User's Manual. Access Control System. Version April 2001

Size: px
Start display at page:

Download "User's Manual. Access Control System. Version April 2001"

Transcription

1 Win Access 2000 Version 3.00 User's Manual Version 3.00 April 2001 Access Control System

2 The manufacture has taken due care in preparing this documentation. Due to lead time required for printing, some minor functionality differences may exist. Check your release notes and on-line help for updated information. This manual is provided for information purposes only. The manufacturer makes no representations or warranties with respect to the contents or use of this manual and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The user will assume the entire risk of the use or the results of the use of this document. Further, the manufacturer reserves the right to revise this publication and make change to its contents at any time, without obligation to notify any person or entity of such revisions or changes. The manufacturer will not be held responsible for any damage to the user that may result from accidents or any other reasons during operation of user s unit according to this document. Copyright This document is NOT copyright. And this document can be, wholly or partially, reproduced by any means. Trademarks Microsoft is registered trademark and Windows, Windows 95, Windows 98, Windows 2000 are trademark of the Microsoft Corporation. AMD is register trademark of Advanced Micro Devices, Inc. Intel is register trademark of Intel corporation. Other trademarks and registered trademarks of products appearing in this manual are the properties of their respective holders. Printed in Hong Kong April 2001

3 Table of Contents Chapter 1 : Introduction What is Win Access Online Help To get the help of the main screen To navigating help Chapter 2 : System Requirement & Installation Host Computer Requirement Key Guard ACS Controllers Modem Connection Tree Software Installation Chapter 3 : Quick Start Starting Win Access First Login System Setup Login Logout Main Screen Basic Technique & Tips Right click mouse button Keyboard Short Cut Key Chapter 4 : Administration Setup Why use Administration Administrators Management To add a new administrator Auto Logoff Function Privileges Setup To delete an administrator To change Logoff function & privileges of administrator To change the password of administrator To change the password during Login Multiple Login Chapter 5 : System Connection & Controllers Setup Port Attachment To attach a new port Controller Attachment To attach a new controller Controllers Configuration...5-4

4 To Setup Controller Configuration To Setup Access Card Holder To Setup Access Time Zone Typical Examples of Access Time Zone Settings To Setup Pin Time Zone To Setup Holiday To Setup Programmable Time Table To Setup Function Key Name To Setup Function Key Table Data Editing Controllers Communication Assign Address Send Date & Time Receive Controller's Setting Direct Send Setting into Controller Individual Send Settings Global Send Settings Chapter 6 : Card Holders Database Management Main Screen List Box Thumb Image User's general information Pop-up menu New Card Holder Appending Before append a new card holder To append a new card holder Access Group Assignment Access Level Description To restrict access to a controller To permit access through a single controller To set permit access to all controllers To set access time zone level to all controllers To set PIN time zone level to all controllers To set authority level to all controllers Personal Information Modification Hardcopy of badge To configure the layout and stored into Template 1(Template Setup) To configure the image layout of a Template To configure the user's Text of a Template To configure the Fixed Text of a Template Card Replacement Card Holder Expired Update to Controller Register Cards Register Cards & Send to Controller Update through the Send Selected to Controller command from the pop-up menu

5 Chapter 7 : Transactions Collection & Amendment Preparation & Configuration Capture Monitoring Before Start During the capturing state Stop Capture Access Transaction Monitoring Alarm Transaction Monitoring Alarm Transaction Acknowledgment Capture Status Panel Transaction Amendment To load a card holder for amendment To append a transaction To append a transaction for entire cardholders To delete a transaction To modify a transaction Leave Amendment To load a leave applicant To append a leave record To delete a leave record To modify a leave record To append several leave records Transaction Export TXT file format DBF file format WinAcc 6.xx file format Transaction Import Chapter 8 : Roster Setup Roster Time Table Setup Before Setup Roster Timetable To assign roster plan to table (by date range) To assign roster plan to table (by monthly) To assign roster plan to entire tables (by date range) To append a new roster timetable To edit roster time plan Roster Time Plan Time Table Setup To append a new roster plan To copy roster plan to another roster plan To setup the calculation method for attendance report Holiday Definition To append a new holiday To modify a defined holiday To delete a holiday To select a pre-set holiday description To edit the Holiday Description List...8-9

