ZKAccess User Manual Version: 1.1 Software Version: For ZKAccess 4.1.8/5.0.8 and above Version Date: June, 2011 About This Manual This document introduces the main functions, the user interface and operations of the system. For installation, please refer to the Quick Installation Guide. 201 Circle Drive N, Suite 116 Piscataway, NJ 08854 Tel: 732-412-6007 Fax: 732-412-6008 www.zkaccess.
Table of Contents Definitions .................................................................................... ii 1. System Instruction .................................................................. 1 1.1 Functions Instruction ............................................................. 1 1.2 Basic Operation Flow ............................................................ 1 2. System Management............................................................... 3 3. My Work Panel .....................
Definitions Super User: The user who has all operation levels of the system, who can assign new users (such as company management personnel, registrar, and access control administrator) in the system and configure the roles of corresponding users. Role: During daily use, the super user needs to assign new users having different levels. To avoid setting individual levels for each user, roles having certain levels can be defined in Role Management, and then assigned to specified users.
1. System Instruction 1.1 Functions Instruction Security management has increasing concerns for modern enterprises. This management system helps customers to integrate safety procedures on one platform, making access control management easier and more practical so as to improve efficiency. System Features 1. Powerful data processing capacity, allowing the management of access control data for 30,000 people. 2. Visible and reasonable work flows come from abundant experience in access control management. 3.
Step 1: Log in to the system to modify the default password of the account; Step 2: Assign accounts and roles to system users (such as management personnel, registrar, access control administrator); Step 3: Set system parameters, database, notice, reminder and other frequently used system information; Step 4: Add devices to the system and configure the basic information of devices; Step 5: The user sets departmental organization chart (refer to the organizational chart of your company); Step 6: Input compan
2. System Management 1. Log in to the System After installing the server on the computer, the user can access the server through the network and use this system. Open the browser and enter the server’s IP address in the address bar. Press [Enter] to access the system homepage. If you use the program at the server computer, open [Server Controller] first, and start the service. Then double click the [ZKAccess Security System] shortcut on the desktop, following the homepage pops up.
Enter the old password and the new password, confirm the new password and click [Confirm] to complete the modification. Note: The user name is case-insensitive, but the password is case-sensitive. 201 Circle Drive N, Suite 116 Piscataway, NJ 08854 Tel: 732-412-6007 Fax: 732-412-6008 www.zkaccess.
3. My Work Panel After the user logs in to the system it will show the [My Panel] main interface, displaying common operations and other important information. The default work panel includes the following modules: Common Operation: The user can rapidly perform some common operations here, as shown below. Add Person please refer to 4.2.1 Add Personnel; Card Issue please refer to 4.2.2 Personnel Information Maintenance; Add Department please refer to 4.1 Department Management; Add Area please refer to 5.
4. Personnel System Management Before using the system’s access control management functions, access the personnel system to configure: First, Department Management settings used to set the company’s organizational chart; Second, Personnel Management settings used to input personnel, assign departments, and maintain and manage personnel. Then set Access Control. 4.1 Department Management Before managing company personnel, it is required to describe and manage the company’s departmental organization chart.
information from other software or another document into this system. For details, see Appendix 1 Common Operation. 4.2.1 Add Personnel Click [Personnel] - [Personnel] - [Add] to show the Personnel Profile edit interface: The fields are as follows: Personnel No.: By default, the length cannot exceed 9 digits. A number with a length of less than 9 digits will be preceded with 0 automatically to complete 9 digits. Numbers cannot be duplicated.
setting will be always valid. After editing personnel information, click [OK] to save and quit. The added personnel will be shown in the personnel list. Note: The number of a person, whether departed or in service, must be unique. The system, when verifying, will automatically search the number in the departure library. The Personnel Information List, by default, is displayed as a table. If Graphic Display is selected, photos and numbers will be shown.
Note: A person can be issued cards only once. Card modification can only be completed by editing personnel information. The system supports card issue through card issuer and by manually inputting card numbers. 2. Register Fingerprint (1) Click [Personnel] - [Personnel], select personnel, and click [Register Fingerprint] to open the Fingerprint Registration edit interface: If you have enrolled fingerprints, the number of enrolled fingerprints will show after corresponding item.
