Hikvision DS-K1T804MF User Manual

Fingerprint Access Control Terminal
User Manual
Fingerprint Access Control Terminal·User Manual
i
User Manual
© 2018 Hangzhou Hikvision Digital Technology Co., Ltd. This manual is applied for fingerprint access control terminal.
Name
Model
Fingerprint Access
Control Terminal
DS-K1T803F
DS-K1T803MF
DS-K1T803MF(L)
DS-K1T803EF
DS-K1T804F
DS-K1T804F-1
DS-K1T804MF
DS-K1T804MF-1
DS-K1T804EF
DS-K1T804EF-1
It includes instructions on how to use the Product. The software embodied in the Product is governed by the user license agreement covering that Product.
About this Manual
This Manual is subject to domestic and international copyright protection. Hangzhou Hikvision
Digital Technology Co., Ltd. (“Hikvision”) reserves all rights to this manual. This manual cannot be
reproduced, changed, translated, or distributed, partially or wholly, by any means, without the prior written permission of Hikvision.
Trademarks
and other Hikvision marks are the property of Hikvision and are registered trademarks or the subject of applications for the same by Hikvision and/or its affiliates. Other trademarks mentioned in this manual are the properties of their respective owners. No right of license is given to use such trademarks without express permission.
Disclaimer
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, HIKVISION MAKES NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, REGARDING THIS MANUAL. HIKVISION DOES NOT WARRANT, GUARANTEE, OR MAKE ANY REPRESENTATIONS REGARDING THE USE OF THE MANUAL, OR THE CORRECTNESS, ACCURACY, OR RELIABILITY OF INFORMATION CONTAINED HEREIN. YOUR USE OF THIS MANUAL AND ANY RELIANCE ON THIS MANUAL SHALL BE WHOLLY AT YOUR OWN RISK AND RESPONSIBILITY. REGARDING TO THE PRODUCT WITH INTERNET ACCESS, THE USE OF PRODUCT SHALL BE WHOLLY AT YOUR OWN RISKS. OUR COMPANY SHALL NOT TAKE ANY RESPONSIBILITIES FOR ABNORMAL OPERATION, PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER ATTACK, HACKER ATTACK, VIRUS INSPECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, OUR COMPANY WILL PROVIDE TIMELY TECHNICAL SUPPORT IF REQUIRED. SURVEILLANCE LAWS VARY BY JURISDICTION. PLEASE CHECK ALL RELEVANT LAWS IN YOUR JURISDICTION BEFORE USING THIS PRODUCT IN ORDER TO ENSURE THAT YOUR USE CONFORMS THE APPLICABLE LAW. OUR COMPANY SHALL NOT BE LIABLE IN THE EVENT THAT THIS PRODUCT IS USED WITH ILLEGITIMATE PURPOSES.
Fingerprint Access Control Terminal·User Manual
ii
IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW, THE LATER PREVAILS.
Support
Should you have any questions, please do not hesitate to contact your local dealer.
Fingerprint Access Control Terminal·User Manual
iii
Regulatory Information
FCC Information
Please take attention that changes or modification not expressly approved by the party responsible
for compliance could void the user’s authority to operate the equipment.
FCC compliance: This equipment has been tested and found to comply with the limits for a Class B
digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference in a residential installation. This equipment
generates, uses and can radiate radio frequency energy and, if not installed and used in accordance
with the instructions, may cause harmful interference to radio communications. However, there is
no guarantee that interference will not occur in a particular installation. If this equipment does
cause harmful interference to radio or television reception, which can be determined by turning
the equipment off and on, the user is encouraged to try to correct the interference by one or more
of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected. Consult the dealer or an experienced radio/TV technician for help.
This equipment should be installed and operated with a minimum distance 20cm between the
radiator and your body.
FCC Conditions
This device complies with part 15 of the FCC Rules. Operation is subject to the following two
conditions:
1. This device may not cause harmful interference.
2. This device must accept any interference received, including interference that may cause
undesired operation.
EU Conformity Statement
This product and - if applicable - the supplied accessories too are marked with "CE"
and comply therefore with the applicable harmonized European standards listed
under the RE Directive 2014/53/EU, the EMC Directive 2014/30/EU, the RoHS
Directive 2011/65/EU.
2012/19/EU (WEEE directive): Products marked with this symbol cannot be disposed
of as unsorted municipal waste in the European Union. For proper recycling, return
this product to your local supplier upon the purchase of equivalent new equipment,
or dispose of it at designated collection points. For more information see:
www.recyclethis.info
Fingerprint Access Control Terminal·User Manual
iv
2006/66/EC (battery directive): This product contains a battery that cannot be
disposed of as unsorted municipal waste in the European Union. See the product
documentation for specific battery information. The battery is marked with this
symbol, which may include lettering to indicate cadmium (Cd), lead (Pb), or
mercury (Hg). For proper recycling, return the battery to your supplier or to a
designated collection point. For more information see: www.recyclethis.info
Use only power supplies listed in the user instructions:
Model
Manufacturer
Standard
DSA-12PFT-12FUK 120100
Dee Van Enterprise Co., Ltd.
BS
DSA-12PFT-12FAU 120100
Dee Van Enterprise Co., Ltd.
AS
DSA-12PFT-12FIN 120100
Dee Van Enterprise Co., Ltd.
IS
DSA-12PFT-12FUS 120100
Dee Van Enterprise Co., Ltd.
IEC
DSA-12PFT-12 FBZ 120100
Dee Van Enterprise Co., Ltd.
NBR
Industry Canada ICES-003 Compliance
This device meets the CAN ICES-3 (B)/NMB-3(B) standards requirements.
