ZKTECO PRORFM Smart Access Control Terminal User Manual

ZKTECO CO., LTD. Smart Access Control Terminal

User Manual

          User Manual   ProRF Version: 1.0 Date: Nov. 2018
 Important Statement Thank you for choosing our product. Before using this product, please read this user manual carefully to avoid risks of danger to the users of this product or those nearby and damaging the device. Follow these instructions to ensure that your product functions properly and completes verifications in a timely manner. Unless authorized by our company, no group or individual shall take excerpts of or copy all or part of these instructions nor transmit the contents of these instructions by any means. The products described in this manual may include software that is copyrighted by our company and its possible licensors. No one may copy, publish, edit, take excerpts of, decompile, decode, reverse-engineer, rent, transfer, sublicense, or otherwise infringe upon the software's copyright unless authorized by the copyright holder(s). This is subject to relevant laws prohibiting such restrictions.          As this product is regularly updated, we cannot guarantee exact consistency between the actual product and the written information in this manual. Our company claims no responsibility for any disputes that arise due to differences between the actual technical parameters and the descriptions in this document. The manual is subject to change without prior notice.
I Contents 1. Must Know ......................................................................................................................................................................................................................................... 1 1.1 Product Profile .................................................................................................................................................................................................................. 1 1.2 Communication Connections ................................................................................................................................................................................ 1 2. Access Control Software ........................................................................................................................................................................................................... 2 2.1 Adding a device ............................................................................................................................................................................................................... 2 2.1.1 Device Settings ................................................................................................................................................................................................. 5 2.2 Adding a user and a card ........................................................................................................................................................................................... 5 2.3 Access Control Settings .............................................................................................................................................................................................. 6 2.4 Upload and download ................................................................................................................................................................................................ 6 2.4.1 Sync All Data to Device ............................................................................................................................................................................... 7 2.4.2 Get Event Entries ............................................................................................................................................................................................. 8 2.4.3 Get Personnel Data From Device .......................................................................................................................................................... 9 2.5 Monitor in real time ....................................................................................................................................................................................................... 9 CE Note .................................................................................................................................................................................................................................................. 10 FCC Warning ....................................................................................................................................................................................................................................... 11
1 1. Must Know 1.1 Product Profile SCR100 Plus released by our company is the World’s first access controller and reader based on TCP/IP, professional access control machine with ID card but no screen and no press-key. These access control product series added with  ID card provide a more product choices for system access control solutions. It can be used as a separate control lock, also can be used as an access controller connecting ID cards, to realize master-slave machine or anti-passback function. The device can connect with Ethernet over TCP/IP. It can be embedded with Webserver to visit query records and so on via Internet. 1.2 Communication Connections The background PC software can communicate with the device, upload and download data and perform remote management of the terminal over TCP/IP. The device can connect with Ethernet in the following two ways:    1.   The device directly connects to the computer.   2.   The device connects to the computer over an Ethernet through a switch.  The default IP address is 192.168.1.201. IP addresses of the server (PC) and the device must be in the same network segment.  TCP/IP PC TCP/IP TCP/IP TCP/IP … Switch PC
