ZKAccess US-C3-1 User Manual

ZKAccess User Manual
Version: 1.1 Software Version: For ZKAccess 4.1.8/5.0.8 and above Version Date: June, 2011
About This Manual
This document introduces the main functions, the user interface and operations of the system. For installation, please refer to the Quick Installation Guide.
201 Circle Drive N, Suite 116 Piscataway, NJ 08854 Tel: 732-412-6007 Fax: 732-412-6008
www.zkaccess.com
Table of Contents
Definitions .................................................................................... ii
1. System Instruction .................................................................. 1
1.1 Functions Instruction ............................................................. 1
1.2 Basic Operation Flow ............................................................ 1
2. System Management............................................................... 3
3. My Work Panel ......................................................................... 5
4. Personnel System Management ............................................ 6
4.1 Department Management ...................................................... 6
4.2 Personnel Management ........................................................ 6
4.2.1 Add Personnel .............................................................. 7
4.2.2 Personnel Information Maintenance ............................. 8
4.2.3 Personnel Adjustment ................................................. 10
5. Device Management .............................................................. 11
5.1 Area Settings ....................................................................... 11
5.2 Device Management ........................................................... 11
5.2.1 Add Access Control Panel .......................................... 11
5.2.2 Add Network Video Recorder (For Professional Version 5.0.8 and above) 14
5.2.3 Device Maintenance ................................................... 14
5.3 Device Communication Management ................................. 14
5.4 Daylight Saving Time ........................................................... 15
6. Security System Management ............................................. 17
6.1 Access Control Time Zones ................................................. 17
6.2 Access Control Holidays ...................................................... 18
6.3 Door Settings ....................................................................... 19
6.3.1 Door Management ...................................................... 20
6.3.2 First-Card Normal Open ............................................. 23
6.3.3 Multi-Card Opening .................................................... 23
6.3.4 Interlock Settings ........................................................ 24
6.3.5 Anti-pass Back Settings .............................................. 25
6.3.6 Linkage Setting ........................................................... 25
6.4 Access Levels ...................................................................... 27
6.5 Personnel Access Levels .................................................... 27
6.6 Real-time Monitoring ........................................................... 28
6.7 Access Control Reports ....................................................... 33
7. Video System (For Professional Version 5.0.8 and above)35
8. System Settings .................................................................... 37
8.1 User Management ............................................................... 37
8.2 Database Management ....................................................... 38
8.3 System Parameters ............................................................. 40
8.4 Log Records ........................................................................ 40
9. Appendices ............................................................................ 41
Appendix 1 Common Operation ................................................ 41
Appendix 2 END-USER LICENSE AGREEMENT FOR THIS SOFTWARE 46
Appendix 3 FAQs....................................................................... 48
201 Circle Drive N, Suite 116 Piscataway, NJ 08854 Tel: 732-412-6007 Fax: 732-412-6008
www.zkaccess.com
Definitions
Super User: The user who has all operation levels of the system, who can assign new users (such as company management
personnel, registrar, and access control administrator) in the system and configure the roles of corresponding users. Role: During daily use, the super user needs to assign new users having different levels. To avoid setting individual levels for
each user, roles having certain levels can be defined in Role Management, and then assigned to specified users. Access Control Time Zone: It can be used for door timing. The reader can be made usable during valid time periods for
certain doors and unusable during other time periods. Time zone can also be used to set Normal Open time periods for doors or set access control levels so that specified users can only access specified doors during specified time periods (including access levels and First-Card Normal Open settings).
Door Status Delay: The duration for delayed detection of the door sensor after the door is opened. Detection is performed only after the door is opened and the delay duration expired. When the door is not in the “Normally Open” period, and the door is opened, the device will start timing. It will trigger the alarm when the delay duration expires, and stop alarming when the door is closed. The door status delay should be longer than the lock drive duration.
Close and Reverse-lock: Set whether or not to lock after door closing. Lock Drive Duration: Used to control the delay for unlocking after card punching. First-Card Normal Open: During a specified interval, after the first verification by the person having First-Card Normal Open
level, the door will be Normal Open, and will automatically restore closing after the valid interval expires. Multi-Card Opening: This function needs to be enabled in some special access occasions where the door will open only after
the consecutive verification of multiple people. Any person verifying outside of the defined combination (even if the person belongs to other combinations) will interrupt the procedure, requiring a 10 seconds wait to restart verification. It will not open by verification of only one of the combination.
