User Manual LTAL5300PM Version: 1.
Contents 1 Introduction...............................................................................................................................................5 1.1 Compiling intention .................................................................................................................................................5 2 Start-up .....................................................................................................................................................
Baud rate ......................................................................................................................................................24 Ethernet network ..........................................................................................................................................24 IP address .....................................................................................................................................................24 Subnet mask ...............
User registration inquiries....................................................................................................................................33 5 Connection mode of external port ..........................................................................................................34 5.1 description of external port ....................................................................................................................................34 5.
1 Introduction 1.1 Compiling intention Instruction for users 2 Start-up When to start up, display firm LOGO and progress bar, collocate LOGO freely, enter original interface after start up, such as: Progress bar 3 The initial interface After device links with power supply, the screen shows the first interface we call the initial interface, see figure, the basic information is as follows: Explanation: 1 Use larger font to display time. 2 Use other smaller font to display date, week, and other information.
The Icon shows the main hardware configuration, including whether or not have camera, ID (MIFARE) Card, fingerprint, SD card, network with power supply mode, serial port and so on Help tips column, shows the current status or message notification 1. Administrator enter into management mode, 1)Press MENU key,Equipment prompts " administrator, Please verify..." 2)Manager loggings in, administrators can use password, fingerprint or cards to log on 2.
Keypad tone Checking interface settings Delete all records Expert settings Delete all registered data Restore the factory settings Firmware upgrade Daylight saving time settings Function key settings Total numbers of managers Password of super manager Sensitivity adjustment Belling settings Power supply management Free time settings Beginning and end of belling time belling time Belling music power off dormancy Play colorful propaganda Time power off Time dormancy Time starting up locking off key t
Recording settings Automatic detection Management recording alarm (alarm) Checking recording alarm (alarm) repeat affirmed time Run all testing Memory testing LCD function testing Sound testing Fingerprint Collector testing Keyboard testing Real-time clock Access Control settings Time sect settings Grouping function settings User access control settings Combination mode of groups Validation mode of groups Time group Validation mode of time group Other validation modes basic settings of unlocking com
U disk management Binding ID Download checking records Download management records Download user information Upload user message Upload message notification Upload mp3 Alarm reset registered user number registered fingerprint number Checking record number Management record number Used memory User registered Residual capacity System information number Fingerprint registered number Checking record number Management record number Residual memory Fingerprint capacity Recording capacity Management recordin
query Management recording query User registration Inquiries Press MENU key, the following “help column” prompts" administrator, Please verify..." At this time, administrator can be passed through pressing fingerprints, inputting ID and password or swiping card to enter the menu, such as authentication, only proved to be successful can enter the main menu. See “8 validation process ”for verification process 1. Default the first as focus after entering the menu, display borders on the focus icon with. 2.
4.1 user management 4.1.1 User Registration Explanation: 1、The intermediate user: Refer to the general user, namely person who needs to verify identity because of some purpose, such as person who opens the door through the device, or only those who check on work attendance.
Default empty Password must be six figures, default 888888 Default empty, only the option (subject to sector configuration files) Default ordinary user, choose by the down direction keys Intermediate user Administrator Super administrator 1. The default code at this point: the last No. automatically add 1, the name is empty, there must be six figures, default 888888 password, the user-level is general 2.
Fingerprint registration Fingerprint registration dialog box Choose 1 Fingerprint registration,then enter into the following dialog box Have voice tips at the same time: “Please press finger…” after succeed, it prompts: “please leave” Please press finger in the second time …after succeed, it Number 0-9.
1, If the RF card has been registered and prompts, "RF card is in existence, whether or not to re-register?" Dialog box is shown as below: After confirm, enter into such dialog box: Voice tips: “Please show card…” after succeed, judge whether or not repeat, if not, prompts “successful registration of RF card”, if repeat, prompts “repeat card number, please show card again…”, cycle by cycle until reach success or cancel Original sound REC Through recording real voice of the person (usually my name), as voi
After confirm, enter into such dialog box: Voice tips: “Please say your name…” after succeed, prompts “successful record”, if not successful, prompts “ Please re-record”, cycle by cycle until reach success or cancel Display file name, number + voice.wav/mp3 Photographing The photo is 320*240*24b, size control within 16k,*.