This device complies with Industry Canada licence-exempt RSS standard(s). Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of the device. Le présent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radioexempts de licence. L'exploitation est autorisée aux deux conditions suivantes : (1) l'appareil ne doit pas produire de brouillage, et (2) l'utilisateur de l'appareil doit accepter tout brouillage radioélectrique subi, même si le brouillage est susceptible d'en compromettre le fonctionnement. Under Industry Canada regulations, this radio transmitter may only operate using an antenna of a type and maximum (or lesser) gain approved for the transmitter by Industry Canada. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (e.i.r.p.) is not more than that necessary for successful communication.
Conformément à la réglementation d'Industrie Canada, le présent émetteur radio peut fonctionner avec une antenne d'un type et d'un gain maximal (ou inférieur) approuvé pour l'émetteur par Industrie Canada. Dans le but de réduire les risques de brouillage radioélectrique à l'intention des autres utilisateurs, il faut choisir le type d'antenne et son gain de sorte que la puissance isotrope rayonnée équivalente (p.i.r.e.) ne dépasse pas l'intensité nécessaire à l'établissement d'une communication satisfaisante.
Fingerprint Access Control Terminal·User Manual
v
This equipment should be installed and operated with a minimum distance 20cm between the radiator and your body. Cet équipement doit être installé et utilisé à une distance minimale de 20 cm entre le radiateur et votre corps.
Safety Instruction
These instructions are intended to ensure that user can use the product correctly to avoid danger or property loss. The precaution measure is divided into Warnings and Cautions:
Warnings: Neglecting any of the warnings may cause serious injury or death. Cautions: Neglecting any of the cautions may cause injury or equipment damage.
Warnings
All the electronic operation should be strictly compliance with the electrical safety regulations,
fire prevention regulations and other related regulations in your local region.
Please use the power adapter, which is provided by normal company. The power consumption
cannot be less than the required value.
Do not connect several devices to one power adapter as adapter overload may cause over-heat
or fire hazard.
Please make sure that the power has been disconnected before you wire, install or dismantle
the device.
When the product is installed on wall or ceiling, the device shall be firmly fixed. If smoke, odors or noise rise from the device, turn off the power at once and unplug the power
cable, and then please contact the service center.
If the product does not work properly, please contact your dealer or the nearest service center.
Never attempt to disassemble the device yourself. (We shall not assume any responsibility for problems caused by unauthorized repair or maintenance.)
Cautions
Do not drop the device or subject it to physical shock, and do not expose it to high
electromagnetism radiation. Avoid the equipment installation on vibrations surface or places subject to shock (ignorance can cause equipment damage).
Do not place the device in extremely hot (refer to the specification of the device for the detailed
operating temperature), cold, dusty or damp locations, and do not expose it to high electromagnetic radiation.
Warnings Follow these safeguards to prevent serious injury or death.
Cautions Follow these precautions to prevent potential injury or material damage.
Fingerprint Access Control Terminal·User Manual
vi
The device cover for indoor use shall be kept from rain and moisture. Exposing the equipment to direct sun light, low ventilation or heat source such as heater or
radiator is forbidden (ignorance can cause fire danger).
Do not aim the device at the sun or extra bright places. A blooming or smear may occur
otherwise (which is not a malfunction however), and affecting the endurance of sensor at the same time.
Please use the provided glove when open up the device cover, avoid direct contact with the
device cover, because the acidic sweat of the fingers may erode the surface coating of the device cover.
Please use a soft and dry cloth when clean inside and outside surfaces of the device cover, do
not use alkaline detergents.
Please keep all wrappers after unpack them for future use. In case of any failure occurred, you
need to return the device to the factory with the original wrapper. Transportation without the original wrapper may result in damage on the device and lead to additional costs.
Improper use or replacement of the battery may result in hazard of explosion. Replace with the
same or equivalent type only. Dispose of used batteries according to the instructions provided by the battery manufacturer.
You can view the device License via the website:
http://opensource.hikvision.com/Home/List?id=46
Fingerprint Access Control Terminal·User Manual
vii
Table of Contents
Chapter 1 Overview ................................................................................................................. 1
1.1 Introduction ......................................................................................................................... 1
1.2 Main Features ...................................................................................................................... 1
1.2.1 DS-K1T803F/MF/EF/MF(L) and DS-K1T804F/MF/EF Features ......................................... 1
1.2.2 DS-K1T804F/MF/EF-1 Features ........................................................................................ 2
1.3 Appearance .......................................................................................................................... 3
1.4 Keypad Description .............................................................................................................. 4
Chapter 2 Installation .............................................................................................................. 5
Chapter 3 Device Wiring .......................................................................................................... 6
