You are on page 1of 104

ZKAccessUserManual

Document Version: 1.4


SoftwareVersion: ZKAccess5.2.20or aboveVersion
Date:December, 2012

AboutThisManual
This document introduces the main functions, the user interface and operations of
thesystem.
TableofContents

TableofContents
Definitions ........................................................................................................... i
1.SystemInstruction...........................................................................................1
1.1FunctionsInstruction................................................................................1
1.2BasicOperationFlow...............................................................................3
2.SystemManagement........................................................................................4
3.MyWorkPanel................................................................................................6
4.PersonnelSystemManagement .......................................................................8
4.1DepartmentManagement..........................................................................8
4.2PersonnelManagement.............................................................................9
4.2.1AddPersonnel .................................................................................9
4.2.2PersonnelInformationMaintenance ...............................................13
4.2.3PersonnelAdjustment....................................................................17
5.DeviceManagement.......................................................................................18
5.1AreaSettings..........................................................................................18
5.2DeviceManagement...............................................................................19
5.2.1AddAccessControlPanel..............................................................19
5.2.2AddVideoRecorder(ForProfessionalVersion5.2.20andabove) ...23
5.2.3DeviceMaintenance ......................................................................24
5.3DeviceCommunicationManagement......................................................24
5.4DaylightSavingTime.............................................................................25
6.AccessControlManagement .........................................................................27
6.1AccessControlTimeZones ....................................................................28
6.2AccessControlHolidays.........................................................................30
6.3DoorSettings .........................................................................................31
6.3.1DoorManagement.........................................................................31
6.3.2FirstCardNormalOpen ................................................................39
6.3.3MultiCardOpening ......................................................................40
6.3.4InterlockSettings ..........................................................................41
6.3.5AntipassbackSettings...................................................................42
6.3.6LinkageSetting .............................................................................43
6.3.7WiegandCardFormat....................................................................46
6.4AccessLevels ........................................................................................47
6.5PersonnelAccessLevels.........................................................................48
6.6RealtimeMonitoring.............................................................................48
6.7AccessControlReports ..........................................................................59

I
TableofContents

6.8AccessControlParameterSettings..........................................................61
7.VideoSystem(ForProfessionalVersion5.2.20orabove) ..............................63
7.1TimeServerSettings ...............................................................................63
7.2VideoLinkageSettings...........................................................................65
7.3VideoView ............................................................................................66
7.4VideoRecordedPlayback .......................................................................67
7.5VideoParameterSettings........................................................................68
7.6ExclusionandSolutionsofException .....................................................69
8.ElevatorControlSystem................................................................................70
8.1AddingElevatorEquipment....................................................................70
8.2ElevatorParameterSettings ....................................................................70
8.3ElevatorTimeZoneManagement ...........................................................72
8.4ElevatorLevelManagement ...................................................................73
8.5PersonalElevatorLevelsDistribution .....................................................74
8.6Personneladding....................................................................................75
8.7Description(realtimesurveillanceandreportoftheelevatorcontrolsystem) .75
9.VisitorSystem................................................................................................76
9.1List........................................................................................................76
9.2ReservationManagement .......................................................................77
9.3VisitorManagement ...............................................................................78
9.4VisitorHistory........................................................................................81
10.SystemSettings ............................................................................................82
10.1UserManagement ................................................................................82
10.2DatabaseManagement..........................................................................84
10.3SystemParameters ...............................................................................87
10.4LogRecords.........................................................................................87
11.Appendices ...................................................................................................88
Appendix1CommonOperation ...................................................................88
Appendix2EndUserLicenseAgreementforThisSoftware...............................95
Appendix3FAQs ........................................................................................98

II
Definitions

Definitions
SuperUser: The user who hasall operationlevels of the system, whocanassign
new users (such as company management personnel, registrar, and access control
administrator)inthesystemandconfiguretherolesofcorrespondingusers.
Role: During daily use, the super user needs to assign new users having different
levels. To avoid settingindividuallevels for each user, roles having certain levels
canbesetinRole Management,andthenbeassignedtospecifiedusers.
AccessControlTimeZone:Itcanbeusedfordoortiming.Thereadercanbemade
usable during valid time periods for certain doors and unusable during other time
periods.TimezonecanalsobeusedtosetNormalOpentimeperiodsfordoors,orset
access control levels so that specified users can only access specified doors during
specifiedtimeperiods(includingaccesslevelsandFirstCardNormalOpensettings).
Door Status Delay:The duration for delayed detection of door sensor after the door is
opened.Detectionisperformedonlyafterthedoorisopenedandthedelaydurationexpired.
WhenthedoorisnotintheNormallyOpenperiod,andthedoorisopened,thedevicewill
starttiming.Itwilltriggeralarmwhenthedelaydurationexpired,andstopalarmwhenyou
closethedoor.Thedoorstatusdelayshouldbelongerthan the lockdriveduration.
CloseandReverselock:Set whether ornot to lockafterdoorclosing.
LockDriveDuration: Usedtocontrolthedelayforunlockingaftercardpunching.
FirstCardNormalOpen:Duringaspecifiedinterval,afterthefirstverificationby
the personhavingFirstCardNormalOpenlevel,thedoorwillbeNormalOpen,and
willautomaticallyrestoreclosingafterthevalidintervalexpires.
MultiCard Opening: This function needs to be enabled in some special access
occasions, wherethe door will open only aftertheconsecutiveverificationof multiple
people. Anyperson verifying outside of the defined combination (even if the person
belongstoothercombinations)willinterrupttheprocedure,requiringa10secondswait
torestartverification.Itwillnotopen by verification ofonlyone ofthecombination.
Interlock: Can be set for any two or more locks belonging to one access control
panel,sothatwhenonedoorisopened,theotherswillbeclosed,allowingonlyone
doortobeopenatatime.
AntipassBack:Thecardholderwhoenteredfromadoorbycardpunchingmustexit
fromthesamedoorbycardpunching,withtheentryandexitrecordsstrictlyconsistent.
LinkageSetting:Whenaneventistriggeredataninputpointoftheaccesscontrol
system, a linkage action will occur at the specified output point to control such
eventsasverification,opening,alarmingandexceptionofthesystemandlistthem
inthecorrespondingmonitoredreportforviewbytheuser.

i
1. SystemInstruction

1. SystemInstruction
1.1FunctionsInstruction
Security Management has increasing concerns for modern enterprises. This
managementsystemhelpscustomerstointegrateoperationofsafetyprocedureson
oneplatform,makingaccesscontrolmanagementeasierandmorepracticalsoasto
improveefficiency.
]SystemFeatures
1.Powerfuldataprocessingcapacity,allowing themanagementoftheaccesscontrol
datafor30,000people.
2. Visible and reasonable work flows come from abundant experience in access
controlmanagement.
3.Automaticusernamelistmanagement.
4. Multilevelmanagementrolebasedlevelmanagementsecuresuserdataconfidentiality.
5.Realtimedataacquisitionsystemensurespromptfeedbackofaccesscontroldata
tothemanagement.
]ConfigurationRequirements:
CPU: Masterfrequencyof2.0Gorabove
Memory:1Gorabove
Hardware: Available space of 10G or above.We recommend using NTFS hard
diskpartitionasthesoftwareinstallationdirectory(NTFSharddiskpartition
hasthebetterperformanceandhighersecurity).
] OperatingSystem:
Supported Operating Systems:
WindowsXP/Windows2003/WindowsVista/Windows7
Supported Databases:
MySQL/MSSQLServer2005orlaterversion
Recommendedbrowserversion:
IE 8.0 or later version (Using fingerprint registration, matching, and visit video
relatedpage,youmustuseIEbrowserandFirfox5.0orlaterversion.)

1
AccessControlSystemUserManual

]SystemModules:
Thesystemincludesfivemajorfunctionalmodules:
Personnel System: Primarily two parts: first, Department Management settings,
used to set the Companys organizational chart second, Personnel Management
settings, used to input personnel information, assign departments, maintain and
managepersonnel.
Device System: Set communication parameters for device connection, including
system settings and machine settings. After successful communication, the
information of connected devices can be viewed and operations such as remote
monitoring,uploadinganddownloadingcanbeperformedinthesystem.
AccessControlSystem:WEBbasedmanagementsystem,enablingnormalaccess
controlfunctions,managementofnetworkedaccesscontrolpanelviacomputer,and
unifiedpersonnelaccessmanagement.Theaccesscontrolsystemsetsdooropening
timeandlevelsforregisteredusers,sothatsomeusersarepermittedtounlocksome
doorsthroughverificationduringcertainintervals.
Video System (for professional version): The system provides the video linkage
function,tomanagethenetworkvideorecorder,viewtherealtimevideo,andquery
thevideorecords. Itopens the Realtime Videowhenthelinkageeventshappen.
Elevatorcontrolsystem (functionintheprofessionaledition):Theelevatorcontrol
function is added to the system and it helps manage network elevator controllers
overthecomputernetwork.Intheelevatorcontrolsystem,thetimeandrightsareset
forregistereduserstouseelevatorcontrollerssothatonlycertainuserscanreachthe
specifiedfloorwithinaperiodoftime afterauthentication.
Visitor system (function in the professional edition): The visitor management
function is added to the system. The visitor system, a webbased management
system, implements functions such as certificate registration, card registration,
onsitesnapshot capture, and visitorquantity statistics. It is highly integrated with
theaccesscontrolsystemandelevatorcontrolsystemtomanagevisitorssafelyand
efficiently.
SystemSettings: Primarily usedto assign systemusersand configuretheroles of
corresponding modules database management such as backup, initialization and
recoveryandsetsystemparametersandmanagesystemoperationlogs.

2
2.SystemManagement

1.2BasicOperationFlow
Thefollowingarethebasicstepstousethesystem,basedontheroleofasuperuser.
Differentusershavedifferentoperationlevels,sothestepsmayslightlydiffer.The
userjustneedstofollowthestepsbelowandskiptheitemswhicharenotdisplayed
ontheir interface.
Step1: Logintothesystemtomodifythedefaultpasswordoftheaccount
Step2:Assignaccountsandrolestosystemusers(suchasmanagementpersonnel,
registrar,accesscontroladministrator)
Step3:Setsystemparameters,database,notice,reminderandotherfrequentlyused
systeminformation
Step 4: Adddevicestothesystem,andconfigurethebasicinformationofdevices
Step 5: The user sets departmental organization chart (refer to the organizational
chartofyourcompany)
Step 6: Inputcompanypersonnelandconductdailymaintenance ofthepersonnel
Step7:Setaccesscontroltimezonesandaccesscontrolholidays(asaccesscontrol
exceptions)
Step8: Setparametersforaccesscontrolleddoors
Step9:Setaccesslevelstoestablishaccesscontrolbasedondoorsgroupandtime
zones
Step10: Settheaccesslevelsofpersonnelbyassigningpersonneltoaccesslevelsto
decidewhichpeoplecanopenwhichdoorsduringwhichtimezones.

3
AccessControlSystemUserManual

2.SystemManagement
1.Logintothe System
Afterinstallingthe server on the computer,the usercan access the server through
thenetworkandusethissystem.
OpenthebrowserandentertheserversIPaddressintheaddressbar.Press[Enter]
toaccessthesystemhomepage.
If you usethe programattheserver computer,please openthe [Server Controller]
first,andstarttheservice.Thendoubleclickthe[AccessSecuritySystem]shortcut
onthedesktop,thefollowing the homepagepopsup.

?Note: Right clicks [Server Controller] and select [Run as Administrator] in


Windows7/Vistasystem.

Forsystemsecurity,itisrequiredtoverifyidentitybeforeaccessingthesystem.We
willprovideasuperuser(havingalloperationlevels)forthebeginnerofthissystem.
Enter username and password, and click [login], or click [Fingerprint Login], and
thenpresstheadministratorfingerprintonthefingerprintsensor(needtoinstallthe
fingerprintsensordriverfirst),toenterthesystem.

? Note: Theusernameofthesuperuseris[admin],andthepasswordis[admin].
After the first login to the system, for system security, please use the [Modify
password]functiontomodifythepassword.
Thesuperusercanassigncompanypersonnelassystemusersto(suchascompany
management personnel, registrar, and access control administrator) and configure
theroles ofcorrespondingmodules.Fordetails,see 10.1UserManagement.
2.Quitthesystem:

4
2. System Management

Clickthe[Logout]buttonontheupperrightcorneroftheinterfacetoreturntothe
homepageorclosethebrowserdirectlytoquitthesystem.
After that, enter the [Server Controller] and stop the server, then quit the [Server
Controller].
3.CustomizeSettings:
The user can use this function to customize the main interface. Click [Setting] to
activatethe Settinginterface, andenterthe following information: Email address,
FirstName,LastName,andLanguage.Click[Confirm]tocompletesetting.
The modified system interface will change accordingly, such as the desired
language.
4.System User Manual:
Pressthehelp icontoviewthesystemhelpfile.Oneachoperationinterface,a
iconwillappearontherighttopoftheinterface,indicatingthehelpforthecurrent
page.Clickittoviewthehelpfile, asshownbelow.

5.Modify Password:
Thesuperuserandthenewusercreatedbythesuperuser(thedefaultpasswordfor
the new user is 111111) can use the [Modify password] function to modify the
login password for system security. Click [Modify password], it pops up the Edit
Page.Entertheoldpasswordandthenewpassword,confirmthenewpasswordand
click[Confirm]tocompletethemodification.

? Note: Theusernameiscaseinsensitive,butthepasswordiscasesensitive.

5
AccessControlSystemUserManual

3.MyWorkPanel
After the user logs in to the system, it will show the [My Panel] main interface,
displayingcommonoperations andotherimportantinformation.
Thedefaultworkpanelincludesthefollowingmodules:
] Common Operation: The user can rapidly perform some common operation
here,asshownbelow.

AddPersonpleasereferto 4.2.1AddPersonnel
CardIssuepleaserefersto 4.2.2PersonnelInformationMaintenance
AddDepartmentpleaserefersto 4.1DepartmentManagement
AddAreapleaserefersto 5.1AreaSettings

Fordetailsonfingerprintregistration,see to4.2.2PersonnelInformationMaintenance
ViewReportspleaserefersto 6.7AccessControlReports
DeviceMonitoringpleaserefersto 5.3 DeviceCommunicationManagement
Fordetailsoncontrollereventrecordacquisition,see to 6.3.1DoorManagement
] Access ControlQuick Start: Follow thesteps to enter corresponding modules
forrelatedoperation,thusbasicallyfulfillingaccesscontrolfunctions.

6
3. My WorkPanell

DeviceManagementpleaserefersto 5.2DeviceManagement
Personnel Managementpleaserefersto 4.2PersonnelManagement
Time Zone Settingspleasereferto 6.1AccessControlTimeZones
HolidaysSettingspleasereferto 6.2AccessControlHolidays
DoorConfigurationpleaserefersto 6.3DoorSettings
Create AccessLevelspleasereferto 6.4AccessLevels
Personnel AccessLevels Settingspleasereferto 6.5PersonnelAccessLevels
Realtime Monitoringpleaserefersto 6.6RealtimeMonitoring
CustomizeWorkPanel:
Click[CustomizeWorkPanel] intheupperrightcornerto open adialogbox.Cancel
thetickoftheundesiredmodules(alltickedbydefault),andclick[OK]tocomplete
setting.Nowcustomizedmodulesaredisplayed
Or directly click the icon on a moduleto minimize, and clickthe to
closethemodule.Clicktheupperbartodragandadjustitsposition
Torestoretheoriginalpanel,click[RestoreWorkPanel]torefreshandreturntothe
systemdefaultworkpanel.

7
AccessControlSystemUserManual

4.PersonnelSystemManagement
Before using the systems access control management functions, first access the
personnelsystemforconfigure:First,DepartmentManagementsettings,usedtoset
the companys organizational chart Second, Personnel Management settings, used
to input personnel, assign departments, and maintain and manage personnel. Then
set AccessControl.

4.1DepartmentManagement
Before managing company personnel, it is required to describe and manage the
companydepartmentalorganizationchart.Uponfirstuseofthesystem,bydefaultit
has a primary department named [Company Name] and numbered [1]. This
departmentcanbemodifiedbutcantbedeleted.
Main functions of Department Management include Add Department and
Department Maintenance.
1.AddDepartment:
Click[Personnel] [Department] [Add]toshow the addDepartmenteditinterface.

Thefieldsareasfollows:
Departmentname: Anycharacter,uptoacombinationof 100characters
Department number: If required, it shall not be identical to another department.
Thelengthshallnotexceed 100 digits.Click[Verify]toseeifrepeatedornot
Parentdepartment: Selectfromthepulldownmenuandclick[OK]
Afterediting,click[OK]tocompleteadding,orclick[Cancel]tocancelit.