(4) The enrolled fingerprint will be indicated in this diagram. Click [OK] to save and close the current interface and return to the previous window. To delete the fingerprints, please click on the enrolled finger twice. The system prompts confirmation for the deletion. If you want to enroll a Duress Fingerprint, tick the Duress Fingerprint option before enrolling. 3.
5. Device Management The access control panel to be connected to this system provides access control system functions. To use these functions, the user must first install devices and connect them to the network. Second, set corresponding parameters in the system so as to manage these devices via the system, upload user access control data, download configuration information, output reports and achieve digital management of the enterprise.
IP Address: Please enter the IP Address of the access control panel; IP Port No.: In Ethernet mode, the default is 4370; RS485: Serial Port Number: COM1-COM254; 485 Address: The machine number. When serial port numbers are the same, there will be no repeated 485 addresses; Baud Rate: Same as the baud rate of the device (9600/ 19200/ 38400/ 57600/115200).
connecting to the device. If it is not ticked, the user can manually synchronize device time; Area: Specify areas of devices. After Area Setting, devices (doors) can be filtered by area upon Real-time Monitoring. Clear Data in the Device when Adding:If this option is ticked, after adding device, the system will clear all data in the device, except the event logs. If you add the device just for demonstration or testing of the system, there is no need to tick it.
Note: Here we use UDP broadcast mode to search the access controller. This mode cannot exceed the HUB scale. The IP address can exceed the net segment, but must belong to the same subnet and needs to configure the gateway and IP address in the same network segment. (4) Click [Add to Device List] behind the device, and a dialog box will open. Enter self-defined device name, and click [OK] to complete device addition.
Shows the list of commands sent to the device by the current system. If the return value is ≥ 0, execution is successful. If it is a negative, the execution failed. Clear Command List: Click it to open the Confirm interface. Click [OK] to clear all items in the list of commands sent by the server; Delete: Tick the check box before the command to be deleted and click [Delete]. Confirm to delete the command. 2.
turn back to the original time. Mode 2: Set as "Month-Weeks-week hour: minute" format. The start time and end time is needed. For example, the start time can be set “second Monday in March, 00:00” When the start time arrives, the system will be advanced one hour. When the end time arrives, the system will turn back to the original time. 2.
6. Security System Management 1. Work principle of the access control system: ZKAccess5.0 Security System is a WEB-based management system, providing normal access control functions, management of networked access control panel via computer, and unified personnel access management. The access control system can set the opening levels of registered users, namely, allowing some personnel to open some doors by verification during a time period.
The parameters are as follows: Time Zone Name: Any character, up to a combination of 30 characters; Remarks: Detailed description of the current time zone, including an explanation of the current time zone and primary applications facilitating the user or other users with same level to view time zone information.
Three holiday types are supported, each including up to 32 holidays. To conduct special access level configuration on special dates, the user can select special holidays for setting. The operation steps are as follows: (1) Click [Access Control System] - [Holidays] - [Add] to access Add Access Control Holiday edit interface: The fields are as follows: Holiday Name: Any character up to a combination of 30 characters; Holiday Type: Holiday Type 1/2/3.
6.3.1 Door Management Click [Access Control System] - [Door Configuration], and by default it will access the [Door Management] interface showing the list of all control panels. When unfolded, it can show all doors under the control of the control panel. Upon first entry into the access interface or successful query, if system the currently has access control panels or the query result is not null, by default it will unfold the doors of the first access control panel.
Enter the old communication password before modification. After verification, input the same new password twice, and click [OK] to modify the communication password. Note: The communication password cannot contain spaces, it is recommended that a combination of numbers and letters be used. The communication password setting can improve the device security. It is recommended to set communication password for each device. (5) Synchronize Time: Synchronize device time with current server time.
according to the number of doors. Before using the device (including doors), the user must edit door information one by one (or apply current settings to other doors). After editing, they will be sent to the device, which can be used after successful setting. (1) Door Parameter Modification: Select the door to be modified, and click [Edit] under “Related Operation” to show the edit interface; The fields are as follows: Device Name: It is not editable (must be edited in 5.2.