Interlock: Can be set for any two or more locks belonging to one access control panel, so that when one door is opened, the others will be closed, allowing only one door to be open at a time.
Anti-pass Back: The card holder who entered from a door by card punching must exit from the same door by card punching, with the entry and exit records strictly consistent.
Linkage Setting: When an event is triggered at an input point of the access control system, a linkage action will occur at the specified output point to control such events as verification, opening, alarming and exception of the system and list them in the corresponding monitored report for view by the user.
201 Circle Drive N, Suite 116 Piscataway, NJ 08854 Tel: 732-412-6007 Fax: 732-412-6008
www.zkaccess.com
1. System Instruction
1.1 Functions Instruction
Security management has increasing concerns for modern enterprises. This management system helps customers to integrate safety procedures on one platform, making access control management easier and more practical so as to improve efficiency.
System Features
1. Powerful data processing capacity, allowing the management of access control data for 30,000 people.
2. Visible and reasonable work flows come from abundant experience in access control management.
3. Automatic user name list management.
4. Multilevel, role-based, management secures user data confidentiality.
5. Real-time data acquisition system ensures prompt feedback of access control data to management.
Configuration Requirements: CPU: Master frequency of 2.0G or above; Memory: 1G or above; Hardware: Available space of 10G or above. We recommend using NTFS hard disk partition as the software installation
directory (NTFS hard disk partition has the better performance and higher security). Operating System: Supported Operating Systems:
Windows XP/Windows 2003/Windows Vista/Windows 7 Supported Databases: MySQL/MS SQL Server 2005/Oracle10g
System Modules:
The system includes five major functional modules: Personnel System: Primarily two parts: first, Department Management settings, used to set the company’s organizational
chart; second, Personnel Management settings, used to input personnel information, assign departments, maintain and manage personnel.
Device System: Set communication parameters for device connection, including system settings and machine settings. After successful communication, the information of connected devices can be viewed and operations such as remote monitoring, uploading and downloading can be performed in the system.
Access Control System: WEB-based management system enabling normal access control functions, management of networked access control panel via computer, and unified personnel access management. The access control system sets door opening time and levels for registered users so that some users are permitted to unlock some doors through verification during certain intervals.
Video System (for professional version): The system provides the video linkage function to manage the network video recorder, view the real-time video, and query the video records. It opens the Real-time Video when the linkage events happen.
System Settings: Primarily used to assign system users and configure the roles of corresponding modules; database management such as backup, initialization and recovery; set system parameters and manage system operation logs.
1.2 Basic Operation Flow
The following are the basic steps to use the system, based on the role of a super user. Different users have different operation levels, so the steps may slightly differ. The user just needs to follow the steps below and skip the items which are not displayed on their interface.
201 Circle Drive N, Suite 116 Piscataway, NJ 08854 Tel: 732-412-6007 Fax: 732-412-6008
www.zkaccess.com
Step 1: Log in to the system to modify the default password of the account; Step 2: Assign accounts and roles to system users (such as management personnel, registrar, access control administrator); Step 3: Set system parameters, database, notice, reminder and other frequently used system information; Step 4: Add devices to the system and configure the basic information of devices; Step 5: The user sets departmental organization chart (refer to the organizational chart of your company); Step 6: Input company personnel and conduct daily maintenance of the personnel; Step 7: Set access control time zones and access control holidays (as access control exceptions); Step 8: Set parameters for access controlled doors; Step 9: Set access levels to establish access control based on door group and time zones; Step 10: Set the access levels of personnel by assigning personnel to access levels to decide which people can open which
doors during which time zones.
201 Circle Drive N, Suite 116 Piscataway, NJ 08854 Tel: 732-412-6007 Fax: 732-412-6008
www.zkaccess.com
2. System Management
1. Log in to the System
After installing the server on the computer, the user can access the server through the network and use this system. Open the browser and enter the server’s IP address in the address bar. Press [Enter] to access the system homepage. If you use the program at the server computer, open [Server Controller] first, and start the service. Then double click the
[ZKAccess Security System] shortcut on the desktop, following the homepage pops up.
Note: Right click [Server Controller] and select [Run as Administrator] in Windows 7/Vista system.
