Frequently Asked Questions
Pick a Support Page
To find the device firmware details, navigate to the menu, select basic info, and choose the "About" page. Alternatively, you can use the IP tool to find the device info, including the firmware details.
To find the IP of a Vantage network camera with ending model number T1, use the IP tool. Install the IP tool application on a Windows PC and search for the camera. Ensure that the PC is on the same network as the camera.
If you forget the NVR password, provide the dynamic reset code to Vantage support team to assist further.
To connect Vantage NVR with ending model number T1 with the mobile app, follow the below steps:
- From the NVR, navigate to network settings and open the NAT option.
- Ensure that NAT is enabled and NAT2.0 cloud is selected.
- Make sure the NVR is connected to the internet and reboot the NVR.
- Navigate to NAT and check the status; it should show "connected," indicating the NVR is connected to the cloud.
- Then, download the app named 'NVMS mobile' and scan the QR code shown under the NAT page. Input the NVR username and password to stream the cameras.
NVMS Lite can support up to 256 channels.
Use the IP tool to reset Vantage network camera with ending model number T1. Firstly, find the camera's IP and MAC ID using the IP tool. Then, you can reset the camera using its MAC ID. For more info contact Vantage support team.
If there is no image after camera installation, please check the power supply and make sure the video cable is workable.
IE browser may be set up to block ActiveX, enable the same.
The default IP for all Vantage network cameras with ending model number T1 is 192.168.226.201.
The default username and password for all Vantage network cameras with ending model number T1 are admin and 123456, respectively.
The default username and password for all Vantage NVRs with ending model number T1 are admin and 123456, respectively.
The login username and password for NVMS are admin and 123456, respectively.
The T1 series PC application name is NVMS 2.1.3 Lite.
Reboot the NVR and wait for it to boot. After the long beep, connect a mouse to the NVR. Hold the right mouse button for more than 10 seconds until you hear a long beep. This will switch the NVR resolution to a lower setting. You can then set the NVR resolution according to the monitor's supported resolution.
Check the HDMI/VGA cable connection. Additionally, check the resolution set on the NVR through the webpage.
It may be caused by the anti-virus software on your computer. Please exit and try to search for the device again. If the issue persists, disable the firewall and try again.
- Check the network connection and make sure it is connected.
- If IP address is not available, reset the IP address.
- If the web port number has been changed, contact the administrator to get the correct port number.
- If none of the above reasons work, restore to default setting by IP Tool.
Yes, access cards can be personalized with a photo, serving as both an access card and an ID badge. Visitors can also be given numbered badges for visibility and appropriate access.
Yes, access cards can be used across multiple locations within an organization. This reduces the need for carrying multiple cards, simplifies administration, and eliminates confusion at access points.
Yes, with the Vantage access pro software, access details can be managed remotely. Changes are instant if the system's parameters are stored on a centrally managed database. We offer intuitive, user-friendly control for organizations of all sizes.
Yes, Vantage access control software allows the creation of temporary cards with time limits and restricted area access and provides flexibility to create temporary access as needed.
4 readers (2 for entry and 2 for exit) can be connected to a 2-door Controller. 8 readers (4 for entry and 4 for exit) can be connected to a 4-door Controller.
The controller IP is labeled on the controller housing along with its serial number (SN).
Yes, if the third-party reader supports Wiegand output, it can be connected with Vantage access controller.
Username: admin, Password: 888888
Report the lost card immediately. The card can then be deactivated in the central access control software, rendering it useless. The system can also track any attempted use of the card since it was reported lost.
A 2-door Controller supports control for 2 doors and a 4-door Controller supports control for 4 doors.
An Access Control Device is a security system designed to manage and monitor access to a building or area by controlling entry points such as doors, gates, or barriers.
Follow the reset instructions provided in the boom barrier user manual. Typically, this involves powering down the system, checking connections, and powering it back up.
Installation of boom barrier involves setting up the cabinet, installing the boom (straight, folding, or fence), and adjusting the spring mechanism. Detailed instructions for each step can be known from the boom barrier user manual.
Verify that the boom length is correctly set in the controller menu. Check for any physical obstructions and ensure the transmission mechanism is calibrated correctly.
Ensure the power supply is connected and the control unit is properly wired. Check for any loose connections and verify that the controller settings are correct. Refer to the error code list in the boom barrier manual for specific issues.
Unusual noises may indicate issues with the transmission mechanism or the spring. Inspect these components for wear or damage and lubricate or replace parts as needed.
Check the spring tension and adjust it according to the instructions in the manual. Ensure that the boom is not obstructed, and the transmission mechanism is functioning properly.
Refer to the error code list in the boom barrier user manual for the meaning of the displayed code. Follow the recommended troubleshooting steps for each specific error code as specified in the manual.
The Boom Barrier system consists of four parts: cabinet, transmission mechanism, control unit, and boom. The boom can be straight, folding, or fence-type.