6 8.3 Typical Example Day off No recess time Over night shift working Chapter 9 : Attendance Report Generation Daily Attendance Report Generation Select Controllers Select Users Specify Date Daily Attendance Report Browsing To edit the output report title To make a hard copy To save as Text File To transfer to DBF format To display attendance by category To arrange the display items in column To amend attendance time Individual Attendance Report Generation Select Controllers Select Users Specify Date Individual Attendance Report Browsing To edit the output report title To amend attendance time To make a hard copy To save as Text File To transfer to DBF format To arrange the display items Attendance Summary Report To edit the output report title To make a hard copy To save as Text File To transfer to DBF format To arrange the display items Report Export Text Format dbase Format Chapter 10 : Others Report Generation Transaction Report Generation Select Controllers Select Users Specify Date Specify Type of Transactions for Report Valid Transaction Invalid Transaction Alarm Transaction

7 10.2 Transaction Report Browsing To make a hard copy To save as Text File To transfer to DBF format To arrange the display items in column Leave Report Generation Select Users Specify Date Leave Report Browsing To make a hard copy To save as Text File To transfer to DBF format To arrange the display items in column Administrator Log Report Generation Select Administrators Specify Date Specify Type of Log Events System Events Report Events Controller Events Transmission Events Administrator Log Report Browsing To make a hard copy To save as Text File To transfer to DBF format Transaction Summary Report Select Controllers Select Users Specify Date Transaction Summary Report Browsing To make a hard copy To save as Text File To transfer to DBF format Application Specified Reports (Tailor Make Reports) Chapter 11 : Capture Express Operation Main Features Background operation Scheduled capture operation Configuration Schedule Setup To set the Capture Express run at schedule time Status & Stastics Operation Mode Operation Status Start Time/Next Capture Time Controller Addr Controller Name Transaction Rece

8 Statistic Panel APPENDIX A : Communcation Error Codes...A-1 APPENDIX B : Export Text Transactions Record Format... B-1 APPENDIX C : Export DBF Transactions Record Format...C-1

9 Chapter 1 Introduction This Chapter provides the brief introduction of the Win Access 2000 environment to let you start to use the software right away. It also tells you how to get the information while utilizing the features of the software. What is Win Access 2000 Win Access 2000 is a 32-bits Windows access control program. It supports Windows 95, Windows 98, & Windows Since the basic goal of an access control system is to monitor who goes in and out of an area, it is important for the system to observe and annunciate any unauthorized use. The Win Access 2000 provides enhanced access control so that system users can be easily identified, entry is allowed only at given times, and a record of system activity is kept in an historical journal. Most of the facilities of Win Access 2000 are accessed through the main windows, which are displayed as a tree. The features of the Win Access 2000 will be described at the rest of the following chapters. Online Help The online help system provides details information about the user-friendly features. Administrator can press the Function key F1 at any situation to pop-up the help screen, which is closely related to the current window. Also the interlinked help system can let administrators navigating the rest of the program for studying the program. To get the help of the main screen There are two ways to reach the main screen of the help. Press the F1 key at the main screen of the program; Or during the help screen is opened, click the Contents button at left-top corner of the help screen. Introduction 1-1

10 Always click this button to reach this main screen. To navigating help Move the mouse pointer to find the messages from the help screen. You can always click the left mouse button when the cursor changed its shape to. Once the left mouse button is clicked, the help screen will go into the related page. Also the scrolling & maximize the help screen is necessary to browsing the rest of help. Some help topics contain green underlined text. You can click the green text to see the short description related to the text. Introduction 1-2

