User Manual
Table Of Contents
- Chapter 1 Overview
- Chapter 2 Installation
- Chapter 3 Device Wiring
- Chapter 4 Basic Operation
- 4.1 Device Activation
- 4.2 Login
- 4.3 Parameters Configuration
- 4.4 User Management
- 4.5 Access Control System Configuration
- 4.6 Attendance Configuration
- 4.7 Other Management
- Chapter 5 Client Operation
- 5.1 Function Module
- 5.2 User Registration and Login
- 5.3 System Configuration
- 5.4 Access Control Management
- 5.4.1 Adding Access Control Device
- 5.4.2 Viewing Device Status
- 5.4.3 Editing Basic Information
- 5.4.4 Network Settings
- 5.4.5 RS-485 Settings
- 5.4.6 Wiegand Settings
- 5.4.7 M1 Card Encryption
- 5.4.8 Remote Configuration
- Checking Device Information
- Editing Device Name
- Editing Time
- Setting System Maintenance
- Managing User
- Setting Security
- Configuring Network Parameters
- Configuring Upload Method
- Configuring Network Center Parameters
- Configuring Advanced Network
- Configuring Wi-Fi
- Configuring Relay Parameters
- Configuring Access Control Parameters
- Uploading Background Picture
- Operating Relay
- Viewing Relay Status
- 5.5 Organization Management
- 5.6 Person Management
- 5.6.1 Adding Person
- Adding Person (Basic Information)
- Adding Person (Basic Information)
- Adding Person (Permission)
- Adding Person (Card)
- Adding Person (Fingerprint)
- Adding Person (Attendance Rule)
- Importing and Exporting Person Information
- Getting Person Information from Access Control Device
- Modifying and Deleting Person
- Changing Person to Other Organization
- Issuing Card in Batch
- 5.6.1 Adding Person
- 5.7 Schedule and Template
- 5.8 Permission Configuration
- 5.9 Advanced Functions
- 5.10 Searching Access Control Event
- 5.11 Access Control Event Configuration
- 5.12 Door Status Management
- 5.13 Arming Control
- 5.14 Time and Attendance
- Appendix A Tips for Scanning Fingerprint
- Appendix B Input Method Operation
- Appendix C Attendance Record Delete Rule
- Appendix D Overview of Device Parameters
- Appendix E Attendance Report Table
- Appendix F Custom Wiegand Rule Descriptions
Fingerprint Access Control Terminal·User Manual
55
A user name cannot contain any of the following characters: / \ : * ? “ < > |. And the length
of the password cannot be less than 6 characters.
For your privacy, we strongly recommend changing the password to something of your own
choosing (using a minimum of 8 characters, including upper case letters, lower case letters,
numbers, and special characters) in order to increase the security of your product.
Proper configuration of all passwords and other security settings is the responsibility of the
installer and/or end-user.
When opening iVMS-4200 after registration, you can log into the client software with the
registered user name and password.
Steps:
1. Input the user name and password you registered.
Note: If you forget your password, please click Forgot Password and remember the encrypted
string in the pop-up window. Contact your dealer and send the encrypted string to him to reset
your password.
2. Optionally, check the checkbox Enable Auto-login to log into the software automatically.
3. Click Login.
After running the client software, you can open the wizards (including video wizard, video wall
wizard, security control panel wizard, access control and video intercom wizard, and attendance
wizard), to guide you to add the device and do other settings and operations. For detailed
configuration about the wizards, please refer to the Quick Start Guide of iVMS-4200.