8
4. PersonnelSystem Management4.Personnel System Management

To add a department, you can also use [Import] to import department information
fromothersoftwareoranotherdocumentintothissystem.Fordetails,seeAppendix
1CommonOperation.[UpperDepartment]isanimportantparametertodetermine
the Companys organizational chart. On the right of the interface, the Companys
organizationalchartwillbeshownintheformof adepartmenttree.
2.DepartmentMaintenance:
Department MaintenanceincludesdepartmentEditand Delete:
Upon a change to the department or organizational structure, the user can usethe
[Edit]functiontomodifysuchitemsasDepartmentName,DepartmentNumberor
Upper Department. Click Department Name directly or click the [Edit] button
behindthedepartmenttoaccess the editinterfaceformodification.
Todeleteadepartment,clickthecheckboxbeforethedepartment,andclick[Cancel
Department],ordirectlyclickthe[Delete]buttonbehindthedepartment.

? Note: A department can not be deleted freely. If so, the personnel under the
departmentwillbepending,andsomehistoricaldatawillnotbeabletobequeried.
If deletion is required, please first transfer the departmental personnel to another
department.

4.2PersonnelManagement
Whenstartingtousethismanagementprogram,theusershallregisterpersonnelin
the system, or importpersonnelinformation from other softwareor documentinto
thissystem.Fordetails,seeAppendix1CommonOperation.

4.2.1AddPersonnel

Click[Personnel] [Personnel] [Add]toshowpersonnelprofileeditinterface:

9
AccessControlSystemUserManual

10
4. PersonnelSystem Management4.Personnel System Management

Thefieldsareasfollows:
Personnel No.: By default, the length can not exceed 9 digits. A number with a
lengthoflessthan9digitswillbeprecededwith0automaticallytocomplete9digits.
Numberscannotbe duplicated.Click[Verify]toseeifitis duplicatedornot
Department: Select from the pulldown menu and click [OK]. If the department
wasnotsetpreviously,youcanonlyselectthedefault[CompanyName]department

Cardnumber:Youcanaddacardnumberthroughmanualentryoracardissuer.
Therearetwomanualentrymodes: ActualCardNumberandInternalCardNumber
mode. In Actual Card Number mode (by default), you must enter both the actual
cardnumberandthe sitecode, thenthesoftwareconvertsthenumbers tothe internal
cardnumberforaccesscontrolsystemverification.InInternalCardNumbermode,

11
AccessControlSystemUserManual

enterthenumbersdirectly.Fordetailsoncardissueoperations,seepersonnelcard
issuein 4.2.2PersonnelInformationMaintenance.

Password: Set personnel password. An access control panel only supports 6digit
passwords. If a password exceeds the specified length, the system will truncate it
automatically.Ifyouneedtomodifythepassword,pleasecleartheoldpasswordin
theboxandinputthenewone
PersonalPhoto:Thebestsizeis120140pixels,forsavingspace.Fordetails,see
UploadPersonal Photoin 4.2.2PersonnelInformationMaintenance
EmploymentDate: Bydefaultitisthecurrentdate.
RegisterFingerprint:EnrollthePersonnelFingerprintorDuress Fingerprint.Ifthe
personpressestheDuressFingerprint,itwilltriggerthealarmandsendthesignalto

12
4. PersonnelSystem Management4.Personnel System Management

the system.

? Note: Ifyouhavenotinstalledthefingerprintsensordriver,thesystemwill
prompt to download and install the driver when you click Register Fingerprint
(Fingerprintfunctionisonlyavailableforversion5.0.8andaboveversion).

AccessControlSettings
SuperuserIn access controller operation, a super user is not restricted by the
regulations on time zones, antipassback and interlock and has extremely high
dooropeningpriority.Inelevatorcontrolleroperation,asuperuserisnotrestricted
by the regulations on time zones, holidays and has extremely high dooropening
priority.
Select access levels, start and end dates of access validity time and multicard
opening personnel groups(Presettingis required. Fordetails, see6.3.3 MultiCard
Opening)
Select elevatorlevel,startandenddatesof elevatorvaliditytime
Validity time is set for temporary access control and temporary elevator control
wherethedoorcanbeopenedonlyduringthistimeperiod.Ifnotticked,thesetting
willbealwaysvalid.
After editing personnel information, click [OK] to save and quit. The added
personnelwillbeshowninthepersonnellist.

? Note: Thenumberofaperson,whetherdepartedorinservice,mustbeunique.
Thesystem,whenverifying,willautomaticallysearchthenumberinthedeparture
library.
The Personnel Information List, by default, is displayed as a table. If Graphic
Display isselected,photosandnumbers will be shown.Putthe cursor on a photo,
detailsaboutthepersonnelwillbeshown.

4.2.2PersonnelInformationMaintenance

TheoperationsincludePersonnelCard Issue,UploadPersonalPhoto,andetc.
Forsuchfunctions,youcandirectlyclickthepersonnelnumberinthepersonnellist
toentertheeditinterfaceformodification,orclickthe[Edit]buttonunderRelated
Operationtoentertheeditinterfaceformodification.Aftermodification,click[OK]
tosaveandquit.
1.Personnel Card Issue:

13
AccessControlSystemUserManual

Batchcardissue andassigncardnumberstopersonnel.
(1)Howtousethecardissuer:
ThecardissuerisconnectedtothePCthroughaUSBport.Whenthecursorison
theCardNumberInputbox,punchthecardonthecardissuer,thenthecardnumber
willdisplayintheinputbox.
(2)Batch Card Issue:
Click[Personnel][IssueCard][BatchIssueCard]toshowtheBatchIssueCard
editinterface

Enter Start and End Personnel Numbers (not longer than the system support max
digits) to generate personnel list and show this all personnel without cards within
thisnumber series
Select[ThewaytogetcardNO.]:CardReaderorAccessControlPanel.
In using of the cardreader. When you swipethe cardnear tothe card reader.The
Systemwillgetthecardnumberandissueittotheuserintheleftlist.
Using of the access controlpanel, you needtoselecttheposition of swiping card,
suchasacardreaderconnectedwithanaccesscontrolpanel.Click[Starttoread],
thesystemwillreadthecardnumberautomatically,andissueittotheuserintheleft
listonebyone. Afterthat,click[Stoptoread].
Click [OK] to complete card issue and return. Personnel and corresponding card
numberswillbeshowninthelist.

14
4. PersonnelSystem Management4.Personnel System Management

2.Registerfingerprint
(1) Click [Personnel] [Personnel], click Personnel No or Edit to show the
PersonnelProfileeditinterface,andyoucanseeRegisterFingerprintinterfacefrom
the PersonnelProfile editinterface:

If youhaveenrolledthefingerprints,thenumberofenrolledfingerprintswillshow
aftercorrespondingitem.
(2)Click[Register]to open the Fingerprint Registrationinterface.

? Note: If there is no fingerprint driver installed, the system will prompt to


downloadandinstallthedriverbyclicking.

15
AccessControlSystemUserManual

(3) Click the finger for the fingerprint to be enrolled. After the finger finishes 3
times press on the FP Sensor, the system prompt Succeed in fingerprint
registration,isshown,asblow:

(4)Theenrolled fingerprint will beindicatedin this diagram. Click [OK]to save


andclosethecurrentinterface,returnto the previouswindow.

16
4. PersonnelSystem Management4.Personnel System Management

To delete the fingerprints, please click on the enrolled finger once. The system
promptsthefollowingconfirmationforthedeletion.
If you want to enroll a Duress Fingerprint, just tick the Duress Fingerprint option
beforeenrolling.
3.Upload Personal Photo:
Click [Personnel][Personnel], click Personnel Noor Edit to show the Personnel
Profile edit interface, and you can see Upload Personal Photo interface from the
PersonnelProfileeditinterface,click[Browse]andselectaphoto,andclick[OK]to
saveandexit.

4.2.3PersonnelAdjustment

Personnel Adjustment is daily maintenance of existing personnel, primarily


including: Personnel Adjust DepartmentandDelete Personnel.
1.Personnel AdjustDepartment:
Operationstepsareasfollows:
(1) Click [Personnel] [Personnel], and select the person subject to department
adjustment from the personnel list, click the [Adjust Department] button, and the
followinginterfaceappear
(2)Selectthedepartmenttobetransferredto
(3)Afterediting,click[OK]tosaveandquit.
2.Delete Personnel:
Click [Personnel][Personnel],selectpersonnel, click [Delete],and click [OK] to
delete, or directly click [Delete] under Related operation of the personnel to
delete.

? Note: Deletingpersonnelalsoresultsindeletingthepersonnelin the database.

17
5.DeviceManagement

5.DeviceManagement
The access control panel tobe connectedto this systemprovidesaccess control system
functions,ortheelevatorcontrolpaneltobeconnectedtothissystemprovideselevator
control system functions. To usethese functions,the user must firstinstall devices and
connectthemtothenetwork.Second,setcorrespondingparametersinthesystemsoasto
managethesedevicesviathesystem,uploaduseraccesscontroldata(orelevatorcontrol
data), download configuration information, output reports and achieve digital
managementoftheenterprise.
Device Management primarily includes Area Setting, DeviceManagement,and Device
Monitoring.

5.1AreaSettings
Areaisaspatialconcept, enabling theusertomanagedevicesinaspecificarea.
In the access system, after area setting, devices (doors) can be filtered by area upon
realtimemonitoring.
The system, by default, has set an area named [Headquarters] and numbered [1]. Area
Settinginclude Add Areaand Deletearea.
1.Addarea:
Click[Device] [AreaSettings] [Add]toactivatethe Add Areaeditinterface:

18
5.DeviceManagement

Thefieldsareasfollows:
AreaNumber: Repetitionnotallowed
AreaName: Anycharacter,uptoacombinationof30characters
ParentArea: Decidestheregionalorganizationstructureofthecompany.
Aftersetting,click[OK].
2.Deletearea:

Selectarea,click or[deletearea]underrelatedoperation,andthen
click[OK].

5.2DeviceManagement
Set the communication parameters of connected devices. Only when communication
parameters, including system settings and device settings, are correct, normal
communication with devices will be possible. When communication is successful, you
can view the information of connected devices, and perform remote monitoring,
uploadinganddownloadingdata.
ItincludesAddAccessControlPanelandAddNetworkVideoRecorder.Click[Device]
[Device] [Add],thesystemwillprompttoselectthedevicetype.

To add Access Control Panel, search and view devices connected to the network, and
directlyaddfromthesearchingresult.

5.2.1AddAccessControlPanel

Therearetwowaystoadd AccessControl Panel.


1.AddDevice:
(1) In the Device Type Selection interface, select Add Access Control Panel. The
communicationmodesareTCP/IPorRS485.Thefollowinginterfacewillbeshown:
TCP/IP:

19
AccessControlSystemUserManual

IP Address: PleaseentertheIP Addressoftheaccesscontrolpanel


IP PortNo.: InEthernetmode,thedefaultis4370
RS485:

Serial Port Number: COM1COM254


485Address:Themachinenumber.Whenserialportnumbersarethesame,therewillbe
norepeated485addresses
Baud Rate:Same asthe baud rate ofthedevice (9600/ 19200/38400/ 57600/115200).
Thedefaultis38400
DeviceName: Anycharacter,uptoacombinationof20characters
Communication Password: Any character, up to a combination of 15 characters (No
blank). You need to input this field only when you add a new device with the
communication password. It cannot be modifiedwhen you editthedevice information
except in [Modify communication password] operation. Please refer to 6.3.1 Door

20
5.DeviceManagement

Management.

? Note: You do not need to input this field if the device has no communication
password,suchas when itis a newfactorydeviceorjustaftertheinitialization.

Panel Type: Onedoorpanel,twodoorpanel,fourdoorpanel,access controldevice.


SwitchtoTwodoorTwoway:Whenfourdoorpanelisselected,thisboxwillappear.
Bydefault,itisnotticked.Thisparameterisusedtoswitchthefourdooronewayaccess
controlpaneltotwodoortwowayaccesscontrolpanel(Forchangesofextendeddevice
parametersbeforeandafterswitching,seerelevantfilesofaccesscontrolpanel).

? Note: After the fourdoor oneway access control panelisswitchedto twodoor


twowayaccesscontrolpanel,toswitchback,youneeddeletethedevicefromthesystem
andadditagain.Whenadding,donottickthecheckboxbeforethisparameter.
Auto Synchronizes Device Time: By default it is ticked, namely, it will synchronize
device time with servertime eachtime connectingtothe device.If it isnotticked, the
usercanmanuallysynchronizedevicetime
Area: Specifyareasofdevices.AfterArea Setting,devices(doors)canbefilteredbyarea
uponRealTime Monitoring.
Clear Data in the Device when AddingIf this option is being ticked, after adding
deviceadding,thesystemwillclearalldatainthedevice,excepttheeventlogs.If you
addthedevicejustfordemonstrationortestingofthesystem,thereisnoneedtotickit.
(2)Afterediting,click[OK],andthesystemwilltryconnectingthecurrentdevice:
If connection is successful, it will read the corresponding extended parameters of the
device.Atthistime,iftheaccesscontrolpaneltypeselectedbytheuserdoesnotmeet
thecorrespondingparametersoftheactualdevice,thesystemwill remindtheuser.Ifthe
userclicks[OK]tosave,itwillsavetheactualaccesscontrolpaneltypeofthedevice
Extended Device Parameters: includes serial number, device type, firmware version
number, auxiliary input quantity, auxiliary output quantity, door quantity, device
fingerprintversion, andreaderquantity.
If device connection fails, while the user still needs to add the device to the system,
corresponding device parameters and extended parameters, such as the serial number,
willnotbewrittenintothesystemandsettingssuchasantipassbackandlinkagewill not
be impossible. These settings can be created only when the device is reconnected
successfullyandcorrespondingparametersareacquired.

? Note:When you adda new deviceto the system,the software will clear all user
information, time zones, holidays, and access control levels settings (including access

21
AccessControlSystemUserManual

control group, antipass back, interlock settings,linkagesettings,etc.) from the device,


excepttheeventsrecordinthedevice.Unlesstheinformationinthedeviceisunusable,
werecommendthat younottodeletethedeviceinused,toavoidthelossofinformation.
AccessControl Panel Settings:
] TCP/IP CommunicationRequirements:
TosupportandenableTCP/IPcommunication,directlyconnectthedevicetothePCor
connect to the Internet, get the device IP address and other device information of the
device
]RS485 CommunicationRequirements:
To support and enable RS485 communication, connect to PC through RS485, get the
serial port number, RS485 machine number (address), baud rate and other device
informationofthedevice.
2.AddDevice By Searching AccessControl Panels:
Searchtheaccesscontrolpanelsinthe Ethernet.
(1)Click[Device] [Device] [Search Panels],toshowtheSearchinterface
(2)Click[StartSearch],anditwillprompt[searching]
(3)Aftersearching,thelistandtotalnumberofaccesscontrolpanelswillbedisplayed

22
5.DeviceManagement

? Note:HereweuseUDPbroadcastmodetosearchtheaccesscontroller,thismode
can not exceed the HUB scale. The IP address can exceed the net segment, but must
belongtothesamesubnet,andneeds toconfigurethegatewayandIPaddressinthesame
networksegment.
(4) Click [Add to device list] behind the device, and a dialog box will open. Enter
selfdefineddevicename,andclick[OK]tocompletedeviceadding.
(5)ThedefaultIPaddressoftheaccesscontrolpanelmayconflictwiththeIPofadevice
on the Internet. You can modify its IP address: Click [Modify IP Address] behind the
deviceandadialogboxwillopen.EnterthenewIPaddressandotherparameters(Note:
MustconfigurethegatewayandIPaddressinthesamenetworksegment)

5.2.2Add VideoRecorder(ForProfessionalVersion5.2.20andabove)

(1) In Device Type Selection interface, select to Add Video Recorder. The following
interfaceappears.Click[Next]andsetthe server information.

IPAddress: TheIPaddressofthe device.


IPPort: IPportofthe device.
UserName: Theusernametologinthe device.
CommunicationPassword:Thepasswordtologinthe device.
(2)Afteredition,click[OK]andthenewvideoserverwilldisplayonthedevicelist.

23
AccessControlSystemUserManual

Currently, thesystem only supportsHikvision networkvideorecorder.

5.2.3DeviceMaintenance

Synchronize All Data: The system will synchronize the data to the device, including
doorinformation,accesscontrollevels(personnelinformation,accesscontroltimezones),
antipassbacksettings,interlocksettings,linkagesettings,firstcardnormalopensettings,
multicardnormal open settings andso on. Select device, click [Synchronize All Data]
andclick[OK]tocompletesynchronization.