Close and Reverse State: Set locking or not after door closing. Tick it for lock after door closing. Verify Mode: Identification modes include Only Card, Card plus Password, Only Password, Card plus Fingerprint, and Only Fingerprint verify. The default is Only Card or Only Fingerprint. When Card plus Password mode is selected, make sure the door uses a reader with keyboard (the fingerprint verify modes are only available for version 5.0.
1. Multi-Card Opening Personnel Groups: It is personnel grouping used to set Multi-Card Opening groups.
For example, select 1-2-3-4 four-door interlock. If you want open door 3, doors 1, 2 and 4 need to be closed. Note: When editing, the device cannot be modified but the Interlock Setting can be modified. If Interlock Setting is not required for the device any more, the Interlock Setting Record can be deleted. When deleting a device record, its Interlock Setting Record will be deleted if it exists. 6.3.5 Anti-pass Back Settings Currently, Anti-pass Back Settings support in and out Anti-pass Back.
1. Click [Access Control System] - [Door Configurations] - [Linkage Setting] - [Add] to show the Linkage setting interface; 2. Enter a Linkage Setting Name (input Linkage Setting Name before selecting the device). After selecting the device the corresponding Linkage Setting will appear (The system will first determine whether or not the device is successfully connected and has read extended device parameters such as auxiliary input quantity, auxiliary output quantity, door quantity and reader quantity.
In addition, the system does not allow the same Linkage Setting at an input point and an output point in a specific trigger condition. The same device permits consecutive logical (as mentioned above) Linkage Settings. Video linkage includes hard linkage and soft linkage. The hard linkage is the same as the previous description. The system will synchronize the setting information to access control panels. The access control panel (no matter if it is offline or online) can execute the current linkage setting.
complete adding. The added personnel will appear in the list on the right; (3) Select personnel, click [Delete from Access Level] to delete the personnel from the access level. Note: When adding personnel, if selected personnel exist in the current access level, the system cannot them add again. 2.
Upon Door Status Monitoring, if the number of doors on the current interface ≤64, the system will, by default, show the doors in pictures to monitor door statuses. Once the number exceeds 64, the system will automatically list the doors. When putting the cursor on a door, it will show relevant parameters and operations: device, door number, door name, remote opening, and remote closing.
Add Map and Delete Map: The user can add or delete the map as needed. Edit Map: The user can change the map name, change the map or change the area it belongs to. Adjust Map (includes door): The user can add a door on the map or delete an existing one (right click the door icon, and select [Remove Door]), adjust the map or position of the door icon (by drag the door icon), or adjust the size of the map (click [Zoom in] or [Zoom out]).
door open period after the first card normally open), or through the remote normal open operation, the person has open door permission, punch the effective card at the opened door to trigger this normal event.
Door Opened Correctly: When the door sensor detects that the door has been properly opened, this normal event is triggered. Door Closed Correctly: When the door sensor detects that the door has been properly closed, this normal event is triggered. Auxiliary Input Disconnected: When the auxiliary input point is disconnected, this normal event is triggered. Auxiliary Input Shorted: When the auxiliary input point is short circuited, this normal event is triggered.
3. Emergency Events Duress Password Open: When the Duress Password of the current door is verified, this alarm event is triggered. Opened Accidentally: Except for all the normal events (such as user with door open permission to punch card and open the door, password open door, open the door at normally open period, remote door open, the linkage triggered door open), the door sensor detects the door is opened unexpectedly.
Clear Access Control Exception Event Records: Clear the list of all Access Control Exception Events. Personnel Access Level View all Access Levels according to access level group, door or personnel. Select the query mode and the condition in the left data list. The corresponding result will display in the right data list. For example, select “By Access Level”, the data list on the left side shows all access levels. Select an access level.
7. Video System (For Professional Version 5.0.8 and above) The system provides video linkage function to manage the network video recorder, view the Real-time Video, query the video record and open the Real-time Video when the Linkage Events happened. Before using the video linkage function, the user needs to add a network video recorder. For detailed operation, please refer to 5.2.2 Add Network Video Recorder.