3.1 Terminal Description ............................................................................................................ 6
3.2 Device Wiring ....................................................................................................................... 8
3.2.1 External Device Wiring Overview (Without Secure Door Control Unit) .......................... 8
3.2.2 External Device Wiring Overview (With Secure Door Control Unit) ................................ 9
Chapter 4 Basic Operation ..................................................................................................... 10
4.1 Device Activation ................................................................................................................ 10
4.1.1 Activating via Device ...................................................................................................... 10
4.1.2 Activating via SADP Software ......................................................................................... 11
4.1.3 Activating via Client Software ........................................................................................ 13
4.2 Login ................................................................................................................................... 16
4.3 Parameters Configuration .................................................................................................. 16
4.3.1 Communication Settings ................................................................................................ 16
4.3.2 System Settings .............................................................................................................. 19
4.3.3 Setting Time ................................................................................................................... 23
4.4 User Management .............................................................................................................. 23
4.4.1 Adding User .................................................................................................................... 24
4.4.2 Managing User ............................................................................................................... 28
4.5 Access Control System Configuration ................................................................................. 29
4.5.1 Configure Access Control Parameters ............................................................................ 30
4.5.2 Configuring Holiday Group ............................................................................................. 31
4.5.3 Configuring Week Plan ................................................................................................... 33
4.5.4 Configuring Schedule Template ..................................................................................... 35
Fingerprint Access Control Terminal·User Manual
viii
4.6 Attendance Configuration .................................................................................................. 37
4.6.1 Configuring Department ................................................................................................ 37
4.6.2 Configuring Shift ............................................................................................................. 39
4.6.3 Configuring Holiday ........................................................................................................ 42
4.6.4 Configuring Shift Schedule ............................................................................................. 44
4.6.5 Report Management ...................................................................................................... 48
4.7 Other Management............................................................................................................ 50
4.7.1 Transferring Data ............................................................................................................ 50
4.7.2 Searching Log ................................................................................................................. 51
4.7.3 Testing ............................................................................................................................ 52
4.7.4 System Information ........................................................................................................ 52
Chapter 5 Client Operation .................................................................................................... 54
5.1 Function Module ................................................................................................................ 54
5.2 User Registration and Login ............................................................................................... 54
5.3 System Configuration ......................................................................................................... 56
5.4 Access Control Management ............................................................................................. 56
5.4.1 Adding Access Control Device ........................................................................................ 58
5.4.2 Viewing Device Status .................................................................................................... 68
5.4.3 Editing Basic Information ............................................................................................... 69
5.4.4 Network Settings ............................................................................................................ 70
5.4.5 RS-485 Settings ............................................................................................................... 72
5.4.6 Wiegand Settings ........................................................................................................... 73
5.4.7 M1 Card Encryption ....................................................................................................... 74