? Note: The operation ofSynchronize All Datais mainlyto delete all datainthe
device first (except event record). Download all settings again, please keep the net
connectionstable andavoidpowerdownsituations,etc.Ifthedeviceisworkingnormally,
pleaseusethisfunctionwithcaution.Executeitinrareusersituationstoavoidimpacton
normaluseofthedevice.
Delete:Selectdevice,click[Delete],andclick[OK].
Edit:Clickdevicename,orclick[Edit]underRelatedoperationbehindthedeviceto
opentheeditinterface.
Forthemeaningsandsettingsoftheparameters,seetherelevantchaptersfordetails.The
grayitemsarenoteditable.Thedevicenamecannotbeidenticaltothenameofanother
device.
Sincedevicetypecannotbemodified,ifthetypeiswrong,theuserneedmanuallydelete
the deviceandadditagain.

5.3DeviceCommunicationManagement
1.CommandsSent By Server
Showsthelistofcommandssenttothedevicebythecurrentsystem.Ifthereturnvalueis
0,executionissuccessful.Ifitisanegative,theexecutionfailed.

24
5.DeviceManagement

ClearCommand List: Click it to open the Confirm interface. Click [OK] to clear all
items inthelistofcommandssentbytheserver
Delete: Tick the check box before the command to be deleted, and click [Delete].
Confirmtodeletethecommand.
2.Device Monitoring
By default it monitors all devices with the current users level, and lists the operation
information of the devices: device name, serial number, operation type, current status,
commandstobeexecuted,andprogress,etc.

5.4DaylightSaving Time
DST,alsocalledDaylightSavingTime,isasystemthatprescribesthelocaltimesetting
principle in order to save energy. The unified time adopted during the system date is
called DST. Usually, the time will be one hour forward in summer. It encourages
peopletogotobedearlyandwakeupearlyinordertoreducelightingandsaveenergy.
Inautumn,thetimewillberecovered.Theregulationsaredifferentindifferentcountries.
TomeetthedemandofDST,aspecialoptioncanbecustomizedonthissystem.Setthe
timeonehourforwardatXX(minute)XX(hour)XX(day)XX(month),andmakethe
timeonehourbackwardatXX(minute)XX(hour)XX(day)XX(month)ifnecessary.

25
AccessControlSystemUserManual

? Note: If a DSTsetting isin use,it can notbe deleted. Firststopthe DST then
deleteitagain.

1.DSTAdding:
Mode1: SetasMonthdayhour:minuteformat,StartTimeandEndTimeisinneeded.
Forexample,theStartTimecanbesetas31100:00,whenthestarttimearrives,the
systemwillbeadvancedonehour.Whentheendtimearrives,thesystemwillturnback
totheoriginaltime.
Mode2:Set as"MonthWeeksweekhour:minute" format.Thestarttimeandendtimeis
inneed.Forexample,thestarttimecanbesetsecondMondayinMarch,00:00When
thestarttimearrives,thesystemwillbeadvancedonehour.Whentheendtimearrives,
thesystemwill turnbacktotheoriginaltime.
2.DSTUsing:
TheusercanenabletheDSTsettingonadevice,bythefollowingways:
IntheDSTinterface,selectaDSTsetting,andclick[Daylightsavingtimesetting],select
thedevice toapplytheDSTsettingtoandclick[OK]toconfirm.
Otherwise, in the [Access Control] [Door Configuration] interface, select the device,
andclick[EnableDaylightSavingtime]or[DisableDaylightSavingTime] toset.
IfaDSTsettingisinuse,thelatestmodificationwillbesenttothedevice.Thedevice
disconnect will lead to transmission failure, and it will continue transmit at the next
connection.
IntheDoorManagementmoduleoftheaccesscontrolsystem,youcanenableordisable
DSTfunction.IfyouenableDSTsetting,whenthestarttimearrives,thesystemwillbe
advancedonehour.Whentheendtimearrives,thesystemwillturnbacktotheoriginal
time. If you have not set a DST in the device, when you disableDST, thesystem will
prompt TheDaylightSavingTimehasntbeensetinthisdevice.

26
AccessControlSystemUserManual

6. AccessControl Management
1.Workprincipleoftheaccesscontrolsystem:
TheSystemisaWEBbasedmanagementsystem,providingnormalaccesscontrol
functions,managementofnetworkedaccesscontrolpanelviacomputer,andunified
personnelaccessmanagement.
The access control system can set the opening levels of registered users, namely,
allowingsomepersonneltoopensomedoorsbyverificationduringatimeperiod.
Otherwise, the system supports the use of data from the access control panel for
attendancepurpose,tosavethedeviceresource.
Itfacilitatesthemanagementandsupportofmultipledatabases,includingMySQL,
SQL Server. Designed based on multibusiness convergence, it supports service
extension, such as attendance, patrol, and visitor management, etc., and supports
multiplelanguages.
2.Accesscontrolsystemparameters:
]255 timezones
]Unlimited accesslevels
]Threeholidaytypesand96holidaystotal
]Antipassbackfunction
]Interlockfunction
]Linkagefunction
]Wiegand Card Format
]FirstCardNormalOpenfunction
] MultiCardOpeningfunction
]Remotedooropeningandclosing
]RealtimemonitoringviaWebbrowser
3.Operationfunctionsofaccesscontrolsystem:
Click to enter the [Access Control System] and the main interface is [RealTime
Monitoring].
AccessControl System ManagementprimarilyincludesAccessControl Time Zones,
Access Control Holiday, Door Settings, Access Levels, Personnel Access Levels,

27
AccessControlSystemUserManual

RealTime Monitoring,and Reports,etc.

6.1AccessControlTimeZones
Access Control Time Zone can be used for door timing. The reader can be made
usable during valid time periods of certain doors and unusable during other time
periods.TimeZonecanalsobeusedtosetNormalOpentimeperiodsfordoors,or
set access control levels so that specified users can only access specified doors
duringspecifiedtimeperiods(includingaccesslevelsandFirstCardNormalOpen
settings).
The system controls access according to Access Control Time Zones. The system
candefineupto255timezones.Foreachtimezone,youcandefine,Duringaweek,
you can defineupto threeintervals foreach day and three holiday types for each
timezone.Eachintervalisthevalidintervalin24hoursofeachday.Theformatof
eachintervalforatimezone:HH:MMHH:MM,thisisaccuratetominutesinthe
24hoursystem.
Initially,by default the systemhasaccess controltime zone named [Accessible 24
hours]. This time period can be modified but cannotbedeleted.The user canadd
AccessControlTimeZonesthatcanbemodified.
1.Add Access Control Time Zone:
(1) Click [Access Control System][Time zones][Add] to accessthetime zone
settinginterface

28
6. AccessControlManagement

Theparametersareasfollows:
TimeZoneName: Anycharacter,uptoacombinationof30characters
Remarks:Detaileddescriptionofthecurrenttimezone,including anexplanationof
the current time zone and primary applications, facilitating the user or other users
withsameleveltoviewtimezoneinformation.Thefieldisupto70characters
IntervalandStart/EndTime:OneAccessControlTimeZoneincludes3intervals
for each day in a week, and three intervals for each of the three Access Control
Holidays.SettheStartandEnd Timeofeachinterval
Setting:IftheintervalisNormalOpen,justenter00:0023:59asthefirstinterval,
and 00:0000:00 asthesecond andthirdintervals. If theintervalis Normal Close:
Allare00:0000:00.Ifonlyusingoneinterval,theuserjustneedtofilloutthefirst
interval (such as: Normal Open), and the second and third intervals will use the
default value of 00:0000:00. Similarly, when the user only uses the first two
intervals, the third interval will use the default value of 00:0000:00. When using
twoorthreeintervals,theuserneedstoensuretwoorthreeintervalshavenotime
intersection, and the time shall not span days. Otherwise, the system will prompt
error.
HolidayType:Therearethreeholidaytypesinthetimezone.Theyareunrelatedto
the day of the week. If a certain date is set to a certain holiday type, the three
intervalsoftheholidaytypewillbeusedforaccess.Theholidaytypeinatimezone
isoptional.However,iftheuserdoesnotenterone,thesystemwillgivethedefault
value.
Forexample,settheaccesscontrolintervalofHolidayType1as820,theAccess
Control Time Period of HolidayType 2 as Normal Open, and the Access Control
Time Zoneof Holiday Type3asNormalClose.
(2)Aftertimezonesetting,click[OK]tosave,andthetimezonewillappearinthe
list.
2.Maintenanceof Access Control Time Zone:
Edit: In the time zone list, click the [Edit] button under Related operation to
accessthetimezonemodificationinterface,andmodify thetimezonesetting.After
modification,click[OK],andthemodifiedtimezonewillbesavedandshowninthe
timezonelist.
Delete: In the time zone list, click the [Delete] button under Related Operation.
Click[OK]todeletethetimezone,orclick[Cancel]tocanceltheoperation.A time
zoneinusecannotbedeleted.
Tickthecheckboxesbeforeoneormoretimezonesinthetimezonelist.Clickthe
[Delete] button over the list, and click [OK] to delete the selected time zones, or

29
AccessControlSystemUserManual

click[Cancel]tocanceltheoperation.

6.2AccessControlHolidays
TheAccessControlTimeofaholidaymaydifferfromthatofaweekday.Foreasy
operation, the system provides holiday settings to set access control time for
holidays.
Access Control Holiday Management includes Add, Modify and Delete Access
ControlHoliday.
1.Add Access Control Holiday:
Three holiday types are supported, each including up to 32 holidays. To conduct
special access level configuration on special dates, the user can select special
holidaysforsetting.
Theoperationstepsareasfollows
(1) Click [Access Control System] [Holidays] [Add] to access Add Access
ControlHolidayeditinterface:

Thefieldsareasfollows:
HolidayName: Anycharacter,uptoacombinationof30characters
Holiday Type: Holiday Type 1/2/3, namely, A current holiday record belongs to
thesethreeholidaytypesandeachholidaytypeincludesupto32holidays
Start/EndDate:Mustmeetthedateformatas201011.TheStartDatecannot
belaterthantheEndDate otherwise thesystemwillpromptanerror.Theyearofthe
startdateStartDatecannotbeearlierthanthecurrentyear,andtheholidaycannot

30
6. AccessControlManagement

spanyears
Recurring:YesorNo.ThedefaultisNo.Annualcyclemeansthataholidaydoes
notrequiremodificationindifferentyears.Forexample,theNearYearsDayison
January1eachyear,andcanbesetasYes.Foranotherexample,theMother'sDay
isonthesecondSundayofeachMay,soitsdateisnotfixedandshouldbesetas
No
For example,the date ofthe holiday Near Years Day issetasJanuary 1, 2010,
andtheholidaytypeis1,thenonJanuary1,AccessTimeControlwillnotfollowthe
timeofFridayin the week,butthe AccessControl Timeof Holiday Type1.
(2)Afterediting,click the[OK]buttonto save,anditwillappearintheholidaylist.
2.Modificationof Access Control Holiday:
To modify the original Access Control Holiday, click [Edit] behind the Access
ControlHolidaytoaccesstheeditinterface.Aftermodification,click[OK]tosave
and quit.
3.Deletionof Access Control Holiday:
In the access control holiday list, click the [Delete] button under Related
Operation. Click [OK] to delete the holiday, or click [Cancel] to cancel the
operation.AnAccessControlHolidayinusecannotbedeleted.
Tick the check boxes before one or more holidays in the holiday list. Click the
[Delete]buttonoverthelist,andclick[OK]todeletetheselectedholiday,orclick
[Cancel]tocanceltheoperation.

6.3DoorSettings
Currentlythesystemsupportstheconnectionandcontrolofupto50accesscontrol
panels.
Theaccesscontrolsystemisprimarilyforthemanagementofpersonnelrestriction
and admission. For security, a company will set personnel admission time zones,
restrictiontimezonesandcombinationsoftimezones.Fordooropeningverification,
FirstCardNormalOpen,MultiCardOpening,antipassback,linkage,andinterlock
can be set to enhance security. This system can provide realtime monitoring of
doorsandoutputofexception,accesscontroleventsandaccesslevelreports.

6.3.1DoorManagement

Click[AccessControlSystem][Doorconfiguration],andbydefaultitwillaccess
the [Door Management] interface, showing the list of all control panels. When

31
AccessControlSystemUserManual

unfolded, it can show all doors under the control of the control panel. Upon first
entryintotheaccessinterfaceorsuccessfulquery,ifthesystemcurrentlyhasaccess
controlpanelsorthequeryresultisnotnull,bydefaultitwillunfoldthedoorsofthe
first access control panel. Click corresponding button for relevant parameter
settings.

Door Management operations include: Control Panel Management and Door


Management.
1.AccessControl Panel Operation
For communication between the system and the device, data uploading,
configurationdownloading,deviceandsystemparametersshallbeset.Theusercan
see access control panels within his levels in the current system, and can edit the
deviceshere.TheusercantoaddordeletedevicesinDevice ifneeded.
Control Panel Management includes: Modify IP Address, Close Auxiliary Output,
Disable, Enable, Modify Communication Password, Synchronize Time, Upload
EventRecord,Upgrade Firmware,andGetEventEentries.
(1)Device Profile:
Selectdevice,click[Edit]underRelatedoperation.ForRelateddetails,see5.2.2
DeviceMaintenance.

32
6. AccessControlManagement

(2)ModifyIP Address:
Select deviceand click [Modify IP address]to show theModification interface. It
will obtain realtime network gateway and mask from the device. If it is fails
because the networkis unavailable, thenthe IP address cannot be modified. Enter
new IP address, gateway, and subnet mask. Click [OK] to save settings and quit.
This function the same as [Modify IP Address Function] in 5.2.1 Add Access
ControlPanel.Thedifferenceiswhensearchingcontrolpanels,thedeviceshavenot
been added into the system, while the current [Modify Device IP Address] is
regardingaddeddevices.
(3)Disable/Enable:
Select device, click [Disable/ Enable] to stop/ start using the device. When the
devicescommunicationwiththesystemisinterruptedorthedevicefails,thedevice
mayautomaticallyappearindisabledstatus.Atthistime,afteradjustingInternetor
device, click [Enable Device] to reconnect the device and restore device
communication.

? Note: If the current device is in enabled status and the connection is not
successful, ifthe user performs the enable operation, the system will immediately
reconnectthedevice.
(4)Modify Communication Password:
Entertheoldcommunicationpasswordbeforemodification.Afterverification,input
the same new password twice, and click [OK] to modify the communication
password.

?Note:Thecommunicationpasswordcannotcontainspace,itisrecommended
that a combination of numbers and letters be used. The communication password
setting can improve the device security. It is recommended to set communication
passwordforeachdevice.

33
AccessControlSystemUserManual

(5)Synchronize Time:
Synchronizedevicetimewithcurrentservertime.
(6)Get Event Entries:
Geteventrecordsfrom thedeviceintothesystem.
Threeoptionsareprovidedforthisoperation,GetNewEntries,GetAllEntries,and
GetEntriesfromSDCard.
Get New Entries: The system only gets the new event entries since the last time
evententrieswerecollectedandrecordsthemintothedatabase.Repeated Entries.
GetAllEntries:Thesystemwillgetalloftheevententriesagain. RepeatedEntries
willnotberewritten.
GetEntriesfromSDCard:ThesystemwillgettheevententriesfromtheSDcard
inthedevice.
When the network status is normal and the communication status between the
systemandthedeviceisnormal,thesystemwillacquireeventrecordsinthedevice
inrealtimeandsavethemintothesystemdatabase.However,whenthenetworkis
interruptedorcommunicationisinterruptedforany reasons,andtheeventrecordsin
thedevicehavenotbeenuploadedintothesysteminrealtime,theoperationcanbe
used to manually acquire event records in the device. In addition, the system, by
default,willautomaticallyacquireeventrecordsinthedeviceat00:00eachday.

?Note: The access controller can restore up to 100 thousands of event entries.
Whentheentriesexceedthisnumber,thedevicewillautomaticallydeletetheoldest
restoredentries(thedefaultdeletenumberis10thousands).
(7)Upgrade Firmware:
To upgrade firmware in the device, tickthe device for which you wantto upgrade
thefirmware,click[Upgradefirmware],entereditinterface,click[Browse]toselect
thefirmwareupgradefile(namedemfw.cfg)providedbyZKAccess,andclick[OK]
tostartupgrading.

? Note:The usershallnot upgrade firmware without authorization. Contact the


distributor before upgrading firmware, or upgrade it when instructed by the
distributor.Unauthorizedupgradingmaybringproblemsthataffectyournormaluse.

