may cause unexpected behavior and loss of contact with the Axis product. Axis strongly recommends that you do not use this function unless you understand the consequences. Axis Support does not provide assistance for problems with customized scripts. If a script causes problems, reset the product to its factory default settings, see Reset to factory default settings. Files, for example webpages and images, can be uploaded to the Axis product and used as custom settings.

Reset to factory default should be used with caution. A reset to factory default resets all settings, including the IP address, to the factory default values.

Press and hold the control button while reconnecting power. See Product overview. Keep the control button pressed for 25 seconds until the status LED indicator turns amber for the second time.

Release the control button. The process is complete when the status LED indicator turns green. The product has been reset to the factory default settings. Use the installation and management software tools, assign an IP address, set the password, and access the product.

It is also possible to reset parameters to factory default through the web interface. Firmware is software that determines the functionality of network devices. One of your first actions when troubleshooting a problem should be to check the current firmware version. The latest version may contain a correction that fixes your particular problem. Download the latest firmware file to your computer, available free of charge at www. Under Upgrade Server , click Choose file and locate the file on your computer.

If you want the product to automatically restore to factory default settings after the upgrade, check the Default checkbox.

Wait approximately 5 minutes while the product is being upgraded and restarted. Then clear the web browser's cache. If the firmware upgrade fails, the product reloads the previous firmware. Check the firmware file and try again.

Try the installation again. The IP address must be set within two minutes after power has been applied to the product. Make sure the Ping length is set to For instructions, see Installation Guide on the product page at axis. If the IP address intended for the product and the IP address of the computer used to access the product are located on different subnets, you will not be able to set the IP address.

Contact your network administrator to obtain an IP address. Disconnect the Axis product from the network. Obtain a new IP address from the network administrator and reinstall the product. If you receive: Request timed out , this means that the IP address is available for use with the Axis product. Check all cabling and reinstall the product. This means that if the same default static IP address is also used by another device, there may be problems accessing the product.

If the password for the user root is lost, the product must be reset to the factory default settings. Identify the product using its model or serial number, or by the DNS name if the name has been configured.

If required, a static IP address can be assigned manually. For instructions, see the document How to assign an IP address and access your device on the product page at axis. To configure your router to allow incoming data traffic to the Axis product, enable the NAT-traversal feature which will attempt to automatically configure the router to allow access to the Axis product, see NAT traversal port mapping for IPv4.

Resetting the product to factory default settings. Two 8—pin terminal blocks supporting both RS and Wiegand protocols for communication with the reader.

The specified power output values are shared between the two reader ports. It means that mA at 12 V DC is reserved for all readers connected to the door controller. UL : Supervised inputs were not evaluated by UL for burglary use. Only door monitor and REX support supervision with end of line resistors. It is recommended to use twisted and shielded cables. Connect shielding to 0 V DC. Only door monitor supports supervision with end of line resistors.

If the connection is interrupted, an alarm is triggered. To use supervised inputs, install end of line resistors. Use the connection diagram for supervised inputs. See Supervised inputs. The qualified cable length is up to 30 m Two 4-pin terminal blocks for form C relays that can be used, for example, to control a lock or an interface to a gate.

If the lock is non-polarized, we recommend you to add an external flyback diode. Use the auxiliary connector with external devices in combination with, for example, motion detection, event triggering, and alarm notifications. In addition to the 0 V DC reference point and power DC output , the auxiliary connector provides the interface to:. When the battery input is used, an external 3 A slow blow fuse must be connected in series.

Indicates a hazardous situation which, if not avoided, will result in death or serious injury. Indicates a hazardous situation which, if not avoided, could result in death or serious injury. Indicates a hazardous situation which, if not avoided, could result in minor or moderate injury. Indicates a situation which, if not avoided, could result in damage to property. Indicates significant information which is essential for the product to function correctly. Indicates useful information which helps in getting the most out of the product.

Show or hide the main menu. Access the product help. Change the language. Set light theme or dark theme. See information about the user who is logged in. The context menu contains:. The current settings are updated automatically.

The current automatic settings are updated automatically. IP address : Enter a unique IP address for the device. Static IP addresses can be assigned at random within isolated networks, provided that each address is unique.

To avoid conflicts, we recommend you to contact your network administrator before you assign a static IP address. Router : Enter the IP address of the default router gateway used to connect devices that are attached to different networks and network segments.

Search domains : When you use a hostname that is not fully qualified, click Add search domain and enter a domain in which to search for the hostname used by the device.