11 Chapter 2 System Requirement & Installation This Chapter provides the basic requirement for the system installation. It also teaches you how to install Win Access 2000 software in your computer system. Host Computer Requirement The following table lists the minimum requirement for the host computer (PC). In order to achieve the best efficiency for the software operation, the recommended requirement is also listed. Minimum Recommended CPU Intel/AMD at 350MHz Intel/AMD at 700MHz Hard disk (free space) 100MB 6GB* RAM 64MB 256MB OS Windows 95 Windows 2000 Display 800x600 SVGA 800x600 SVGA Input Device Mouse & keyboard Mouse & keyboard Printer 24pin dot matrix printer Photo quality color printer Or Laser jet Modem 9600 bps modem (Optional) 9600bps modem (optional) Communication Ports 1 communication port 2 communication ports The hard disk space requirement can be varied for individual of transactions storage. The 3GB space is typically for a 1000 cardholders with each 50 transactions access per day, run at 3 years: 1000*50*365*3*106 = 6GB, where 106 is the number of bytes for one transactions. Intel is a trademark of Intel Corporation. AMD is a trademark of Advanced Micro Devices, Inc. Windows 95, Windows 2000 are trademarks of the Microsoft Corporation. Key Guard The Key Guard has two functions used with the Win Access 2000: Protect the software for illegal usage, & used to link with ACS controllers as RS232 RS485 converter. For details of Key Guard connection to the PC, please refer to the Installation Manual of Key Guard. In general, only one Key Guard should be attached to the system for software access, especially for ACS controller s communication. However, the user can also access the others parts of the software, even if the Key Guard are not attached. For multiple login usage, please refer to Chapter 3. ACS Controllers The controller is the foundation of Win Access 2000, making access control decisions for your system's PC. By receiving download information from the PC's database, the controller can determine which cardholders have access to a door and which do not. For example, if the field control panel denies access and someone tries to force the door open, an alarm occurs. The Win Access system can link up to 256 controller devices. System Requirement & Installation 2-1

12 Each controller holds a database in Random Access Memory (RAM). If your site loses power, the controller can hold database information for 3 years. When a single controller fails only that unit's card readers, inputs, and outputs are affected. The rest of the system functions normally. The amount of RAM and the size of the cardholder record determine how many cardholders record and controller's database can store. Memory is used to store cardholder information and event messages. For the difference products of the ACS controllers, please contact your sales agencies. Modem The main usage of modem is for the remote controller connection. The minimum requirement of modem is support with CCITT V.32. Usually, it is Hayes type modem at 9600 bps. For the selection of a modem, it is highly recommended to consult your technical support term. Connection Tree PC/Station PC/Station Server Host Computer Modem Modem PC/Station key Guard Converter ACS Controller ACS Controller ACS Controller ACS Controller ACS Controller ACS Controller System Requirement & Installation 2-2

13 Software Installation Before install the Win Access 2000 program, make sure you have already installed connected properly at least one ACS controller. Also please make sure you attached the Key Guard into you PC which you install the program on it. The Key Guard should be connected to the PC for the first login. If you are not sure, please consult your sales agencies for support. To install Win Access 2000 on Windows 95/Windows Insert the Win Access 2000 Program CD-ROM disc into your CD-ROM driver. 2. In the Windows 95, open the Windows Explorer. 3. Goes into the CD-ROM drive and find the Disk 1 folder. 4. Double click the file Setup.exe to launch the installation. 5. Following the instructions on-screen to progress through the installation. 6. The program directory can be placed at any locations along the PC, and if the network is logon, the program directory can also be located at network. 7. An information window opens when the operation is complete. Click OK to exit the window. To install Win Access 2000 on Windows Login in administrator into Windows 2000 or the user access group is the same level as administrator. 2. If it is failed to do so, the Program Icon & Program Registry cannot be properly installed. 3. Following the procedures as above for Windows 95/Windows 98. After properly installed the program, there are two icons are added into program bar. 1. Win Access 2000: this is the main program icon. This icon is also placed into the desktop. This icon is the Win Access 2000 program icon. Double click it can launch the program. System Requirement & Installation 2-3

14 These two icons are the programs of Win Access Win Access 2000 Capture Express: this is the captures express program icon. This icon is also placed into the startup folder, so that it can be run automatically when the PC is turn ON. This icon located in Startup will be automatically launched after starting Windows. System Requirement & Installation 2-4