For system security, it is required to verify identity before accessing the system. We will provide a super user (having all operation levels) to begin the system. Enter user name and password, and click [login], or click [Fingerprint Login], and then press the administrator fingerprint on the fingerprint sensor (need to install the fingerprint sensor driver first) to enter the system.
Note: The user name of the super user is [admin], and the password is [admin]. After the first login to the system, for
system security, please use the [Modify password] function to modify the password. The super user can assign company personnel as system users to (such as management personnel, registrar, and access
control administrator) and configure the roles of corresponding modules. For details, see 7.1 User Management.
2. Quit the System:
Click the [Logout] button in the upper right corner of the interface to return to the ZKAccess 5.0 homepage. Or close the browser directly to quit the system. After that, enter the [Server Controller] and stop the server, then quit the [Server Controller].
3. Customize Settings:
The user can use this function to customize the main interface. Click [Setting] to activate the Setting interface and enter the following information: E-mail Address, First Name, Last Name and Language. Click [Confirm] to complete setting.
The modified system interface will change accordingly, such as the desired language.
4. System User Manual:
Press the help icon to view the system help file. On each operation interface, a “ icon will appear on the right top of the interface, indicating the help for the current page. Click it to view the help file.
5. Modify Password:
The super user and the new user created by the super user (the default password for the new user is “111111”) can use the [Modify Password] function to modify the login password for system security. Click [Modify Password], it pops up the Edit Page.
201 Circle Drive N, Suite 116 Piscataway, NJ 08854 Tel: 732-412-6007 Fax: 732-412-6008
www.zkaccess.com
Enter the old password and the new password, confirm the new password and click [Confirm] to complete the modification.
Note: The user name is case-insensitive, but the password is case-sensitive.
201 Circle Drive N, Suite 116 Piscataway, NJ 08854 Tel: 732-412-6007 Fax: 732-412-6008
www.zkaccess.com
3. My Work Panel
After the user logs in to the system it will show the [My Panel] main interface, displaying common operations and other important information.
The default work panel includes the following modules: Common Operation: The user can rapidly perform some common operations here, as shown below.
Add Person please refer to 4.2.1 Add Personnel; Card Issue please refer to 4.2.2 Personnel Information Maintenance; Add Department please refer to 4.1 Department Management; Add Area please refer to 5.1 Area Settings; View Reports please refer to 6.7 Access Control Reports; Device Monitoring please refer to 5.3 Device Communication Management; Access Control Quick Start: Follow the steps to enter corresponding modules for related operations, fulfilling access
control functions.
Device Management please refer to 5.2 Device Management; Personnel Management please refer to 4.2 Personnel Management; Time Zone Settings please refer to 6.1 Access Control Time Zones; Holidays Settings please refer to 6.2 Access Control Holidays; Door Configuration please refer to 6.3 Door Settings; Create Access Levels please refer to 6.4 Access Levels; Personnel Access Levels Settings please refer to 6.5 Personnel Access Levels; Real-time Monitoring please refer to 6.6 Real-time Monitoring;
Customize Work Panel:
Click [Customize Work Panel] in the upper right corner to open a dialog box. Cancel the tick of the undesired modules (all ticked by default) and click [OK] to complete the setting. Now customized modules are displayed;
Or, directly click the “ ” icon on a module to minimize, and click the icon to close the module. Click the upper bar to drag and adjust its position;
To restore the original panel, click [Restore Work Panel] to refresh and return to the system default work panel.
201 Circle Drive N, Suite 116 Piscataway, NJ 08854 Tel: 732-412-6007 Fax: 732-412-6008
www.zkaccess.com
4. Personnel System Management
Before using the system’s access control management functions, access the personnel system to configure: First, Department Management settings used to set the company’s organizational chart; Second, Personnel Management settings used to input personnel, assign departments, and maintain and manage personnel. Then set Access Control.
4.1 Department Management
Before managing company personnel, it is required to describe and manage the company’s departmental organization chart. Upon first use of the system, by default it has a primary department named [Company Name] and numbered [1]. This department can be modified but cannot be deleted.
Main functions of Department Management include Add Department and Department Maintenance.
1. Add Department:
Click [Personnel] - [Department] - [Add] to show the Add Department edit interface.
