Dahua XIS4000-L User manual

Type
User manual
I
V1.0.0
ZHEJIANG DAHUA TECHNOLOGY CO., LTD.
Handheld Bottled Liquid Scanner
User's manual
User’s Manual
I
Foreword
This manual introduces the installation, functions and operations of the Handheld Bottled
Liquid Scanner (hereinafter referred to as "the Device"). Read carefully before using the
device, and keep the manual safe for future reference.
Model
DH-XIS-L311
Safety Instructions
The following categorized signal words with defined meaning might appear in the manual.
Signal Words
Description
DANGER
Indicates a high potential hazard which, if not avoided,
will result in death or serious injury.
WARNING
Indicates a medium or low potential hazard which, if
not avoided, could result in slight or moderate injury.
CAUTION
Indicates a potential risk which, if not avoided, could
result in property damage, data loss, lower
performance, or unpredictable result.
Indicates electrostatic sensitive equipment.
Indicates high voltage danger.
Indicates strong laser radiation.
Indicates dangerous moving parts, please stay away
from moving fan blades.
Indicates that equipment parts will cause mechanical
wounding to people.
TIPS
Provides methods to help you solve a problem or
save you time.
NOTE
Provides additional information as the emphasis and
supplement to the text.
User’s Manual
II
Revision History
Version
Revision Content
V1.0.0
First release.
Privacy Protection Notice
As the device user or data controller, you might collect the personal data of others such as
their face, fingerprints, and license plate number. You need to be in compliance with your
local privacy protection laws and regulations to protect the legitimate rights and interests of
other people by implementing measures which include but are not limited: Providing clear and
visible identification to inform people of the existence of the surveillance area and provide
required contact information.
About the Manual
The manual is for reference only. Slight differences might be found between the manual
and the product.
We are not liable for losses incurred due to operating the product in ways that are not in
compliance with the manual.
The manual will be updated according to the latest laws and regulations of related
jurisdictions. For detailed information, see the paper users manual, use our CD-ROM,
scan the QR code or visit our official website. The manual is for reference only. Slight
differences might be found between the electronic version and the paper version.
All designs and software are subject to change without prior written notice. Product
updates might result in some differences appearing between the actual product and the
manual. Please contact customer service for the latest program and supplementary
documentation.
There might be errors in the print or deviations in the description of the functions,
operations and technical data. If there is any doubt or dispute, we reserve the right of
final explanation.
Upgrade the reader software or try other mainstream reader software if the manual (in
PDF format) cannot be opened.
All trademarks, registered trademarks and company names in the manual are properties
of their respective owners.
Please visit our website, contact the supplier or customer service if any problems occur
while using the device.
If there is any uncertainty or controversy, we reserve the right of final explanation.
User’s Manual
III
Important Safeguards and Warnings
This chapter describes the contents covering proper handling of the Device, hazard
prevention, and prevention of property damage. Read these contents carefully before using
the Device, comply with them when using, and keep the manual well for future reference.
Transportation Requirements
Transport the Device under the allowed humidity and temperature conditions.
Storage Requirements
Store the Device under the allowed humidity and temperature conditions.
Electrical Safety
Do not connect the power adapter to the Device after powering on. Connect the power
adapter to the Device when the power is off.
Conform to the local electrical safety standards strictly to ensure that the ambient
voltage is stable and meets the Device power supply requirements.
Do not provide two or more power supply methods to the device simultaneously,
otherwise, it may cause Device damages or safety risks.
Safety helmets, safety belts, and protective measures are required for personnel working
at heights to ensure personal safety.
Do not place and install the Device in direct sunlight or near heating devices.
Do not install the Device in a humid, dusty or soot place.
Install the Device in a well-ventilated place, and do not block its vents.
Use the adapter or chassis power supply provided by the product manufacturer.
The power source shall conform to the requirements of the Safety Extra Low Voltage
(SELV) standard, and supply power with rated voltage which conforms to Limited power
Source requirement according to GB8898IEC60065) or GB4943.1IEC60950-1). Please
note that the power supply requirements are subject to the device label.
