Hangzhou Hikvision Digital Technology K1T803MF, K1T803EF User Manual

Fingerprint Access Control Terminal
User Manual
V1.0
UD02842B
Fingerprint Access Control Terminal
Name
Model
Fingerprint Access
Control Terminal
DS-K1T803F
DS-K1T803MF
DS-K1T803EF
This quick start guide is intended for users of the models below:
It includes instructions on how to use the Product. The software embodied in the Product is governed by the user license agreement covering that Product.
About this Manual
This Manual is subject to domestic and international copyright protection. Hangzhou Hikvision Digital Technology Co., Ltd. (“Hikvision”) reserves all rights to this manual. This manual cannot be reproduced, changed, translated, or distributed, partially or wholly, by any means, without the prior written permission of Hikvision.
Disclaimer
REGARDING TO THE PRODUCT WITH INTERNET ACCESS, THE USE OF PRODUCT SHALL BE WHOLLY AT YOUR OWN RISKS. OUR COMPANY SHALL NOT TAKE ANY RESPONSIBILITIES FOR ABNORMAL OPERATION, PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER ATTACK, HACKER ATTACK, VIRUS INSPECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, OUR COMPANY WILL PROVIDE TIMELY TECHNICAL SUPPORT IF REQUIRED. SURVEILLANCE LAWS VARY BY JURISDICTION. PLEASE CHECK ALL RELEVANT LAWS IN YOUR JURISDICTION BEFORE USING THIS PRODUCT IN ORDER TO ENSURE THAT YOUR USE CONFORMS THE APPLICABLE LAW. OUR COMPANY SHALL NOT BE LIABLE IN THE EVENT THAT THIS PRODUCT IS USED WITH ILLEGITIMATE PURPOSES. IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW, THE LATER PREVAILS.
Support
Should you have any questions, please do not hesitate to contact your local dealer.
i
Fingerprint Access Control Terminal
Regulatory Information
FCC Information
Please take attention that changes or modification not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment. FCC compliance: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected. Consult the dealer or an experienced radio/TV technician for help. This equipment should be installed and operated with a minimum distance 20cm between the radiator and your body.
FCC Conditions
This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions:
1. This device may not cause harmful interference.
2. This device must accept any interference received, including interference that may cause undesired operation
EU Conformity Statement
This product and - if applicable - the supplied accessories too are marked with "CE" and comply therefore with the applicable harmonized European standards listed under the RE Directive 2014/53/EU, the EMC Directive 2014/30/EU, the RoHS Directive 2011/65/EU.
2012/19/EU (WEEE directive): Products marked with this symbol cannot be disposed of as unsorted municipal waste in the European Union. For proper recycling, return this product to your local supplier upon the purchase of equivalent new equipment, or dispose of it at designated collection points. For more information see: www.recyclethis.info.
2006/66/EC (battery directive): This product contains a battery that cannot be disposed of as unsorted municipal waste in the European Union. See the product documentation for specific battery information. The battery is marked with this symbol, which may include lettering to indicate cadmium (Cd), lead (Pb), or mercury (Hg). For proper recycling, return the battery to your supplier or to a designated collection point. For more information see:
www.recyclethis.info.
Industry Canada ICES-003 Compliance
This device meets the CAN ICES-3 (B)/NMB-3(B) standards requirements.
This device complies with Industry Canada licence-exempt RSS standard(s). Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of the device.
ii
Fingerprint Access Control Terminal
Le présent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radioexempts de licence. L'exploitation est autorisée aux deux conditions suivantes : (1) l'appareil ne doit pas produire de brouillage, et (2) l'utilisateur de l'appareil doit accepter tout brouillage radioélectrique subi, même si le brouillage est susceptible d'en compromettre le fonctionnement. Under Industry Canada regulations, this radio transmitter may only operate using an antenna of a type and maximum (or lesser) gain approved for the transmitter by Industry Canada. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (e.i.r.p.) is not more than that necessary for successful communication.
Conformément à la réglementation d'Industrie Canada, le présent émetteur radio peut fonctionner avec une antenne d'un type et d'un gain maximal (ou inférieur) approuvé pour l'émetteur par Industrie Canada. Dans le but de réduire les risques de brouillage radioélectrique à l'intention des autres utilisateurs, il faut choisir le type d'antenne et son gain de sorte que la puissance isotrope rayonnée équivalente (p.i.r.e.) ne dépasse pas l'intensité nécessaire à l'établissement d'une communication satisfaisante.