The fields are as follows: Department Name: Any character, up to a combination of 100 characters; Department Number: If required, it cannot be identical to another department. The length cannot exceed 100 digits. Click
[Verify] to see if it is a duplicate or not; Parent Department: Select from the pull-down menu and click [OK]; After editing, click [OK] to complete adding, or click [Cancel] to cancel it. To add a department, you can also use [Import] to import department information from other software or another document into
this system. For details, see Appendix 1 Common Operation. [Upper Department] is an important parameter to determine the company’s organizational chart. On the right of the interface, the company’s organizational chart will be shown in the form of a department tree.
2. Department Maintenance:
Department Maintenance includes department Edit and Delete: Upon a change to the department or organizational structure, the user can use the [Edit] function to modify such items as
Department Name, Department Number or Upper Department. Click Department Name directly or click the [Edit] button behind the department to access the edit interface for modification.
To delete a department, click the check box before the department, and click [Cancel Department], or directly click the [Delete] button behind the department.
Note: A department cannot be deleted freely. If so, the personnel under the department will be pending, and some
historical data will not be able to be queried. If deletion is required, please first transfer the departmental personnel to another department.
4.2 Personnel Management
When starting to use this management program, the user must register personnel in the system, or import personnel
201 Circle Drive N, Suite 116 Piscataway, NJ 08854 Tel: 732-412-6007 Fax: 732-412-6008
www.zkaccess.com
information from other software or another document into this system. For details, see Appendix 1 Common Operation.
4.2.1 Add Personnel
Click [Personnel] - [Personnel] - [Add] to show the Personnel Profile edit interface:
The fields are as follows: Personnel No.: By default, the length cannot exceed 9 digits. A number with a length of less than 9 digits will be preceded with
0 automatically to complete 9 digits. Numbers cannot be duplicated. Click [Verify] to see if it is duplicated or not; Department: Select from the pull-down menu and click [OK]. If the department was not set previously, you can only select the
default [Company Name] department; Social Security Number: Duplication is not allowed. Click [Verify] to check duplication. 15-digit and 18-digit ID card numbers
are supported; Card Number: Assign a card number to the person for access control use. This can be done manually or by using a card
issuer. For details, see Personnel Card Issue in 4.2.2 Personnel Information Maintenance; Password: Set personnel password. An access control panel only supports 6-digit passwords. If a password exceeds the
specified length, the system will truncate it automatically. If you need to modify the password, please clear the old password in the box and input the new one;
Personal Photo: The best size is 120×140 pixels for saving space. For details, see Upload Personal Photo in 4.2.2 Personnel
Information Maintenance;
Employment Date: By default it is the current date. Register Fingerprint: Enroll the Personnel Fingerprint or Duress Fingerprint. If the person presses the Duress Fingerprint, it
will trigger the alarm and send the signal to the system.
Note: If you have not installed the fingerprint sensor driver, the system will prompt to download and install the driver
when you click Register Fingerprint (Fingerprint function is only available for version 5.0.8 and above). Access Control Settings: Select access levels, start and end dates of access validity time and multi-card opening personnel
groups (Presetting is required. For details, see 6.3.3 Multi-Card Opening); Validity time is set for temporary access control, where the door can be opened only during this time period. If not ticked, the
201 Circle Drive N, Suite 116 Piscataway, NJ 08854 Tel: 732-412-6007 Fax: 732-412-6008
www.zkaccess.com
setting will be always valid. After editing personnel information, click [OK] to save and quit. The added personnel will be shown in the personnel list.
Note: The number of a person, whether departed or in service, must be unique. The system, when verifying, will
automatically search the number in the departure library. The Personnel Information List, by default, is displayed as a table. If Graphic Display is selected, photos and numbers will be
shown. Put the cursor on a photo, details about the person will be shown.
4.2.2 Personnel Information Maintenance
The operations include Personnel Card Issue, Upload Personal Photo, etc. For such functions, you can directly click the personnel number in the personnel list to enter the edit interface for modification,
or click the [Edit] button under “Related Operation” to enter the edit interface for modification. After modification, click [OK] to save and quit.
1. Personnel Card Issue:
Assign card numbers to personnel, including batch card issue and individual card issue.
(1) How to use the Card Issuer:
The card issuer is connected to the PC through a USB port. When the cursor is on the Card Number Input box, punch the card on the card issuer, then the card number will display in the input box.