Connect the I-type structure to the power socket with protective earthing.
Operation Requirements
Check the power supply correct or not before the Device operation.
User’s Manual
IV
Do not unplug the power cable on the Device side when adapter is being powered.
Operate the Device within the rated range of power input and output.
Use the Device under the allowed humidity and temperature conditions.
Maintenance Requirements
Do not drop or splash liquid onto the Device, and make sure that there is no object filled
with liquid on the Device to prevent liquid from flowing into the Device.
Do not disassemble the Device.
User’s Manual
V
Contents
Foreword ........................................................................................................................................................................... I
Important Safeguards and Warnings ........................................................................................................................ III
1 Overview ......................................................................................................................................................................... 1
Introduction ................................................................................................................................................................ 1
Product Appearance ............................................................................................................................................... 1
Packing List ............................................................................................................................................................... 1
2 Basic Operations ......................................................................................................................................................... 2
Structure Diagram .................................................................................................................................................. 2
3 Charging ........................................................................................................................................................................ 3
Charging by USB Cable ......................................................................................................................................... 3
3.1.1 Charging Procedures ................................................................................................................................. 3
Charging by Charger ............................................................................................................................................. 5
4 Configuration ............................................................................................................................................................... 6
Alarm Sound Switch .............................................................................................................................................. 6
Calibration ................................................................................................................................................................ 6
5 Daily Maintenance and Troubleshooting................................................................................................................ 8
Daily Maintenance................................................................................................................................................... 8
Faults and Troubleshooting ................................................................................................................................ 8
Cybersecurity Recommendations ......................................................................................................... 9
User’s Manual
1
1 Overview
Introduction
The Handheld Bottled Liquid Scanner can quickly judge whether the inspected liquid is
dangerous goods without opening the container, which has the advantages of easy operation,
high safety performance and affordable human resource and more.
It is suitable for traffic departments, government departments, public places and other
scenarios.
Traffic departments: subway, station, airport, railway, etc.
Government departments: embassies, police stations, fire stations, courts, inspection
bureaus, etc.
Public places: large conference venues, stadiums, theaters, shopping malls, etc.
Product Appearance
Product Appearance
Packing List
Table 1-1 Packing list
Name
Quantity
Host
1
Pedestal
1
1.5-Meter USB cable
1
Warranty Card, product certificate
1
PC CD
1
User's manual
1
Lanyard
1
AA battery charging kit(charger, 4 rechargeable batteries)
1
Phillips screwdriver
1
User’s Manual
2
2 Basic Operations
Structure Diagram
Structure Diagram
Table 2-1 Descriptions of structure diagram
No.
Name
Description
1
LCD
It displays the working status of the Device.
2
Safe Indicator
When the bottled liquid is detected out to be a safe liquid, the
green indicator lights up.
3
Ready Indicator
When press the start button, the yellow indicator will keep on
when the detection is pending or performing without inspected
objects, which indicates whether the Device is in normal working
status or not.
4
Dangerous Indicator
When the bottled liquid is detected out to be a hazardous liquid,
the red indicator lights up.
5
Detection Area
The square detection surface area of the device is the key part for
liquid detection.
6
Speaker
The sounding part of alarm and more.
7
USB Port
By connecting the USB cable, the port can communicate with the
PC software, and can also be used to charge the rechargeable
battery.
8
Power Switch
Click the power switch, start the Device to detect the liquid. If
the device is in the same status (ready, safe or dangerous) for
10 seconds, the Device will shut down automatically and
immediately. During this period (within 10 seconds), if you
click the power switch, the Device will shut down after
another 10 seconds.
Press and hold the power switch for 10 seconds to perform
calibration.
Press and hold the power switch for 3 seconds to turn on or
off the alarm sound.
9
Battery
It requires two 1.5V AA dry batteries or AA batteries with the
capacity not less than 1300mAh.