This equipment should be installed and operated with a minimum distance 20cm between the radiator and your body. Cet équipement doit être installé et utilisé à une distance minimale de 20 cm entre le radiateur et votre corps.
iii
Fingerprint Access Control Terminal
Warnings Follow these safeguards to prevent serious injury or death.
Cautions Follow these precautions to prevent potential injury or material damage.
Safety Instruction
These instructions are intended to ensure that user can use the product correctly to avoid danger or property loss. The precaution measure is divided into Warnings and Cautions:
Warnings: Neglecting any of the warnings may cause serious injury or death. Cautions: Neglecting any of the cautions may cause injury or equipment damage.
Warnings
All the electronic operation should be strictly compliance with the electrical safety regulations, fire
prevention regulations and other related regulations in your local region.
Please use the power adapter, which is provided by normal company. The power consumption cannot
be less than the required value.
Do not connect several devices to one power adapter as adapter overload may cause over-heat or fire
hazard.
Please make sure that the power has been disconnected before you wire, install or dismantle the
device.
When the product is installed on wall or ceiling, the device shall be firmly fixed. If smoke, odors or noise rise from the device, turn off the power at once and unplug the power cable,
and then please contact the service center.
If the product does not work properly, please contact your dealer or the nearest service center. Never
attempt to disassemble the device yourself. (We shall not assume any responsibility for problems caused by unauthorized repair or maintenance.)
Cautions
Do not drop the device or subject it to physical shock, and do not expose it to high electromagnetism
radiation. Avoid the equipment installation on vibrations surface or places subject to shock (ignorance can cause equipment damage).
Do not place the device in extremely hot (refer to the specification of the device for the detailed
operating temperature), cold, dusty or damp locations, and do not expose it to high electromagnetic radiation.
The device cover for indoor use shall be kept from rain and moisture. Exposing the equipment to direct sun light, low ventilation or heat source such as heater or radiator is
forbidden (ignorance can cause fire danger).
Do not aim the device at the sun or extra bright places. A blooming or smear may occur otherwise
(which is not a malfunction however), and affecting the endurance of sensor at the same time.
Please use the provided glove when open up the device cover, avoid direct contact with the device
cover, because the acidic sweat of the fingers may erode the surface coating of the device cover.
Please use a soft and dry cloth when clean inside and outside surfaces of the device cover, do not use
alkaline detergents.
iv
Fingerprint Access Control Terminal
Please keep all wrappers after unpack them for future use. In case of any failure occurred, you need to
return the device to the factory with the original wrapper. Transportation without the original wrapper may result in damage on the device and lead to additional costs.
Improper use or replacement of the battery may result in hazard of explosion. Replace with the same
or equivalent type only. Dispose of used batteries according to the instructions provided by the battery manufacturer
v
Fingerprint Access Control Terminal
Contents
Contents ............................................................................................................................................ 1
Chapter 1 Overview ........................................................................................................................ 3
Introduction ....................................................................................................................................... 3 1.1
Main Features .................................................................................................................................... 3 1.2
Appearance ........................................................................................................................................ 4 1.3
Keypad Description ............................................................................................................................ 5 1.4
Chapter 2 Installation ...................................................................................................................... 6
Chapter 3 Device Wiring .................................................................................................................. 7
Terminal Description .......................................................................................................................... 7 3.1
Device Wiring ..................................................................................................................................... 1 3.2
3.2.1 External Device Wiring Overview (Without Secure Door Control Unit) ...................................... 1
3.2.2 External Device Wiring Overview (With Secure Door Control Unit) ........................................... 2
Chapter 4 Basic Operation ............................................................................................................... 3
Device Activation ............................................................................................................................... 3 4.1
4.1.1 Activating via SADP Software ....................................................................................................... 3
4.1.2 Activating via Client Software ...................................................................................................... 5
Login ................................................................................................................................................... 8 4.2
Parameters Configuration .................................................................................................................. 8 4.3
4.3.1 Communication Settings .............................................................................................................. 8
4.3.2 System Settings .......................................................................................................................... 11
4.3.3 Setting Time ............................................................................................................................... 14
User Management ........................................................................................................................... 15 4.4
4.4.1 Adding User ............................................................................................................................... 15
4.4.2 Managing the User .................................................................................................................... 19
Access Control System Configuration .............................................................................................. 20 4.5
4.5.1 Configure Access Control Parameters ........................................................................................ 20
4.5.2 Configuring Holiday Group ........................................................................................................ 21
4.5.3 Configuring Week Plan ............................................................................................................... 24
4.5.4 Configuring Schedule Template ................................................................................................. 25
Attendance Configuration ................................................................................................................ 26 4.6