(2) Batch Card Issue:
Click [Personnel] - [Issue Card] - [Batch Issue Card] to show the Batch Issue Card edit interface;
Enter Start and End Personnel Numbers (not longer than the system support max digits) to generate personnel list and show all personnel without cards within this number series;
Select [The way to get card NO.]: Card Reader or Access Control Panel. When using the card reader, swipe the card near the card reader. The system will get the card number and issue it to the user
in the left list. Using the access control panel, select the position of swiping card, such as a card reader connected to an access control
panel. Click [Start to read], the system will read the card number automatically, and issue it to the user in the left list one by one. After that, click [Stop to read].
Click [OK] to complete card issue and return. Personnel and corresponding card numbers will be shown in the list.
(3) Individual Card Issue:
Click [Personnel] - [Card Issue] - [Add] to show Individual Card Issue interface; Select personnel, enter card number (or use card issuer for card issue), select card issue date, and click [OK].
201 Circle Drive N, Suite 116 Piscataway, NJ 08854 Tel: 732-412-6007 Fax: 732-412-6008
www.zkaccess.com
Note: A person can be issued cards only once. Card modification can only be completed by editing personnel
information. The system supports card issue through card issuer and by manually inputting card numbers.
2. Register Fingerprint
(1) Click [Personnel] - [Personnel], select personnel, and click [Register Fingerprint] to open the Fingerprint Registration edit interface:
If you have enrolled fingerprints, the number of enrolled fingerprints will show after corresponding item. (2) Click [Fingerprint Registration] to open the Fingerprint Registration interface.
Note: If there is no fingerprint driver installed, the system will prompt to download and install the driver.
(3) Click the finger for the fingerprint to be enrolled. After the finger finishes 3 times press the FP Sensor. The system prompt “Succeed in fingerprint registration” is shown, as blow:
201 Circle Drive N, Suite 116 Piscataway, NJ 08854 Tel: 732-412-6007 Fax: 732-412-6008
www.zkaccess.com
(4) The enrolled fingerprint will be indicated in this diagram. Click [OK] to save and close the current interface and return to the previous window.
To delete the fingerprints, please click on the enrolled finger twice. The system prompts confirmation for the deletion. If you want to enroll a Duress Fingerprint, tick the Duress Fingerprint option before enrolling.
3. Upload Personal Photo:
Click [Personnel] - [Personnel], tick the personnel (only one person can be selected), click [Upload Personal Photo], enter the edit interface, click [Browse], select a photo, and click [OK] to save and exit.
4.2.3 Personnel Adjustment
Personnel Adjustment is daily maintenance of existing personnel, primarily including: Personnel Adjust Department and Delete Personnel.
1. Personnel Adjust Department:
Operation steps are as follows: (1) Click [Personnel] - [Personnel], and select the person subject to department adjustment from the personnel list. Click the
[Adjust Department] button, and the following interface appears; (2) Select the department to be transferred to. (3) After editing, click [OK] to save and quit.
2. Delete Personnel:
Click [Personnel] - [Personnel], select personnel, click [Delete], and click [OK] to delete, or directly click [Delete] under “Related Operation” of the personnel to delete.
Note: Deleting personnel also results in deleting the personnel in the database.
201 Circle Drive N, Suite 116 Piscataway, NJ 08854 Tel: 732-412-6007 Fax: 732-412-6008
www.zkaccess.com
5. Device Management
The access control panel to be connected to this system provides access control system functions. To use these functions, the user must first install devices and connect them to the network. Second, set corresponding parameters in the system so as to manage these devices via the system, upload user access control data, download configuration information, output reports and achieve digital management of the enterprise.
Device Management primarily includes Area Setting, Device Management, and Device Monitoring.
5.1 Area Settings
Area is a spatial concept, enabling the user to manage devices in a specific area. In the access system, after area setting, device (doors) can be filtered by area upon real-time monitoring. The system, by default, has set an area named [Headquarters] and numbered [1]. Area Setting includes Add Area and Delete
Area.
1. Add Area:
Click [Device] - [Area Settings] - [Add] to activate the Add Area edit interface;
The fields are as follows: Area Number: Repetition not allowed; Area Name: Any character up to a combination of 30 characters; Parent Area: Decides the regional organization structure of the company.
After setting, click [OK].
2. Delete Area:
Select area, click [Delete Area], or directly click [Delete Area] under “Related Operation” of an area, and click [OK].
5.2 Device Management
Set the communication parameters of connected devices. Only when communication parameters, including system settings and device settings are correct, normal communication with devices will be possible. When communication is successful, you can view the information of connected devices and perform remote monitoring, uploading and downloading data.