2 2. Access Control Software Suppose the device has connected with PC well and the access control software has been installed already.  On the desktop, double-click the ZKBiosecurity icon   to enter the system. The user name of the super user is [admin], and the password is [admin], then click [login]. After the first login to the system, please reset the password in   [Personnel Information].   2.1 Adding a device  Add Device by manually 1) Click [Access Device] > [Device] > [New] on the Action Menu, the following interface will be shown:
3 Device Name: Any character, up to a combination of 50 characters. Communication type: TCP/IP. IP Address: Please enter the IP Address of the device, the default IP address is 192.168.1.201. Communication port: The default value is 4370. Communication Password: Any character, up to a combination of 8 characters (No blank). You need to input this field only when you add a new device with the communication password. It cannot be modified when you edit the device information except in [Modify communication password] operation. Note: You do not need to input this field if the device has no communication password, such as when it is a new factory device or just after the initialization. Icon Type: It will set the representation of the device. You can choose as per the kind of device; Door, Parking barrier, Flap Barrier.  Control Panel Type: Standalone Device. Area: Specify areas of devices. After Area Setting, devices (doors) can be filtered by area upon Real-Time Monitoring. Add to Level: Automatically add the device to the selected level. The device cannot be automatically added to the selected level if the number of personnel exceeds 5000. You can add personnel after the device is successfully added. Clear Data in the Device when Adding: If this option is being ticked, after adding device, the system will clear all data in the device, except the event logs. If you add the device just for demonstration or testing of the system, there is no need to tick it. 2) After editing, click [OK], and the system will try connecting the current device: Note: When you add a new device to the system, the system will clear all user information, time zones, holidays, and access control levels settings (including access control group, anti-passback, interlock settings, linkage settings, etc.) from the device, except the events record in the device. Unless the information in the device is unusable, we recommend you not to delete the device in used, to avoid the loss of information. 3) One PC can connect with multiple devices, and the access control software in PC can manage multiple devices at the same time. If you want to add devices, please click [New]. If you want to delete devices, select devices and click [Delete]. For details, please refer to “ZKBiosecurity User Manual”.
4  Add Device by Searching Access Controllers Search the device in the Ethernet. (1) Click [Access Device] > [Device] > [Search Device], to open the Search interface.  (2) Click [Search], and it will prompt [Searching……]. (3) After searching, the list and total number of access controllers will be displayed.  (4) Click on [Add] in the search list.
5 2.1.1 Device Settings Includes that Modify IP Address, Close Auxiliary Output, Disable, Enable, Modify Communication Password, Synchronize Time, Upgrade Firmware, Get Logs From SD Card, Import Data From USB disk and so on. For more details, please refer to “ZKBiosecurity User Manual”. 2.2 Adding a user and a card 1) Click [Personnel] > [Person] > [New]:  The fields are as follows: Personnel ID: An ID may consist of up to 9 characters, within the range of 1 to 79999999. It can be configured based on actual conditions. The Personnel No. contains only numbers by default but may also include letters.   Notes:  When configuring a personnel number, check whether the current device supports the maximum length and whether letters can be used in personnel ID.  To edit the settings of the maximum number of characters of each personnel number and whether letters can also be used, please click [Personnel] > [Parameters]. Department: Select from the pull-down menu and click [OK]. If the department was not set previously, only one department named [Company Name] will appear. First Name/Last Name: The maximum number of character is 50. Card number: Assign a card number to the person for access control use. The max length is 10, and it should not
6 be repeated. This can be done manually or by using card issuer.   2.3 Access Control Settings The access control system can set the opening levels of registered users, namely, allowing some personnel to open some doors by verification during a time period. Access Control System Management primarily includes Access Control Time Zones, Access Control Holiday, Door Settings, Access Levels, Personnel Access Levels, Real-Time Monitoring, and Reports, etc.  Access control system parameters 255 time zones. Unlimited access levels. Three holiday types and 96 holidays total. Anti-passback function. Wiegand format. Interlock function. Linkage function. First-Card Normal Open function. Multi-Card Opening function. Remote door opening and closing. Real-time monitoring. For more details, please refer to “ZKBiosecurity User Manual”. 2.4 Upload and download For a PC corresponding to multiple devices, the user information in PC can be uploaded to multiple devices, and user information in multiple devices can be downloaded to this PC also.   For the first time to use, after user information and ID cards are registered, user information can be uploaded from PC to device through  . After the registered ID cards are punched on device successfully, attendance records will be generated in device. These attendance records can be downloaded from device to PC through [Reports].