4.6.1 Configuring Department ............................................................................................................ 26
4.6.2 Configuring Shift ........................................................................................................................ 28
4.6.3 Configuring Holiday ................................................................................................................... 31
4.6.4 Configuring Shift Schedule ......................................................................................................... 33
4.6.5 Report Management .................................................................................................................. 37
Other Management ......................................................................................................................... 38 4.7
4.7.1 Transferring Data........................................................................................................................ 38
4.7.2 Searching Log ............................................................................................................................. 39
4.7.3 Testing ........................................................................................................................................ 40
4.7.4 System Information .................................................................................................................... 40
Chapter 5 Client Operation ............................................................................................................ 42
Overview of Access Control System ................................................................................................. 42 5.1
5.1.1 Description ................................................................................................................................. 42
5.1.2 Configuration Flow ..................................................................................................................... 42
Device Management ........................................................................................................................ 43 5.2
1
Fingerprint Access Control Terminal
5.2.1 Controller Management ............................................................................................................ 43
5.2.2 Access Control Point Management ............................................................................................ 57
Permission Management ................................................................................................................. 59 5.3
5.3.1 Person Management .................................................................................................................. 59
5.3.2 Card Management ..................................................................................................................... 61
5.3.3 Schedule Template ..................................................................................................................... 64
5.3.4 Door Status Management .......................................................................................................... 68
5.3.5 Interact Configuration ................................................................................................................ 71
5.3.6 Access Permission Configuration ............................................................................................... 74
5.3.7 Advanced Functions ................................................................................................................... 78
Attendance Management ................................................................................................................ 82 5.4
5.4.1 Shift Group Management .......................................................................................................... 82
5.4.2 Shift Management ..................................................................................................................... 84
5.4.3 Holiday Management ................................................................................................................ 86
5.4.4 Shift Schedule Management ...................................................................................................... 87
5.4.5 Attendance Check Point Management ...................................................................................... 88
5.4.6 Adjustment Management .......................................................................................................... 89
5.4.7 Card Swiping Log Query ............................................................................................................. 94
5.4.8 Statistic Analysis ......................................................................................................................... 94
5.4.9 Parameters Configuration .......................................................................................................... 96
5.4.10 Data Management .................................................................................................................. 96
Checking Status and Event ............................................................................................................... 96 5.5
5.5.1 Status Monitor ........................................................................................................................... 96
5.5.2 Access Control Event .................................................................................................................. 98
5.5.3 Event Search............................................................................................................................... 99
System Maintenance ..................................................................................................................... 100 5.6
5.6.1 Log Management ..................................................................................................................... 100
5.6.2 System Configuration ............................................................................................................... 103
Chapter 6 Appendix .................................................................................................................... 107
Tips for Scanning Fingerprint ......................................................................................................... 107 6.1
Attendance Record Delete Rule ..................................................................................................... 108 6.2
6.2.1 Enabling Record Delete ............................................................................................................ 108
6.2.2 Disabling Record Delete ........................................................................................................... 108
Device Performance ....................................................................................................................... 109 6.3
6.3.1 Access Control .......................................................................................................................... 109
6.3.2 Attendance ............................................................................................................................... 109
Attendance Report Table ............................................................................................................... 110 6.4
6.4.1 Description of Attendance Report File Name .......................................................................... 110
6.4.2 Attendance Report Table Description ...................................................................................... 111
2
DS-K1T803 Series Fingerprint Access Control Terminal is designed with a 2.4-inch LCD display screen. Offline operation, wired network (TCP/IP) and wireless network transmission modes are supported as well.