The control unit manages the operation of the boom, including raising and lowering.
Regular maintenance includes checking and adjusting the spring mechanism, inspecting the boom and cabinet, and ensuring all connections are secure. For more details, follow the maintenance schedule in the manual.
Yes, flap barrier/swing gate has fire alarm input terminal for easy integration with fire alarm system.
Any third-party access control system can be connected to Vantage flap barrier/swing gate through NO/NC dry contact.
The flap barrier/swing gate can be operated in normally open or closed modes with adjustable speed and direction settings. Use the control panel to manage these settings.
The speed can be adjusted using the control panel settings. Refer to the user manual for instructions on accessing and modifying the speed settings.
Refer to the error messages section in the user manual for specific error codes and their meanings. Follow the suggested troubleshooting steps for each error.
Check the power supply and ensure the control board is properly connected. Verify that there are no obstructions in the path of the barrier/gate. Inspect the mechanism for any signs of wear or damage.
Unusual noises may indicate mechanical issues. Inspect the moving parts for wear and ensure they are properly lubricated. Check for any obstructions or misalignment.
Ensure that the card reader or keypad is properly connected and functional. Verify that the access cards or codes are correctly programmed into the system.
3x120-degree rotation rods have three arms spaced 120 degrees apart, allowing a 120-degree turn per pass. 4x90-degree rotation rods have four arms spaced 90 degrees apart, allowing a 90-degree turn per pass.
Top quality AISI 304 grade SS and 316 grade SS can be provided for flap barrier/swing gate housings.
When the power is down, the arm of the tripod turnstile drops to allow free passage.
A half-height tripod turnstile is waist-high and typically used in areas requiring moderate security, while a full-height tripod turnstile extends from the floor to above head height, providing a higher security level by preventing individuals from climbing over.
Extensive testing has been conducted on cell phones, computers, and film exposure to radiation. These tests have concluded that X-ray scanners do not cause any damage to these components or equipment.
One notable feature of modern walk-through metal detectors is their multi-zone detection capability. By dividing the detection area into multiple zones, these devices can pinpoint the location of a detected metal object, providing security personnel with clearer information during the screening process. This improves accuracy, reduces false alarms, and streamlines the overall security screening process.
Regular maintenance includes cleaning the scanner, checking the conveyor belt, and ensuring all components are functioning correctly. Follow the maintenance schedule in the user manual for best results.
Dual energy differs from single energy X-Ray inspection as it uses two energy spectrums to discriminate between high and low channel X-Rays, as well as a dual-layer detector. Dual Energy X-Ray Technology is better at detecting objects that show a very small X-Ray absorption variation, meaning dense foreign bodies in dense products are more easily detected using dual energy X-Ray compared with single energy. For example, dual energy better detects flat glass and stone in mixed nuts, both of which can be challenging to detect using single energy detectors.
Ensure the scanner is properly connected to a power source. Check the power cable for any damage and verify that the power switch is in the "on" position.
Check the conveyor belt for any obstructions or damage. Ensure the belt is properly aligned and the motor is functioning. Refer to the user manual for belt adjustment instructions.
Verify that the scanner is properly calibrated. Ensure the X-ray source and detectors are clean and unobstructed. Perform a test scan to check for proper operation.
Clean the scanner's imaging components and ensure they are free from dirt or debris. Check the calibration settings and adjust them according to the user manual.
An X-ray generator is the main energy source in an X-ray scanner. Generators pass electricity through a heat filament to produce gamma X-rays. These X-rays penetrate objects and create images that allow operators to inspect their contents. Vantage X-ray scanners are equipped with single or dual generators, and these produce single- or dual-view images of the scanned object.
Threat Image Projection (TIP) is a valuable detection tool for operators and administrators. The software has a large library with a range of threat objects and operates by periodically inserting a threat object into a scanned image.
Follow the procedures in the user manual for handling detected issues. This may include re-scanning the baggage, adjusting the scanner settings, or contacting technical support.
7 color imaging feature uses imaging analysis to assign colors based on the effective atomic number and provides better differentiation of items which may have similar composition. Each screened object appears in one of the colors based upon a specific range of atomic numbers. 7 color imaging enables high security threats to be more easily identified by operators in minimal time compared to 4 color.
The multi-apartment solution operates on DHCP and uses a 10.x.x.x IP range (Class A). The IP address is assigned automatically based on the room number within this range.
A multi-apartment Video Door Phone (VDP) solution allows multiple apartments within a building to have individual video door phone systems that are interconnected, providing both shared and private access control and communication capabilities.
An IP Video Door Phone (IP VDP) is a security device that allows residents to see and communicate with visitors at their door via a video call over an IP network.
SIP (Session Initiation Protocol) in IP VDP is a communication protocol used for initiating, maintaining, and terminating real-time voice and video calls over IP networks.