5.4.8 Remote Configuration .................................................................................................... 74
5.5 Organization Management ................................................................................................ 84
5.5.1 Adding Organization ....................................................................................................... 84
5.5.2 Modifying and Deleting Organization ............................................................................ 84
5.6 Person Management .......................................................................................................... 85
5.6.1 Adding Person ................................................................................................................ 85
5.7 Schedule and Template ...................................................................................................... 95
5.7.1 Week Schedule ............................................................................................................... 96
5.7.2 Holiday Group ................................................................................................................ 97
Fingerprint Access Control Terminal·User Manual
ix
5.7.3 Template ......................................................................................................................... 99
5.8 Permission Configuration ................................................................................................. 101
5.8.1 Adding Permission ........................................................................................................ 102
5.8.2 Applying Permission ..................................................................................................... 103
5.9 Advanced Functions ......................................................................................................... 104
5.9.1 Access Control Parameters ........................................................................................... 105
5.9.2 Card Reader Authentication ......................................................................................... 107
5.10 Searching Access Control Event ....................................................................................... 109
5.10.1 Searching Local Access Control Event ...................................................................... 110
5.10.2 Searching Remote Access Control Event .................................................................. 110
5.11 Access Control Event Configuration ................................................................................. 110
5.11.3 Access Control Event Linkage ................................................................................... 111
5.11.4 Event Card Linkage ................................................................................................... 112
5.12 Door Status Management ................................................................................................ 113
5.12.1 Access Control Group Management ........................................................................ 114
5.12.2 Controlling Door Status ............................................................................................ 115
5.12.3 Configuring Status Duration for Door ...................................................................... 117
5.12.4 Real-time Card Swiping Record ................................................................................ 118
5.12.5 Real-time Access Control Alarm ............................................................................... 119
5.13 Arming Control ................................................................................................................. 121
5.14 Time and Attendance ....................................................................................................... 121
5.14.1 Shift Schedule Management .................................................................................... 122
5.14.2 Attendance Handling ................................................................................................ 129
5.14.3 Advanced Settings .................................................................................................... 133
5.14.4 Attendance Statistics ................................................................................................ 138
Appendix A Tips for Scanning Fingerprint ............................................................................... 142
Appendix B Input Method Operation ...................................................................................... 143
Appendix C Attendance Record Delete Rule ............................................................................ 144
C.1 Enabling Record Delete .................................................................................................... 144
C.2 Disabling Record Delete ................................................................................................... 144
Appendix D Overview of Device Parameters............................................................................ 145
D.1 Access Control Terminal Parameters ................................................................................ 145
Fingerprint Access Control Terminal·User Manual
x
D.2 Attendance Parameters .................................................................................................... 146
Appendix E Attendance Report Table ...................................................................................... 147
E.1 Description of Attendance Report File Name .................................................................. 147
E.2 Attendance Report Table Description .............................................................................. 148
Appendix F Custom Wiegand Rule Descriptions ...................................................................... 151
Fingerprint Access Control Terminal·User Manual
1