Fingerprint Access Control Terminal
Chapter 1 Overview
Introduction 1.1
Main Features 1.2
Doorbell ringtone settings function 2.4-inch LCD display screen Transmission modes of wired network (TCP/IP) and wireless network Max. 3,000 users, 3,000 fingerprints and 100,000 access control events records storage Export the report and upgrade the device via the USB disk. Adopts the optical fingerprint module, supporting 1:N mode (fingerprint, card + fingerprint) and
1:1 mode (card + fingerprint)
Terminal can be set as card reader and connect to the access controller when the Wiegand
mode is selected as exporting
Supports multiple authentication modes (card, fingerprint, card + fingerprint, card + password,
fingerprint + password, card + fingerprint + password, terminal authentication, user authentication and so on.)
Supports EM card reading (DS-K1T803EF) Supports Mifare card reading, including card No. reading (DS-K1T803MF) Support CPU card reading, including CPU card serial No. (DS-K1T803MF needs to be configured
in the client software)
Supports secure door control unit accessing via RS-485 connection Tampering detection, unlocking overtime alarm, invalid card swiping over times alarm, duress
card alarm, and so on
3
No.
Description
1
Keypad
2
Door Bell Button
3
Fingerprint Reading Module
4
2.4-inch LCD Display Screen Indicator
5
USB Interface/Reset Button (Inside of the Cover)
6
Tamper-proof Button
7
Ethernet Port
8
RS-485/Wiegand Wiring Terminal
9
12V Power Interface
10
Door Lock Wiring Terminal
11
Alarm Wiring Terminal
Fingerprint Access Control Terminal
Appearance 1.3
Appearance of DS-K1T803 Series model Figure 1. 1 Description of DS-K1T803 Series Model Table 1. 1
4
No.
Description
1
Exiting Key: Press the button to exit the menu.
2
Direction Keys: Use , , to move the cursor in the menu.
3
Numeric Keys/Letter Keys: Press to input numbers or letters.
4
Confirming Key: Press to confirm operations. Press and hold the key for 3s to login the main interface.
5
Deleting Key: Delete the contents in the textbox.
6
Editing Key: Press to enter the editing status. Press to shift among Chinese, numbers/lowercases, numbers/uppercases and symbols.
Fingerprint Access Control Terminal
Keypad Description 1.4
Keypad Appearance Figure 1. 2 Keypad Description Table 1. 2
5
1. Install 120 gang box into the wall.
Install the 120 gang box
Figure 2. 1
2. Secure the device mounting plate on the gang
box with two screws (supplied).
Secure the mounting plate
Figure 2. 2
3. Align the terminal with mounting plate.
Push the terminal in the mounting plate from bottom up. Fasten the terminal with the buckles on the plate.
Install the Terminal
Figure 2. 3
4. Tighten the screws to fix the terminal on the
mounting plate and complete the installation.
Secure the mounting Screw
Figure 2. 4
Fingerprint Access Control Terminal
Chapter 2 Installation
Before You Start:
Make sure that the device in the package is in good condition and all the assembly parts are
included.
Make sure that the wall is strong enough to withstand three times the weight of the device.
Steps:
6
Fingerprint Access Control Terminal
Chapter 3 Device Wiring
Terminal Description 3.1
Terminal Diagram of Access Control Terminal Figure 3. 1
7
Line Group
No.