It includes Add Access Control Panel and Add Network Video Recorder. Click [Device] - [Device] - [Add], the system will prompt to select the device type.
To add Access Control Panel, search and view devices connected to the network, and directly add from the search result.
5.2.1 Add Access Control Panel
There are two ways to add Access Control Panel.
1. Add Device:
(1) In the Device Type Selection interface, select Add Access Control Panel. The communication modes are TCP/ IP or RS485. The following interface will be shown:
TCP/ IP:
201 Circle Drive N, Suite 116 Piscataway, NJ 08854 Tel: 732-412-6007 Fax: 732-412-6008
www.zkaccess.com
IP Address: Please enter the IP Address of the access control panel; IP Port No.: In Ethernet mode, the default is 4370; RS485:
Serial Port Number: COM1-COM254; 485 Address: The machine number. When serial port numbers are the same, there will be no repeated 485 addresses; Baud Rate: Same as the baud rate of the device (9600/ 19200/ 38400/ 57600/115200). The default is 38400; Device Name: Any character, up to a combination of 20 characters; Communication Password: Any character, up to a combination of 15 characters (No blank). You need to input this field only
when you add a new device with the communication password. It cannot be modified when you edit the device information except in [Modify Communication Password] operation. Please refer to 6.3.1 Door Management.
Note: You do not need to input this field if the device has no communication password, such as when it is a new factory
device or just after initialization.
Panel Type: One-door panel, two-door panel, four-door panel; Switch to Two-door Two-way: When four-door panel is selected, this box will appear. By default, it is not ticked. This
parameter is used to switch the four-door one-way access control panel to two-door two-way access control panel (For changes of extended device parameters before and after switching, see relevant files of access control panel).
Note: After the four door one-way access control panel is switched to two- door two-way access control panel, to switch
back, you need delete the device from the system and add it again. When adding, do not tick the check box before this parameter.
Auto Synchronizes Device Time: By default it is ticked, namely, it will synchronize device time with server time each time
201 Circle Drive N, Suite 116 Piscataway, NJ 08854 Tel: 732-412-6007 Fax: 732-412-6008
www.zkaccess.com
connecting to the device. If it is not ticked, the user can manually synchronize device time;
Area: Specify areas of devices. After Area Setting, devices (doors) can be filtered by area upon Real-time Monitoring. Clear Data in the Device when Adding:If this option is ticked, after adding device, the system will clear all data in the device,
except the event logs. If you add the device just for demonstration or testing of the system, there is no need to tick it. (2) After editing, click [OK] and the system will try connecting the current device: If connection is successful, it will read the corresponding extended parameters of the device. At this time, if the access control
panel type selected by the user does not meet the corresponding parameters of the actual device, the system will remind the user. If the user clicks [OK] to save, it will save the actual access control panel type of the device.
Extended Device Parameters: includes serial number, device type, firmware version number, auxiliary input quantity, auxiliary output quantity, door quantity, device fingerprint version, and reader quantity.
If device connection fails while the user still needs to add the device to the system, corresponding device parameters and extended parameters such as the serial number, will not be written into the system and settings such as anti-pass back and linkage will not be possible. These settings can be created only when the device is reconnected successfully and corresponding parameters are acquired.
Note: When you add a new device to the system, the software will clear all user information, time zones, holidays, and
access control levels settings (including access control group, anti-pass back, interlock settings, linkage settings, etc.) from the device, except the events record in the device. Unless the information in the device is unusable, we recommend that you not delete the device to avoid the loss of information.
Access Control Panel Settings: TCP/ IP Communication Requirements:
To support and enable TCP/ IP communication, directly connect the device to the PC or connect to the Internet, get the device IP address and other device information;
RS485 Communication Requirements:
To support and enable RS485 communication, connect to the PC through RS485, get the serial port number, RS485 machine number (address), baud rate and other device information.
2. Add Device by Searching Access Control Panels:
Search the access control panels in the Ethernet. (1) Click [Device] - [Device] - [Search Panels], to show the Search interface; (2) Click [Start Search], and it will prompt [searching……]; (3) After searching, the list and total number of access control panels will be displayed;
201 Circle Drive N, Suite 116 Piscataway, NJ 08854 Tel: 732-412-6007 Fax: 732-412-6008
www.zkaccess.com
Loading...
+ 36 hidden pages