User manual

201 Circle Drive N, Suite 116 Piscataway, NJ 08854 Tel: 732-412-6007 Fax: 732-412-6008
www.zkaccess.com
1. System Instruction
1.1 Functions Instruction
Security management has increasing concerns for modern enterprises. This management system helps customers to
integrate safety procedures on one platform, making access control management easier and more practical so as to improve
efficiency.
System Features
1. Powerful data processing capacity, allowing the management of access control data for 30,000 people.
2. Visible and reasonable work flows come from abundant experience in access control management.
3. Automatic user name list management.
4. Multilevel, role-based, management secures user data confidentiality.
5. Real-time data acquisition system ensures prompt feedback of access control data to management.
Configuration Requirements:
CPU: Master frequency of 2.0G or above;
Memory: 1G or above;
Hardware: Available space of 10G or above. We recommend using NTFS hard disk partition as the software installation
directory (NTFS hard disk partition has the better performance and higher security).
Operating System:
Supported Operating Systems:
Windows XP/Windows 2003/Windows Vista/Windows 7
Supported Databases:
MySQL/MS SQL Server 2005/Oracle10g
System Modules:
The system includes five major functional modules:
Personnel System: Primarily two parts: first, Department Management settings, used to set the company’s organizational
chart; second, Personnel Management settings, used to input personnel information, assign departments, maintain and
manage personnel.
Device System: Set communication parameters for device connection, including system settings and machine settings. After
successful communication, the information of connected devices can be viewed and operations such as remote monitoring,
uploading and downloading can be performed in the system.
Access Control System: WEB-based management system enabling normal access control functions, management of
networked access control panel via computer, and unified personnel access management. The access control system sets
door opening time and levels for registered users so that some users are permitted to unlock some doors through verification
during certain intervals.
Video System (for professional version): The system provides the video linkage function to manage the network video
recorder, view the real-time video, and query the video records. It opens the Real-time Video when the linkage events happen.
System Settings: Primarily used to assign system users and configure the roles of corresponding modules; database
management such as backup, initialization and recovery; set system parameters and manage system operation logs.
1.2 Basic Operation Flow
The following are the basic steps to use the system, based on the role of a super user. Different users have different operation
levels, so the steps may slightly differ. The user just needs to follow the steps below and skip the items which are not displayed
on their interface.