Chapter 1 Overview

1.1 Introduction

DS-K1T803 Series and DS-K1T804 Series Fingerprint Access Control Terminal is designed with a 2.4-inch LCD display screen. Offline operation, wired network (TCP/IP) and wireless network transmission modes are supported as well. (The models with -1 do not support the wireless network function.)
Note: The figure on the left is for reference only. Refer to the
actual product as the standard.

1.2 Main Features

1.2.1 DS-K1T803F/MF/EF/MF(L) and DS-K1T804F/MF/EF Features

Doorbell ringtone settings function 2.4-inch LCD display screen Transmission modes of wired network (TCP/IP) and wireless network Max. 3,000 users, 3,000 fingerprints and 100,000 access control events storage Export the report and upgrade the device via the USB disk. Adopts the optical fingerprint module, supporting 1:N mode (fingerprint, card + fingerprint)
and 1:1 mode (card + fingerprint) (DS-K1T803F and DS-K1T804F does not support swiping card.)
Terminal authentication and user authentication Multiple authentication modes: card, fingerprint, card + fingerprint, card + password,
fingerprint + password, card + fingerprint + password, and so on. (DS-K1T803F and DS-K1T804F does not support swiping card.)
EM card reading (DS-K1T803EF/DS-K1T804EF) Mifare card reading, including card No. reading (DS-K1T803MF/DS-K1T804MF) CPU card reading, including CPU card serial No Secure door control unit accessing via RS-485 connection
Fingerprint Access Control Terminal·User Manual
2
Tampering detection, unlocking overtime alarm, invalid card swiping over times alarm,
duress card alarm, and so on
Accurate data and time display provided by built-in electronic clock Check the device running status via the Watchdog. When exception status occurs, the
system will reboot automatically
Data can be permanently saved after power-off Remotely control via the iVMS-4200 client software Collects fingerprint information locally or via fingerprint recorder
Note: Device with the model of DS-K1T803MF(L) supports collecting or applying fingerprint
pictures locally.
Supports the third party arming Supports transmitting data via EHome to realize the whole network transmitting. Activates via device

1.2.2 DS-K1T804F/MF/EF-1 Features

Doorbell ringtone settings function 2.4-inch LCD display screen Transmission modes of wired network (TCP/IP) Max. 3,000 users, 3,000 fingerprints and 100,000 access control events storage Export the report and upgrade the device via the USB disk. Adopts the optical fingerprint module, supporting 1:N mode (fingerprint, card + fingerprint)
and 1:1 mode (card + fingerprint) (DS-K1T804-1 does not support swiping card.)
Terminal authentication and user authentication Multiple authentication modes: card, fingerprint, card + fingerprint, card + password,
fingerprint + password, card + fingerprint + password, and so on. (DS-K1T804-1 does not support swiping card.)
EM card reading (DS-K1T804EF-1) Mifare card reading, including card No. reading (DS-K1T804MF-1) CPU card reading, including CPU card serial No. Secure door control unit accessing via RS-485 connection Tampering detection, unlocking overtime alarm, invalid card swiping over times alarm,
duress card alarm, and so on
Accurate data and time display provided by built-in electronic clock Check the device running status via the Watchdog. When exception status occurs, the
system will reboot automatically
Data can be permanently saved after power-off Remotely control via the iVMS-4200 client software Collects fingerprint information locally or via fingerprint recorder Supports the third party arming
Fingerprint Access Control Terminal·User Manual
3
Supports transmitting data via EHome to realize the whole network transmitting. Activates via device.

