User Manual
Table Of Contents
- Chapter 1 Overview
- Chapter 2 Installation
- Chapter 3 Device Wiring
- Chapter 4 Basic Operation
- 4.1 Device Activation
- 4.2 Login
- 4.3 Parameters Configuration
- 4.4 User Management
- 4.5 Access Control System Configuration
- 4.6 Attendance Configuration
- 4.7 Other Management
- Chapter 5 Client Operation
- 5.1 Function Module
- 5.2 User Registration and Login
- 5.3 System Configuration
- 5.4 Access Control Management
- 5.4.1 Adding Access Control Device
- 5.4.2 Viewing Device Status
- 5.4.3 Editing Basic Information
- 5.4.4 Network Settings
- 5.4.5 RS-485 Settings
- 5.4.6 Wiegand Settings
- 5.4.7 M1 Card Encryption
- 5.4.8 Remote Configuration
- Checking Device Information
- Editing Device Name
- Editing Time
- Setting System Maintenance
- Managing User
- Setting Security
- Configuring Network Parameters
- Configuring Upload Method
- Configuring Network Center Parameters
- Configuring Advanced Network
- Configuring Wi-Fi
- Configuring Relay Parameters
- Configuring Access Control Parameters
- Uploading Background Picture
- Operating Relay
- Viewing Relay Status
- 5.5 Organization Management
- 5.6 Person Management
- 5.6.1 Adding Person
- Adding Person (Basic Information)
- Adding Person (Basic Information)
- Adding Person (Permission)
- Adding Person (Card)
- Adding Person (Fingerprint)
- Adding Person (Attendance Rule)
- Importing and Exporting Person Information
- Getting Person Information from Access Control Device
- Modifying and Deleting Person
- Changing Person to Other Organization
- Issuing Card in Batch
- 5.6.1 Adding Person
- 5.7 Schedule and Template
- 5.8 Permission Configuration
- 5.9 Advanced Functions
- 5.10 Searching Access Control Event
- 5.11 Access Control Event Configuration
- 5.12 Door Status Management
- 5.13 Arming Control
- 5.14 Time and Attendance
- Appendix A Tips for Scanning Fingerprint
- Appendix B Input Method Operation
- Appendix C Attendance Record Delete Rule
- Appendix D Overview of Device Parameters
- Appendix E Attendance Report Table
- Appendix F Custom Wiegand Rule Descriptions
Fingerprint Access Control TerminalยทUser Manual
110
5.10.1 Searching Local Access Control Event
Steps:
1. Select the Event Source as Local Event.
2. Input the search condition according to actual needs.
3. Click Search. The results will be listed below.
4. For the access control event which is triggered by the card holder, you can click the event to
view the card holder details, including person No., person name, organization, phone number,
contact address and photo.
5. (Optional) If the event contains linked pictures, you can click in the Capture column to view the
captured picture of the triggered camera when the alarm is trigged.
6. (Optional) If the event contains linked video, you can click in the Playback column to view the
recorded video file of the triggered camera when the alarm is trigged.
Note: For setting the triggered camera, refer to Chapter 5.11 Access Control Event
Configuration.
7. You can click Export to export the search result to the local PC in *.csv file.
5.10.2 Searching Remote Access Control Event
Steps:
1. Select the Event Source as Remote Event.
2. Input the search condition according to actual needs.
3. (Optional) You can check With Alarm Picture checkbox to search the events with alarm
pictures.
4. Click Search. The results will be listed below.
5. You can click Export to export the search result to the local PC in *.csv file.
5.11 Access Control Event Configuration
Purpose:
For the added access control device, you can configure its access control linkage including access
control event linkage, access control alarm input linkage, event card linkage, and cross-device
linkage.
Click the icon on the control panel,
Or click Tool->Event Management to open the Event Management page.