7 2.4.1 Sync All Data to Device 1) Click [Device Control] > [Synchronize All Data To Devices] in the Device page.   2) Click [Synchronize], the following interface will be shown.  Note: The operation of Synchronize All Data is mainly to delete all data in the device first (except event record). Download all settings again, please keep the net connection stable and avoid power down situations, etc. If the device is
8 working normally, please use this function with caution. Execute it in rare user situations to avoid impacting on normal use of the device. 2.4.2 Get Event Entries Click [Device Control] > [View and Get device Info] > [Get Transactions] to get transactions from the device into the system. Two options are provided for this operation: Get New Transactions and Get All Transactions. Get New Transactions: The system only gets new transactions since the last collected and recorded transaction. Repeated transactions will not be rewritten. Get All Transactions: The system will get transactions again. Repeated entries will not be shown twice.  When the network status is healthy and the communication between the system and device is normal, the system will acquire transactions of the device in real-time and save them into the system database. However, when the network is interrupted or communication is interrupted for any reasons, and the transactions of the device have not been uploaded into the system in real-time, [Get Transactions] can be used to manually acquire transactions of the device. In addition, the system, by default, will automatically acquire transactions of the device at 00:00 on each day. You can view the  statistics of relevant device data in [Report], including card verification information, door operation information, and normal punching information, etc. By default, the system displays latest three months transactions. Click [Reports] > [All Transactions] to view all transactions:
9 Clear All Data: Click [Clear All Data] to pop up prompt and click [OK] to clear all transactions. Export: You can export all transactions in Excel, PDF, CSV format. Note: The device can restore up to 1 million of event entries. When the entries exceed this number, the device will automatically delete the oldest restored entries. 2.4.3 Get Personnel Data From Device Click [Device Control] > [View and Get device Info] > [Get Personnel Information] in the Device page. Renew the current information in the device. The final value will be displayed in the device list. 2.5 Monitor in real time Suppose a user with an ID card has been uploaded to device, when this card is punched on the device, the device will pass the verification (LED indicator light will turn green and be constant on for 2 seconds) and then generate an attendance record. In  ZKBiosecurity  Software, click [Access] > [Access Device] > [Real-Time Monitoring] to monitor  the  statuses, real-time events of doors and punching on device in real time. If you want to stop monitoring, please click [Stop Monitoring].
10 CE Note Manufacturer: ZKTECO CO., LTD. Address: No.26, Pingshan 188 Industry zone, Tangxia Town, Dongguan City, Guangdong Province, China 523728 Hereby, ZKTECO CO., LTD. declares that this device is in compliance with the essential requirements and other relevant provisions of Directive 2014/53/EU. Importers: ZKTECO EUROPE SL Address: Carretera de Fuencarral, 44 Edificio 1, Planta 2, 28108 Alcobendas, Madrid- Spain A copy of the declaration of conformity can be obtained with this user manual; this product is not restricted in the EU. The wireless operation frequency RFID: 13.56MHzThe device has been evaluated to meet CE  general RF exposure requirement. The device can be used without restriction.
11 FCC Warning This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.  NOTE: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: -- Reorient or relocate the receiving antenna. -- Increase the separation between the equipment and receiver. -- Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. -- Consult the dealer or an experienced radio/TV technician for help.  Note: The manufacturer is not responsible for any radio or TV interference caused by unauthorized modifications to this equipment. Such modifications could void the user’s authority to operate this equipment.  Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.  RF Exposure Statement The device has been evaluated to meet general RF exposure requirement. The device can be used in portable exposure condition without restriction.
12  ZK Building, Wuhe Road, Gangtou, Bantian, Buji Town, Longgang District, Shenzhen China 518129 Tel: +86 755-89602345 Fax: +86 755-89602394 www.zkteco.com © Copyright 2018. ZKTECO CO., LTD. ZKTeco Logo is a registered trademark of ZKTeco or a related company. All other product and company names mentioned are used for identification purposes only and may be the trademarks of their respective owners. All specifications are subject to change without notice. All rights reserved.

Navigation menu