After confirm, enter into such dialog box: Real-time camera before taking pictures, show photos after taking pictures If not satisfied, press the UP arrow ▲, may take pictures again, at this time, re-voice and re-text prompts.
Registration flow Enter user registration Enter dialog box system, show default No. (May modify) etc information Y Whether to modify No. N Whether to exist N Y Orient according to No. N FP Enroll ID(Mifare) card Y Y Original sound Whether to exist record Photographing Whether to exist N N Save 4.1.2 Deletion of registration recording Explanation: 1.
After confirm, enter into the following interface Note: 1. No. 00000 super-administrator can not be deleted 2. The administrator may not delete other administrator, only can delete their own. 3. Super Administrators can delete all users’ information except No. 00000 super-administrator 4. May delete some information of user registration, select “ delete all” ,then remove the user completely from the system 4.2 Settings 4.2.
1. Including date and it’s form and time settings, default form is YY-MM-DD24H 2. Offer date forms which support at least 10 types, YYYY MM DD YYYY-MM-DD、YYYY/MM/DD、 MM-DD-YYYY、 MM/DD/YYYY、 DD-MM-YYYY 、DD/MM/YYYY、 YYYYMMDD, Language settings Explanation: language that is displayed on the screen menu of setting fingerprint machine (voice also should be amended accordingly, but currently do not support).
4.2.2.1 Checking interface settings Whether to real-time photographing If choose "Yes", you have to set up to preserve the ratio of real-time photographing which are as follows: 1.0: no save 2.30% 3.60% 4.100% save all Whether to display photos Real-time fingerprint display settings When choose "yes" in the registration of fingerprints and fingerprint mode authentication, it shows corresponding true fingerprint image. Choose "No", it does not show. 4.2.2.2Delete all records Delete all validation records.
The end of daylight saving time - the end time for implementing the daylight saving time Correction time - different with the current time Example: The current time is 16:07 , April 9 The beginning of daylight saving time: Set for April 1 The end of daylight saving time: Set for May 1 Correction time: set to 1 hour Back to the checking work attendance interface, display the time :2009-4-8 16:07 4.2.2.
1) from the loudspeaker of machine itself. 2) Connect electric bell with a fingerprint machine, when arrive at the set time, the machine shall send out a relay signal to trigger bells ring. Free time settings 1. Free means that users do not use terminal equipment 2.
Baud rate Default 9600, set up five options: 9600,19200,38400,57600,115200. Ethernet network Whether or not to open Ethernet communication, if choose "Yes", you should also set the following parameters: IP address Default IP is 192.168.1.201, adjust in accordance with demands Subnet mask Default subnet mask is 255.255.255.0, adjust in accordance with demands Gateway address Default gateway address is 192.168.1.
4.2.
Settings for each user is compose of one sub-group, group time sect and user time sect. Grouping means assign a group of users to some group, for example, Group 1, Group 2, etc.
Not allowed to enter on Saturdays and Sundays, these two days have a rest; enter from Monday to Friday at working hours Working hours: 08:30-18: 00; Settings are as follows: Time sect 2 definition Sunday 23:57-23:56 Monday 08:30-18:00 Tuesday 08:30-18:00 Wednesday 08:30-18:00 Thursday 08:30-18:00 Friday 08:30-18:00 Saturday 23:57-23:56 ▲ 4.3.
personal authentication mode in accordance with needs of the user. □ grouping:divide registered users into several parts (according to roles) in order to facilitate management, □ time sect of the using group:whether or not to use default time sect of affiliated group by the user, □ time sect of users:set time of unlocking, namely choose the set time number, □ authentication mode of the using group:Whether or not to use validation mode of affiliated group by the user.