User’s Manual
3
3 Charging
Charging by USB Cable
When the Device is being charged, LCD display area turns off; when not being charged, 3
indicators flashes alternately; when fully charged, all indicators turn off.
Use USB cables to connect the Device with an external power or a computer host to
charge the batteries.
When the Device is being charged, LCD display area turns off.
Only after installing the rechargeable batteries can the USB charging be used.
After fully charged, cut off the charging power and unplug the USB cable in time.
In the charging state, press the power button, the LCD display area can be used for
detection after it lights up, and the screen turns off after 10 seconds. After the screen
turns off, you need to press the power switch to light up the LCD area before detection.
3.1.1 Charging Procedures
Open the USB rubber plug of the USB port.
Open the USB rubber plug.
Connect the Mini B type’ 5Pin port with USB cables with the Device.
USB connection
Connect A type male port with the USB adapter and connect the alternating current.
User’s Manual
4
Connect the power.
Charging connection Device charging
When the Device is being charged, LCD display area turns off.
Display Screen in charging status
When fully charged, all indicators turn off.
Charging finished.
User’s Manual
5
Charging by Charger
When the Device is not used for a long time, remove the batteries to prevent battery
leakage and other damage to the battery and the Device.
Store the Device in a cool, dry place. There must be no corrosive components in the air
where the Device is stored.
Charging with dry batteries may cause battery leakage, battery damage and even Device
damage.
When the battery is low, take out the rechargeable battery and use a qualified external
charger of AA batteries to charge the rechargeable battery.
When the rechargeable battery is fully charged, remove the rechargeable battery from the
charger.
User’s Manual
6
4 Configuration
Alarm Sound Switch
To turn the alarm sound on or off, perform the following procedures:
In the ready state, press and hold the power switch button for 3 seconds until a black dot
appears and flashes on the upper right of the screen.
Release the button before the black dot disappears (The black dot continuously flashes for 3
seconds before disappears).
The operation succeeded if a small green dot appears at the top right of the screen.
The operation failed if no small green dot appears at the top right of the screen, and the
above procedures needs to be done again.
Alarm sound on by default. Perform the above procedures to turn off the alarm sound when
the alarm sound is on; perform the above procedures to turn on the alarm sound when the
alarm sound is off. Turn on/off the alarm sound
Calibration
After starting the Device and the device is idling, if there appears Safe or Dangerous on the
screen for a long time instead of Ready, calibrate the Device to ensure the detection accuracy.
After the Device has been used for a period of time, if it is found that the detection accuracy
has decreased, calibrate the Device. The procedures are as follows:
In the ready state, press and hold the power switch for 10 seconds until a red
dot appears and flashes on the upper right of the screen. And quickly press
the power switch three times (it must be done before the red dot flashing
disappears).
The red dots will no longer flash until the green dots appear, and the
calibration successes. If the yellow dots appear, the calibration fails. If you do
not press the power button three times when the red dot appears, it will not
enter the calibration mode.
User’s Manual
7
Device calibration
User’s Manual
8
5 Daily Maintenance and Troubleshooting
Daily Maintenance
Use and store the Device according in the environment required by the Device
regulations.
Faults and Troubleshooting
Table 5-1 Common faults
No.
Faults
Possible cause
Troubleshooting
1
The power indicator
does not light up and
the Device has no
response.
No power supply / damaged
power adapter
Check the power
supply/contact the
manufacturer to replace the
adapter.
2
Fail to pass the
POST(power-on self
test), and then fails
to enter the
detection interface.
Damaged circuit hardware
Contact the manufacturer
for maintenance.
3
Abnormal detection
of hazardous goods.
Lost Device parameters
Damaged circuit
Recalibration
Contact the manufacturer.
9
Cybersecurity Recommendations
Cybersecurity is more than just a buzzword: it’s something that pertains to every device that
is connected to the internet. IP video surveillance is not immune to cyber risks, but taking
basic steps toward protecting and strengthening networks and networked appliances will
make them less susceptible to attacks. Below are some tips and recommendations from
Dahua on how to create a more secured security system.