Function
Color
Terminal Name
Description
Line Group A
A1
Power Input Red
+12V
12V DC Power Supply A2
Black
GND
GND
Line Group B
B1
Alarm Input
Yellow/Blue
IN1
Alarm Input 1
B2
Yellow/Black
GND
GND B3
Alarm Output
Yellow/Purple
NC
Alarm Output Wiring
B4
Yellow/Brown
COM
B5
Yellow/Red
NO
Line Group C
C1
RS-485 Communication Port
Yellow
485 +
RS-485 Wiring C2
Blue
485 ­C3
Wiegand
Green
W0
Wiegand Wiring 0
C4
White
W1
Wiegand Wiring 1
C5
Orange
WG_OK
Wiegand Authenticated
C6
Purple
WG_ERR
Wiegand Authentication Failed
C7
Brown
WG_ BEEP
Tampering Alarm Wiring
C8
Grey
WG_TAMP ER
Buzzer Wiring C9
Black
GND
GND
Line Group D
D1
Lock
White/Purple
NC
Lock Wiring
D2
White/Yellow
COM
D3
White/Red
NO
D4
Yellow/Green
SENSOR
Door Contact Signal Input
D5
White/Black
GND
GND
D6
Yellow/Grey
BUTTON
Exit Door Wiring
Line Group E
E1
Door Bell
White/Brown
BELL+
Door Bell Wiring
E2
White/Blue
BELL-
Fingerprint Access Control Terminal
Terminal Description Table 3. 1
8
Fingerprint Access Control Terminal
Device Wiring 3.2
3.2.1 External Device Wiring Overview (Without Secure Door Control
Unit)
Note: The external power supply and the access control terminal should use the same GND cable.
1
Fingerprint Access Control Terminal
3.2.2 External Device Wiring Overview (With Secure Door Control Unit)
Note: The external power supply and the secure door control unit should use the same GND cable.
2
Fingerprint Access Control Terminal
Chapter 4 Basic Operation
Suggested working flow:
Working Flow Figure 4. 1
Device Activation: Activate the device before first using. Login: Hold the OK button for 3s to login the device main interface. Parameters Configuration: Configure the communication, the system, and the time. User Management: Add, edit and delete the users in the fingerprint access control terminal. You are
able to set the user ID No. name, card number fingerprint, password, department, etc.
Access Control Configuration: Configure the access control parameters and control the door status. Attendance Configuration: Configure the attendance parameters and control the users attendance.
Note: The device has configured the default department, the default shift, the default shift schedule and
the default system information. You are able to use the device directly after adding the user.
Device Activation 4.1
Purpose:
You should activate the device before the first login. After powering on, the system will switch to activate notifying interface.
Activation Notifying Interface Figure 4. 2
Activation via SADP and activation via the iVMS-4200 Client Software are supported. The default values of the terminal are as follows:
The default IP address: 192.0.0.64 The default port No.: 8000 The default user name: admin
4.1.1 Activating via SADP Software
Purpose:
SADP software is used for detecting the online device, activating the device, and resetting the device password.
3
Fingerprint Access Control Terminal
Steps:
1. Get the SADP software from the supplied disk or the official website. Install and run the software.
Note: Go to http://www.hikvision.com/en/tools_82.html to download the SADP software.
SADP Software Interface Figure 4. 3
2. Check the inactive device from the device list.
3. Create a password in the right side of the interface and confirm the password.
STRONG PASSWORD RECOMMENDED We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product.
4
Fingerprint Access Control Terminal
Activate the Device Figure 4. 4
4. Click Activate. The device will be active.
Or click Fresh to fresh the device status.
5. Check the device and manually edit the device IP address, Port No., Subnet Mask, Gateway, etc.
Or check DHCP to enable DHCP.
6. Input the password and click Modify to apply the settings.
Note: The device IP address should be the same with the PC’s.
Edit Device Parameters Figure 4. 5
4.1.2 Activating via Client Software
Purpose:
The client software is versatile video management software for multiple kinds of devices.
Steps:
5
Fingerprint Access Control Terminal
1. Get the client software from the supplied disk or the official website. Install and run the client
software.
Note: Go to http://www.hikvision.com/en/Tools_84.html to download the client software.
2. Click Switch System -> Access Control System at the upper left corner of the interface to enter
the Access Control System interface.
3. Click Controller Management to enter the Controller Management interface.
Control Panel Interface Figure 4. 6
You can check the online device, as shown in Figure 4. 7
4. Select an inactive device from the device list.
Device List Figure 4. 7
6
Fingerprint Access Control Terminal
5. Click Activate to pop up the Activation interface.
Select Inactive Device Figure 4. 8
6. Create a password and confirm the new password.
STRONG PASSWORD RECOMMENDED We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product.
Activate the Device Figure 4. 9
7. Click OK to start activate.
8. Click to configure the device IP address, mask address, gateway address, port No.
9. Input the password and click OK to apply.
Note: The device IP address should be the same with the PC.