(8) Change the fingerprint identification threshold (Ensure that the access
controllersupportsthefingerprint function):
Theusercanchangethefingerprintidentificationthresholdinthedevice.Thescale
is3570and55bydefault.Indeviceadding,thesystemwillgetthethresholdfrom

34
6. AccessControlManagement

the device. If the operation succeeds, user can view the threshold in all of the
devices. Batchoperationispermittedtheusercan changemultipledevices concurrently.
(9) EnableDaylightSavingTime
Selectthe DaylightSavingTimebeingset,click[EnableDaylightSavingTime].
(10)DisableDaylightSavingTime
DisabletheDaylightSavingTimeinused.
(11)GetInformationofPersonnel
Renew the current number of personnel and fingerprints in the device. The final
valuewillbedisplayedonthedevicelist.
(12)CloseAuxiliaryOutput
Closetheauxiliarydeviceconnectedtothedeviceauxiliaryoutputinterface.
(13)Renameauxiliaryinput:Renametheauxiliaryinputforthedevice.
(14)Renameauxiliaryoutput:Renametheauxiliaryoutputforthedevice.
2.Doormanagement:
Thedevicelistwillshowallaccesscontroldevices.Clickthe+buttonbeforethe
device name to show the door list under a device. When adding a device, it will
automaticallyadddoors(correspondingdevicenameanddoornumberscannotbe
edited)accordingtothenumberofdoors.Beforeusingthedevice(includingdoors),
theuser must edit door information oneby one (or apply current settings to other
doors). After editing, they will be sent to the device, which can be used after
successfulsetting.
Doorparametermodification:
Selectthedoortobemodified,andclick[Edit]underRelatedoperationtoshow
theEditinterface:

35
AccessControlSystemUserManual

Thefieldsareasfollows:
DeviceName: Itisnoteditable(mustbeeditedin 5.2.1AddAccessControlPanel)

DoorNumber:Thesystemautomaticallynamedthenumbersofdoorsaccordingto
how many doors of the device (for example,the four doors of afourdoor control
panel are numbered 1, 2, 3 and 4). The number will be consistent with the door
numberonthedevice.

? Note: Although by default the number following the underline in the door
nameisconsistentwiththedoornumber,but1/2/3/4inantipassbackandinterlock
refers to door serialnumberrather than the number following the door name,and
theyhavenonecessaryrelation,andthesystemallowstheusertomodifythedoor
name,sotheycannotbeconfused

Door Name: The default Door Name is device name_door number. The field
allowstheusertomodifyasrequired.Upto30characterscanbeentered

36
6. AccessControlManagement

Door Active Time Zone, Passage Mode Time Zone: By default both are null.
Initializedandaddedaccesscontroltimezoneswillbeshownfortheusertoselect.
Upondoorediting,doorvalidtimezoneisneedstobeinput.Onlyaftersettingthe
doorvalidtimezone,thedoorcanbeopenedandclosednormally.Werecommend
to set thedoorNormalOpentimeperiodwithinthedoorvalidtimezone,onlyinthis
situation,thedoornormalopentimezoneisvalid.

? Note:Consecutivepunchingofacardhavingaccesslevelofthedoorfor5
timescanreleasetheNormalOpenstatusforoneday(includingFirstCardNormal
Open),andclosethedoorimmediately.
LockDriveDuration:Usedtocontrolthedelayforunlockingaftercardpunching.
The unit is second, and the default is 5 seconds. The user can enter a number
between0254
Punch Interval: The unit is seconds (range: 010 seconds), and the default is 2
seconds
Entryonceonlyrestriction duration:Only oneentryisallowedwithareaderin
this duration. The durationranges from 0to 120 minutes(default duration: 0).the
passwordisanintegerwithlessthansixcharacters.
Door Sensor Type: NO (door sensor not detected), Normal Open, Normal Close.
ThedefaultisNO.Wheneditingdoors,theusercanselectthedoorsensortypetobe
Normal Open or Normal Close. If Normal Open or Normal Close isselected, it is
requiredtoselect doorstatusdelay andwhethercloseandreverselock isrequired.
By default, once door sensor type is set as Normal Open or Normal Close, the
default door status delay will be 15s, and by default it will enable close and
reverselock.
DoorStatusDelay:Thedurationfordelayeddetectionofthedoorsensorafterthe
doorisopened.Detectionisperformedonlyafterthedoorisopenedandthedelay
durationexpired.WhenthedoorisnotintheNormallyOpenperiod,andthedoor
is opened, the device will start timing. It will trigger an alarm when the delay
duration expired,and stop alarm when you close thedoor. Thedefaultdoor status
delaywillbe15seconds.ThedoorstatusdelayshouldbelongerthanLockDrive
Duration.
CloseandReverseState:Setlockingornotafterdoorclosing.Tickitforlockafter
doorclosing.
Verify Mode: Identification modes include Only Card, Card plus Password, Only
Password, Cardplus Fingerprint, and Only Fingerprint verify. The default is Only
CardorOnlyFingerprint.WhenCardplusPasswordmodeisselected,makesurethe
doorusesareaderwithkeyboard(thefingerprintverifymodesareonlyavailablefor
version5.0.8andaboveversion)

37
AccessControlSystemUserManual

Wiegandcardformat:SelecttheWiegandcardformatthatcanbeidentifiedbythe
Wiegandreaderinthedoor.Ifthescannedcardformatisdifferentwiththesetting
format,thedoorcannotbeopened.Thesoftwareisembeddedwith9formats,andit
is set to automatic matching to Wiegand card format by default. After automatic
matching,themultipleWiegandcardformats(exceptforthecardformatnamewith
a,borc)embeddedinthesoftwarecanbeidentified.
RequesttoExit:Lockstatusindicatesthatthedoorislockedaftertheexitbuttonis
pressed.Unlockingstatusindicatesthatthedoorisunlockedaftertheexitbuttonis
pressed.Itissettounlocking bydefault.
Alarm delay: Alarm delay indicates the alarm delay time for door detection after
theexitbuttonislocked.Whenthedoorisunlockedforcibly,thesystemdetectsthe
doorstatusafteraperiodoftime.Thedelaytimeissetto10sbydefault.Youcanset
ittoanyintegralbetween1and254.
DuressPassword,EmergencyPassword:Uponduress,use DuressPassword(used
withlegallycard)toopenthedoor.WhenopeningthedoorwithDuressPassword,it
will alarm. Uponemergency, theuser can useEmergencyPassword (namedSuper
Password) to open the door. Emergency Password allows normal door opening.
Emergency password is effective in any time zone and any type of verify mode,
usuallyusedfortheadministrator.
DuressPasswordOpening(usedwithlegallycard):WhenOnlyCardverifymode
isused,thepassword isanumbernotexceeding6digits(integer), youneedtopress
[ESC] first, and then press the setting password plus [OK] button. Finally swipe
yourcard.Thedooropensandtriggersthealarm.WhenCardPlusPasswordverify
modeisused,pleaseswipeyourcardfirst,thenpressthepasswordnumberplusthe
[OK] button (same to normal door open in card plus password verify mode), the
dooropenandtriggerthealarm.
EmergencyPasswordOpening:Thepasswordmustbe8digits(integer).Thedoor
canbeopenedjustbyenteringthepassword.Pleasepress[ESC]everytimebefore
enteringpassword,andthenpressOKtoexecute.
WhenusingDuressPasswordorEmergencyPassword,theintervalforenteringeach
numbershallnotexceed10seconds,andthesetwonumbersshouldnotbethesame.
Copythesettingstodoorsofthecurrentpanels:Clicktoapplytoalldoorsofthe
currentaccesscontrolpanel

38
6. AccessControlManagement

Copy the settings to doors of all the panels: Click to apply to all doors of all
accesscontrolpanelswithinthecurrentuserslevel
Userdefined name of the reader: You can userdefinedname of the reader. The
newnamewillbedisplayedinthestatuscolumnintherealtimemonitoringreport
andaccesscontrolreport.
Binding Video Channel: Before selecting a video channel to be bound with the
reader,youmustselectavideodevicefirstly.Youcanselectavideochannelamong
Channel1toChannel8.
Atpresent,tworeaderofadoorcannotbindthesamevideochannel.If
processthisoperation,thepagewilldisplaythepromptcorresponding
information.Choosetothebindingofvideochannel, afterparameterediting,
click[OK]tosaveandquit. Youcanalsocancelit.

6.3.2FirstCardNormalOpen

FirstCardNormalOpen:Duringaspecifiedinterval,afterthefirstverificationby
the personhavingFirstCardNormalOpenlevel,thedoorwillbeNormalOpen,and
willautomaticallyrestoreclosingafterthevalidintervalexpired.
The user can set FirstCard Normal Open fora specific door. The settings include
door,dooropeningtimezoneandpersonnelwithFirstCardNormalOpenlevel.A
door can have FirstCard Normal Open settings for multiple time zones. The
interface of each door will show the number of existing FirstCard Normal Open
settings.ForFirstCardNormalOpensetting,whenaddingoreditingeachrecord,it
is notrequiredto modify the current door, butto select time zone.When record
addingissuccessful,addpersonnelthatcanopenthedoorforaFirstCardNormal
Open setting record. On the right of the interface, you can browse door opening
personnelinaFirstCardNormalOpensettinganddeletecurrentpersonnel,sothat
somepersonnelwillnothaveFirstCardNormalOpenlevelanymore.
Theoperationstepsareasfollows:
1.Click[Set] underFirstCardNormalOpenofadoortoshowFirstCardNormal
Opensettinginterface
2.Click[Add],selectthetimezoneofFirstCardNormalOpen,andclick[OK]to
savethesettings
3.Click[Addanopeningperson]underRelatedoperationtosetpersonnelhaving
FirstCardNormalOpenlevel.
Click[OK]tosaveandquitediting.

39
AccessControlSystemUserManual

?Note:
For a door currently in Normal Open time period, consecutive verification of a
personhavingaccesslevelforthedoorfor5times(thepersonverificationinterval
should be within5second.)canreleasethecurrentNormalOpenstatusandclosethe
door. The sixth person verification will be a normal verification. This function is
onlyeffectiveatthevaliddoorvalidtimezone.NormalOpenintervalssetforother
doors within the day and FirstCard Normal Open settings will not take effect
anymore.

6.3.3MultiCardOpening

Thisfunctionneedstobeenabledinsomespecialaccessoccasions,wherethedoor
will open only after the consecutive verification of multiple people. Any person
verifying outside of this combination (even if the person belongs to other
combination)willinterrupttheprocedure,andyouneedtowait10secondswaitto
restartverification.Itwillnotopen by verificationby only oneofthecombination.
1.MultiCardOpeningPersonnelGroups:
ItispersonnelgroupingusedtosetMultiCardOpeninggroups.
(1) Click [Access Control System] [Door Configuration] [MultiCard Opening
PersonnelGroups] [Add]toshowthefollowingeditinterface:
Groupname:Anycombinationofupto30charactersthatcannotbeidenticalto an
existinggroupname
After editing, click [OK], return and the added MultiCard Opening Personnel
Groupswillappearinthelist
(2)Selectagroup,andclick[Addpersonnel]toaddpersonneltothegroup:
(3)Afterselectingandaddingpersonnel,click[OK]tosaveandreturn.

?Note: A personcanonlybelongtoonegroup,andcannotbegroupedrepeatedly.
2.MultiCardOpening:
Setlevelsforpersonnelin[MultiCard OpeningPersonnelGroups].
If currently [MultiCard Opening Personnel Groups] is not configured, the system
willprompt,andtheusercanonlyaddcombinationname.Thesystempermitsthe
usertoaddanameonlycombination,andtoeditMultiCardOpeningcombination
when[MultiCardOpeningPersonnelGroups]isadded.
MultiCardOpeningcombinationisacombinationofthepersonnelinoneormore
MultiCardOpeningPersonnelGroups.Whensettingthenumberofpeopleineach

40
6. AccessControlManagement

group,youcanconfigureonegroup(suchascombineddooropeningbytwopeople
in one group) or multiple groups (such as combined door opening by four people,
including2peopleingroup1and2peopleingroup2),andatleastonegroupshall
be entereda number of door opening people not being 0, and converselythetotal
numberofdooropeningpeopleshallnotbegreaterthan5.Inaddition,ifthenumber
of people entered by the user is greater than the number of people in the current
group,theMultiCardOpeningfunctionwillbeunabletoberealizednormally.
MultiCardOpeningsettings:
(1) Click [Access Control System] [Door configuration] [Door management],
click [Set] under MultiCard Opening of a door in the door list to show the
MultiCardOpeningsettinginterface
(2) Click[Add]toopenAddMultiCardOpeningsettinginterface
(3)ForMultiCardOpening,thenumberofpeopleforcombineddooropeningisup
to5.Thatinthebracketsisthecurrentactualnumberofpeopleinthegroup.Select
the number of people for combined door opening in a group, and click [OK] to
completeediting.

6.3.4InterlockSettings

Interlockcanbesetforanytwoormorelockbelongtooneaccesscontrolpanel,so
thatwhenonedoorisopened,theotherswillbeclosed.Andyoucanopenonedoor
onlywhenothersareclosed.
Before interlock setting, please make sure the access controller is connected with
doorsensoraccordingtotheInstallationGuide,andthedoorsensorhasbeensetas
NCorNOstate.
Addinterlocksettings:
1.Click[AccessControlSystem] [Doorconfiguration] [Interlocksettings] [Add]
toentertheinterlocksettingeditinterface
2.Selectdevicetoshowinterlocksettings.Sinceonedevicecanonlycorrespondto
oneinterlocksettingrecord,whenadding,interlockeddevicescannotbeseeninthe
dropdown list of the device. When deleting established interlock information, the
corresponding device will return to the dropdown list. The setting page will vary
withthenumberofdoorscontrolledbytheselecteddevice:
Aonedoorcontrolpanelhasnointerlocksettings
Atwodoorcontrolpanel:12twodoorinterlocksettings
A fourdoor control panel: 12 twodoor interlock, 34 twodoor interlock, 123
threedoorinterlock,1234fourdoorinterlock

41
AccessControlSystemUserManual

3.Selectinterlocksettings,tickanitem(multipleinterlockscanbeselectedaslong
as doors are not repeated), click [OK] to complete setting, and then the added
interlocksettingswillbeshowninthelist.
Forexample,select1234fourdoorinterlock,ifyouwantopendoor3,doors1,2
and4needstobeclosed.

? Note:Whenediting,thedevicecannotbemodified,buttheinterlocksetting
can be modified. If interlock setting is not required for the device any more, the
interlocksettingrecordcanbedeleted.Whendeletingadevicerecord,itsinterlock
settingrecord,ifexist,willbedeleted.

6.3.5AntipassbackSettings

Currently antipassback settings support in and out antipassback. In some special


occasions, it is required that the card holder who entered from a door by card
punching mustexit from thesamedoor by card punching, with the entry and exit
recordsstrictlyconsistent.Onewhofollowedanothertoenterthedoorwithoutcard
punching will be denied when trying to exit by card punching, and one who
followedanothertoexitwithoutcardpunchingwillbedeniedwhentryingtoenter
by card punching. When a person enters by card punching, and gives the card to
another to try entering, the other person will be denied. The user can use this
functionjustbyenableitinthesettings.Thisfunctionisnormallyusedinprisons,
thearmy,nationaldefense,scientificresearch,bankvaults,etc.
Addantipassbacksettings:
1.Click[AccessControlSystem][Doorconfigurations][Antipassbacksettings]
[Add]toshowantipassbacksettingeditinterface
2.Selectdevice(Ndoorcontrolpanel),becauseonedevicecanonlycorrespondto
one antipassback setting record, so when adding, devices with antipassback
settings cannot be seen in the dropdown list. When deleting established
antipassbackinformation,thecorrespondingdevicewillappearinthedropdownlist.
Thesettingsvarywiththenumberofdoorscontrolledbythedevice:
Antipassbackcanbesetbetweenreadersandbetweendoors.Thecardholderenter
from door A, he mustexit from door B, this functionisused forchannel orticket
management.
Antipassback settings of onedoor control panel: Antipassback between door
readers
Antipassbacksettingsofatwodoorcontrolpanel:
Antipassbackbetweenreadersofdoor1,antipassbackbetweenreadersofdoor2,
antipassbackbetweendoors1/2

42
6. AccessControlManagement

Antipassbacksettingsofafourdoorcontrolpanel:
Antipassback of doors 12, antipassback of doors 34, antipassback of doors
1/23/4,antipassbackofdoors12/3,antipassbackofdoors12/3/4,Antipassback
betweenreadersofdoor1,antipassbackbetweenreadersofdoor2,Antipassback
betweenreadersofdoor3,antipassbackbetweenreadersofdoor4.

? Note: Thereadermentioned above includesWiegandreaderthatconnectedwith


accesscontrolpanelandinBIOreader.Thesingledoorandtwodoorcontrolpanel
with Wiegand reader include out reader and in reader. There is only in reader for
fourdoorcontrolpanel.Thereadernumberof1,2(thatisRS485addressordevice
number,thesamebelow)isfordoor1,thereadernumberof3,4isfordoor2,etc.
No need to consider if it is Wiegand reader or inBIO reader in setting of
antipassback between doors or between readers,just makesurethe in or outstate
(meansitistheinreaderoroutreader)andsetaccordingtotheactualneed.Forthe
readernumber,oddnumberisforinreader,andevennumberisforoutreader.
3.Selectantipassbacksettings,andtickoneitem(antipassbackwithoutrepetition
ofdoorsorreaderscanbesubjecttomultichoice).Click[OK]tocompletesetting,
andtheaddedantipassbacksettingscanbeshowninthelist.

? Note: When editing, you can not modify the device, but can modify
antipassback settings. If antipassback setting is not required for the device any
more,theantipassbacksettingrecordcanbedeleted.Whendeletingadevicerecord,
itsantipassbacksettingrecord,ifexist,willbedeleted.

6.3.6LinkageSetting

Linkage setting means when an event is triggered at an input point of the access
control system, alinkage action will occur at thespecified output pointto control
sucheventsasverification,opening,alarmandexceptionofthesystemandlistthem
inthecorrespondingmonitoredreportforviewbytheuser.
Addlinkagesetting:
1.Click[AccessControlSystem] [Doorconfigurations] [Linkagesetting] [Add]
toshowthelinkagesettinginterface
2. Inputlinkagesetting name(inputlinkage settingname beforeselectingdevice).
After selecting device, corresponding linkage setting will appear (The system will
first determine whether or not the device is successfully connected and has read
extended device parameters such as auxiliary input quantity, auxiliary output
quantity,doorquantityandreaderquantity.Ifthesystemhasnoavailableextended
deviceparameters,itwillremindtheuseroffailingtosetantipassback.Otherwise,
itwill,showslinkagesettingoptionsaccordingtothecurrentlyselecteddevice,such

43
AccessControlSystemUserManual

as thedoorquantity,auxiliaryinputandoutputquantity):

Thefieldsareasfollows:
Trigger Condition: Please refer to 6.6 Realtime Monitoring for the Real Time
EventsDescription.ExceptLinkageEventTriggered,CancelAlarm,OpenAuxiliary
Output, Close Auxiliary Output, and Device Start, all events could be trigger
condition.
Input Point Address: Any, Door 1, Door 2, Door 3, Door 4, Auxiliary Input 1,
AuxiliaryInput2,AuxiliaryInput3,AuxiliaryInput4,AuxiliaryInput9,Auxiliary
Input10,AuxiliaryInput11,AuxiliaryInput12(thespecificinputpointpleaserefer
tospecificdeviceparameters,Ifthedevicefirmwareversionsupportsthereadhead
linkage,itwilllisteachdoorsReaderoptions)
Output Point Address: Lock 1, Lock 2, Lock 3, Lock 4, Auxiliary Output 1,
Auxiliary Output 2, Auxiliary Output 3, Auxiliary Output 4, Auxiliary Output 6,
Auxiliary Output 8, Auxiliary Output 9, Auxiliary Output 10 (the specific output
pointpleaserefertospecificdeviceparameters)
Action Type: Close, Open, Normal Open. By default it is closed. To open, delay
timeshallbeset,orNormalClosecanbeselected
Delay: Rangesfrom1254s(ThisitemisvalidwhentheactiontypeisOpen)
Send tomailbox OutputPointAddress :Formultipleemail addressesof linkage
event recipients, separate them with semicolon (). When a linkage action is
triggered,sendanemail(linkageeventrecordandvideolinkagesnappingpicture)
totherecipient.

44
6. AccessControlManagement

Video Linkage: Video Linkagecontainspopupvideofunctionandrecordfunction.If


you enable the popup video function, the video is played on the [RealTime
Monitoring]window,cometosetatime,videoboxwouldautomaticallyshutoff.Set
the display time to an integral between5and60. If you enable the video recording
function, the triggering procedure is recorded. Set the record time to an integral
between 10 and 180. (Shouldensurevideoservermaintainnormalconnection.)

? Note: The video linkage function is only available for 5.2.20 and above
professional version, if you need to use, please contact with our commercial
representativeorforsalesupporter.
3.Afterediting,click[OK]tosaveandquit,andtheaddedlinkagesettingwillbe
showninthelinkagesettinglist.
Forexample:IfselectNormalPunchingCardOpenasthetriggercondition,and
theinput point is Door 1, the outputpoint is Lock 1, the action type is Open,the
delayis60s,thenwhenNormalPunchingCardOpenoccursatDoor1,thelinkage
actionofOpenwilloccuratLock1,anddoorwillbeopenfor60s.

? Note:Whenediting,youcannotmodifythedevice,butcanmodifylinkage
settingnameandconfiguration.Whendeletingadevice,itslinkagesettingrecord,if
exist,willbedeleted.
Ifsystemhassetthattheinputpointisaspecificdoororauxiliaryinputpointunder
atrigger condition of a device, it will not allowthe userto add (or edit) alinkage
settingrecordwherethedeviceandtriggerconditionarethesamebuttheinputpoint
isAny.
Onthecontrary,ifthedeviceandtriggerconditionarethesame,andthesystemhas
linkagesettingrecordwherethetriggerpointisAny,thesystemwillnotpermitthe
usertoadd(oredit)alinkagesettingrecordwheretheinputpointisaspecificdoor
orauxiliaryinput.
In addition, thesystem does not allow thesamelinkage setting at input point and
outputpointinspecifictriggercondition.
Thesamedevicepermitsconsecutivelogical(asmentionedabove) linkagesettings.
VideoLinkageisclassifiedintoHardLinkageandSoftlinkage.HardLinkageis
consistent with the preceding linkage. The system synchronizes the settings
information to the access control panels, and then the access controller (whatever
offline or online) can implement the current linkage settings. Soft linkage is only
applicabletovideolinkage.Afterthesystemacquiresaspecificrealtimeeventfrom
theaccesscontroller,thesoftwarequeriesvideodatainthevideoserver,andthen
playsthevideoonthesoftwarewindow.

45
AccessControlSystemUserManual

6.3.7WiegandCardFormat

Wiegand card format is the card format that can be identified byWiegand reader.
The software is embedded with9Wiegand card formats.You cansettheWiegand
cardformat.

AddingaWiegand cardformat:

1. [ClickAccessControl][DoorSettings][WiegandCardFormat][Add],
andthentheWiegandcardformatsettingwindowisdisplayed.

2. Set the card format, including Wiegand card formatname (norepeat), totalbit,
evenparitybit, oddparitybit,CID(cannotbenull)andcompanycode.
3.Click[OK]tocompleteandexitthesettings,andthenthenewlyaddedWiegand
cardformatnameisdisplayedinthelist.

46
6. AccessControlManagement

6.4AccessLevels
Accesslevelsmeansinaspecifictimeperiod,whichdoorordoorcombinationcan
beopenedthroughverification.However,thepersonnelcombinationthatcanopen
these doors via verification shall be set in personnel access levels settings. Please
referto 6.5 PersonnelAccessLevelssettings.
Addaccesslevels:
1. Click [Access Control System] [Access levels] [Add] to enter Add access
levelseditinterface

2.Setparameters:accesslevelname(norepetition),accesscontroltimezones,door
combination
3. Click [OK]to complete setting and quit, andadded access levels will appear in
thelist.

? Note:
(1)Selectthedoorsintheaccesslevelsasmultichoice,soyoucanselectdifferent
doorsindifferentcontrolpanels
(2)Twolevelswiththesametimezoneanddoorcombinationarenotallowedinthesystem.

47
AccessControlSystemUserManual

6.5PersonnelAccessLevels
Toassignaccesslevelsforthepersonneltoverifyandgetthrough,personnelaccess
levelshavetwodisplaymodes:
ShowbyAccess levels:Add/deletepersonnelforspecificaccesslevels.
Showbypersonnel:Addspecifiedpersonnelintospecifiedaccesslevels,ordelete
specifiedpersonnelfromspecifiedaccesslevels
1.Add/deletepersonneltolevels:
(1)Click[AccessControlSystem][Personnelaccesslevels][ShownbyAccess
levels], and click a level,then personnel having opening levels in the access level
willbeshowninthelistontheright
(2) Click [Add personnel] to openthe Add personnelinterface,select personnelto
createthelistontheright,andclick[OK]tocompleteadding,andaddedpersonnel
willappearinthelistontheright
(3) Select personnel, click [Delete from access level] to deletethe personnel from
theaccesslevel.

? Note: Whenaddingpersonnel,ifselectedpersonnelexistinthecurrentaccess
level,thesystemcannotaddagain.
2.Editaccesslevelforpersonnel:
(1) Click [Access Control System][Personnel accesslevel settings][Shown by
personnel] interface, click a person, and the list on the right will show the access
leveloftheperson
(2)Click[Addaccesslevel]toopeneditinterface,selectaccesslevel,click[OK]to
completeediting,andthelistontherightwillshowtheaccesslevel
(3)Selectaccesslevelandclick[Deleteaccesslevel]tothepersonfrom theaccesslevel.

6.6RealtimeMonitoring
Monitorthestatusesandrealtimeeventsofdoorsundertheaccesscontrolpanelsin
the system inrealtime, including normal events andexceptionalevents(including
alarmevents).

48
6. AccessControlManagement

1.Monitoringall:
The system will, by default, show the monitoring of all doors under the control
panels within the current users access level. The user can monitor one (or more)
door(s)by[Area],[Controlpanel]or[Door].
Remote Opening/Closing: involved in control on single door and all doors. In
singledoorcontrol,movethecursortothedooricon,click[Remoteopening/closing]
in the displayed dialog box. In all current doors control, directly click [Close all
currentdoors]inthemaininterfacetofulfilltheoperation.
Forremoteunlock, you canselfdefinetheopentimedurationinthedisplayeddialog
box (the default unlock duration is 15s) or you can select [Enable Intraday Normal
OpenTimeZone],andthentheintradaynormalopentimesegmentsetbythesystem
becomeseffectivefurthermore,youcansetthedoorstatustonormalopen,andthenthe
doorisopenwithouttimerestriction(thatis,thedooris24houropen).

Ifyouwanttoclosethedoor,youmustselect[DisableIntradayNormalOpenTime
Zone] firstly topreventdooropeningfromothernormalopentimesegmentenabling,
andthenselect [RemoteClosing]tofulfilltheoperation.

? Note:Iftheoperationsofremoteopening/closingalwaysreturnfailure,please
checkthecurrentlistofdevices.Iftherearetoomanyofflinedevices,youneedto
checkthenetworktoensuretheoperationproceednormally.
Cancel the alarm: Once an alarming door is displayed on the interface, you can
hearthealarmsound.Alarmcancellationisinvolvedincontrolonsingledoorand
all doors. In singledoor control, move the cursortothe icon ofthe door,andthen
click [Cancel the alarm] in the displayed dialog box. In alldoor control, directly
click [Cancel allalarms]. If the alarm iscancelledsuccessfully,thealarmsoundis
disappearedautomatically.
? Note: If the system reports that alarm cancellation fails, check whether too
many devices inthe devicelistare disconnected. If yes, check the networkstatus
otherwise,youcannotoperate onthesystem.
UponDoorStatusMonitoring,ifthenumberofdoorsonthecurrentinterface<=64,

49
AccessControlSystemUserManual

the system will, by default, show the doors in pictures to monitor door statuses.
Oncethenumberexceeds64,thesystemwillautomaticallylistthedoors.
Whenputtingthecursoronadoor,itwillshowrelevantparametersandoperations:
device, door number, door name, door status, relay status and alarmtype, remote
opening,remoteclosing and cancelalarm.

Iconsindifferentcolorsrepresentstatusesasfollows:

Icon

Door
Online
sensor Doorsensor Onlinestatus:
status:Door
unset unset Doorclosed
closed
Device
Status DoorOffline Relay Relayopened Relayopened
banned Relayclosed
closed
/Without /Withoutrelay
/Without
/Without relaystatus status
relaystatus
relaystatus

Icon

Online Onlinestatus: Door Dooropening Dooropening


Dooropened Dooropened timeout timeout
status:Door opened
alarming
Status opened Relayopened alarming Relayclosed Relayopened
Relay
Relayclosed /Withoutrelay Relay /Without /Withoutrelay
opened
status closed relaystatus status
/Without

50
6. AccessControlManagement

relaystatus

Icon

Door
Doorclosed Doorclosed sensor Doorsensor
alarming alarming unset unset
Status Relayclosed Relayopened Door Door
alarming alarming
/Without /Withoutrelay
relaystatus status Relay Relayopened
closed

? Note:Withoutrelaystatus,denotesthatthecurrentfirmwaredoesnotsupport
"detectrelaystatus"function.
Personnelphotodisplay:
If the RealTime Monitoring is involved in a person, the monitor displays the
personalphoto(ifnophotoisregistered,Nophotodisplays).Theeventname,time
and namearedisplayedonthe personal photo.
Eventmonitoring:
The system automatically acquires monitored device event records, including
normalaccesscontroleventsandexceptionalaccesscontrolevents(includingalarm
events). Alarm events appear in red. Exceptional events excluding alarm events
appearinorange.Normaleventsappearingreen.

Onthecurrenteventmonitoringinterface,therecentrecordsareonthetop,enabling

51
AccessControlSystemUserManual

theusertoseewithoutdraggingthescrollbar.Meanwhile,theinterfacewillshowup
tosome50records.
2.Alarm Events:
Actually,AlarmEventsindicatesmonitoringthealarmstatusofthedoors.Ifadoor
sendsanalarm,andthepagewillalwaysdisplaythealarmstatus.Adoormayhave
multiple alarm states, which represent different alarm types. In the descending
severityorder,thealarmtypesareasfollows:tamperresistantalarm>intimidation
alarm (password + fingerprint) > intimidation password or finger print alarm >
unexpectedopeningalarm>openingtimeoutalarm.
Note: The alarm type is displayed only when the firmware version of the device
supportsalarmtypedescription.
Notification: Enter the recipient email address (separate multiple addresses with
semicolon()),andthensendalldooralarmrecordsinthealarmeventmonitoring
listtotherecipient.
Cancel alarm: Select the door in alarm status, and then click [Cancel alarm] to
cancelthealarmstatus.
Cancelallalarms: Click[Cancelallalarms] tocancelthealarmstatusofalldoors.
Thealarmeventmonitoringlistisshownbelow:

3.ElectroMap
Before using the electromap,user needstoadd the mapin thesystem first.After
success adding, user can add door, camera, zoomin, zoomout the map (and the
door on the map), etc. If the user changes the position of icon or the map, click
[SavePosition]tosavethecurrentposition,thentheusercanviewthesettingatthe
nexttimeaccess.

52
6. AccessControlManagement

AddMap and DeleteMap: Usercanaddordeletethemapasneeded.


Edit Map: User can change the map name, change map or change the area it
belongsto.
Adjustmap(includesdoor):Usercanaddadoororacameraonthemap,ordelete
an exist one (right click the door icon or camera, and select [Remove Door]or
[camera]),oradjustthemaporpositionofthedoororcameraicon(bydragthedoor
orcameraicon),adjustthesizeofthemap(click[Zoomin]or[Zoomout]orclickon
[FullScreen]).
Realtimedoor status monitoring: Except todisplay theelectromap,the system
can view the realtime event monitoring (same data source with door status
monitoring,includealarmsound,etc.).
Door operation: Move the mouse icon to the door position, the system will
automatically filterthe operation according tothe door statusand display them on
thepopupmenu. Usercanremoteopenorclosethedoor,cancelalarm,andetc.
CameraOperation: Doubleclickthe [cameraicon],can be realtimepreviewvideo
monitorscreen.

?Note: Camerafunctiononly supports5.2.20oraboveversion.


Userrightcontrol:
(1)Inaddingprocess,userneedstoselectthebelongingareaformap.Theareaset
here is relevant to the user management rights, that is, the user can only view or
managethemapunderhisrights.Iftheusermodifythebelongingareaofamap,all
dooronthatmapwillbecleared,andneedtoaddagain.
(2)Whentheadministratoraddanewuser,hecanmanagetheuseroperationrightsbyrole

53
AccessControlSystemUserManual

setting,suchastheoperationof [Savedoorposition],[Zoomin],[Zoomout],etc.

?Notes:
(1)Inmapmodification,theusercanselecttomodifythemapnamebutnotthepath,
onlyneedtocancelthetickbefore[ModifyPath].
(2)Thesystemsupportstoaddmultidooratthesametime.Afterdooradding,user
needstosetthedoorpositiononthemap, andclick[Save]aftersetting.
(3) In doorposition modifying, especially zoom in the map,themargin of upward
and leftward should be smaller than 5 pixels. The system will prompt error if the
marginsmallerthanthisvalue.
(4)Thesystemrecommendaddingmapsizeunder1120pixels*380pixels.Ifthe
multiclientsaccessthesameserver,thedisplayeffectwillbedifferedaccordingto
theresolutionofscreen and the setting ofthebrowser.
Appendixes: RealTime Event Description (the fingerprint events are only
availablefor5.2.20andaboveversion):
1.NormalEvents:
NormalPunchOpen:In[CardOnly]verificationmode,thepersonhasopendoor
permissionpunchthecardandtriggerthisnormaleventofopenthedoor.
Press Fingerprint Open: In [Fingerprint Only] or [Card plus Fingerprint]
verification mode, theperson has the openpermission, press thefingerprint atthe
validtimeperiod, andthedoorisopened,andtriggersthenormalevent.
Card plus Fingerprint Open: In [Card plus Fingerprint] verification mode, the
personhastheopenpermission,punchthecardandpressthefingerprintatthevalid
timeperiod,andthedoorisopened, andtriggersthenormalevent.
ExitbuttonOpen:Userpresstheexitbuttontoopenthedoorwithinthedoorvalid
timezone,andtriggerthisnormalevent.
Triggertheexitbutton(locked):indicatesthenormaleventtriggeredbypressing
theexitbuttonwhentheexitbuttonislocked
Punch during Normal Open Time Zone: At the normally open period (set to
normally open period of a single door or the door open period after the first card
normallyopen),orthroughtheremotenormalopenoperation,thepersonhasopen
door permissionpunch the effective card atthe opened doortotrigger this normal
events.
PressFingerprintduringNormalOpenTimeZone:Atthenormallyopenperiod
(settonormallyopenperiodofasingledoororthedooropenperiodafterthefirst
cardnormally open), or through the remote normal open operation, the person has

54
6. AccessControlManagement

opendoorpermissionpresstheeffectivefingerprintattheopeneddoortotriggerthis
normalevents.
First Card Normal Open (Punch Card): In [Card Only] verification mode, the
personhasfirstcardnormallyopenpermission,punchcardatthesettingfirstcard
normallyopenperiodbutthedoorisnotopened,andtriggerthenormalevent.
FirstCardNormalOpen(PressFingerprint):In[FingerprintOnly]or[Cardplus
Fingerprint]verificationmode,thepersonhasfirstcardnormallyopenpermission,
pressthefingerprintatthesettingfirstcardnormallyopenperiodbutthedoorisnot
opened,andtriggersthenormalevent.
First Card Normal Open (Card plus Fingerprint): In [Card plus Fingerprint]
verification mode, the person has first card normally open permission, punch the
cardandpressthefingerprintatthesettingfirstcardnormallyopenperiodbutthe
doorisnotopened,andtriggersthenormalevent.
NormalOpenTimeZoneOver:Afterthesettingnormalopentimezone,thedoor
willcloseautomatically.Thenormalopentimezoneincludethenormalopentime
zoneindoorsettingandtheselectednormalopentimezoneinfirstcardsetting.
RemoteNormalOpening:Setthedoorstatetonormalopenintheremoteopening
operation,andtriggerthisnormalevent.
Cancel Normal Open: Punch the valid card or use remote opening function to
cancelthecurrentdoornormalopenstate,andtriggersthisevent.
DisableIntradayNormalOpenTimeZone:Indoornormalopenstate,punchthe
effectivecardforfivetimesneartothecardreader(mustbethesameuser),orselect
[DisableIntradayNormalOpenTimeZone]inremoteclosingoperation,andtrigger
thisnormalevent.
EnableIntradayNormalOpenTimeZone:Iftheintradaydoornormalopentime
zoneisdisabled,punchtheeffectivecardforfivetimesneartothecardreader(must
be thesame user), orselect [Enable Intraday Normal OpenTime Zone] inremote
openingoperation,andtriggerthisnormalevent.
MultiCardOpen(PunchingCard):In[CardOnly]verificationmode,multicard
combinationcanbeusedtoopenthedoor.Afterthelastpieceofcardverified,the
systemtriggerthisnormalevent.
MultiCard Open (Press Fingerprint): In [Fingerprint Only] or [Card plus
Fingerprint] verificationmode,multicardcombinationcanbeusedtoopenthedoor.
Afterthelast fingerprintverified,thesystemtriggerthisnormalevent.
MultiCardOpen(CardplusFingerprint):In[CardplusFingerprint]verification
mode,multicardcombinationcanbeusedtoopenthedoor.Afterthelastcardplus
fingerprintverified,thesystemtriggerthisnormalevent.

55
AccessControlSystemUserManual

MultiCard Open (Press Fingerprint): In [Card Only] verification mode,


multicard combination can be used to open the door. After the last fingerprint
verified,thesystemtriggerthisnormalevent.
MultiCard Open (Card plus Fingerprint): In [Card Only] verification mode,
multicard combination can be used to open the door. After the last card plus
fingerprintverified,thesystemtriggerthisnormalevent.
EmergencyPasswordOpen:Thepassword(alsoknownasthesuperpassword)set
forthecurrentdoorcanbeusedfordooropen.Itwilltriggerthisnormaleventafter
theemergency passwordverified.
OpenduringNormalOpenTimeZone:Ifthecurrentdoorissetanormallyopen
period,thedoorwillopenautomaticallyafterthesettingstarttime,andtriggerthis
normalevent.
Linkage Event Triggered: After the system linkage configuration take effect,
triggerthisnormalevent.
CancelAlarm:Whentheusercancelthealarmofthecorrespondingdoor,andthe
operationissuccess,triggerthisnormalevent.
Remote Opening: When the user opens a door from remote and the operation is
successful,itwilltriggerthisnormalevent.
Remote Closing: When the user close a door from remote and the operation is
successful,itwilltriggerthisnormalevent.
Open Auxiliary Output: In linkage action setting, if the user select Auxiliary
Output for Output Point Address, select Open for Action Type, it will trigger this
normaleventwhenthelinkagesettingistakeeffect.
Close Auxiliary Output: In linkage action setting, if the user select Auxiliary
Output for Output Point Address, select Open for Action Type, it will trigger this
normal event when the linkage setting is take effect. And if the user closes the
opened auxiliary output through the [Close Auxiliary Output] operation in [Door
Setting],triggerthisnormaleventtoo.
Door Opened Correctly: When the door sensor detects that the door has been
properlyopened,triggeringthisnormalevent.
Door Closed Correctly: When the door sensor detects that the door has been
properlyclosed,triggeringthisnormalevent.
Auxiliary Input Disconnected: When the auxiliary input point disconnected,
triggerthisnormalevent.
AuxiliaryInputShorted:Whentheauxiliaryinputpointshortcircuit,triggerthis
normalevent.

56
6. AccessControlManagement

DeviceStart:Whenthedevicestarttriggerthisnormalevent,andthiseventcannot
displayontherealtimemonitor,butyoucancheckitintheeventreport.
2.AbnormalEvents
Too Short Punch Interval: When the interval between two card punching is less
thanthesettimeinterval,triggerthisabnormalevent.
Too Short Fingerprint Pressing Interval: When the interval between two card
punchingislessthanthesettimeinterval,triggerthisabnormalevent.
Door Inactive Time Zone (Punch Card): In [Card Only] verification mode, the
userhasthedooropenpermission,punchcardbutnotatthedooreffectiveperiodof
time,andtriggerthisabnormalevent.
Door Inactive Time Zone (Press Fingerprint): The user has the door open
permission, press the fingerprint but not at the door effective period of time, and
triggerthisabnormalevent.
DoorInactiveTime Zone(ExitButton):The userhasthe dooropen permission,
punchcardbutnotattheaccesseffectiveperiodoftime,andtriggerthisabnormal
event.
Illegal Time Zone: The user with the permission of opening the current door,
punchesthecardduringtheinvalidtimezone,andtriggersthisabnormalevent.
Access Denied: The registered card without the access permission of the current
door,punchtoopenthedoor,triggerthisabnormalevent.
AntiPassback:Whentheantipassbacksettingofthesystemtakeseffect,triggers
thisabnormalevent.
Interlock: When the interlocking rules of the system take effect, trigger this
abnormalevent.
MultiCardAuthentication (PunchingCard): Usemulticardcombinationtoopen
the door,the card verificationbefore the lastone(whether verified or not), trigger
thisnormalevent.
MultiCard Authentication (Press Fingerprint): Use multicard combination to
open the door, the fingerprint verification before the last one (whether verified or
not),triggerthisnormalevent.
MultiCardAuthentication (PunchingCard): Usemulticardcombinationtoopen
the door,the card verificationbefore the lastone(whether verified or not), trigger
thisnormalevent.
MultiCard Authentication (Press Fingerprint): In [Fingerprint Only] or [Card
plus Fingerprint] verification mode, use multicard combination to open the door,
thefingerprintverificationbeforethelastone(whetherverifiedornot),triggerthis

57
AccessControlSystemUserManual

normalevent.
Unregistered Card: Refers to the current card is not registered in the system,
triggerthisabnormalevent.
UnregisteredFingerprint:Referstothecurrentfingerprintisnotregisteredoritis
registeredbutnot synchronizedwiththe system,triggerthisabnormalevent.
Opening Timeout: The door sensor detect that it is expired the delay time after
opened,ifnotclosethedoor,triggerthisabnormalevent.
CardExpired:Thepersonwiththedooraccesspermission,punchcardtoopenthe
dooraftertheeffectivetimeoftheaccesscontrol,cannotbe verifiedandwilltrigger
thisabnormalevent.
FingerprintExpired:Thepersonwiththedooraccesspermission,pressfingerprint
toopenthedooraftertheeffectivetimeoftheaccesscontrol,cannotbeverifiedand
willtriggerthisabnormalevent.
PasswordError:Usecardpluspassword,duresspasswordoremergencypassword
toopenthedoor,triggerthiseventifthepasswordiswrong.
Failedto Closeduring NormalOpenTime Zone:The currentdoor isinnormal
openstate,buttheusercannotclosethedoorthrough[RemoteClosing]operation,
andtriggerthisabnormalevent.
3.EmergencyEvents
Duress Password Open: Use the duress password of current door verified and
triggeredalarmevent.
Opened Accidentally: Except all the normal events (normal events such as user
with door open permission to punch card and openthe door, password open door,
openthedooratnormallyopenperiod,remotedooropen,thelinkagetriggereddoor
open), the door sensor detect the door is opened, that is the door is unexpectedly
opened.
DuressFingerprintOpen:Usetheduressfingerprintofcurrentdoorverifiedand
triggeredalarmevent.
Dooropen times out:indicates the alarm event triggered whenthelocked dooris
notlockedaftertimeout

58
6. AccessControlManagement

6.7AccessControlReports
Includes [All access control events], [Access control exception events] and
[Personnelaccesslevels]reports.YoucanselectExportallandExportafterquery.
Theusercangeneratestatisticsofrelevantdevicedatafromaccesscontrolreports,
includingcardverificationinformation,dooroperationinformation,andnormalcard
punchinginformation,etc.
About the Normal event and abnormal event please refer to 6.6 Realtime
Monitoring fordetails.
Verify mode: Only Card, Only Password, Only Fingerprint, Card plus Password,
CardplusFingerprint,CardorFingerprint andetc.

? Note:Onlyeventrecordsgeneratedwhentheuserusesemergencypassword
toopendoorswillinclude[Onlypassword]verificationmode.
] All accesscontrolevents
Becausethedatasizeofaccesscontroleventrecordsislarge,youcanviewaccess
controleventsasspecifiedconditionwhenquerying.Bydefault,thesystemshows
thereportofallaccesscontrolevents:

Clearalleventrecords:
Click[Clearalleventrecords]toopenaprompt.Click[OK]toclearrecords.

59
AccessControlSystemUserManual

] Accesscontrolexceptionevents
Youcanviewaccesscontrolexceptioneventsinspecifiedcondition.Theoptionsare
sameasthoseof[Allaccesscontrolevents].

Clear accesscontrol exceptioneventrecords: Clear the list ofall access control


exceptionevents.
] Personnelaccesslevel
Viewallaccesslevelsaccordingtoaccesslevelgroup,doororpersonnel.Selectthe
query mode, and the condition in the left data list, the corresponding result will
displayontherightdatalist.
Forexample,selectByAccessLevel,thedatalistontheleftsideshowallaccess
levels,selectaaccesslevel,thepersonnelunderthisaccesslevelwilldisplayonthe
rightdatalist.

60
6. AccessControlManagement

6.8AccessControlParameterSettings
Setsomeofthesoftwarefunctions,including[Setthetimeforobtainingnewevents],
[Configure real time monitoring], [Set retry interval after the device is offline],
[Configurethe Mailbox Server]. After thesettingsare completed, manually restart
the software service through the service console otherwise, the setting will not
becomeeffective.

Setthetimeforobtainingnewevents:

Selectintervalfornewevents:

Settherecorddownloadintervaluponthesettingbecomeseffective.

Setthetimeforobtainingnewevents:
Thesystemdownloadstherecordatthespecifiedtimepoints automatically.

Configurerealtimemonitoring:
If select [Yes], when the software service is enabled, the software automatically
acquirestherealtimeeventrecordfromthedevicewhetherthebrowserisopenfor
realtimemonitoring ornot, andthe software savestherecordinthedatabase.
Ifselect[No],onlywhenthebrowserisopenandmonitorsinrealtime,thesoftware
canacquiretherealtimeeventrecordfromthedevice.

Setretryintervalafterthedeviceisoffline:

61
AccessControlSystemUserManual

Thesoftwareattemptstoreconnectthedisconnecteddevicesatadefaultintervalof
60s.Ifyouwanttoreconnectthedevicesfaster,youcanadvisablymodifythevalue.
Thesmallervalueoccupiesmoreresourcesoftheserver.

ConfiguretheMailboxServer:
Set the information of the mail server sending emails. The email addresses
receivingemailsshouldbesetinlinkagesettings.

? Note:Inmailserversetting,theemailaddressandmailserver(SMTP)must
havethesamedomainname.Forexample,iftheemailaddressistest@gmail.com,
themailserveraddressmustbe smtp.gmail.com.

62
7. Video System (For ProfessionalVersion5.2.20orabove)

7.Video System(ForProfessionalVersion5.2.20orabove)
The system provide video linkage function,to managetheVideo Server, viewthe
RealRime Video, and query the VideoRecord, popup the RealTime Video when
thelinkageeventshappened.
Whenusingthevideolinkagefunction,theuserneedtoaddVideoServerfirstly,for
detailedoperation,pleasereferto5.2.2AddNetworkVideoRecorder.Afteradding,
the user fill in the video linkage corresponding setting, can use video linkage
function. Thedetailedsetting,pleaserefer to 7.2VideoLinkageSettings.

? Note: The current software version only supports ZKiVision IPC and Hikvision
embeddednetworkDVR.

7.1TimeServerSettings
The TimeServer function is used to ensure time synchronization between the video
serverandthesoftwareserver.
The computer where the software is installed has the TimeServer function. The
functionbecomesavailableonlyafterthefollowingsettingsarecompleted:
1. StartthesystemserviceWindowsTimeontheserverwherethesoftwareisinstalled,
andsetthestartuptypetoauto.

2.SettingNTPfunctionofVideoServer.ItcanbedirectlysetuponVideoServer.,
also through browser visit Video Server, at Web interface to set. There is NTP
functionofVideoServerinWebfollowing:

63
AccessControlSystemUserManual

In the proceeding figure, Server Address indicates the IP address of the software
server.ThedefaultNTPportnumberis123,whichdoesnotneedtobemodified.It
is recommended thatthetime correction interval be setto asmall value (1 minute
for example) to ensure precise time synchronization between the video server and
softwareserver.Afterparametersareset,restartthevideoserver.
HiKVision need to set the NTP function, ZKiVision IPC does not need to set the
NTPfunction.

64
7. Video System (For ProfessionalVersion5.2.20orabove)

7.2VideoLinkageSettings
Bindthevideochannelandthedoorforwhichassociationneedstobeset.Youcan
setthebindingbetweenthedoorreaderandthevideochannelonthedooreditpage.
Fordetails,see6.3.1DoorManagement.Alternatively,bindthedoorreaderandthe
videochannelin[ChannelManagement]. Theoperationflowofbindingthevideo
channelandthedoorreaderonthe[ChannelManagement]pageisasfollows:

Themethodofsettingvideoassociationisthesameasthatofsettingdoorcontroller
association. Set the trigger condition and video input position, and select relevant
optionsontheassociationsetuppage.Fordetails,see 6.3.6LinkageSetting.

65
AccessControlSystemUserManual

7.3 VideoView
Click[Video] menu[VideoView],theinterfacesdisplayedasbelow:

Select different video servers from the [Video Server] dropdown list, and click a
videochannelforrealtimepreview,orclickthebuttonsimilartothemeshshapein
thevideoframefor synchronouspreviewofmultiplechannels.

?Note: The styleofthe preview display varieswiththevideodevicebrand.The


followingusestheHIKVISIONvideodeviceasanexampletodescribethe iconson
the videopreviewpage.

Doubleclickpreviewframeshavechangeoverfullscreenfunction.

Click to stop previewingallvideos.

Click tocapturethecurrent picture.

Click tostartvideorecordingonallchannelsofthecurrentvideoserver.

Click tostopvideorecordingonallchannelsofthecurrentvideoserver.

Then the video files of all channels are stored in: C:\Program
Data\Web\RecordFiles\ oftheclient.

Click tomovepreviewedpicturesupordown.

Click toturnon,turnoff,oradjustthesound.

66
7. Video System (For Professional Version5.2.20 orabove)

7.4 VideoRecordedPlayback
VideoRecordedPlaybackmainlydisplayedeventsrecord(includevideolinkage
record).

Clickthesmallcameraiconontheleft toplay backthe recorded video.

Rightclick the small camera icon and choose Export from the video server
from the shortcut menu, toexportthe video from the video serverto a client. The
exportedvideofile is storedin C:\OCXDownloadFiles bydefault.
After realtime monitoring is enabled or [Set up whether opening realtime
monitoring] is set to Yes on the [Access Control parameters] page, the system
automatically start video recording and capture when a video association event
occurs. The video file is saved to the preset path of the server. After the video
recordingends,thevideofileiconandcapturefileiconaboutthisvideoeventsuch
as and aredisplayedinthereport.
Click todownloadthefileonthe serverlocally.

67
AccessControlSystemUserManual

7.5 VideoParameterSettings
Youcansetthesizeofthevideopopupboxandprocessingmodewhenthespaceof
theharddisk wherethecurrentvideofileissaved isinsufficient.

l Videopopupwindowsize
Setup popup boxsizeof [RealtimeMonitoring] orVideoRecordedPlayback of
[AccessControlReports].

l Setwhetherto continuevideo recording


Thesoftwarecheckstheavailablespaceoftheharddiskwherethecurrentvideofile
is saved when recording videos. If the available space is less than 1 GB, you can
select automatic overwriting or no recording. If you select automatic overwriting,
thesoftwaredeletestheearliest100videofilesandcontinuesvideorecording.Ifyou
selectnorecording,videorecordingisstopped.

68
7. Video System (For Professional Version5.2.20 orabove)

7.6ExclusionandSolutionsofException
1. Clientbrowsercannotplaybackvideo,previeworRealTime Monitoringpage
hasnovideopopup:
Firstly,makesuretouseIE8andabovebrowser,clientand VideoServer onthe
samenetworksegmentandthevideoAxtiveXinstallationissuccessful.Ifthe
ActiveXinstallationfails, aboveall,uninstallthevideoActiveXthatwereoriginally
installed,runthe"regsvr32uNetVideoActiveX23.ocx"command,andtheninthe
browser,setalltheoptionsin"Tools>InternetOptions >Security >Custom
Level"ontheActiveXto"EnableorPrompt",reopenthebrowser,reloginscreen
andopenthevideopreviewpage,runthebutton"alladditemsofthesite".

2. Inthe EMap,novideopopupafteryouclickthesmallcameraicon:
Aboveall,makesuretouseIE8andabovebrowser,clientand VideoServer onthe
samenetworksegmentandthevideoAxtiveXinstallationissuccessful. Also,view
whetherthebrowserispreventingthetemporarywindowpopsup,ifso,changedto
allowwindowpopsuptothesite.

3. Videolinkageistriggered,thevideoserverdoesnothavevideoorsizeofthe
videofilethattheclient downloadsfromtheVideoServer is0kb:
First,makesurethatthesoftwareserverhasset TimeServer(keeptheWindowstime
serviceandhassettheNTPfunctionofthevideoserver),itisrecommendedtoset
thetimeintervalofthevideoserversmallertoensureaccuratesynchronization
softwareserverandvideoservertime,soastokeepthetimeconsistent between
softwareserverandcontrollers.You'dbettersetLinkageRecordingTimemorethan
5seconds,toavoidexecutingvideolinkagecommandsdelay,whichmayleadtothe
downloaded0kbvideofile.

69
AccessControlSystemUserManual

8. ElevatorControlSystem
The ElevatorControlSystem is mainly usedto setdevice parameters(such asthe
swiping interval for taking elevators and elevator key drive duration), manage
personnel'srightstofloorsandelevatorcontroltime,andsuperviseelevatorcontrol
events.Youcansetregisteredusers'rightstofloors.Onlyauthorizeduserscanreach
certainfloorswithinaperiodoftimeafter beingauthenticated.

8.1AddingElevatorEquipment
Choose [Add] to add device. At Device Type Selection interface, select to Add
Elevator Control Panel. The following interface appears. Click [Next] and set the
deviceinformation.

8.2Elevator ParameterSettings
ChooseAccessControlSystemFloorSettings,clickafloorNo.tosetthe
swiping interval for taking elevators, elevator key drive duration, floor available
time,andverificationmode.

70
8. ElevatorControlSystem

71
AccessControlSystemUserManual

8.3ElevatorTimeZoneManagement
ChooseAccessControlSystemAccessControlTimeZone , toviewexisting
elevator control timeperiods. The operations of adding,editing,and deleting time
periodsaresupported.

ClickAccessControlSystemAccessControlTimeZoneAdd,then
youcansee the newelevator TimeZone.

72
8. ElevatorControlSystem

8.4ElevatorLevelManagement
Choose ElevatorControlElevatorLevel, toviewexistingelevatorcontrol
rightsgroups.Theoperationsofadding,editing,anddeletingelevatorcontrolrights
groupsaresupported.

ElevatorControl
Click ElevatorLevel
Add
,thenyoucanseethedata
asshownbelow.

73
AccessControlSystemUserManual

8.5PersonalElevatorLevelsDistribution
ChooseElevatorControlSystem PersonalElevatorLevelsShowby
AccessLevels,toviewallelevatorcontrolrightsgroups.Selectarightsgroupto
viewallmembersinthegroup,andaddordeletememberstoorfromthegroup.

ClickElevator Control SystemPersonal Elevator LevelsShow by


Personal,clickShowbyPersonal, toviewallpersonnel.Selectanemployeeto
viewtherightsgrouptowhichtheemployeebelongsandaddordeletetheemployee
toorfromagroup.

74
8. ElevatorControlSystem

8.6Personneladding
ClickPersonnel PersonnelAdd,youcanassignpersonal elevator
levelasshowninfigure.

8.7 Description (realtime surveillance and report of the


elevatorcontrolsystem)
The elevator controlleris atype of access controller. Itsrealtime surveillance and
the realtime surveillance of the access control system are both set in RealTime
MonitoringdisplayedwhenyouchooseAccessControl.Foranelevatorcontroller,
Normal Punch Open indicates Floor Button Release and Remote Opening
indicate RemoteUnlockFloorButton.
In summary, a door in the elevator controller corresponding to the floor key and
openingadoormeans releasing afloorkey.

75
AccessControlSystemUserManual

9. VisitorSystem
The visitor system is a webbased management system that implements entry
registration,exitregistration,snapshotcapture,visitorquantitystatistics,and reservation
management, as well as shares information among registration sites. It is highly
integratedwiththeaccesscontrolsystemandelevatorcontrolsystemandgenerallyused
at reception desks and gates of enterprises, to understand and manage visitors.

9.1List
The List tabpagecovers AddEntry/Exitand AddReason.Definerelevantinformation
based on the requirements of a site, for collecting statistics and querying visitor
information.Set AddEntry/Exit and AddReason beforeregisteringvisitorinformation
onthe VisitorManage tabpage.Otherwise,theregistrationfunctionisunavailable.

Choose Visitor System List and click Add Entry/Exit and Add Reason
separately onthelefttocompletethesettings,as showninthefollowingfigure.

76
9. VisitorSystem

9.2ReservationManagement
Make recent visit plans in advance for registered users in the system, enter visitor
information into the system, and summarize all appointmentbased visit plans to the
registrysothatpersonnelatthevisitorregistrationsitestimely understandinformation
aboutvisitorstocomeandmakereceptionarrangements.
Choose VisitorSystem ReservationManage,asshowninthefollowingfigure.

RegistereduserslogintothesystemandclickReservationLogin ontheloginpage.
UsernameisthepersonnelNo.andPasswordisthereservationpasswordsetafter
youchoosePersonnel PersonnelProfile.Registereduserscanmodify only their
ownreservationinformation.Seethefollowingfigures.

77
AccessControlSystemUserManual

9.3VisitorManagement
ChooseVisitorSystem VisitorManage,asshowninthefollowingfigure.

VisitorManagecoversEnrollvisitorandExitvisitor.ClickEnrollvisitorwhena
visitorcomestohaveavisitandclickExitvisitorwhenthevisitorexits.Bothcard
registrationandonsitesnapshotcapturearesupportedduringregistration.
Choose Visitor System Visitor Manage Enroll visitor to access the entry
registrationpage,asshowninthefollowingfigure.

78
9. VisitorSystem

Choose Visitor System Visitor Manage Exit visitor to access the exit
registrationpage,asshowninthefollowingfigure.

Thevisitorsystemishighlyintegratedwiththeaccesscontrolsystemandelevator
control system. Door access rights must be granted to visitors. To grant rights to
visitors,grantsomerightstovisitorsintherightsgroupoftheaccesscontrolsystem
or elevator control system, and then grant specific rights to the visitors in Enroll
visitor,asshowninthefollowingfigure.

79
AccessControlSystemUserManual

?Note:CompletethefollowingsettingsbeforeusingtheUSBcamerabasedcapture
function:RightclickCaptureinthecaptureframeandchooseGlobalSettingsfrom
theshortcutmenu.OntheStoragetabpage,clickLocalStorageSettingsbySiteto
addawebsiteaddress.Add 127.0.0.1 ifthecomputerisaserver,andaddtheIPaddress
of the server such as192.168.8.12if the computer is a client. Setthe website to be
allowed onthe Camera and Mic andPlaybacktab pages. The settings need to be
completed only onceaslongashistoryrecordsofthebrowserarenotdeleted. Ifthe
camera does not capture any pictures, check whether the settings are correct and
whetherthecameraindicatorison,closeandthenopenthebrowseragain.
?Note: Thecameracanbeloadedand invokedonlybyonepageatatime.

80
9. VisitorSystem

9.4VisitorHistory
The visitor history records means operation logs when visitors are registered. The
entryregistrationandexitregistrationcompriseonecompleterecord.Youcanclick
therecordforview.
Choose VisitorSystem VisitorHistory,asshowninthefollowingfigure.

Click the link in the Visitor column or Details to view details, as shown in the
followingfigure.

81
AccessControlSystemUserManual

10.SystemSettings
System settings primarily include assigning system users (such as company
management personnel, registrar,access control administrator) and configuring the
roles of corresponding modules, managing database,suchas backup,initialization,
andsettingsystemparametersandoperationlogs,etc.

10.1UserManagement
1.Rolemanagement:
Duringdailyuse,thesuperuserneedstoassignnewusershavingdifferentlevels.To
avoidindividualsettingforeachuser,roleshavingcertainlevelscanbesetinrole
management, and then be assigned to specified users, including the levels set for
sevenmajorfunctionalmodulesofpersonnel,device,accesscontrol,videosystem,
elevatorcontrolsystemandsystemsetting.Thesystemsdefaultsuperuserhasall
levels,andcancreatenewusersandsetcorrespondinglevelsasrequired.
Rolesetting steps:
(1)Theelevatorcontrollercanbedirectlyadded,theprocessisthesameasadding
controller.

(2) Set role name, select your desired role setting item, and tick levels to be
configuredforusersofdifferentlevels
(3) After setting, click [OK] to saveandreturnto the list, and addedrolesettings

82
10. System Settings

willbeshowninthelist.
2.Usermanagement:
Addnewuserstothesystem,andassignuserroles(levels).
Adduser:
1.Click[Add],enternewuserinformation,whereitemswith[*]aremandatory.The
parametersareasfollows:

Username: Notmorethan30characters,onlyusingletters,numbersorcharacters
Password: The length must be more than 4 digits and less than 18 digits. The
defaultpasswordis111111
Authorize Department: If you select no department, you will possess all
departmentrightsbydefault
AuthorizeArea: Ifyouselectnoarea,youwillpossessallarearightsbydefault
Enter FirstName, LastName and EmailAddress
StaffStatus:Indicatesifthisusercanaccesstheadministratorsite
Superuserstatus:Designates thatthis user has all permissionswithoutexplicitly
assigningthem.Tickittobeasuperuserwithoutselectingarole
Select Role: Nonsuper user needs to select a role. By selecting a preset role
configuration,thisuserwillhavethelevelsconfiguredfortherole.
FingerprintRegistration: Enrolltheuserfingerprintorduressfingerprint.Theuser
can login the system by pressing the enrolled fingerprint. If the user presses the

83
AccessControlSystemUserManual

duressfingerprint,itwilltriggerthealarmandsendthesignaltothe system.
2.Afterediting,click[OK]tocompleteuseradding,andtheuserwillbeshownin
thelist.
Tomodifyexistinguser,click[Edit]behindtheusername,andentereditinterface.
Aftermodification,click[OK]tosaveandreturn.

10.2DatabaseManagement
The homepage of the system shows database backup history. The system allows
databasebackup,restorationandinitialization.
1.Databasebackuppathconfiguration:
Select [Database backup path configuration] in the [Server Controller] operation
menu,theeditinterfaceappears.
Click[Browse]toselectthebackuppath,click[Save]tosavetheselectionandquit.

? Note:
(1)Insoftwareinstallationprocess,itwillprompttosetthedatabasebackuppath.If
youhaventsetthebackuppath,theoperationofbackupdatabasecantbeexecuted
(Theserverforothercomputertoaccess,needtosetthebackuppathintheserver
firstly).
(2)Proposalthatthedatabasebackuppathandthepresentsysteminstalledpathnot
be under the same disk. Dont set the path to the root of a disk, and no blanket
permitted.
2.Backupdatabase:
Periodicallybackupthesystemsdatabasetoensuredatasecurity.Tousethebacked
updata,justrestorethedata.
(1)Click[Backupdatabase]toenterthebackupinterface
(2) Select the operation: backup now, scheduled backup and cancel scheduled
backup.Scheduledbackupcansetbackupeveryseveraldayssinceastarttime
(3)Click[OK],thesystemwillopenthedatabasebackuppathprompt.ForBackup
now,itwillreturnafterbackup.Forscheduledbackup,itwillbackupasscheduled.

84
10. System Settings

?Note:
(1) After database backing up, the value under Whether backup successful will
change to Yes or No. Yes indicates database backing up successfully,
otherwise,thebackupoperationisfailed.
(2) We recommended backing up the database after you create the personnel file,
deviceinformationorpartofaccesscontrollevelsettings.
(3)ThesystemnotsupporttobackupOracledatabase,ifyouneedtobackup,please
usesthespecificOraclebackuptools.
3.RestoreDatabase
Select[RestoreDatabase]inthe[ServerController]operationmenu,thefollowing
interfaceappears.
Click [Browse] to select a successfully backed up database from the backup
databaselist,click[Start]beginthedatabaserestoration.

?Note:
(1)Dontcloseanycommandwindowpromptduringthedatabaserestoreprocess.
(2)Onthesameserver,pleasedontplanmultiplescheduledbackuptoavoidadding
totheserverload.
4.Initializedatabase:
Initializedatabaseistorestoredatatosysteminitializationstatus.Initializeddatain
thedatabasewillbedeleted.Pleaseoperatewithcare.
Click[Initializedatabase]toentereditinterface,selectoneorseveraldatasheetsto
initialize,andclick[OK]tocompleteinitializationandreturn.

85
AccessControlSystemUserManual

Forexample:
Selecttoinitializeaccesslevel:Afterselection,itwillinitializeaccesscontroltime
periods,accesscontrolholidaysandaccesslevels.Allcontentsonthesethreepages
willrestoreinitialstatuses
Select to initialize door settings: After selection, it will initialize all interlock
settings, antipassback settings, linkage settings, firstcard opening settings, and
multicardopeningsettings(includingpersonnelgroupofmulticardverification)
Selecttoinitializeevents:Afterselection,itwillinitializeallrealtimemonitoring
records
Selecttoinitializeaccesscontrol:Afterselection,itwillinitializeallsettingsand
informationintheaccesscontrolsystem,includingtheabovethreeitems,andonly
reservesystemdefaultsettings
Selecttoinitializedevices: Afterselection,itwillinitializealldeviceinformationin
the system (including access control). If the device is an access control panel,
correspondingdeviceparametersanddoorinformationwillbedeleted.

? Note:Ifthedeviceisstillinnormaluse,pleaseinitializedatabasecautiously,
86
10. System Settings

especially when involving access levelrelated departments and personnel, access


levels,doorsettings,areas,devices,usersandroles.Itisrecommendedthatifthere
are still devices in use after database initialization, the user shall [Synchronize all
data]forthesettingtoavoidunexpectederrors.

10.3SystemParameters
Thesystemhomepageshowsthesystemparameterlist:Parametername,Parameter
value,Description,andRelatedoperation.

Dataformat: Setthedataformatdisplayedonthesoftware.

10.4LogRecords
The default homepage of system log records shows log records of all operations.
Sincelargedatasize,youcanusequeryfunctiontosearchdesiredlogrecords.For
details,see Appendix1CommonOperation.

87
11. Appendices

11.Appendices
Appendix1CommonOperation
1.Personnelselection
Inthissystem,thisdialogboxisusedforallmodulesusingpersonnelselection:

Youcansearchpersonnelintwoways:
1)Searchbydepartment.Tickthecheckboxbeforeadepartmentinthedepartment
list of the pulldown menu to select all personnel of the department. If [Select all
personnel under the department] is ticked, all personnel in the department will be
selectedandshowninthelistboxofthecurrentlyselectedpersonnel
2) Search by personnel number/name. Enter the name or employee number of the
persontobeselectedinthequerybox,andclickquerytoshowtheeligiblepersonin
thelistbox.
Whenpersonnelareselectedintothelistbox,ifitisrequiredtodeleteoneormore
persons, just cancel the tick of the check box before the personnel. To select or
unselectallpersonnelinthelist,clicktheSelectallcheckboxunderthelist.
Tocancelallpersonnelforreselection,clickClear.
2.Selectdate

88
10.Appendices

Clickthepulldownmenutoselectdate:

Click on year to activate the scroll button for year selection, and click or
buttontoselectanearlieroralateryear.Click or buttontoselectanearlier
oralatermonth,andclickthedesireddate.
3.Import(takingimportingpersonneltableasanexample):
If there is an electronic personnel file, which may be the information of the
personneloraccesscontrol,attendanceorhumanresourcessystemofanotherbrand,
youcanimportitintothissystemthroughthe[Import]function.
(1)Click[Import]toshowtheimporteditinterface:

89
AccessControlSystemUserManual

Descriptionofitems:
Selectimporttable:Currentlythesystemsupportstheimportofdepartmenttable
andpersonneltable
Importfile:Click[Browse]toselectthefiletobeimported
Fileformat: Selecttheformatofthefiletobeimported
Delimiter:Theuserselectfromsmartsearchorothers,suchascomma,semicolon
orblank
Title: Select and set whether or not the original file contains a title. If so, enter
whichrowthetitleisin
Startrow:Therowfromwhichimportingstarts(namely,whichrowoftheoriginal
filethedatainthefirstrowisin)
File code: Select the code that the original file uses, being Simplified Chinese,
TraditionalChineseor utf8
Data error processing way: Select skip the erroneous row, and continue to
import,orinterruptimportandclearimportedentries

90
10.Appendices

Associated entry processing: Select auto add to associate table or skip the
currententrywithoutaddingassociatedentry.
(2)Click[Browse]toselectthefiletobeimported
(3)Click[Open] button,andthefileformatwillbeautomaticallyshown.Determine
delimiter,title,startrow and file code, and click [Upload]todisplaytheuploaded
fileitems.
(4)Inthetable[correspondencebetweenentriesandtablefields],[fileheader]isan
itemrowintheoriginalfile,[filerecord]isadatarowintheoriginalfile,[tablefield]
is an item in the current system. Select corresponding fields in the system from
pulldownmenus,andunwanteddatacanbeunchecked.
(5)Selectdataerrorprocessingwayandassociatedentryprocessing,click[Import],
and the system will automatically start importing data. When the system prompts
that data import is successful, the newly imported data will be shown in the
personnellist.

? Note:
(1) When importing department table, repeated numbers do not affect import, and
canbemodifiedmanually
(2) When importing personnel table, if there is no personnel number or personnel
numberis0,theimportoperationcantexecute.Ifyouneedimportthepersonnel
gender, please use M represent male and F represent female, then execute
importoperation.
4.Exportdata(takingexportingpersonnellistasanexample):
(1)Click[export]toshowtheeditinterface
Whenthedatasizeislarge,itisrecommendedtoselect[Selectnumberofentriesto
export]toexpediteexportandreducesystemload.
(2)Selecttheformatofexportedfile:IfPDFformatisselectedtherewillbenofile
codeoption(namely,nodifferentiationbetweenSimplifiedandTraditionalChinese).
Click[Export]todirectlyshowtheexportedfile.
IfTXTorCSVformatisselected,thenfilecodesincludeSimplifiedandTraditional
Chinese, but Traditional Chinese code can be completely exported only in the
operatingsysteminTraditionalChinese. ThesystempromptsOpenorSave:
Select [Open] to directly show the list.Select [Save] to open the [Save as] dialog
box. Determine file name and save type, and select save path. Select [Cancel] to
return.

91
AccessControlSystemUserManual

(3)Returntotheinitialeditinterface,andclick[Return]toreturntothepersonnel
interface.

? Note:
(1) When importing department table, repeated numbers do not affect import, and
canbemodifiedmanually
(2)Exportedtableisthelistcurrentlyshown,beingthelistofqueriedordisplayed
result
(3)Upto10,000latestrecordscanbeexported.
5.Viewlogrecords(takingpersonnellogasanexample):
(1)Clicklogrecordstoshowthefollowing:

(2) Enter query condition, click [query] to show thelist, click [Clear], clear query
condition,and returntotheinitialinterface.

? Note:
1.Thelogrecordsonlyshowtheoperationloginthecurrentoperationmodule
2.Logrecordsundersomeoperationmenuscanbeviewedonlywhenenteringthe
editinterface.
For example, from [Access Control System] [Door Configuration] [Door
Management], click [Edit] under Related operation of a device to enter the edit
interface,andclick[Logrecords]ontheupperrightcorneroftheinterfacetoview
theoperationlog.
6.Queryfunction(takingpersonnel informationqueryasanexample):

92
10.Appendices

Commonquery:Theusercandirectlyselecttheitemtobequeriedfrom[Common
query]onmyworkpanel,orenteramoduleforspecificquery.
Takepersonnelqueryasanexample:

Enterquerycondition,clickQuery,andthequeryresultwillbeshownbelow:

Advancedquery:Click[Advanced]icontoshowadvancedqueryinterface(taking
personnelinformationadvancedqueryasanexample).

93
AccessControlSystemUserManual

(1)Selectthequeryfieldinthe[Selectqueryfield]pullsdownmenu
(2)Selecttheconditioninthepulldownmenusuchasequaltonull,contain,meet
any,equaltoetc.
(3)Inputthequeryvalueinthe[Range]field
(4) Click [Add] to add this query information to the [Selected condition] list, the
multiplechoiceofqueryconditionisallowed.Butonefieldandoneconditioncan
beselectedonlyonce.
Click[Query],thequeryresultdisplayonthelist.

Thequeryfunctionsofeachmenuinthesystemaresimilar,differinginthatquery
conditionsaredifferent,andtheusercanenterasprompted.

94
AccessControlSystemUserManual

Appendix2 EndUserLicenseAgreement for ThisSoftware


Important readcarefully:
This EndUser License Agreement ("EULA") is a legal agreement between you
(eitheranindividualorasingleentity)andthementionedauthorofthisSoftwarefor
thesoftware productidentified above, which includes computer software and may
include associated media, printed materials, and "online" or electronic
documentation ("SOFTWARE PRODUCT"). By installing, copying, or otherwise
using the SOFTWARE PRODUCT, you agree to be bound by the terms of this
EULA. If you do not agree to the terms of this EULA, do not install or use the
SOFTWAREPRODUCT.

SOFTWAREPRODUCTLICENSE
The SOFTWARE PRODUCT is protected by copyright laws and international
copyright treaties, as well as other intellectual property laws and treaties. The
SOFTWAREPRODUCTislicensed,notsold.

1.GRANTOFLICENSE.ThisEULAgrantsyouthefollowingrights: Installation
and Use. You may install and use an unlimited number of copies of the
SOFTWAREPRODUCT.
ReproductionandDistribution
You may reproduce and distribute an unlimited number of copies of the
SOFTWARE PRODUCT provided that each copy shall be a true and complete
copy,includingallcopyrightandtrademarknotices,andshallbeaccompaniedbya
copyofthisEULA.CopiesoftheSOFTWAREPRODUCTmaybedistributedasa
standaloneproductorincludedwithyourownproduct.

2.DESCRIPTIONOFOTHERRIGHTSANDLIMITATIONS.
LimitationsonReverseEngineering,Decompilation,andDisassembly
You may not reverse engineer, decompile, or disassemble the SOFTWARE
PRODUCT,exceptand only to the extentthat such activity is expressly permitted
byapplicablelawnotwithstandingthislimitation.
SeparationofComponents
The SOFTWARE PRODUCT is licensed as a single product. Its component parts

95
AccessControlSystemUserManual

maynotbeseparatedforuseonmorethanonecomputer.
SoftwareTransfer
You may permanently transfer all of your rights under this EULA, provided the
recipientagreestothetermsofthisEULA.
Termination
Withoutprejudicetoanyotherrights,theAuthorofthisSoftwaremayterminatethis
EULA if you fail to comply withtheterms and conditions of this EULA. In such
event, you must destroy all copies of the SOFTWARE PRODUCT and all of its
componentparts.
Distribution
The SOFTWARE PRODUCT may not be sold or be included in a product or
packagewhichintendstoreceivebenefitsthroughtheinclusionoftheSOFTWARE
PRODUCT. The SOFTWARE PRODUCT may be included in any free or
nonprofitpackagesorproducts.

3.COPYRIGHT.
All title and copyrights in and to the SOFTWARE PRODUCT(including but not
limited to any images, photographs, animations, video, audio, music, text, and
"applets"incorporatedintotheSOFTWAREPRODUCT),theaccompanyingprinted
materials,andanycopiesoftheSOFTWAREPRODUCTareownedbytheAuthor
ofthisSoftware.TheSOFTWAREPRODUCTisprotectedbycopyrightlawsand
international treaty provisions. Therefore, you must treat the SOFTWARE
PRODUCT like any other copyrighted material except that you may install the
SOFTWARE PRODUCT on a single computer provided you keep the original
solelyforbackuporarchivalpurposes.
LIMITEDWARRANTY
NOWARRANTIES.
TheAuthorofthisSoftwareexpresslydisclaimsanywarrantyfortheSOFTWARE
PRODUCT. The SOFTWARE PRODUCT and any related documentation is
provided"asis"withoutwarrantyofanykind,eitherexpressorimplied,including,
withoutlimitation,theimpliedwarrantiesormerchantability,fitnessforaparticular
purpose, or noninfringement. The entire riskarising out of use or performance of
theSOFTWAREPRODUCTremainswithyou.
NOLIABILITYFORDAMAGES.
InnoeventshalltheauthorofthisSoftwarebeliableforanydamageswhatsoever

96
10.Appendices

(including, without limitation, damages for loss of business profits, business


interruption,lossofbusinessinformation,oranyotherpecuniaryloss)arisingoutof
the use of or inability to usethis product, evenif the Author of this Software has
beenadvisedofthepossibilityofsuchdamages.
AcknowledgmentofAgreement
IhavecarefullyreadandunderstandthisAgreement,Radiate,Inc.sPrivacyPolicy
Statement.
IFYOUACCEPTthetermsofthisAgreement:
IacknowledgeandunderstandthatbyACCEPTINGthetermsofthisAgreement.
IFYOUDONOTACCEPTthetermsofthisAgreement
Iacknowledgeandunderstandthatbyrefusingtoaccepttheseterms,Ihaverejected
thislicenseagreementandthereforehavenolegalrighttoinstall,use,orcopythis
ProductortheLicensedSoftwarethatitincorporates.

97
AccessControlSystemUserManual

Appendix3FAQs
Q:Howcanmyworkpanelbeunique?
A:Theusercancustomizetheworkpanel:1.Click[Customworkpanel]toopena
dialogbox,cancelthetickofyourundesiredmodule(bydefaultthesystemticksall),
and Confirm. Thenthe custommodule will appear 2. Or directly click the
icon on a module to minimize, and click to close the module. Click the
columnbartodragandadjustthemodulesposition3.Ifrequiredtoreturntothe
default work panel, click [Restore work panel]to refresh and returnto thesystem
default.
Q:Howtouseacardissuer?
A: Connect the card issuer to PC through USB port, and then select individual
personnelcardissueorbatchcardissue.Movethecursortothecardnumberinput
box, and punch the card on the card issuer, then the card number will be
automaticallyshownintheinputbox.
Q:Whatistheuseofrolesetting?
A:Rolesettinghasthefollowinguses:1.Tosetunifiedlevelforthesametypeof
usersnewlyadded,justdirectlyselectthisrolewhenaddingusers2.Whensetting
systemreminder,anddeterminewhichrolescanbeviewed.
Q:HowtooperateifIwanttosetaccountsforallpersonneloftheCompanys
FinancialDepartment?
A:First,createanewroleinsystemsettingandconfigurethefunctionstobeused
for this role.Then add a user,set userinformation,andselect the users role,thus
addinganewaccount.Forotheraccounts,dothesame.
Q:Whatistheuseofblacklist?
A:Ablacklistedpersonnelcannotachievedeparturerestoration,namely,thisperson
cannotbeemployedbytheCompanyanylonger.Tomodify,justmodifydeparture
informationonthedepartureinterface.
Q:Howtoadjustthedepartmentofaperson?
A:Therearethefollowingwaystoadjustpersonneldepartment:1.Inpersonnellist,
click personnel number or click Edit under related operation item to show
personnel details, and modify personnel department in the department item 2. In
personnel list, check the personnel requiring department adjustment, click Adjust
department, and a dialog box will open, then modify the department 3. On
personneltransferinterface, click Add to open the editinterface,select personnel,
and check department in the transfer field, and complete other information, thus

98
10.Appendices

completingtransfer.
Q:Howtosetaccesslevelsforvisitors?
A: Setting access levels is as follows: 1. In the system, add these personnel, and
enterrelevantinformation2.Selectaccesslevelssuitableforthem.Ifthereareno
suitable levels, it is required to enter the access control system to add relevant
settings 3. Set valid time, namely, the start and end dates when they need to use
accesslevels.
Q:Whatarethewaystocancelpersonnelaccesscontrolsettings?
A:Therearethefollowingwaysto cancelpersonnelaccesscontrolsettings:1.Close
access control only: In the personnel list, click personnel number or click Edit
underrelatedoperationitemtoshowpersonneldetails,anddeleteaccesslevelsand
Personnel Group of MultiCard Verification in access control settings 2. Delete
personnel: In the personnel list, click Delete under related operation item of
personnel,ortickapersonnelandclicktheDeleteabovetodeletethispersonfrom
the system. Corresponding access control information will be deleted 3. In
Personnel access levels settings, delete access levels of personnel, and in
PersonnelGroupofMultiCardVerification,deleteMultiCardOpeninglevels.
Q:Howtosetaccesscontrolholidays?
A:Accesscontrolholidayshavethreetypesof1,2and3.TakeNewYearsDayas
anexample:1.Inaccesscontrolholidays,addaholidayofNewYearsDay.Set
theholidaytypeas1,andthestartandenddatesoftheholidayarebothJanuary12.
Duringtheaccesscontroltimeperiod,addanaccesscontroltimezone,setthethree
access control intervals of this holiday type 1. For example, set access control
interval 1 as 8:0020:00, and intervals 2 and 3 as null, namely Normal Close 3.
Applythisaccesscontroltimezonetoaccesslevels4.Setpersonnelwithlevelsfor
theaccesslevels.
Q:InWindowsServer2003,whytheIEbrowserdisplayederrorwhenaccess
thesystem,howtosolveit?
A: This problem occurs because that Server 2003 has [Security Configuration
Option]settings.Ifyouwantaccessthesystem,pleaseconfigureitasfollows:click
StartControlPanelAddorRemoveProgram,select[AddandremoveWindows
components] in the interface and click [Internet Explorer Enhanced Security
Configuration]option,cancelthetickbeforeit.Thenclick[Next]toremoveitfrom
thesystem.Openthesystemagainthebrowserwillaccessthesystemproperly.
Q:Ifbackinguporrestoringthedatabasefails,thepossiblereason?
A:Pleasecheckthesystemenvironmentvariables[path],ifthedatabaseinstallation
path (For example, MS SQL Server installation path maybe is: C:\Program
Files\Microsoft SQL Server\90\Tools\Binn For MySQL, it is like: C:\Program

99
AccessControlSystemUserManual

Files\MySQL\MySQL Server 5.1\bin)is exist. If not, you needto add it manually.


Otherwise,theantivirusorfirewallsoftwaremaystoptheexecutionofbackingup
or restoring command, if the security prompt pops up, please select Always
Permitted.Andthedamageddatabasecanalsoleadtobackuperror,pleaserepairor
restorethedatabase.

100