Unlocking combination settings Set different unlocking group combinations, each combination is composed of the different group. The unlocking combination use group number directly, without regard to validation order of every group. Such as “ 123” means 1 group, 2 groups, 3 groups, it demands at least one user in each group to validate together that can open the lock, “4” means one user of the single 4 groups passes the validation, then to open the lock..
Explanation:No passing time zone of validation □ unselected time zone number of user, □ unselected time zone number of group default time zone(when using group time zone), □ the validation time for user does not exist in any setting time zone; □ define time zone as forbiddance; Note:if the time zone set by user is not passed: □ answer for above combination 2, it appears prompt that user of “Illegal sub-portfolio ” can not open lock, but may check on work attendance.
Appointment of duress fingerprint:Change registered fingerprint into duress fingerprint Cancel duress fingerprint:Cancel single duress fingerprint Cancel all:Cancel all duress fingerprints User specially registers a new fingerprint or appoints a registered one existed in fingerprint machine as duress fingerprint. In any cases, after compare with these fingerprints, it may appear duress alarm.
4.4 U disk management USB flash disk management ▼ ►Download validation records Download management records Download user information Upload user information Upload message notification Upload mp3 4.5Alarm reset When the machine is not alarm, the menu has no option of alarming, only the machine begin to alarm, option “alarm reset” shall appears in the menu, select the option to lift the current alarm status. 4.6system information 4.6.1 User registered number 4.6.2 Fingerprint registered number 4.6.
4.6.7 Device Information Fingerprint capacity Note capacity Management record capacity Memory capacity Leave factory date Serial number Manufacturer Device name Device model Arithmetic version Firmware version 4.7 Query and pivot Checking recording Query Support query according to date, number, name. Display in report forms Management recording query Support query according to date, number, name. Display in report forms User registration inquiries Support number, fingerprint, ID (MIfare) card query.
5 Connection mode of external port 5.1 description of external port Combination mode of links: 1、 RS232 connection method—RS232R、RS232T、GND 2、 RS485 connection method—RS485A、RS485B 3、 connection mode of Wiegand—GND、DATA0、DATA1 4、 connection mode of the bell—BELL-、BELL+ 5、 connection mode of OUT switch—BUTON、GND 6、 connection mode of door contact—DOORSENSOR、GND 7、 alarm connection mode—ALARM+、ALARM8、 connection line of the lock—LK-COM、LK-NO、LK-NC 9、 connection line of the bell—BL-COM、BL-NC、BL-NO 5.
2、connection mode of normally electrified opened lock Power supply + adapte r 12V + LOCK - 3、connection mode of normally electrified closed electric bell Power supply + adapte r 12V + LOCK - 35
4、connection mode of normally electrified opened electric bell Power supply + adapte r 12V + LOCK - 6 Networking mode 6.
unit need no Power cell 6.2 Networking mode of unity machine 6.
7 Transferring line mode illumination of terminal units network 1, Terminal equipment has two transferring line methods, one is split transferring line mode, the other is transferring line mode of unity machine. 2, In split transferring line mode, communicating with upper computer only has two modes, one is TCP / IP, the other is the RS485. Split transfer mode for networking mode of the split. The network connection process in split mode is network input ⊇controller ⊇terminal unit.
232R/RX+ 232T/RX- 232T/WG1 232T/WG0 7.
8 Instruction of controller 8.
Refuse to found Fingerprint device refuses the registered fingerprint. Permission rank Serial fingerprint machine has 3 permission levels: □ User:indicates those who need to establish identity because of some purpose, such as open the door though the device, or record their in and out records □ Administrator:Implements all other operation except carrying through advanced settings and register users that they have power more than administrator (include administrator).
Host computer and slave 1、introduction of host computer and slave Two machines control one lock, install one machine in the door (hereinafter referred to as the "host"), install the other one out the door(hereinafter referred to as "slave"), at the same time, 2 machines may control the lock only the host connect with the lock. Consequently, solve trivial connection problem of using 2 traditional machines on controlling one lock.