This provides the translation of hostnames to IP addresses on your network. Assign IPv6 automatically : Select to let the network router assign an IP address to the device automatically. HTTPS is a protocol that provides encryption for page requests from users and for the pages returned by the web server. The encrypted exchange of information is governed by the use of an HTTPS certificate, which guarantees the authenticity of the server.

If you view encrypted web pages through HTTPS, you might experience a drop in performance, especially when you request a page for the first time. Port 80 or any port in the range are allowed. If you are logged in as an administrator, you can also enter any port in the range If you use a port in this range, you get a warning.

Port or any port in the range are allowed. Bonjour name : Enter a friendly name to be visible on the network. The default name is the device name and MAC address. UPnP name : Enter a friendly name to be visible on the network. One-click cloud connection O3C together with an O3C service provides easy and secure internet access to live and recorded video from any location.

For more information, see axis. One-click : The default setting. Press and hold the control button on the device to connect to an O3C service over the internet. You need to register the device with the O3C service within 24 hours after you press the control button. Otherwise, the device disconnects from the O3C service.

Once you have registered the device, Always is enabled and the device stays connected to the O3C service. Always : The device constantly attempts to connect to an O3C service over the internet. Once you have registered the device, it stays connected to the O3C service. Use this option if the control button on the device is out of reach.

Login and Password : If needed, enter username and password for the proxy server. Digest : This method is more secure because it always transfers the password encrypted across the network. Auto : This option lets the device select the authentication method depending on the supported methods.

It prioritizes the Digest method over the Basic method. This is only possible if the device is connected to the internet without a firewall or proxy.

The default value is public. The default value is write. Activate traps : Turn on to activate trap reporting. The device uses traps to send messages for important events or status changes to a management system. In the device interface, you can set up traps for SNMP v1 and v2c. Trap community : Enter the community to use when the device sends a trap message to the management system.

Authentication failed : Sends a trap message when an authentication attempt fails. This also prevents unauthorized parties to access unencrypted SNMP v1 and v2c traps. Once the password is set, the password field is no longer displayed.

To set the password again, you must reset the device to factory default settings. The device supports two types of certificates:. A self-signed certificate offers limited protection and can be used before a CA-issued certificate has been obtained.

You can use a CA certificate to authenticate a peer certificate, for example to validate the identity of an authentication server when the device connects to a network protected by IEEE The device has several pre-installed CA certificates.

If you reset the device to factory default, all certificates are deleted. Any pre-installed CA certificates are reinstalled. Filter the certificates in the list.

Add certificate : Click to add a certificate. Create certificate signing request : Create a certificate signing request to send to a registration authority to apply for a digital identity certificate. When configured without a CA certificate, server certificate validation is disabled and the device tries to authenticate itself regardless of what network it is connected to.

To allow the device to access a network protected through certificates, a signed client certificate must be installed on the device. When no certificate is selected, the device tries to authenticate itself regardless of what network it is connected to. Blocking : Turn on to block brute-force attacks. A brute-force attack uses trial-and-error to guess login info or encryption keys.

Blocking conditions : Enter the number of authentication failures allowed per second before the block starts. You can set the number of failures allowed both on page level and device level. Use filter : Select to filter which IP addresses that are allowed to access the device. Addresses : Enter the IP numbers that are either allowed or denied access to the device. You can also use the CIDR format. To install test firmware or other custom firmware from Axis on the device, you need a custom-signed firmware certificate.

The certificate verifies that the firmware is approved by both the device owner and Axis. The firmware can only run on a specific device which is identified by its unique serial number and chip ID.

Custom-signed firmware certificates can only be created by Axis, since Axis holds the key to sign them. Click Install to install the certificate. You need to install the certificate before you install the firmware. It was designed for simplified IoT integration and is used in a wide variety of industries to connect remote devices with a small code footprint and minimal network bandwidth. The MQTT client in Axis device firmware can simplify integration of data and events produced in the device to systems which are not video management systems VMS.

Set up the device as an MQTT client. MQTT communication is based on two entities, the clients and the broker. The clients can send and receive messages. The broker is responsible for routing messages between clients. Use digital input to connect external devices that can toggle between an open and closed circuit, for example PIR sensors, door or window contacts, and glass break detectors. Use digital output to connect external devices such as relays and LEDs.

Mono Movie 4. You can only view or download manuals with. Sign Up and get 5 for free. Upload your files to the site. You get 1 for each file you add. Get 1 for every time someone downloads your manual.

Buy as many as you need. View and download manuals available only for. Register and get 5 for free. Upload manuals that we do not have and get 1 for each file. Get 1 for every download of your manual. Buy as much as you need.



0コメント

  • 1000 / 1000