The device will switch to the initial interface:
Initial Interface Figure 4. 10
7
Fingerprint Access Control Terminal
Login 4.2
Steps:
1. For the first time login, hold the OK key for 3s to enter the main interface. You can manage the
user, the access control, the attendance, the communication, the system, etc.
Main Interface Figure 4. 11
If you have configured the admin in the User interface:
1) Long-press the OK key to enter the Admin Login interface.
2) Enter the admin ID No. and password, scan the fingerprint or swipe the card to enter the
main interface.
Admin Login Interface Figure 4. 12
Parameters Configuration 4.3
4.3.1 Communication Settings
Purpose:
You can set the network parameters, the Wiegand parameters and the Wi-Fi.
8
Fingerprint Access Control Terminal
Communication Settings Interface Figure 4. 13
4.3.1.1 Setting Network
You can set the device network parameters, including the IP address, the subnet mask and the gateway address.
Steps:
1. Move the cursor to the Network and press the OK key to enter the Network interface.
2. Edit the IP address, the subnet mask and the gateway.
Note: The IP address should be the same with the PC’s.
Network Interface Figure 4. 14
3. Press the ESC key and select Yes to save the parameters.
Prompt Interface Figure 4. 15
4.3.1.2 Setting Wiegand Parameters
Purpose:
9
Fingerprint Access Control Terminal
You are able to set the Wiegand Direction (Send/Receive) and the Wiegand mode (Wiegand 26/Wiegand
34).
Steps:
1. Move the cursor to Wiegand, and press the OK key to enter the Wieagand interface.
Wiegand Setting Interface Figure 4. 16
2. Edit the Wiegand parameters, including the Wiegand direction and the Wiegand mode.
Wiegand Direction:
If select Send, the terminal can connect to the access controller to upload the card No.
bia the Wiegand 26 or the Wiegand 34 mode.
If select Receive, the terminal can connect to the Wiegand card readers. No need to
configure the Wiegand mode. The default mode contains Wiegand 26/34 and the Hikvision private Wiegand protocol.
Wiegand Mode:
Wiegand 26 and Wiegand 34 can be selected. The default Wiegand mode is Wiegand 34.
4.3.1.3 Setting Wi-Fi
Purpose:
You can enable the Wi-Fi and configure the Wi-Fi parameter.
Steps:
1. Move the cursor to Wi-Fi, and press the OK key to enter the Wi-Fi interface.
Wi-Fi Enabling Figure 4. 17
2. Move the cursor to the icon and press the OK key to enable the WLAN.
10
Fingerprint Access Control Terminal
Wi-Fi Selection Figure 4. 18
3. Select a network and press the OK key to enter the Wi-Fi Setting interface.
4. Input the Wi-Fi password, and configure the IP mode the IP address, the subnet mask and the
gateway.
Note: The password supports numbers, uppercase letters, lowercase letters and symbols.
Wi-Fi Setting Interface Figure 4. 19
5. Press the ESC key and select Yes to save the parameters and exit the interface.
4.3.2 System Settings
Purpose:
You are able to set the system parameters, manage the data, restore default parameters and upgrade the device.
4.3.2.1 Setting System Parameters
Purpose:
Set the system parameters, including the device time format, the keypad audio, the voice prompt, the voice volume, the sleeping, the attendance repeating time interval, the attendance record over threshold prompt, the secure door control panel and the record delete.
11
Fingerprint Access Control Terminal
Time Format:
MM/DD/YYYYMM.DD.YYYYDD-MM-YYYYDD/MM/YYYY DD.MM.YYYYYYYYMMDDYYYY-MM-DDYYYY/MM/DD YYYY.MM.DD and MM-DD-YYYY are available.
Keypad Sound:
Move the cursor to or and press the OK key to enable or disable the keypad sound.
Voice Prompt:
Move the cursor to or and press the OK key to enable or disable the prompt audio.
Note: The icon represents the keypad sound is enabled. The
icon represents the keypad sound is disabled.
Voice Volume:
High, Medium and low can be selected.
Sleeping:
Set the device sleeping waiting time (Minute). If you set the sleeping time to 30min, the device will sleep after 30 min without any operation.
Note: If you set the sleeping time to 0, the function is disabled.
Time Interval:
Set the attendance repeating time interval (Second) of a person. The attendance will be invalid, the authentication will be failed, and the door will not be open if the user swipe the card repeatedly within the time interval. (Set the authentication mode to Card).
Note: The time interval should be between 0 and 255s.
Attendance Record Prompt:
If the attendance record memory reaches the configured value, the system will pop up a prompt to remind you.
Secure Door Control Panel:
Enable/disable the secure door control panel. The terminal connects to the secure door control panel via the RS-485. And the terminal will receive the magnetic signals, the door opening button signal and
System Configuration Interface Figure 4. 20
12
Fingerprint Access Control Terminal
the input/output alarm signals via the secure door control panel. When disabling the function, the terminal can control these signals directly.
Record Delete:
When enabling the function, the terminal will delete the first 3000 attendance records, if the memory is full, to save the new attendance records. By default, the function is enabled. For detailed information, see Section 6.2 Attendance Record Delete Rule.
Delete Event Only:
Delete all recorded events in the device.
Delete Attendance Data Only:
Delete all attendance data in the device or delete attendance data by time.
Delete User Only:
Delete all user data in the device, including the attendance records.
Clear Permission:
Clear the admin management permission. The admin will turn to the normal user. The user will not be deleted.
4.3.2.2 Managing Data
Purpose:
You are able to delete the storage data of the device, including the event, the attendance data, the user, and the permission.
Steps:
1. Move the cursor to Data and press the OK key to enter the Data interface.
2. Select a data type and press the OK key to delete.
Data Management Interface Figure 4. 21
Delete Attendance Data Interface Figure 4. 22
4.3.2.3 Restoring Settings
Purpose:
You can restore Factory Defaults or Default Settings.
13
Fingerprint Access Control Terminal
Factory Defaults:
All parameters of the device will restore to the factory condition.
Default Settings:
All parameters, excluding the communication parameters and the remote user management, will restore to the factory condition.
Date:
The displayed date on the device.
Time:
The displayed time on the device.
DST:
Select to enable or disable the DST. When the DST is enabled, you can set the DST bias time, the start time and the end time.
DST Bias: you can select 30min, 60min, 90min and 120min. Start: Set the start time of the DST. End: Set the end time of the DST.
Steps:
1. Move the cursor to Reset and press the OK key to enter the Reset interface.
Reset Interface Figure 4. 23
2. Select Factory Defaults or Default Settings.
4.3.2.4 Upgrading Device
The system can automatically read the upgrading file from the plugged USB disk to upgrade the device.
Notes:
The upgrading file should be put in the root directory. The upgrading file name should be digicap.dav.
4.3.3 Setting Time
Purpose:
You are able to set the device time and the DST.
Steps:
1. Move the cursor to Time in the main interface and press the OK key to enter the Time interface.
2. Edit the parameters.
14
Fingerprint Access Control Terminal
Time Settings Interface Figure 4. 24
3. Press the ESC key and select Yes to save the settings and exit the interface.
User Management 4.4
Purpose:
You are able to add, edit, delete and search the user. Move the cursor to User in the main interface and press the OK key to enter the User List interface.
User List Interface Figure 4. 25
4.4.1 Adding User
You can add users by editing the ID No., the user name, the card No. You can also scan the user fingerprint, set the password, the department, the role, the schedule template, the authentication mode and the duress card.
Steps:
1. Press the key to enter the New (new user) interface and input the ID No.
Notes:
The ID No. refers to the user attendance serial No. The ID No. should be between 1 and 99999999 and should not start with 0. The ID No. can be used for once. By default, the ID No. will be increased in sequence.
15
Fingerprint Access Control Terminal
Adding User Interface Figure 4. 26
2. Enter the new user name.
1) Press key to enter the editing interface. Press key to shift input mode. Chinese,
Number/Lowercase Letters, Number/Uppercase Letters and symbols are supported.
2) Enter the use name and press the OK key to confirm and exit the interface.
Editing Interface Figure 4. 27
Notes:
Numbers, uppercase letters, lowercase letters, Chinese characters and symbols are
supported.
The user name supports up to 32 characters. Each user name can be used for once.
3. Enter the card No.
Notes:
The card No. is required. The card No. can start with 0 when it contains more than one numbers. E.g. 012345.
16
Loading...
+ 98 hidden pages