After setting the linkage event, if the Real-time Linkage Event happens, the preview interface will open in the Real-time Monitor interface. 201 Circle Drive N, Suite 116 Piscataway, NJ 08854 Tel: 732-412-6007 Fax: 732-412-6008 www.zkaccess.
8. System Settings System Settings primarily include assigning system users (such as company management personnel, registrar, access control administrator) and configuring the roles of corresponding modules, managing databases, such as backup, initialization, and setting system parameters and operation logs, etc. 8.1 User Management 1. Role Management: During daily use, the super user needs to assign new users having different levels.
Username: Not more than 30 characters, using only letters, numbers or characters; Password: The length must be more than 4 digits and less than 18 digits.
(2) Select the operation: backup now, scheduled backup and cancel scheduled backup. Scheduled backup can set backup to run on planned dates and times; (3) Click [OK] and the system will open the database backup path prompt. For Backup now, it will return after backup. For scheduled backup, it will backup as scheduled. Note: (1) After database backup, the value under “Whether backup successful” will change to “Yes” or “No”.
Select to initialize door settings: After selection, it will initialize all Interlock Settings, Anti-pass Back Settings, Linkage Settings, First-Card Opening Settings, and Multi-Card Opening Settings (including personnel group of Multi-Card verification); Select to initialize events: After selection, it will initialize all Real-time Monitoring Records; Select to initialize Access Control: After selection, it will initialize all settings and information in the Access Control System, including the above three
9. Appendices Appendix 1 Common Operation 1. Personnel Selection In this system, this dialog box is used for all modules using Personnel Selection: You can search personnel in two ways: 1) Search by department. Tick the check box in front of a department in the department list of the pull-down menu to select all personnel in the department.
resources system of another brand, you can import it into this system through the [Import] function.
cannot execute. If you need to import the personnel gender, please use “M” to represent male and “F” to represent female, then execute the import operation. 4. Export Data (exporting personnel list for example): (1) Click [Export] to show the edit interface; When the data size is large, it is recommended to select [Select Number of Entries to Export] to expedite export and reduce system load.
Enter the query condition, click Query, and the query result will be shown: Advanced Query: Click [Advanced] icon to show advanced query interface (using personnel information advanced query as an example). (1) Select the query field in the [Select Query Field] pull down menu; (2) Select the condition in the pull down menu such as equal to null, contain, meet any, equal to etc.
enter as prompted. 201 Circle Drive N, Suite 116 Piscataway, NJ 08854 Tel: 732-412-6007 Fax: 732-412-6008 www.zkaccess.
Appendix 2 END-USER LICENSE AGREEMENT FOR THIS SOFTWARE Important – please read carefully: This End-User License Agreement ("EULA") is a legal agreement between you (either an individual or a single entity) and the mentioned author of this software for the software product identified above, which includes computer software and may include associated media, printed materials, and "online" or electronic documentation ("SOFTWARE PRODUCT").
the original solely for backup or archival purposes. LIMITED WARRANTY NO WARRANTIES. The Author of this Software expressly disclaims any warranty for the SOFTWARE PRODUCT. The SOFTWARE PRODUCT and any related documentation is provided "as is" without warranty of any kind, either express or implied, including, without limitation, the implied warranties or merchantability, fitness for a particular purpose, or non-infringement.
Appendix 3 FAQs Q: How can My Work Panel be unique? A: The user can customize the work panel: 1. Click [Custom Work Panel] to open a dialog box, cancel the tick of your undesired module (by default the system ticks all), and Confirm. Then the custom module will appear; 2. Or directly click the “ ” icon on a module to minimize, and click “ ” to close the module. Click the column bar to drag and adjust the module’s position; 3.
remove it from the system. Open the system again and the browser will access the system properly. Q: If backing up or restoring the database fails, what is the possible reason? A: Please check the system environment variables [path], if the database installation path exists (For example, MS SQL Server installation path maybe is: C:\Program Files\Microsoft SQL Server\90\Tools\Binn; For MySQL, it is like: C:\Program Files\MySQL\MySQL Server 5.1\bin). If not, you need to add it manually.