1.3 Appearance

Table 1-1 Description of DS-K1A801 Series Model
No.
Description
1
Keypad
2
Door Bell Button
3
Fingerprint Reading Module
4
2.4-inch LCD Display Screen Indicator
5
USB Interface/Reset Button (Inside of the Cover)
6
Tamper-proof Button
7
Ethernet Port
8
RS-485/Wiegand Wiring Terminal
9
12V Power Interface
10
Door Lock Wiring Terminal
11
Alarm Wiring Terminal
Fingerprint Access Control Terminal·User Manual
4

1.4 Keypad Description

Table 1-2 Description of Keys
No.
Description
1
Exiting Key: Press the button to exit the menu.
2
Direction Keys: Use to move the cursor in the menu.
3
Numeric Keys/Letter Keys:
Press to input numbers or letters. Long press Key 6 for 3s to enter One-Touch Wi-Fi Settings mode. You can
set the Wi-Fi for the device via the App on the phone. Press Key 6 again to exit the mode after setting Wi-Fi completely.
Note: The models with -1 do not support One-Touch Wi-Fi Settings mode.
4
OK Key: Press to confirm operations. Press and hold the key for 3s to login the main interface.
5
Deleting Key:
Press to delete the letters or numbers one by one in the textbox. Long-press to clear all contents in the textbox.
6
Editing Key: Press to enter the editing status. Press to shift among Chinese, numbers/lowercases, numbers/uppercases and symbols.
Fingerprint Access Control Terminal·User Manual
5

Chapter 2 Installation

Before You Start:
Make sure that the device in the package is in good condition and all the assembly parts are
included.
Make sure that the wall is strong enough to withstand three times the weight of the device.
Steps:
1. Install 120 Or 86 gang box into the wall.
2. Route the cables through the cable hole of the
mounting plate.
3. Secure the device mounting plate on the gang
box with two screws (supplied).
4. Connect the corresponding cables.
5. Align the terminal with mounting plate.
Push the terminal in the mounting plate from bottom up. Fasten the terminal with the buckles on the plate.
4. Tighten the screws to fix the terminal on the
mounting plate and complete the installation.
Note: The pictures in this documentation are for references only, refer to the actual product.
Fingerprint Access Control Terminal·User Manual
6

Chapter 3 Device Wiring

3.1 Terminal Description

Fingerprint Access Control Terminal·User Manual
7
Table 3-1 Terminal Description
Line Group
No.
Function
Color
Terminal Name
Description
Line Group A
A1
Power Input Red
+12V
12V DC Power Supply A2
Black
GND
GND
Line Group B
B1
Alarm Input
Yellow/Blue
IN1
Alarm Input 1
B2
Yellow/Black
GND
GND B3
Alarm Output
Yellow/Purple
NC
Alarm Output Wiring
B4
Yellow/Brown
COM
B5
Yellow/Red
NO
Line Group C
C1
RS-485 Communication Port
Yellow
485 +
RS-485 Wiring C2
Blue
485 ­C3
Wiegand
Green
W0
Wiegand Wiring 0
C4
White
W1
Wiegand Wiring 1
C5
Orange
WG_OK
Wiegand Authenticated
C6
Purple
WG_ERR
Wiegand Authentication Failed
C7
Brown
WG_ BEEP
Tampering Alarm Wiring
C8
Grey
WG_TAMP ER
Buzzer Wiring C9
Black
GND
GND
Line Group D
D1
Lock
White/Purple
NC
Lock Wiring
D2
White/Yellow
COM
D3
White/Red
NO
D4
Yellow/Green
SENSOR
Door Contact Signal Input
D5
White/Black
GND
GND
D6
Yellow/Grey
BUTTON
Exit Door Wiring
Line Group E
E1
Door Bell
White/Brown
BELL+
Door Bell Wiring
Fingerprint Access Control Terminal·User Manual
8