Mandatory actions to be taken for basic device network security:
1. Use Strong Passwords
Please refer to the following suggestions to set passwords.
The length should not be less than 8 characters.
Include at least two types of characters; character types include upper and lower
case letters, numbers and symbols.
Do not contain the account name or the account name in reverse order.
Do not use continuous characters, such as 123, abc, etc.
Do not use overlapped characters, such as 111, aaa, etc.
2. Update Firmware and Client Software in Time
According to the standard procedure in Tech-industry, we recommend to keep your
device (such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the
system is equipped with the latest security patches and fixes. When the device is
connected to the public network, it is recommended to enable the“auto-check for
updates” function to obtain timely information of firmware updates released by the
manufacturer.
We suggest that you download and use the latest version of client software.
"Nice to have" recommendations to improve your device network security:
1. Physical Protection
We suggest that you perform physical protection to device, especially storage devices.
For example, place the device in a special computer room and cabinet, and implement
well-done access control permission and key management to prevent unauthorized
personnel from carrying out physical contacts such as damaging hardware, unauthorized
connection of removable device (such as USB flash disk, serial port), etc.
2. Change Passwords Regularly
We suggest that you change passwords regularly to reduce the risk of being guessed or
cracked.
3. Set and Update Passwords Reset Information Timely
The device supports password reset function. Please set up related information for
password reset in time, including the end user’s mailbox and password protection
questions. If the information changes, please modify it in time. When setting password
protection questions, it is suggested not to use those that can be easily guessed.
4. Enable Account Lock
The account lock feature is enabled by default, and we recommend you to keep it on to
guarantee the account security. If an attacker attempts to log in with the wrong password
several times, the corresponding account and the source IP address will be locked.
User’s Manual
10
5. Change Default HTTP and Other Service Ports
We suggest you to change default HTTP and other service ports into any set of numbers
between 102465535, reducing the risk of outsiders being able to guess which ports you
are using.
6. Enable HTTPS
We suggest you to enable HTTPS, so that you visit Web service through a secure
communication channel.
7. MAC Address Binding
We recommend you to bind the IP and MAC address of the gateway to the device, thus
reducing the risk of ARP spoofing.
8. Assign Accounts and Privileges Reasonably
According to business and management requirements, reasonably add users and assign
a minimum set of permissions to them.
9. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP,
etc., to reduce risks.
If necessary, it is highly recommended that you use safe modes, including but not limited
to the following services:
SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.
SMTP: Choose TLS to access mailbox server.
FTP: Choose SFTP, and set up strong passwords.
AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords.
10. Audio and Video Encrypted Transmission
If your audio and video data contents are very important or sensitive, we recommend that
you use encrypted transmission function, to reduce the risk of audio and video data being
stolen during transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.
11. Secure Auditing
Check online users: we suggest that you check online users regularly to see if the
device is logged in without authorization.
Check device log: By viewing the logs, you can know the IP addresses that were used
to log in to your devices and their key operations.
12. Network Log
Due to the limited storage capacity of the device, the stored log is limited. If you need to
save the log for a long time, it is recommended that you enable the network log function
to ensure that the critical logs are synchronized to the network log server for tracing.
13. Construct a Safe Network Environment
In order to better ensure the safety of device and reduce potential cyber risks, we
recommend:
Disable the port mapping function of the router to avoid direct access to the intranet
devices from external network.
The network should be partitioned and isolated according to the actual network
needs. If there are no communication requirements between two sub networks, it is
User’s Manual
11
suggested to use VLAN, network GAP and other technologies to partition the
network, so as to achieve the network isolation effect.
Establish the 802.1x access authentication system to reduce the risk of unauthorized
access to private networks.
Enable IP/MAC address filtering function to limit the range of hosts allowed to
access the device.
More information
Please visit Dahua official website security emergency response center for security
announcements and the latest security recommendations.
User’s Manual
12
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18

Dahua XIS4000-L User manual

Type
User manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI