Hik.accs Manual
Hik.accs Manual
User Manual
Access Controller User Manual
Legal Information
©2021 Hangzhou Hikvision Digital Technology Co., Ltd. All rights reserved.
i
Access Controller User Manual
ii
Access Controller User Manual
Available Model
iii
Access Controller User Manual
Regulatory Information
FCC Information
Please take attention that changes or modification not expressly approved by the party responsible
for compliance could void the user’s authority to operate the equipment.
FCC compliance: This equipment has been tested and found to comply with the limits for a Class B
digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference in a residential installation. This equipment
generates, uses and can radiate radio frequency energy and, if not installed and used in accordance
with the instructions, may cause harmful interference to radio communications. However, there is
no guarantee that interference will not occur in a particular installation. If this equipment does
cause harmful interference to radio or television reception, which can be determined by turning
the equipment off and on, the user is encouraged to try to correct the interference by one or more
of the following measures:
—Reorient or relocate the receiving antenna.
—Increase the separation between the equipment and receiver.
—Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
—Consult the dealer or an experienced radio/TV technician for help
This equipment should be installed and operated with a minimum distance 20cm between the
radiator and your body.
FCC Conditions
This device complies with part 15 of the FCC Rules. Operation is subject to the following two
conditions:
1. This device may not cause harmful interference.
2. This device must accept any interference received, including interference that may cause
undesired operation.
EU Conformity Statement
This product and - if applicable - the supplied accessories too are marked with "CE"
and comply therefore with the applicable harmonized European standards listed
iv
Access Controller User Manual
v
Access Controller User Manual
Cet équipement doit être installé et utilisé à une distance minimale de 20 cm entre le radiateur et
votre corps.
vi
Access Controller User Manual
Safety Instruction
These instructions are intended to ensure that user can use the product correctly to avoid danger
or property loss.
The precaution measure is divided into Dangers and Cautions:
Dangers: Neglecting any of the warnings may cause serious injury or death.
Cautions: Neglecting any of the cautions may cause injury or equipment damage.
Dangers: Follow these safeguards to prevent Cautions: Follow these precautions to prevent
serious injury or death. potential injury or material damage.
Danger:
● An appropriate disconnect device shall be provided as part of installation.
Note
External disconnect devices will not necessarily be supplied with the equipment.
● All the electronic operation should be strictly compliance with the electrical safety regulations,
fire prevention regulations and other related regulations in your local region.
● Please use the power adapter, which is provided by normal company. The power consumption
cannot be less than the required value.
● Do not connect several devices to one power adapter as adapter overload may cause over-heat
or fire hazard.
● Please make sure that the power has been disconnected before you wire, install or dismantle the
device.
● When the product is installed on wall or ceiling, the device shall be firmly fixed.
● If smoke, odors or noise rise from the device, turn off the power at once and unplug the power
cable, and then please contact the service center.
● Do not ingest battery, Chemical Burn Hazard.
This product contains a coin/button cell battery. If the coin/button cell battery is swallowed, it
can cause severe internal burns in just 2 hours and can lead to death.
Keep new and used batteries away from children. If the battery compartment does not close
securely, stop using the product and keep it away from children. If you think batteries might have
been swallowed or placed inside any part of the body, seek immediate medical attention.
● If the product does not work properly, please contact your dealer or the nearest service center.
Never attempt to disassemble the device yourself. (We shall not assume any responsibility for
problems caused by unauthorized repair or maintenance.)
vii
Access Controller User Manual
Cautions:
● Do not drop the device or subject it to physical shock, and do not expose it to high
electromagnetism radiation. Avoid the equipment installation on vibrations surface or places
subject to shock (ignorance can cause equipment damage).
● Do not place the device in extremely hot (refer to the specification of the device for the detailed
operating temperature), cold, dusty or damp locations, and do not expose it to high
electromagnetic radiation.
● The device cover for indoor use shall be kept from rain and moisture.
● Exposing the equipment to direct sun light, low ventilation or heat source such as heater or
radiator is forbidden (ignorance can cause fire danger).
● Do not aim the device at the sun or extra bright places. A blooming or smear may occur
otherwise (which is not a malfunction however), and affecting the endurance of sensor at the
same time.
● Please use the provided glove when open up the device cover, avoid direct contact with the
device cover, because the acidic sweat of the fingers may erode the surface coating of the device
cover.
● Please use a soft and dry cloth when clean inside and outside surfaces of the device cover, do
not use alkaline detergents.
● Please keep all wrappers after unpack them for future use. In case of any failure occurred, you
need to return the device to the factory with the original wrapper. Transportation without the
original wrapper may result in damage on the device and lead to additional costs.
● Improper use or replacement of the battery may result in hazard of explosion. Replace with the
same or equivalent type only. Dispose of used batteries according to the instructions provided by
the battery manufacturer.
viii
Access Controller User Manual
Contents
Chapter 1 Preventive and Cautionary Tips .................................................................................. 1
Chapter 2 Product Description .................................................................................................... 2
Chapter 3 Main Board Description .............................................................................................. 3
3.1 Single-Door Access Controller Main Board Description ......................................................... 3
3.2 Two-Door Access Controller Main Board Description ............................................................ 4
3.3 Four-Door Access Controller Main Board Description ........................................................... 5
3.4 Component Description ......................................................................................................... 5
Chapter 4 Terminal Description .................................................................................................. 8
4.1 Single-Door Access Controller Terminal Description .............................................................. 8
4.2 Two-Door Access Controller Terminal Description ............................................................... 12
4.3 Four-Door Access Controller Terminal Description .............................................................. 17
Chapter 5 Terminal Wiring ........................................................................................................ 24
5.1 External Terminal ................................................................................................................. 24
5.1.1 Single-Door Access Controller Terminal Description ................................................... 24
5.1.2 Two-Door Access Controller Terminal Description ...................................................... 25
5.1.3 Four-Door Access Controller Terminal Description ..................................................... 25
5.2 Wiegand Card Reader Wiring ............................................................................................... 25
5.3 RS-485 Card Reader Wiring .................................................................................................. 27
5.4 Cathode Lock Wiring ............................................................................................................ 28
5.5 Anode Lock Wiring ............................................................................................................... 28
5.6 External Alarm Device Wiring .............................................................................................. 29
5.7 Exit Button Wiring ................................................................................................................ 30
5.8 Door Contact Wiring ............................................................................................................ 31
5.9 Power Supply Wiring ............................................................................................................ 32
5.10 Arming Region Input Wiring .............................................................................................. 33
5.10.1 NO Wiring of Arming Region Input ........................................................................... 33
ix
Access Controller User Manual
x
Access Controller User Manual
xi
Access Controller User Manual
● Ensure unit is properly secured to a rack or shelf. Major shocks or jolts to the unit as a result of
dropping it may cause damage to the sensitive electronics within the unit.
● Use the device in conjunction with an UPS if possible.
● Power down the unit before connecting and disconnecting accessories and peripherals.
● Improper use or replacement of the battery may result in hazard of explosion. Replace with the
same or equivalent type only. Dispose of used batteries according to the instructions provided by
the manufacturer.
1
Access Controller User Manual
2
Access Controller User Manual
3
Access Controller User Manual
4
Access Controller User Manual
5
Access Controller User Manual
6
Access Controller User Manual
7 Power Indicator
8 Charging Completing Indicator
9 Running Indicator
10 Main Board DIP Switch
Set the DIP address for the access controller. Available range: 1 to 63.
Example: If the DIP address is 24, switch Bit 4 and Bit 5 to ON.
Note
● The settings will be valid after the device reboot.
● For details about the DIP settings, see Appendix A DIP Switch
Description.
7
Access Controller User Manual
Note
● 2602 and 2604 series: The rated power for door lock is 12 V/2 A, and for card reader power
supply is 12 V/0.67 A.
● 2601 series: The rated power for door lock is 12 V/0.5 A, and for card reader power supply is 12
V/0.3 A.
8
Access Controller User Manual
9
Access Controller User Manual
10
Access Controller User Manual
Note
● The Alarm input hardware interface is normally open by default. Only the normally open signal is
allowed. It can be linked to the buzzer of the card reader and access controller, the alarm relay
output, and door relay open and close.
● Arming region alarm input linkage is only for the alarm relay output linkage.
● RS-485 card reader ID should be set as 1to 2. The table displayed below shows the relationship
between the door No. and the ID.
11
Access Controller User Manual
12
Access Controller User Manual
13
Access Controller User Manual
14
Access Controller User Manual
15
Access Controller User Manual
Note
● The alarm input hardware interface is normally open by default. So only the normally open
signal is allowed. It can be linked to the buzzer of the card reader and access controller, the
alarm relay output, and door relay open and close.
● Arming region alarm input linkage is only for the alarm relay output linkage.
● RS-485 card reader ID should be set as 1 to 8.
16
Access Controller User Manual
17
Access Controller User Manual
18
Access Controller User Manual
19
Access Controller User Manual
20
Access Controller User Manual
21
Access Controller User Manual
22
Access Controller User Manual
Note
● The Alarm input hardware interface is normally open by default. So only the normally open
signal is allowed. It can be linked to the buzzer of the card reader and access controller, and the
alarm relay output and door relay open and close.
● Arming region alarm input linkage is only for the alarm relay output linkage.
● RS-485 card ID should be set as 1to 8.
23
Access Controller User Manual
Warning
The high voltage cable should be threaded through the Hole 1 and Hole 2. The Hole 1 and Hole 2
should be installed with rubber ring to avoid the sharp edge cutting the cable and avoid electric
shock.
24
Access Controller User Manual
25
Access Controller User Manual
Note
You must connect the OK/ERR/BZ, if using access controller to control the LED and buzzer of the
Wiegand card reader.
26
Access Controller User Manual
Note
If the card reader is installed too far away from the access controller, you can use an external
power supply.
27
Access Controller User Manual
28
Access Controller User Manual
29
Access Controller User Manual
30
Access Controller User Manual
31
Access Controller User Manual
32
Access Controller User Manual
33
Access Controller User Manual
34
Access Controller User Manual
35
Access Controller User Manual
36
Access Controller User Manual
Chapter 6 Settings
Note
The device initialization will restore all the parameters to the default settings and all the device
event logs will be deleted.
37
Access Controller User Manual
Note
The device initialization will restore all the parameters to the default settings and all the device
event logs will be deleted.
38
Access Controller User Manual
39
Access Controller User Manual
40
Access Controller User Manual
Chapter 7 Activation
You should activate the device before the first login. After powering on the device, the system will
switch to Device Activation page.
Activation via the device, SADP tool and the client software are supported.
The default values of the device are as follows:
● The default IP address: 192.0.0.64
The following steps show how to activate a device and modify its IP address. For batch activation
and IP addresses modification, refer to User Manual of SADP for details.
Steps
1. Run the SADP software and search the online devices.
2. Find and select your device in online device list.
3. Input new password (admin password) and confirm the password.
Caution
STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of
your own choosing (using a minimum of 8 characters, including upper case letters, lower case
letters, numbers, and special characters) in order to increase the security of your product. And
we recommend you reset your password regularly, especially in the high security system,
resetting the password monthly or weekly can better protect your product.
4. Click Activate to start activation.
41
Access Controller User Manual
Note
This function should be supported by the device.
1. Enter the Device Management page.
2. Click on the right of Device Management and select Device.
3. Click Online Device to show the online device area.
The searched online devices are displayed in the list.
4. Check the device status (shown on Security Level column) and select an inactive device.
5. Click Activate to open the Activation dialog.
6. Create a password in the password field, and confirm the password.
42
Access Controller User Manual
Caution
The password strength of the device can be automatically checked. We highly recommend you
change the password of your own choosing (using a minimum of 8 characters, including at least
three kinds of following categories: upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. And we recommend you reset your
password regularly, especially in the high security system, resetting the password monthly or
weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
installer and/or end-user.
7. Click OK to activate the device.
43
Access Controller User Manual
Note
For the user with access control module permissions, the user can enter the Access Control
module and configure the access control settings. For setting the user permission of Access Control
module, refer to Account Management in User Manual of iVMS-4200 Client Software.
Note
For some models of devices, you can open its general or advanced parameters configuration
window. To open the original remote configuration window, press CTRL and click Remote
Configuration.
After adding access control devices, you can select access control device from the list and click
Device Status to view the device status.
44
Access Controller User Manual
2. Click Device tab and select Hikvision Device as the device type to display the Online Device
area.
Note
For the inactive device, you need to create the password for it before you can add the device
properly. For detailed steps, refer to Activation .
4. Click Add to Client to open the device adding window.
5. Input the required information.
Address
Input the device's IP address. The IP address of the device is obtained automatically in this
adding mode.
Port
The default value is 8000.
User Name
By default, the user name is admin.
Password
Input the device password.
Caution
The password strength of the device can be automatically checked. We highly recommend
you change the password of your own choosing (using a minimum of 8 characters, including
at least three kinds of following categories: upper case letters, lower case letters, numbers,
and special characters) in order to increase the security of your product. And we recommend
you reset your password regularly, especially in the high security system, resetting the
password monthly or weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
installer and/or end-user.
6. Optional: Check Synchronize Device Time to synchronize the device time with the PC running
the client after adding the device to the client.
45
Access Controller User Manual
Note
You can import all the channels of the device to the corresponding group by default.
8. Optional: Add the offline devices.
1) Check Add Offline Device.
2) Input the required information, including the device channel number and alarm input
number.
3) Click Add.
When the offline device comes online, the software will connect it automatically.
9. Click Add to add the device.
Note
For the inactive device, you need to create the password for it before you can add the device
properly. For detailed steps, refer to Activation .
4. Click Add to Client to open the device adding window.
5. Input the required information.
User Name
By default, the user name is admin.
Password
Input the device password.
Caution
The password strength of the device can be automatically checked. We highly recommend
you change the password of your own choosing (using a minimum of 8 characters, including
at least three kinds of following categories: upper case letters, lower case letters, numbers,
and special characters) in order to increase the security of your product. And we recommend
you reset your password regularly, especially in the high security system, resetting the
password monthly or weekly can better protect your product.
46
Access Controller User Manual
Proper configuration of all passwords and other security settings is the responsibility of the
installer and/or end-user.
6. Optional: Check Synchronize Device Time to synchronize the time of the devices with the PC
running the client after adding the devices to the client.
7. Optional: Check Export to Group to create a group by the device name.
Note
You can import all the channels of the device to the corresponding group by default.
8. Click Add to add the devices.
Note
For the inactive device, you need to create the password for it before you can add the device
properly. For detailed steps, refer to Activation .
4. Input the user name and password.
User Name
By default, the user name is admin.
Password
Input the device password.
Caution
The password strength of the device can be automatically checked. We highly recommend you
change the password of your own choosing (using a minimum of 8 characters, including at least
three kinds of following categories: upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. And we recommend you reset your
password regularly, especially in the high security system, resetting the password monthly or
weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
installer and/or end-user.
5. Optional: Check Synchronize Device Time to synchronize the time of the devices with the PC
running the client after adding the devices to the client.
47
Access Controller User Manual
Note
You can import all the channels of the device to the corresponding group by default.
7. Click Add to add the devices.
Caution
The password strength of the device can be automatically checked. We highly recommend you
change the password of your own choosing (using a minimum of 8 characters, including at
least three kinds of following categories: upper case letters, lower case letters, numbers, and
special characters) in order to increase the security of your product. And we recommend you
reset your password regularly, especially in the high security system, resetting the password
monthly or weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
installer and/or end-user.
6. Optional: Check Synchronize Device Time to synchronize the device time with the PC running
the client after adding the device to the client.
7. Optional: Check Export to Group to create a group by the device name.
48
Access Controller User Manual
Note
You can import all the channels of the device to the corresponding group by default.
8. Optional: Add the offline devices.
1) Check Add Offline Device.
2) Input the required information, including the device channel number and alarm input
number.
3) Click Add.
When the offline device comes online, the software will connect it automatically.
9. Click Add to add the device.
Caution
The password strength of the device can be automatically checked. We highly recommend
you change the password of your own choosing (using a minimum of 8 characters, including
at least three kinds of following categories: upper case letters, lower case letters, numbers,
49
Access Controller User Manual
and special characters) in order to increase the security of your product. And we recommend
you reset your password regularly, especially in the high security system, resetting the
password monthly or weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
installer and/or end-user.
6. Optional: Check Synchronize Device Time to synchronize the device time with the PC running
the client after adding the device to the client.
7. Optional: Check Export to Group to create a group by the device name.
Note
You can import all the channels of the device to the corresponding group by default.
8. Optional: Add offline devices to the client.
1) Check Add Offline Device.
2) Input the required information, including the device channel number and alarm input
number.
3) Click Add.
When the offline device comes online, the software will connect it automatically.
9. Click Add to add the device.
50
Access Controller User Manual
Note
When the offline device comes online, the software will connect it automatically.
9. Click Add to add the device.
51
Access Controller User Manual
Caution
The password strength of the device can be automatically checked. We highly recommend you
change the password of your own choosing (using a minimum of 8 characters, including at
least three kinds of following categories: upper case letters, lower case letters, numbers, and
special characters) in order to increase the security of your product. And we recommend you
reset your password regularly, especially in the high security system, resetting the password
monthly or weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
installer and/or end-user.
Add Offline Device
You can input 1 to enable adding the offline device, and then the software will automatically
connect it when the offline device comes online. 0 indicates disabling this function.
Export to Group
You can input 1 to create a group by the device name (nickname). All the channels of the
device will be imported to the corresponding group by default. 0 indicates disabling this
function.
Channel Number
If you set 1 for Add Offline Device, input the channel number of the device. If you set 0 for Add
Offline Device, this field is not required.
Alarm Input Number
If you set 1 for Add Offline Device, input the alarm input number of the device. If you set 0 for
Add Offline Device, this field is not required.
Serial Port No.
If you set 5 as the adding mode, input the serial port No. for the access control device.
Baud Rate
If you set 5 as the adding mode, input the baud rate of the access control device.
DIP
If you set 5 as the adding mode, input the DIP address of the access control device.
Hik-Connect Account
If you set 6 as the adding mode, input the Hik-Connect account.
Hik-Connect Password
If you set 6 as the adding mode, input the Hik-Connect account password.
6. Click and select the template file.
7. Click Add to import the devices.
52
Access Controller User Manual
Note
Once the scene is configured, you cannot change it.
1. Enter the Access Control module.
The Select Scene window will pop up.
Note
If you select Residence mode, you cannot configure person's attendance rule when adding
person.
3. Click OK.
53
Access Controller User Manual
Note
● The main channel and the backup channel cannot enable N1 or G1 at the same time.
● Only device with 3G/4G function supports setting the channel as G1.
● For wired network settings, see Create EHome Account in Wire Communication Mode .
● For wireless network settings, see Create EHome Account in Wireless Communication Mode .
7. Click Save.
54
Access Controller User Manual
Steps
Note
This function should be supported by the device
1. Click Access Control → Device Management to enter the Device Management page.
2. Select the device in the device list and click Modify.
3. Click Network Settings → Network Center to enter the Network Center page.
4. Select the center group from the drop-down list.
5. Select the Address Type as IP Address or Domain Name.
6. Input IP address or domain name according to the address type.
7. Input the port number for the protocol.
Note
The port number of the wireless network and wired network should be consistent with the port
number of EHome.
8. Select the Protocol Type as EHome and select EHome version.
Note
If set the EHome version as 5.0, you should create an EHome key for the EHome account.
9. Set an account name for the network center.
10. Click Save.
Note
This function should be supported by the device
1. Click Access Control → Device Management to enter the Device Management page.
2. Select the device in the device list and click Modify.
3. Click Network Settings → Wireless Communication Center to enter the Wireless
Communication Center page.
4. Select the center group from the drop-down list.
5. Input the IP address and port number.
55
Access Controller User Manual
Note
● By default, the port number for EHome is 7660.
● The port number of the wireless network and wired network should be consistent with the
Note
The function should be supported by the access control device and the card reader.
Steps
1. Click Access Control → Device Management to enter the access control device management
page.
2. Select the device in the device list, and click Modify to pop up Modify window.
3. Click M1 Card Encryption tab to enter the M1 Card Encryption page.
4. Check Enable to enable the M1 card encryption function.
5. Set the sector ID.
The sector ID ranges from 1 to 100.
6. Click Save to save the settings.
Note
After enabling the M1 card encryption function, you should set the added card's sector ID as the
configured sector ID here.
56
Access Controller User Manual
Note
Up to 10 levels of organizations can be added.
5. Optional: After adding the organization, you can do one or more of the following operations.
Edit Select the added organization and click Modify to modify its name.
Organization
Delete Select the added organization and click Delete to delete it.
Organization
Note
● The lower-level organizations will be deleted as well if you delete an
organization.
● Make sure there is no person added under the organization, or the
organization cannot be deleted.
Note
Up to 10,000 persons or cards can be added.
57
Access Controller User Manual
Note
Input the person's basic iformation first. For details about configuring person's basic
information, refer to Configure Person's Basic Information .
3. Click Details tab.
58
Access Controller User Manual
4. Input the detailed information of the person, including person's ID type, ID No., country, etc.,
according to actual needs.
Linked Device
bind the indoor station to the person.
Note
If you select Analog Indoor Station, the Door Station field will display and you are required to
select the door station to communicate with the analog indoor station.
5. Confirm to add the person.
- Click OK to add the person and close the Add Person window.
- Click Save and Continue to add the person and continue to add other persons .
Note
For setting the access control permission, refer to Assign Permission to Person .
1. Enter Access Control → Person and Card .
2. Select an organization in the organization list to add the person.
3. Click Add.
4. Input person's basic information.
Note
For details about configuring person's basic information, refer to Configure Person's Basic
Information .
5. Click Permission tab.
6. In the Permission(s) to Select list, check the permission(s) checkbox(es) and click > to add to the
Selected Permission(s) list.
7. Confirm to add the person.
- Click OK to add the person and close the Add Person window.
- Click Save and Continue to add the person and continue to add other persons .
59
Access Controller User Manual
Steps
1. Enter Access Control → Person and Card .
2. Select an organization in the organization list to add the person and click Add.
Note
Input the person's basic information first. For details about configuring person's basic
information, refer to Configure Basic Information.
3. Click Credential → Card tab to enter the card credential settings page.
4. Click Add and select General Card tab to enter the general card configuration page.
5. Set card parameters.
1) Select a card type for the general card.
Normal Card
By default, the card is normal card, which has no additional functions.
Patrol Card
The card swiping action can used for checking the working status of the inspection staff.
The access permission of the inspection staff is configurable.
Duress Card
The door can open by swiping the duress card when there is duress. At the same time, the
client can report the duress event.
Super Card
The card is valid for all the doors of the controller during the configured schedule.
2) Optional: In the Remark field, input the remark information for the card if needed.
Note
Up to 32 characters are allowed in the Remark field.
3) Set the effective time and expiry time of the card.
6. Select the reading card mode and input the card number.
- Access Controller Reader
1. Place the card on the reader of the Access Controller.
2. Click Read to get the card number.
- Card Enrollment Station
1. Connect the card enrollment station with the PC running the client.
2. Click Set Card Enrollment Station to set the card enrollment station's parameters.
3. Select the Card Enrollment Station type.
Note
Currently, the supported card reader types include DS-K1F100-D8, DS-K1F100-M, DS-K1F100-
D8E, and DS-K1F180-D8E.
60
Access Controller User Manual
4. Set the serial port number, the baud rate, the timeout value, the buzzing, or the card
number type.
5. Optional: If the card is M1 card, and if you need to enable the M1 Card Encryption function,
you should check Enable of M1 Card Encryption and click Modify to select the sector.
Note
The M1 Card Encryption function is supported by DS-K1F100-D8, DS-K1F100-D8E, and DS-
K1F180-D8E.
6. Click Save.
7. Place the card on the card enrollment station.
8. Click Readto get the card No.
- Manually Input
1. Input the card number manually.
2. Click Enter to input the card number.
7. Click OK.
The card(s) will be issued to the person.
8. Confirm to add the person.
- Click OK to add the person and close the Add Person window.
- Click Save and Continue to add the person and continue to add other persons .
Note
Input the person's basic information first. For details about configuring person's basic
information, refer to Configure Person's Basic Information.
3. Click Credential → Fingerprint tab to enter the card credential settings page.
4. Select the collection mode as Local Collection.
5. Connect the fingerprint recorder to the PC and set its parameters.
1) Click Set Fingerprint Machine to open the setting fingerprint machine window.
2) Select the device type.
61
Access Controller User Manual
Note
Currently, the supported fingerprint recorder types include DS-K1F800-F, DS-K1F300-F, DS-
K1F810-F, and DS-K1F820-F.
3) Optional: For fingerprint recorder type DS-K1F800-F, you can set the serial port number, baud
rate, and overtime parameters of the fingerprint recorder.
Note
● The serial port number should correspond to the serial port number of PC.
● The baud rate should be set according to the external fingerprint card reader. The default
value is 19200.
● Timeout after field refers to the valid fingerprint collecting time. If the user does not input a
fingerprint or inputs a fingerprint unsuccessfully, the device will indicate that the fingerprint
collection is over.
4) Click Save.
6. Collect the fingerprint.
1) Click Start.
2) Select a fingerprint on the hand picture to start collecting.
3) Lift and rest the corresponding fingerprint on the fingerprint scanner twice to collect the
fingerprint.
1) Select a fingerprint type.
Note
When the same fingerprints of one person are collected, the prompt with repeat ID appears.
When the similar fingerprints are collected for different person, the prompt with repeat ID and
person name appears.
7. Confirm adding the person.
- Click OK to add the person and close the Add Person window.
- Click Save and Continue to add the person and continue to add other persons.
62
Access Controller User Manual
Note
Input the person's basic information first. For details about configuring person's basic
information, refer to Configure Person's Basic Information.
3. Click Credential → Fingerprint tab to enter the card credential settings page.
4. Select the collection mode as Remote Collection.
5. Click Start and select an access control device to collect the fingerprint.
Note
The function should be supported by the device.
6. Collect the fingerprint.
1) Select a fingerprint on the hand picture to start collecting.
2) Lift and rest the corresponding fingerprint on the device's fingerprint module to collect the
fingerprint.
3) Select a fingerprint type.
4) Click Stop.
7. Confirm adding the person.
- Click OK to add the person and close the Add Person window.
- Click Save and Continue to add the person and continue to add other persons.
Note
For details about attendance settings and application, refer to Time and Attendance .
1. Enter Access Control → Person and Card .
2. Select an organization in the organization list to add the person and click Add.
3. Enter person's basic information.
Note
For details about configuring person's basic information, refer to Configure Person's Basic
Information .
4. Click Attendance Rule tab.
Note
This tab page will display when you select Non-Residence mode as the application scene when
running the software for the first time. For details, refer to Select Application Scenario .
63
Access Controller User Manual
5. If the person joins in the time and attendance, check Time and Attendance to enable this
function for the person.
The person's card swiping records will be recorded and analyzed for time and attendance.
6. Set attendance rule for the person.
Note
For details about Time and Attendance, click More to go to the Time and Attendance module.
7. Confirm to add the person.
- Click OK to add the person and close the Add Person window.
- Click Save and Continue to add the person and continue to add other persons .
Note
If the person has multiple cards, separate the card No. with semicolon.
5. Enter Access Control → Person and Card , click Import Person and select the Excel file with
person information.
6. Click OK to start importing.
64
Access Controller User Manual
Note
If the person No. already exists in the client software's database, it will replace the person
information automatically after importing.
Note
● This function is only supported by the device the connection mothod of which is TCP/IP when
adding the device.
● If the person name stored in the device is empty, the person name will be filled with the issued
card No. after importing to the client.
65
Access Controller User Manual
Note
For details about the card type, refer to Issue a General Card to Person..
2) In the Card Password field, create a password (4 to 8 digits) for the card itself.
Note
The password will be required when the card holder swiping the card to enter or exit the door
if the card reader authentication mode requires password. For details, refer to Configure Card
Reader Authentication Mode and Schedule.
3) Input the card quantity issued for each person.
Example
If the card quantity is 3, you can read or enter three card numbers for each person.
4) Set the effective time and expiry time of the card.
4. In the Person(s) with No Card Issued list on the left, select the person to issue cards.
5. Select the reading card mode and input the card number.
Access Controller Reader
Place the card on the reader of the Access Controller and click Read to get the card No.
Card Enrollment Station
Place the card on the Card Enrollment Station and click Readto get the card No.
66
Access Controller User Manual
Note
The Card Enrollment Station should connect with the PC running the client. You can click Set
Card Enrollment Station to set the card enrollment station's parameters. For details, refer to
Issue a General Card to Person.
Manually Input
Input the card No. manually and click Enter to input the card No.
After issuing the cards to the person, the person and card information will display in the
Person(s) with Card Issued list.
6. Click OK.
Normal Search
After adding the person information to the client, you can search the person by person name or
card number.
Perform this task if you want to search the person information by person name or card number.
Steps
1. Enter Access Control → Person and Card module.
2. Set the search condition.
- To search the person by person name, input the keyword of the person name in the search
field.
- To search the person by card number, input the keyword of the card number in the search
field manually, or click Read to read the card number from certain card by card enrollment
station.
Note
Before reading by card enrollment station, you need to connect the card enrollment station
with the PC running the client first. You can click Read → Set Card Enrollment Station to set
its parameters. For details, refer to Issue a General Card to Person .
3. Click Search.
The search results will display in the person list.
67
Access Controller User Manual
Advanced Search
After adding the person information to the client, you can search the target person by setting more
accurate search conditions, including card number, person name, person number.
Perform this task if you need to search the target person with more accurate search conditions.
Steps
1. Enter Access Control → Person and Card module.
2. Click Advanced Search to display the search conditions.
3. Set the search condition.
Card No.
Input the keyword of the card number, or click Read to read the card number from certain
card by card enrollment station.
Note
Before reading by card enrollment station, you need to connect the card enrollment station
with the PC running the client first. You can click Read → Set Card Enrollment Station to set
its parameters. For details, refer to Issue a General Card to Person .
Person No.
Input the keyword of the person number.
Person Name
Input the keyword of the person name.
Note
The person name is case sensitive.
4. Click Search.
The search results will display in the person list.
5. Optional: Click Reset to clear the search conditions.
68
Access Controller User Manual
Note
For searching the person, refer to Search Person Information .
3. Select the person and click Modify to open the Edit Person window.
4. Click Credential → Card tab to show the person's card information
5. Select the lost card and click Report Card Loss.
The card status will turn to lost.
6. Optional: If the lost card is found, you can select the card and click Cancel Card Loss to cancel
the loss.
The card status will turn to normal.
7. Optional: If you have assigned access permission to the person, a window will pop up to notify
you to apply the permission to the device again to take effect. You can click Apply Now or Apply
Later to apply the permission changes to the device.
Note
Currently, the supported card enrollment station models include DS-K1F100-D8, DS-K1F100-M,
DS-K1F100-D8E, and DS-K1F180-D8E.
Card Type
This field is only available when the model is DS-K1F100-D8E or DS-K1F180-D8E.
Select the card type as EM card or IC card according to the actual card type.
If the card contains both EM and IC chips, you can also select All to read the numbers of both
EM and IC chips.
Serial Port No. and Baud Rate
These two fields are only available when the model is DS-K1F100-M.
Select the COM the card enrollment station connects to and set the baud rate.
Timeout after
Specify the milliseconds after which the read card number will be timeout.
69
Access Controller User Manual
Buzzing
Enable or disable the buzzing when the card number is read successfully.
Card No. Type
The type of the card number.
M1 Card Encryption
This field is only available when the model is DS-K1F100-D8, DS-K1F100-D8E, or DS-K1F180-D8E.
If the card is M1 card, and if you need to enable the M1 Card Encryption function, you should
check Enable of M1 Card Encryption and click Modify to select the sector of the card to encrypt.
Note
For access control permission settings, refer to Assign Permission to Person .
Note
There are two default week schedules: Whole Week Schedule and Blank Schedule, and they
cannot be edited or deleted.
Whole Week Schedule
Card swiping is valid on each day of the week.
Blank Schedule
Card swiping is invalid on each day of the week.
2. Add a week schedule.
1) Click Add Week Schedule to open the Add Week Schedule dialog.
2) Input a desired name in the Week Schedule Name field.
70
Access Controller User Manual
Note
Up to 8 time periods can be set for each day in the week schedule.
5. Optional: Perform one of the following operations to edit the drawn time periods.
- Move the cursor to the time period and drag the time period on the timeline bar to the
desired position when the cursor turns to .
- Click the time period and directly edit the start/end time in the appeared dialog.
- Move the cursor to the ends of time period and drag to lengthen or shorten the time period
when the cursor turns to .
6. Optional: After setting the time schedule, you can do one or more of the following operations.
Delete Day Schedule Select a day and click Delete Duration to delete the schedule of the
selected day.
Clear Week Schedule Click Clear to delete the whole week schedule.
Copy to Whole Week Click Copy to Week to copy the schedule of this day to the whole
week.
7. Click Save to saving the settings and finishing adding the week schedule.
Note
Up to 16 holiday periods can be added to one holiday group.
1) Click Add Holiday.
2) Drag to draw the period, which means in that period of time, the configured permission is
activated.
71
Access Controller User Manual
Note
Up to 8 time durations can be set to one holiday period.
3) Optional: When the cursor turns to , you can move the selected time bar you just edited.
You can also edit the displayed time point to set the accurate time period.
4) Optional: When the cursor turns to , you can lengthen or shorten the selected time bar.
4. Click Save.
Add Template
After setting the week schedule and holiday group, you can add and configure the template which
contains week schedule and holiday group schedule.
Perform this task if you want to add and configure template.
Steps
1. Click Access Control → Schedule and Template → Template to enter the Template Management
page.
Note
There are two default templates: Whole Week Template and Blank Template, and they cannot
be edited or deleted.
Whole Week Template
The card swiping is valid on each day of the week and it has no holiday group schedule.
Blank Template
The card swiping is invalid on each day of the week and it has no holiday group schedule.
2. Add a template.
1) Click Add Template to open Add Template window.
2) Input a name in the Template Name filed.
3) Click OK to add the template.
3. Click the added template in the left list to show its property on the right.
4. Add a week schedule to apply to the template.
1) Click Week Schedule tab on the right.
2) In the Week Schedule field, select a configured week schedule.
3) Optional: Click Add Week Schedule to add a new week schedule.
Note
For details about adding a week schedule, refer to Add Week Schedule .
5. Add a holiday group schedule to apply to the template.
Note
Up to four holiday groups can be added to one template.
72
Access Controller User Manual
Note
For details about adding a holiday group, refer to Add Holiday Schdule .
4) Click Add to add the selected holiday group schedule to the right list.
5) Optional: Select a selected holiday group on the right list and click Delete to remove the
selected one.
6. Click Save to save the settings and finish adding the template.
● When the permission settings are changed, you need to apply the permissions to the devices
again to take effect. The permission changes include changes of schedule and template,
permission settings, person's permission settings, and related person details (including card
number, fingerprint, linkage between card number and fingerprint, linkage between card
number and fingerprint, card password, card effective period, etc).
1. Click Access Control → Permission to enter the Permission Management interface.
2. Click Add to open the adding permission window.
3. In the Permission Name text field, create a name for the permission as you want.
4. Select a schedule template for the permission.
Note
You should configure the template before permission settings. You can click Add Template to
add the template. Refer to Configure Schedule and Template for details.
5. In the Person list, select person(s) to assign the permission and click > to add to the Selected
Person list.
6. In the Access Control Point/Device list, select door(s) or door station(s) for the selected persons
to access and click > to add to the selected list.
73
Access Controller User Manual
7. Click OK.
The selected persons will have the permission to enter/exit the selected doors/door stations
with their linked card(s) or fingerprints.
8. After adding the access permissions, you need to apply them to the access control device to take
effect.
1) Select the permission(s) to apply to the access control device.
To select multiple permissions, you can hold the Ctrl or Shift key and select permissions.
2) Click Apply All to start applying all the selected permission(s) to the access control device or
door station.
Note
You can also click Apply Changes to apply the changed part of the selected permission(s) to
the device(s).
Note
The person name is case sensitive.
Card No.
Input the keyword of the card number.
Permission Name
The permission name is case sensitive.
4. Click Search.
The search results will display below.
5. Click Reset to clear the search conditions.
74
Access Controller User Manual
Note
The advanced functions should be supported by the device.
Note
The displayed parameters may vary for different access control devices.
RS-485 Card Reader Communication Redundancy
You should check the checkbox if you wire the RS-485 card reader to the access control
device redundantly.
Press Key to Input Card No.
If you check the checkbox, you can input the card No. by pressing the key.
4. Click Save.
5. Optional: Click Copy to and select the access control device to copy the parameters to other
devices.
75
Access Controller User Manual
Note
● The duress code, super code, and dismiss code should be different.
● The duress code, super password, and the dismiss code should be different from the
authentication password.
● The duress code, super password, and the dismiss code should contain 4 to 8 digits.
76
Access Controller User Manual
5. Click Status Duration Settings to set the door status duration. For details, see Configure Duration
Schedule for Door Status.
6. Click Save.
7. Optional: Click Copy to and select the door/floor(s) to copy the parameters to other doors/
floors.
Note
The door or floor's status duration settings will be copied to the selected door/floor(s) as well.
77
Access Controller User Manual
Note
The displayed parameters may vary for different access control devices. There are part of
parameters listed as follows. Refer to the user manual of the device for more details.
Nickname
Edit the card reader name as desired.
Enable Card Reader
Select Yes to enable the card reader for card swiping.
OK LED Polarity/Error LED Polarity/Buzzer Polarity
Set OK LED Polarity/Error LED Polarity/Buzzer LED Polarity of main board according to the
card reader parameters. Generally, adopts the default settings.
Minimum Card Swiping Interval
If the interval between card swiping of the same card is less than the set value, the card
swiping is invalid. You can set it as 0 to 255.
Max. Interval When Inputting Password
When you inputting the password on the card reader, if the interval between pressing two
digits is larger than the set value, the digits you pressed before will be cleared automatically.
Enable Failed Attempts Limit of Card Reading
Enable to report alarm when the card reading attempts reach the set value.
Max. Times of Card Swiping Failure
Set the max. failure attempts of reading card.
Enable Tampering Detection
Enable the anti-tamper detection for the card reader.
Detect When Card Reader is Offline for
When the access control device cannot connect with the card reader for longer than the set
time, the card reader will turn offline automatically.
Buzzing Time
Set the card reader buzzing time. The available time ranges from 0 to 5,999s. 0 represents
continuous buzzing.
Card Reader Type/Card Reader Description
Get card reader type and description. They are read-only.
Fingerprint Recognition Level
Select the fingerprint recognition level in the drop-down list.
Default Card Reader Authentication Mode
78
Access Controller User Manual
You can view the default card reader authentication mode in this part.
5. Click Save.
6. Optional: Click Copy to and select the card reader(s) to copy the parameters to other card
readers.
Note
If the alarm input is armed, you cannot edit its parameters. Disarm it first.
1. Click Access Control → Advanced Function → Access Control Parameters to enter Parameter
Settings page.
2. Select a device and click to show the alarm inputs of the selected access control device.
3. Set the alarm input parameters.
Nickname
Edit the alarm input name as desired.
Detector Type
The detector type of the alarm input.
Zone Type
Set the zone type for the alarm input.
Sensitivity
Only when the duration of signal detected by the detector reaches the setting time, the alarm
input is triggered. For example, you have set the sensitivity as 10ms, only when the duration
of signal detected by the detector reach 10ms, this alarm input is triggered.
Trigger Alarm Output
Select the alarm output(s) to be triggered.
4. Click Save.
5. Optional: Click the switch on the upper-right corner to arm or disarm the alarm input.
79
Access Controller User Manual
Steps
1. Click Access Control → Advanced Function → Access Control Parameters to enter Parameter
Settings page.
2. Select a device and click to show the alarm outputs of the selected access control device.
3. Set the alarm output parameters.
Output Delay
The delay time for the alarm output to be triggered.
4. Click Save.
5. Optional: Set the switch on the upper right corner to ON to trigger the alarm output.
Note
The configured individual authentication has higher priority than other authentication modes.
The individual application mode will be applied to the device automatically.
5. Optional: Select a person in the Individual Authentication page, and click Modify to change the
person's individual authentication mode.
6. Optional: If applying individual authentication mode failed, click Failed Application to view
details. Select an applying status from the list and click Apply Again to apply the person's
authentication mode again to the device.
80
Access Controller User Manual
Steps
1. Click Access Control → Advanced Function → Card Reader Authentication to enter the card
reader authentication configuration page.
2. Select a card reader on the left to configure.
3. Set card reader authentication mode.
1) Click Configuration.
Note
● Password refers to the card password set when issuing the card to the person. For details,
Authentication Password.
● The supported card reader authentication mode varies according to different devices. For
81
Access Controller User Manual
Note
For setting the template, refer to Configure Schedule and Template .
3) Select the authentication type as Local Authentication, Local Authentication and Remotely
Open Door, or Local Authentication and Super Password from the drop-down list.
Local Authentication
Authentication by the access control device.
Local Authentication and Remotely Open Door
Authentication by the access control device and by the client. When the person swipes the
card on the device, a window will pop up. You can unlock the door via the client.
Note
You can check Offline Authentication to enable the super password authentication when
the access control device is disconnected with the client.
Local Authentication and Super Password
Authentication by the access control device and by the super password.
4) Select the added card group in the left list below and click to add the selected card group
to the right list as the authentication group.
82
Access Controller User Manual
Note
● The card swiping times should be larger than 0 and smaller than the added card quantity in
7) Click OK.
Note
● For each access control point (door), up to four authentication groups can be added.
Password or Local Authentication and Remotely Open Door, up to 7 card groups can be
added to the authentication group.
7. Click Save.
Note
The remain open duration should be between 0 and 1440 minutes. By default, the remain
open duration is 10 minutes.
83
Access Controller User Manual
Note
The First Card Authorization is effective only on the current day. The authorization will be
expired after 24:00 on the current day.
Note
You can swipe the first card again to disable the first card mode.
4. Click Add on the First Card List panel.
5. Select a card in the list and click OK to add the selected card as the first card of the doors.
The added first card will list on the First Card List panel.
6. Optional: Select a first card from the list and click Delete to remove the card from the first card
list.
7. Click Save.
Configure Anti-Passback
You can set to only pass the access control point according to the specified path and only one
person could pass the access control point after swiping the card.
Before You Start
Enable the anti-passing back function of the access control device.
Perform this task when you want to configure the anti-passing back for the access control device.
Steps
Note
Either the anti-passing back or multi-door interlocking function can be configured for an access
control device at the same time. For the configuration of multi-door interlocking, refer to
Configure Multi-door Interlocking .
1. Click Access Control → Advanced Function → Anti-Passback to enter the anti-passing back
configuration page.
2. Select an access control device in the list.
3. Select a card reader as the beginning of the path in the First Card Reader field.
4. Click the text field of the selected first card reader in the Card Reader Afterward column to open
Select Card Reader dialog.
84
Access Controller User Manual
5. Select the afterward card readers for the first card reader.
Note
Up to four afterward card readers can be added for one card reader.
6. Click OK in the dialog to save the selections.
7. Click Save at the upper-right corner of Anti-Passback page to save the settings and take effect.
Note
Super credentials, such as super card, super password, super fingerprint, and so on, have the
privilege of not following the anti-passback rules.
Example
Set Card Swiping Path
If you select Reader In_01 as the beginning, and select Reader In_02, Reader Out_04 as the linked
card readers. Then you can only get through the access control point by swiping the card in the
order as Reader In_01, Reader In_02 and Reader Out_04.
Note
It should be supported by the device.
Note
It supports M1 card at present and the sector cannot be encrypted. For details about sector
encryption, refers to Authenticate M1 Card Encryption .
1. Click Access Control → Advanced Function → Cross-Controller Anti-passing Back to enter the
cross-controller anti-passing back configuration page.
2. Check Enable Cross-Controller Anti-passing Back to enable the function.
85
Access Controller User Manual
Note
Up to 64 devices with anti-passing back function can be added.
7. Set the first card reader and after card readers.
1) In the Card Reader area, click the icon on the left of the card reader column to set it as the
first card reader.
Note
● Up to 16 card readers afterward can be added for each card reader.
● The displayed card readers in the card reader afterward input field should be in
authentication order.
3) Check the checkbox in the Enable Anti-passing Back column to enable the anti-passing back
function.
8. Click Save.
86
Access Controller User Manual
Steps
1. Click Access Control → Advanced Function → Cross-Controller Anti-passing Back to enter the
cross-controller anti-passing back configuration page.
2. Check Enable Cross-Controller Anti-passing Back to enable the function.
3. Select Based on Network as the anti-passing back mode.
4. Select Route Anti-passing Back as the rule.
5. Select a server in the drop-down list for judging the anti-passing back.
Note
● You can click Delete Card Swiping Record and select the card in the pop-up window to delete
Note
Up to 64 devices with anti-passing back function can be added.
7. Set the first card reader and after card readers.
1) In the Card Reader area, click the icon on the left of the card reader column to set it as the
first card reader.
Note
● Up to 16 card readers afterward can be added for each card reader.
● The displayed card readers in the card reader afterward input field should be in
authentication order.
3) Check the checkbox in the Enable Anti-passing Back column to enable the anti-passing back
function.
8. Click Save.
87
Access Controller User Manual
Note
It supports M1 card at present and the sector cannot be encrypted. For details about sector
encryption, refers to Authenticate M1 Card Encryption .
1. Click Access Control → Advanced Function → Cross-Controller Anti-passing Back to enter the
cross-controller anti-passing back configuration page.
2. Check Enable Cross-Controller Anti-passing Back to enable the function.
3. Select Based on Card as the anti-passing back mode.
4. Select Entrance/Exit Anti-passing Back as the rule.
5. Set the sector ID.
6. Click Select Access Controller to select a device for anti-passing back.
Note
Up to 64 devices with anti-passing back function can be added.
7. In the Card Reader area, check the checkboxes in the Enable Anti-passing Back column to select
the entrance card reader and the exit card reader.
Note
Up to one entrance carder and one exit card reader should be checked.
8. Click Save.
88
Access Controller User Manual
Note
● You can click Delete Card Swiping Record and select the card in the pop-up window to delete
Note
Up to 64 devices with anti-passing back function can be added.
7. In the Card Reader area, check the checkboxes in the Enable Anti-passing Back column to select
the entrance card reader and the exit card reader.
Note
Up to one entrance carder and one exit card reader should be checked.
8. Click Save.
Note
● Multi-door Interlocking function is only supported by the access control device which has more
than one access control points (doors).
● Either the anti-passing back or multi-door interlocking function can be configured for an access
control device at the same time. For the configuration of anti-passing back function, refer to
Configure Anti-Passback .
1. Click Access Control → Advanced Function → Multi-door Interlocking to enter the Multi-door
Interlocking page.
2. Select an access control device in the list of Controller List panel.
3. Click Add on the Multi-door Interlocking List panel to open Add Access Control Point to Interlock
window.
4. Select access control point (s) from the list.
89
Access Controller User Manual
Note
Up to four doors can be added in one multi-door interlocking combination.
5. Click OK to add the selected access control point(s) for interlocking.
The configured multi-door interlocking combination will list on the Multi-door Interlocking List
panel.
6. Optional: Select an added multi-door interlocking combination from the list and click Delete to
delete the combination.
7. Click Save.
Note
● The authentication password function should be supported by the access control device.
● Up to 500 cards with authentication password can be added to one access control device. The
password should be unique and cannot be same with each other.
Steps
1. Click Access Control → Advanced Function → Authentication Password to enter the
authentication password configuration page.
2. Select an access control device in the list of Controller List panel.
All the applied cards and persons will display on the Card List panel.
Note
For setting and applying the permissions to the device, refer to Assign Permission to Person .
3. Click the field of each card in the Password column to input the authentication password.
Note
The authentication password should contain 4 to 8 digits.
4. Click Save at the upper-right corner of Authentication Password page to save the settings.
The authentication password function of the card will be enabled automatically. And you can set
the card reader authentication mode of access control device as Card or Authentication
Password. Refer to Configure Card Reader Authentication Mode and Schedule for details.
90
Access Controller User Manual
Note
● By default, the device disables the custom wiegand function. If the device enables the custom
Wiegand function, all wiegand interfaces in the device will use the customized wiegand protocol.
● Up to 5 custom Wiegands can be set.
● For details about the custom Wiegand, see Custom Wiegand Rule Descriptions .
1. Click Access Control → Advanced Function → Custom Wiegand to enter the custom Wiegand
configuration page.
2. Select a custom Wiegand on the left.
3. Check Enable to enable the custom Wiegand.
4. Create a Wiegand name.
Note
Up to 32 characters are allowed in the custom Wiegand name.
5. Click Select Device to select the access control device for setting the custom wiegand.
6. Set the parity according to the property of the third party card reader.
Note
● Up to 80 bits are allowed in the total length.
● The odd parity start bit, the odd parity length, the even parity start bit and the even parity
from 1 to 80 bit.
7. Set output transformation rule.
1) Click Set Rule to open the Set Output Transformation Rules window.
91
Access Controller User Manual
Note
You can search the access control events within three months.
1. Click Access Control → Search → Access Control Event to enter the searching access control
event page.
2. Select the event source as Local Event.
3. Set the search conditions, such as device(s), event type, occurred time, and so on.
92
Access Controller User Manual
Note
For setting the triggered camera, refer to Configure Client Actions for
Access Event .
Export Event Click Export to export the search results to the local PC in CSV file.
Information
93
Access Controller User Manual
Steps
Note
The linkage actions here refer to the linkage of the client software's own actions such as audible
warning, email linkage, etc.
1. Click Event Management → Access Control Event .
The added access control devices will display in the device list.
2. Select a resource from the device list.
The event types which the selected resource supports will display.
3. Select the event(s) and click Edit Priority to define the priority for the event(s), which can be
used to filter events in the Event Center.
4. Set the linkage actions of the event.
1) Select the event(s) and click Edit Linkage to set the client actions when the events triggered.
Audible Warning
The client software gives an audible warning when alarm is triggered. You can select the
alarm sound for audible warning.
Note
For setting the alarm sound, please refer to Set Alarm Sound in the user manual of the
client software.
Email Linkage
Send an email notification of the alarm information to one or more receivers.
2) Click OK.
5. Enable the event so that when the event is detected, en event will be sent to the client and the
linkage actions will be triggered.
6. Optional: Click Copy to... to copy the event settings to other access control device, alarm input,
door, or card reader.
Note
It should be supported by the device.
94
Access Controller User Manual
Note
The device should support recording.
Card Reader Buzzer
The audible warning of card reader will be triggered.
Alarm Output
The alarm output will be triggered for notification.
Zone
Arm or disarm the zone.
Note
The device should support zone function.
Access Control Point
The door status of open, close, remain open, and remain close will be triggered.
Note
● The door status of open, close, remain open, and remain close cannot be triggered at the
same time.
● The target door and the source door cannot be the same one.
Audio Play
The audio prompt will be triggered. And the select audio index related audio content will be
played according to the configured play mode.
7. Click Save.
8. Optional: After adding the device linkage, you can do one or more of the following:
95
Access Controller User Manual
Edit Linkage Select the configured linkage settings in the device list and you can edit its
Settings event source parameters, including event source and linkage target.
Delete Linkage Select the configured linkage settings in the device list and click Delete to
Settings delete it.
Note
It should be supported by the device.
1. Click Event Management → Event Card Linkage .
2. Select the access control device from the list on the left.
3. Click Add button to add a new linkage.
4. Select the event source as Card Linkage.
5. Input the card number or select the card from the dropdown list.
6. Select the card reader where the card swipes to trigger the linked actions.
7. In the Linkage Target panel, set the property switch to on to enable this action.
Host Buzzer
The audible warning of access control device will be triggered.
Capture
The real-time capture will be triggered.
Recording
The recording will be triggered.
Note
The device should support recording.
Card Reader Buzzer
The audible warning of card reader will be triggered.
Alarm Output
The alarm output will be triggered for notification.
Zone
96
Access Controller User Manual
Note
The device should support zone function.
Access Control Point
The door status of open, close, remain open, and remain close will be triggered.
Note
The door status of open, close, remain open, and remain close cannot be triggered at the
same time.
Audio Play
The audio prompt will be triggered. And the select audio index related audio content will be
played according to the configured play mode.
8. Click Save.
When the card (configured in Step 5) swipes on the card reader (configured in Step 6), it can
trigger the linked actions (configured in step 7).
9. Optional: After adding the device linkage, you can do one or more of the following:
Delete Linkage Select the configured linkage settings in the device list and click Delete to
Settings delete it.
Edit Linkage Select the configured linkage settings in the device list and you can edit its
Settings event source parameters, including event source and linkage target.
97
Access Controller User Manual
Note
The door status of open, close, remain open, and remain close cannot be triggered at the
same time.
7. Click Save.
When the employee ID has entered on the selected card reader, it can trigger the linked actions
(configured in step 7).
8. After adding the device linkage, you can do one or more of the following:
Delete Linkage Select the configured linkage settings in the device list and click Delete to
Settings delete it.
Edit Linkage Select the configured linkage settings in the device list and you can edit its
Settings event source parameters, including event source and linkage target.
Note
It should be supported by the device.
Note
The devices should support this function.
1. Click Event Management → Cross-Device Linkage to enter the cross-device linkage configuration
interface.
98
Access Controller User Manual
Note
The door status of open, close, remain open, and remain close cannot be triggered at the
same time.
6. Click Save.
99
Access Controller User Manual
Note
The door status of open, close, remain open, and remain close cannot be triggered at the
same time.
6. Click Save.
100
Access Controller User Manual
Note
The door status of open, close, remain open, and remain close cannot be triggered at the
same time.
6. Click Save.
Note
● You can also import the access control device's alarm inputs into groups.
● For video access control terminal, you can import its camera into groups.
● For other detailed operations, refer to Group Management.
101
Access Controller User Manual
Note
For managing the access control group, refer to Group Access Control Points..
The access control points of the selected access control group will be displayed on the right.
3. Click on the Status Information panel to select a door.
4. Click the following buttons listed on the Status Information panel to control the door.
Open Door
Open the door once.
Close Door
Close the door once.
Remain Open
Keep the door open.
Remain Closed
Keep the door closed.
Note
● Make sure the door has linked to a door contact, or the door status cannot be displayed in the
operation log.
● Make sure the access control point cannot be armed by other client software, or you may not
view the changes of door status. Only one client software can arm the device, and then view
the changes of the door status, receive the alarm messages from the access control point.
102
Access Controller User Manual
2. Optional: Check Show Latest Access Record and the latest access record will be selected and
displayed at the top of the record list.
3. Optional: Click the event to view the person details, including captured person pictures
(captured picture and profile) person No., person name, organization, phone, contact address,
etc.
Authentication Result
Access results such as card No. not registered, succeeded, etc.
Note
For configuring the access control point on E-map, refer to Display Access Control Point on E-
map .
3. Optional: Click or to view the live view or the captured picture of the triggered camera
when the alarm is trigged.
Note
For setting the triggered camera, refer to Configure Client Actions for Access Event .
4. Optional: Select the alarm that the client can receive when the alarm is triggered.
1) Click Subscribe.
2) Check the checkbox(es) to select the alarm(s), including device exception alarm, door event
alarm, card reader alarm, and alarm input.
3) Click OK to save the settings.
103
Access Controller User Manual
Steps
1. Enter Live View module and start live view of one camera.
Note
For details about starting live view, refer to for details.
2. Link the camera with an access control point.
1) Right click on the live view window and select Link to Access Control Point to open the Set
Linked Access Control Point window.
2) Check Enable to enable the linkage.
3) Select access control point from the drop-down list.
4) Click OK.
Note
One camera can be linked to only one access control point; Different cameras can be linked to
the same access control point.
3. Start the camera's live view again to make the settings effective.
Four door control buttons will appear on the toolbar during live view.
4. Click to control the door to open, close, remain open, or remain closed.
Note
● For Video Access Control Terminal, you can also add its camera to the E-map to view the live
view of the camera.
● For detailed operations of E-map, refer to .
104
Access Controller User Manual
The door icons are added on the map as hot spots and the icons of added access control points
change from to in the group list. You can click-and-drag the access control point icons to
move the hot spots to the desired locations.
7. After adding the access control point on the map as hot spot, you can control the access control
point and view triggered alarm.
1) Click Exit Editing Mode on the E-map toolbar to enter the map preview mode.
2) To control the access control point, you can right click the access control point icon on the
map, and click Open Door, Close Door, Remain Open, and Remain Closed to control the door.
Note
To display the alarm information on the map, you should set display on e-map as the alarm
linkage action. For details, refer to Configure Client Actions for Access Event .
105
Access Controller User Manual
The device will synchronize time with NTP automatically. After you enable NTP, you should set
the NTP server address, NTP port, and synchronization interval.
Manual Time Synchronization
After you enable Manual Time Synchronization, you can manually set the device time.
If you check Synchronize with Computer Time, the Set Time will display the current computer's
time. At this time, uncheck Synchronize with Computer Time, and click , you can edit the
device time manually.
Click Save to save the settings.
DST
On the Device for Management page, click Remote Configuration → System → Time → DST to
enter the DST tab.
Enable DST and you can edit the DST bias time, the DST start time, and end time.
Click Save.
106
Access Controller User Manual
Note
● N1 refers to wired network and G1 refers to GPRS.
● Only device with 3G/4G function supports setting the channel as G1.
Note
If set the EHome type as EHome5.0, you should create an EHome key as well.
Click Save.
After creating the EHome information, you can add the device via EHome protocol.
107
Access Controller User Manual
Caution
The password strength of the device can be automatically checked. We highly recommend you
change the password of your own choosing (using a minimum of 8 characters, including at least
three kinds of following categories: upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. And we recommend you reset your
password regularly, especially in the high security system, resetting the password monthly or
weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
installer and/or end-user.
4. Click OK.
Result
The device password is changed. You should enter the new password on the Device for
Management page to reconnect the device.
108
Access Controller User Manual
Reboot
On the Device for Management page, click Remote Configuration → System → System
Maintenance to enter the System Maintenance tab.
Click Reboot and the device starts rebooting.
Restore Default Settings
On the Device for Management page, click Remote Configuration → System → System
Maintenance to enter the System Maintenance tab.
Restore Default
The parameters will be restored the default ones, excluding the IP address.
Restore All
All device parameters will be restored to the default ones. The device should be activated after
restoring.
Upgrade
On the Device for Management page, click Remote Configuration → System → System
Maintenance to enter the System Maintenance tab.
Select a device type from the drop-down list, click Browse and select an upgrade file from the local
computer, and click Upgrade.
109
Access Controller User Manual
Note
● If you select Card reader as the device type, you should also select a card reader No. from the
drop-down list.
● The upgrade will lasts for about 2 min. Do not power off during the upgrading. After upgrading,
the device will reboot automatically.
Note
In this section, we introduce the configurations before you can getting the attendance reports. The
access records recorded after these configurations will be calculated in the statistics.
110
Access Controller User Manual
Note
If you have configured the different card readers as start-work and end-work check points,
you can check Absence time is not included in effective work hours to exclude the absence
time from the work hours.
Check-in / Check-out Required
Check the checkboxes and set the valid period for check-in or check-out.
Mark as Late/Mark as Early Leave
Set the time period for late or early leave.
Exclude Break Period from Work Duration
Check the checkbox and set the break period excluded.
Note
Up to 3 break periods can be set.
Set as Pay-per-Time Period
Check the checkbox and set the pay rate and minimum time unit.
5. Click Save.
The added time period lists on the left panel of the window.
Add Shift
You can add the shift for the shift schedule.
Before You Start
Add a time period first. See Add Time Period for details.
Perform this task when you need to add shift.
Steps
1. Enter Time and Attendance module.
2. Click Shift Schedule Management → Shift Settings → Shift to enter Shift Settings window.
3. Click Add to enter Add Shift page.
4. Input the name for shift.
5. Select the shift period from the drop-down list.
6. Select the added time period and click on the time bar to apply the time period.
7. Click Save.
The added shift lists on the left panel of the window.
111
Access Controller User Manual
Note
After checking the Effective for Multiple Shift Schedules, you can select the effective time
period(s) from the added time periods for the persons in the department.
Multiple Shift Schedules
It contains more than one time periods. The person can check in/out in any of the time
periods and the attendance will be effective.
If the multiple shift schedules contains three time periods: 00:00 to 07:00, 08:00 to 15:00 and
16:00 to 23:00. The attendance of the person adopting this multiple shift schedules will be
effective in any of the three time periods. If the person checks in at 07:50, it will apply the
nearest time period 08:00 to 15:00 to the person's attendance.
7. Optional: Check Set as Default for All Persons in Department.
All persons in the department will use this shift schedule by default.
8. Optional: If the selected department contains sub department(s), you can check Set as Shift
Schedule for All Sub Departments to apply the department schedule to its sub departments.
9. Click Save.
112
Access Controller User Manual
Note
After checking the Effective for Multiple Shift Schedules, you can select the effective time
period(s) from the added time periods for the persons in the department.
Multiple Shift Schedules
It contains more than one time periods. The person can check in/out in any of the time
periods and the attendance will be effective.
If the multiple shift schedules contains three time periods: 00:00 to 07:00, 08:00 to 15:00 and
16:00 to 23:00. The attendance of the person adopting this multiple shift schedules will be
effective in any of the three time periods. If the person checks in at 07:50, it will apply the
nearest time period 08:00 to 15:00 to the person's attendance.
9. Click Save.
113
Access Controller User Manual
Note
The temporary schedule has higher priority than department schedule and person schedule.
1. Enter Time and Attendance module.
2. Click Shift Schedule Management tab to enter the Shift Schedule Management page.
3. Select the department and select one person.
4. Click Temporary Schedule to pop up Temporary Schedule window.
5. Click to set the shift date.
6. Select the time period.
7. Click the time bar to apply the time period for the select date.
8. Optional: Click Advanced Settings and select advanced attendance rules for the temporary
schedule.
9. Click Add.
114
Access Controller User Manual
Note
The exported details are saved in CSV format.
115
Access Controller User Manual
Perform the following steps when you want to add a leave or business trip application.
Steps
1. Enter Time and Attendance module.
2. Click Attendance Handling → Leave and Business Trip to enter the Leave and Business Trip
page.
3. Click Add to open the Add Leave and Business Trip Application window.
4. Select the leave and business trip type from the drop-down list.
Note
You can set the leave type in Advanced Settings. For details, refer to Configure Leave Type .
5. Click and set the time period for your leave or business trip.
6. Click Employee Name filed and select the person for the application in the pop-up Add Person
window.
7. Optional: Input the remark information as desired.
8. Click Add.
The added leave and business trip displays on the Leave and Business Trip page.
9. Optional: After adding the leave and business trip application, perform one of the following
operations.
Modify Select the leave and business trip and click Modify to edit the leave or business
application.
Delete Select the leave and business trip and click Delete to delete the leave or
business trip application.
Report Click Report to generate the leave or business trip report.
Export Click Export to export the leave or business trip details to local PC.
Note
The exported details are saved in CSV format.
116
Access Controller User Manual
Perform this task if you need to set the time to make the client calculate attendance data
automatically.
Steps
Note
It will calculate the attendance data till the previous day.
1. Enter the Time and Attendance module.
2. Click Attendance Handling → Attendance Calculation to enter the attendance record calculation
page.
3. In the Auto-Calculate Attendance panel, set the time that you want the client to calculate the
data every day.
4. Click Save.
Note
It can only calculate the attendance data within three months.
117
Access Controller User Manual
Steps
1. Enter Time and Attendance module.
2. Click Advanced Settings → Basic Settings to enter the Basic Settings page.
3. Set the start day of each week and the start date of each month from the drop-down list.
4. Set the non-work day settings.
Set as Non-Work Day
Check the checkboxes to set the dates as non-work days.
Set Non-Work Day's Color in Report
Select the color from the Select Color window. The non-work days in the report will mark as
the configured color.
Set Non-Work Day's Mark in Report
Input the mark and the non-work day field in the report will display with the mark.
5. Set the authentication type, which means the client will calculate the attendance data recorded
based on the selected authentication type.
6. Click Save.
Note
The parameters configured here will be set as default for the newly added time period. It will not
affect the existed one(s).
1. Enter Time and Attendance module.
2. Click Advanced Settings → Attendance Rule Settings to enter the Attendance Rule Settings
page.
3. Set rule parameters, including attendance/absence parameters, check-in/out parameters, and
overtime parameters.
4. Optional: Check Non-scheduled Work Day and set the overtime rule for non-work day.
5. Click Save.
118
Access Controller User Manual
Note
By default, all card readers of the added access control devices are set as attendance checkpoint.
1. Enter the Time and Attendance module.
2. Click Advanced Settings → Attendance Check Point Settings to enter the Attendance Check
Point Settings page.
3. Optional: Uncheck Set All Card Readers as Check Points.
Only the card readers in the list will be set as the attendance check points.
4. Click to enter the Add Attendance Check Point window.
5. Set the related parameters.
Check Point Name
Customize a name for the check point.
Card Reader
Select the card reader from the drop-down list as the attendance check point.
Check Point Function
Select the check point function from the drop-down list. You can set the check point as Start/
End-Work check point, Start-Work check point, or End-Work check point.
Door Location
Input the door location's name.
Check Point Description
Input the check point's descriptions as desired.
6. Click Add.
The added attendance check point displays on the list.
7. Optional: After adding the attendance check point, perform one of the following operations.
Edit the attendance check point information.
Delete the attendance check point in the list.
Configure Holiday
You can add the holiday during which the check-in or check-out will not be recorded.
119
Access Controller User Manual
120
Access Controller User Manual
121
Access Controller User Manual
Note
If one holiday crosses two years and the effective period
6. Click OK.
7. Optional: After adding the holiday, perform one of the following operations.
Edit the holiday information.
Delete the holiday from the holiday list.
122
Access Controller User Manual
card. For details, refer to Manage Organization and Manage Person Information .
● Calculate the attendance data.
Note
○ The client will automatically calculate the previous day's attendance data at 1:00 am on the
next day.
○ Keep the client running at 1:00 am or it cannot calculate the previous day's attendance data
automatically. If not calculated automatically, you can calculate the attendance data manually.
For details, refer to Manually Calculate Attendance Data .
Perform the following steps to search the employees' all attendance data in a time period.
Steps
1. Enter the Time and Attendance module.
2. Click Attendance Statistics → Attendance Summary to enter the Attendance Summary page.
3. Select a department from the drop-down list.
4. Optional: Input the person name for search.
5. Select the attendance start date and end date that you want to search from.
6. Optional: Click Reset to reset all search conditions and edit the search conditions again.
7. Click Search.
123
Access Controller User Manual
The result displays on the page. You can view the employee's required attendance times, actual
attendance times, late times, early leave times, absent times, overwork times, leave times, etc.
8. Optional: After searching the result, perform one of the following operations.
Report Generate the attendance report.
Export Export the results to the local PC.
card. For details, refer to Manage Organization and Manage Person Information .
● Calculate the attendance data.
Note
○ The client will automatically calculate the previous day's attendance data at 1:00 am on the
next day.
○ Keep the client running at 1:00 am or it cannot calculate the previous day's attendance data
automatically. If not calculated automatically, you can calculate the attendance data manually.
For details, refer to Manually Calculate Attendance Data .
Perform the following steps to search the employee's detailed attendance data.
Steps
1. Enter the Time and Attendance module.
2. Click Attendance Statistics → Attendance Details to enter the Attendance Details page.
3. Select a department from the drop-down list.
4. Optional: Input the person name for search.
5. Select the attendance start date and end date that you want to search from.
6. Optional: Check the attendance status that you want to search.
7. Optional: Click Reset to reset all search conditions and edit the search conditions again.
8. Click Search.
The detailed information of the attendance details displays below. You can view the attendance
date, the person belonged shift, time period, start-work status, end-work status, check-in time,
check-out time, late period, early leave period, attendance period, absence period, leave period,
and overwork period.
9. Optional: After searching the result, perform one of the following operations.
Report Generate the attendance report.
124
Access Controller User Manual
card. For details, refer to Manage Organization and Manage Person Information
● Calculate the attendance data.
Note
○ The client will automatically calculate the previous day's attendance data at 1:00 am on the
next day.
○ Keep the client running at 1:00 am or it cannot calculate the previous day's attendance data
automatically. If not calculated automatically, you can calculate the attendance data manually.
For details, refer to Manually Calculate Attendance Data .
Perform the following steps to search the employee's abnormal attendance data.
Steps
1. Enter the Time and Attendance module.
2. Click Attendance Statistics → Abnormal Attendance to enter the Abnormal Attendance page.
3. Select a department from the drop-down list.
4. Optional: Input the person name for search.
5. Select the attendance start date and end date that you want to search from.
6. Optional: Click Reset to reset all search conditions and edit the search conditions again.
7. Click Search.
The result displays below. You can view the employee No., the person name, the person
belonged department, the abnormal type, the abnormal start time, the abnormal end time, and
the abnormal date.
8. Optional: After searching the result, perform one of the following operations.
Report Generate the attendance report.
Export Export the results to the local PC.
125
Access Controller User Manual
card. For details, refer to Manage Organization and Manage Person Information .
● Calculate the attendance data.
Note
○ The client will automatically calculate the previous day's attendance data at 1:00 am on the
next day.
○ Keep the client running at 1:00 am or it cannot calculate the previous day's attendance data
automatically. If not calculated automatically, you can calculate the attendance data manually.
For details, refer to Manually Calculate Attendance Data .
Perform the following steps to search the overtime working data.
Steps
1. Enter the Time and Attendance module
2. Click Attendance Statistics → Overtime Search to enter the Overtime Search page.
3. Select a department from the drop-down list.
4. Optional: Input the person name for search.
5. Select the attendance start date and end date that you want to search from.
6. Optional: Click Reset to reset all search conditions and edit the search conditions again.
7. Click Search.
The detailed information of the overtime work result displays below. You can view the employee
No., the person name, the person belonged department, the overtime work's date, the overtime
duration, and the overtime type.
8. Optional: After searching the result, perform one of the following operations.
Report Generate the attendance report.
Export Export the results to the local PC.
card. For details, refer to Manage Organization and Manage Person Information .
● Calculate the attendance data.
126
Access Controller User Manual
Note
○ The client will automatically calculate the previous day's attendance data at 1:00 am on the
next day.
○ Keep the client running at 1:00 am or it cannot calculate the previous day's attendance data
automatically. If not calculated automatically, you can calculate the attendance data manually.
For details, refer to Manually Calculate Attendance Data .
Perform the following steps to searching and the view card swiping log.
Steps
1. Enter the Time and attendance module.
2. Click Attendance Statistics → Card Swiping Log to enter the Card Swiping Log page.
3. Configure the search conditions, including the employee department, employee name, or
attendance date.
4. Optional: Click Reset to reset all search conditions.
5. Click Search.
The search result lists on this page.
You can view the result details, including the employee No., employee name, department, time,
authentication mode, and card No.
6. Optional: After searching and view the card swiping log, perform one of the following
operations.
Report Generate the attendance report.
Export Export the results to the local PC.
Note
You can calculate the attendance data manually, or set the schedule so that the client can calculate
the data automatically every day. For details, refer to Calculate Attendance Data .
Perform the following steps to generate the attendance report instantly.
127
Access Controller User Manual
Steps
1. Enter the Time and Attendance module.
2. Click Attendance Statistics → Report to enter the Report page.
3. In the Instant Report panel, select a report type from the drop-down list.
4. Select a person or department.
5. Set the time period during which the attendance data will be displayed in the report.
6. Click Generate.
Note
Set the email parameters before you want to enable auto-sending email functions. For details,
refer to Set Email Parameters.
1. Enter the Time and Attendance module.
2. Click Attendance Statistics → Report to enter the Report page.
3. In the Scheduled Report panel, click Add to pre-define a report and set the report content.
4. Set the report content.
Person
Select the added person(s) and click to add the person.
5. Optional: Set the schedule to send the report to the email address(es) automatically.
1) Set the Auto-Sending Email switch to ON to enable this function.
2) Set the effective period during which the client will send the report on the selected sending
date(s).
3) Select the date(s) on which the client will send the report.
4) Set the time at which the client will send the report.
Example
If you set the effective period as 2018/3/10 to 2018/4/10, select Friday as the sending date,
and set the sending time as 20:00:00, the client will send the report at 8 p.m. on Fridays
during 2018/3/10 to 2018/4/10.
Note
Make sure the attendance records are calculated before the sending time. You can calculate
the attendance data manually, or set the schedule so that the client can calculate the data
automatically every day. For details, refer to Calculate Attendance Data .
5) Input the receiver email address(es).
128
Access Controller User Manual
Note
You can click to add a new email address. Up to 5 email addresses are allowed.
6. Click Save.
7. Optional: After adding the scheduled report, you can do one or more of the followings:
Modify Report Select one added report and click Modify to edit its settings.
Delete Report Select one added report and click Remove to delete it.
Generate Report Select one added report and click Generate to generate the report
instantly and you can view the report details.
129
Access Controller User Manual
Recommended Finger
Forefinger, middle finger or the third finger.
Correct Scanning
The figure displayed below is the correct way to scan your finger:
You should press your finger on the scanner horizontally. The center of your scanned finger should
align with the scanner center.
Incorrect Scanning
The figures of scanning fingerprint displayed below are incorrect:
130
Access Controller User Manual
Environment
The scanner should avoid direct sun light, high temperature, humid conditions and rain.
When it is dry, the scanner may not recognize your fingerprint successfully. You can blow your
finger and scan again.
Others
If your fingerprint is shallow, or it is hard to scan your fingerprint, we recommend you to use other
authentication methods.
If you have injuries on the scanned finger, the scanner may not recognize. You can change another
finger and try again.
131
Access Controller User Manual
When the switch is towards ON, it means the switch is enabled, otherwise, the switch is off. If you
set the DIP switch like the figure displayed below, its binary value is 00001100, and its decimal
value is 12.
132
Access Controller User Manual
Wiegand Data
Wiegand Data = Valid Data + Parity Data
Total Length
Wiegand data length.
Transportation Rule
4 bytes. Display the combination types of valid data. The example displays the combination of Card
ID and Manufacturer Code. The valid data can be single rule, or combination of multiple rules.
Parity Mode
Valid parity for Wiegand data. You can select either odd parity or even parity.
Odd Parity Start Bit, and Length
If you select Odd Parity, these items are available. If the odd parity start bit is 1, and the length is
12, then the system will start odd parity calculation from bit 1. It will calculate 12 bits. The result
will be in bit 0. (Bit 0 is the first bit.)
133
Access Controller User Manual
134
UD17326B-D