User Manual
Table Of Contents
- Chapter 1 Overview
- Chapter 2 Appearance
- Chapter 3 Installation
- Chapter 4 Terminal Connection
- Chapter 5 Wiring Description
- Chapter 6 Activating Access Control Terminal
- Chapter 7 Basic Operation
- Chapter 8 Client Operation
- 8.1 Function Module
- 8.2 User Registration and Login
- 8.3 System Configuration
- 8.4 Access Control Management
- 8.4.1 Adding Access Control Device
- 8.4.2 Viewing Device Status
- 8.4.3 Editing Basic Information
- 8.4.4 Network Settings
- 8.4.5 Capture Settings
- 8.4.6 RS-485 Settings
- 8.4.7 Wiegand Settings
- 8.4.8 Authenticating M1 Card Encryption
- 8.4.9 Remote Configuration
- Checking Device Information
- Editing Device Name
- Editing Time
- Setting System Maintenance
- Managing User
- Setting Security
- Configuring Network Parameters
- Configuring Upload Method
- Configuring Network Center
- Configuring Advanced Network
- Configuring Wi-Fi
- Configuring Relay Parameters
- Configuring Access Control Parameters
- Uploading Background Picture
- Configuring Face Detection Parameters
- Operating Relay
- Viewing Relay Status
- 8.5 Organization Management
- 8.6 Person Management
- 8.7 Schedule and Template
- 8.8 Permission Configuration
- 8.9 Advanced Functions
- 8.10 Searching Access Control Event
- 8.11 Access Control Event Configuration
- 8.12 Door Status Management
- 8.13 Arming Control
- 8.14 Time and Attendance
- Appendix A Tips for Scanning Fingerprint
- Appendix B Custom Wiegand Rule Descriptions
Access Control Terminal·User Manual
50
Note: After adding the device, you should check the device arming status in Tool – Device Arming
Control. If the device is not armed, you should arm it, or you will not receive the real-time events
via the client software. For details about device arming control, refer 8.13 Arming Control.
Creating Password
Purpose:
For some devices, you are required to create the password to activate them before they can be
added to the software and work properly.
Note: This function should be supported by the device.
Steps:
1. Enter the Device Management page.
2. On the Device for Management or Online Device area, check the device status (shown on
Security column) and select an inactive device.
3. Click the Activate button to pop up the Activation interface.
4. Create a password in the password field, and confirm the password.
STRONG PASSWORD RECOMMENDED– We highly recommend you create a strong password
of your own choosing (using a minimum of 8 characters, including upper case letters, lower
case letters, numbers, and special characters) in order to increase the security of your product.
And we recommend you reset your password regularly, especially in the high security system,