3.2 Device Wiring

3.2.1 External Device Wiring Overview (Without Secure Door Control Unit)

Note: The external power supply and the access control terminal should use the same GND cable.
Fingerprint Access Control Terminal·User Manual
9

3.2.2 External Device Wiring Overview (With Secure Door Control Unit)

Note: The external power supply and the secure door control unit should use the same GND cable.
Fingerprint Access Control Terminal·User Manual
10

Chapter 4 Basic Operation

The suggested working flow is as follows:
Device Activation: Activate the device before first using. Login: Hold the OK button for 3s to login the device main interface. Parameters Configuration: Configure the communication, the system, and the time. User Management: Add, edit and delete the users in the fingerprint access control terminal. You
are able to set the user ID No. name, card number fingerprint, password, department, etc. Access Control Configuration: Configure the access control parameters and control the door status. Attendance Configuration: Configure the attendance parameters and control the users attendance.
Note: The device has configured the default department, the default shift, the default shift
schedule and the default system information. You are able to use the device directly after adding the user.

4.1 Device Activation

Purpose:
You should activate the device before the first login. After powering on, the system will switch to Device Activation interface. Activation via the device, SADP tool and the iVMS-4200 client software are supported. The default values of the terminal are as follows:
The default IP address: 192.0.0.64 The default port No.: 8000 The default user name: admin

4.1.1 Activating via Device

If the device is not activated before first login, the system will enter the Device Activation interface after powering on.
Fingerprint Access Control Terminal·User Manual
11
Steps:
1. Create a device password for activation.
2. Confirm the password.
3. Press the OK key to activate the device.
Note: For details about entering and operating the input method, see Appendix B Input Method
Operation.
STRONG PASSWORD RECOMMENDED– We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product.

4.1.2 Activating via SADP Software

Purpose:
SADP software is used for detecting the online device, activating the device, and resetting the password.
Get the SADP software from the supplied disk or the official website, and install the SADP according to the prompts. Follow the steps to activate the control panel.
Steps:
1. Run the SADP software to search the online devices.
2. Check the device status from the device list, and select an inactive device.
Fingerprint Access Control Terminal·User Manual
12
3. Create a password and input the password in the password field, and confirm the password.
STRONG PASSWORD RECOMMENDED– We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product.
4. Click Activate to save the password.
5. Check the activated device. You can change the device IP address to the same network
segment with your computer by either modifying the IP address manually or checking the checkbox of Enable DHCP.
Fingerprint Access Control Terminal·User Manual
13
6. Input the password and click the Modify button to activate your IP address modification.

4.1.3 Activating via Client Software

Purpose:
The client software is versatile video management software for multiple kinds of devices.
Get the client software from the supplied disk or the official website, and install the software according to the prompts. Follow the steps to activate the control panel.
Steps:
1. Run the client software and the control panel of the software pops up, as shown in the figure
below.
Fingerprint Access Control Terminal·User Manual
14
2. Click Device Management to enter the Device Management interface.
3. Check the device status from the device list, and select an inactive device.
4. Check the device status from the device list, and select an inactive device.
5. Click the Activate button to pop up the Activation interface
6. In the pop-up window, create a password in the password field, and confirm the password.
STRONG PASSWORD RECOMMENDED– We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product.
Fingerprint Access Control Terminal·User Manual
15
7. Click OK button to start activation.
8. Click the Modify Netinfor button to pop up the Network Parameter Modification interface.
9. Change the device IP address to the same network segment with your computer by either
modifying the IP address manually.
10. Input the password and click the OK button to save the settings.
You will enter the initial interface.
Notes:
In the initial interface, the icons , , , and at the upper-right corner represents
network is online, network is armed, EHome is online, and Wi-Fi is connected respectively. If
there are on the first three icons, it represents network is offline, network is not armed,
and EHome is offline respectively. When the Wi-Fi is not connected, the Wi-Fi icon will have no color inside.
The picture displayed above is the initial interface. It may vary according to different models: If
the device model contains -1, the interface will not contain the Wi-Fi icon.
Fingerprint Access Control Terminal·User Manual
16

4.2 Login

Steps:
1. For the first time login, long-press the OK key for 3s and input the device password (the
password for activation) to enter the main interface. You can manage the user, the department, the shift, the holiday, the shift schedule, the report, the communication, the system, the time, etc.
If you have configured the admin in the User interface, for different device models, there are different login methods: DS-K1T803F, DS-K1T804F, and DS-K1T804F-1
1) Long-press OK key for 3s to enter the Login interface.
2) Move the cursor to select FP, Employee ID & PWD, or Device PWD.
3) Press the OK key.
4) Scan the fingerprint, input the employee ID and the password, or input the device
password to enter the main interface.
DS-K1T803MF/EF, DS-K1T803MF(L), DS-K1T804MF/EF, DS-K1T804MF/EF-1
1) Long-press OK key for 3s to enter the Login interface.
2) Move the cursor to select FP, Card, Employee ID & PWD, or Device PWD.
3) Press the OK key.
4) Scan the fingerprint, input the card No., input the employee ID and the password, or input
the device password to enter the main interface.
Note: For details about entering and operating the input method, see Appendix B Input Method
Operation

4.3 Parameters Configuration

4.3.1 Communication Settings

Purpose:
You can set the network parameters, the Wiegand parameters and the Wi-Fi.
Fingerprint Access Control Terminal·User Manual
17
Note: The picture displayed above is the Communication Settings interface. The models with -1
does not support Wi-Fi function. And the Wi-Fi module’s icon will not be displayed in the interface.
Setting Network
You can set the device network parameters, including the IP address, the subnet mask, the gateway address, and the DHCP.
Steps:
1. Move the cursor to the Network and press the OK key to enter the Network interface.
2. Edit the IP address, the subnet mask, the gateway, and the DHCP.
Note: The device’s IP address and the PC’s should be in the same network segment.
3. Press the ESC key and select Yes to save the parameters.
Fingerprint Access Control Terminal·User Manual
18
Setting Wiegand Parameters
Purpose:
You are able to set the Wiegand Direction (Send/Receive) and the Wiegand mode (Wiegand 26/Wiegand 34).
Steps:
1. Move the cursor to Wiegand, and press the OK key to enter the Wieagand interface.
2. Edit the Wiegand parameters, including the Wiegand direction and the Wiegand mode.
Wiegand Direction:
If select “Send”, the terminal can connect to the access controller to upload the card No.
bia the Wiegand 26 or the Wiegand 34 mode.
If select “Receive”, the terminal can connect to the Wiegand card readers. No need to
configure the Wiegand mode. The default mode contains Wiegand 26/34 and the Hikvision private Wiegand protocol.
Wiegand Mode: Wiegand 26 and Wiegand 34 can be selected. The default Wiegand mode is Wiegand 34.
Fingerprint Access Control Terminal·User Manual
19
Setting Wi-Fi
Purpose:
You can enable the Wi-Fi and configure the Wi-Fi parameter.
Steps:
1. Move the cursor to Wi-Fi, and press the OK key to enter the Wi-Fi interface.
2. Move the cursor to the icon and press the OK key to enable the WLAN.
3. Select a network and press the OK key to enter the Wi-Fi Setting interface.
4. Input the Wi-Fi password, and configure the IP mode the IP address, the subnet mask and the
gateway.
Note: The password supports numbers, uppercase letters, lowercase letters and symbols.
5. Press the ESC key and select Yes to save the parameters and exit the interface.

4.3.2 System Settings

Purpose:
Loading...
+ 134 hidden pages