15 Chapter 3 Quick Start This tutorial guides you through the basic configuration and setup of the access control system. After setting up the system, you can fully dominate the access of the system. This tutorial is only for a typical system configuration, you are highly recommended to consult your technical support term for your individual requirement. Starting Win Access 2000 You can start Win Access 2000 in several ways: 1. Double click the Win Access 2000 at the desktop. 2. Choose Program Win Access 2000 Win Access 2000 from the Windows Start Menu. For the details of operation of Win Access 2000 Capture Express, please refer to the Chapter 11. First Login If this is the first time for the PC to install the Win Access 2000, right away, you will see the screen below. System Setup This window is used to setup the Win Access 2000 Key Guard configuration. This window will be automatically display if the program fails to authenticate the Key Guard. Please refer to the backside of the Key Guard for the Serial Number. Specify the port number of which the Key Guard located. If wrong port is assigned, the system cannot be logged in. It is used to indicate that the key guard is attached or not. If the Key Guard Attached is display, the ACS controllers can be communicated at this host computer. Key Guard should be attached for Supervisor login. If the Key Guard Not Attached is display, ACS controllers cannot be communicated at this computer. The box is toggled by click it. 16 digits Serial Number of the current key Guard should be input here. Please see the backside of the Key Guard for Serial Number. The serial number must be matched, otherwise, administrator cannot login the system. Quick Start 3-1

16 Login To log into system: 1. Click the Login button at system tools bar, the Login dialog box will appear. (When the program started, the Login dialog box will appear automatically). 2. Enter the Administrator Name and Password into the fields and click OK button. As a security precaution, the screen does not display the password but instead of the character '*'. If administrator is logging in for the first time, enter the system's default, administrator Name is supervisor and Password also is supervisor. Enter the administrator user name. For the management of administrators, see the Chapter Administration Setup. Enter the password of the Administrator. For the security reason, all input characters will be displayed as '*'. Logout To log out system: 1. Click the Logout button at system tools bar to close all functions of the program. 2. It is highly recommended to logout the program after finish the job in order to avoid un-authority access. 3. Only when the program is logout, the Win Access 2000 Capture Express can be waked up. Quick Start 3-2

17 Main Screen Once the administrator successfully login into the system the screen will be show below: The administrator setup function will only activated when supervisor login. For detail of administrators setup, please refer to the Chapter 4. Speed bar for some often usage functions. All attached ACS controllers are listed under the tree node System Connection. This tree node lists the transactions related functions. This tree node lists the several reports available. This node is for Cardholder management. Shows the current system date/time. Show the total login time of the current administrator. Quick Start 3-3

18 Basic Technique & Tips Right click mouse button The Win Access 2000 is developed using the technique of pop-up menu the menu is displayed when right click the mouse button. The following example shows how to do so. Move the mouse pointer to the Login: Supervisor Right-click on it to pop-up the menu Change Password Move the mouse pointer on it and left click to launch. Keyboard Short Cut Key At some pop-up menus, some menu items are always associated with the short cut key in order to speed up the process. The format of the short cut key is in Ctrl+ key style. The following show the example: You can use the right-click way to launch the command Copy Cell Alternatively, Press the Ctrl+ C can also do the same action. Note: the short cut key may only available combined with the pop-up menu of which item with the Ctrl+. Quick Start 3-4

19 Chapter 4 Administration Setup This Chapter provides the knowledge to adopt the administration login concept. It also demonstrates the basic operation. Why Use Administration The main purpose to use the administrator login is to monitor and record the system operations so that it can be trace back for security reasons. The trace report can be generated at Administrators Log Report, which is described at Chapter 10. Administration Management The Administrator set screen can only be access by Supervisor at the Host computer only for the security reason. Use this screen, supervisor can assign and change the privileges of each administrator. For administrator s password, it is highly recommended to let administrators change his or her own after login. The following screen will be displayed when the Admin. Button is clicked at the speed bar. This box lists all the information of administrators including Supervisor. The Supervisor is a permanent administrator and it can NOT be deleted. This section lists the individual administrator login properties. This box lists all the privileges for individual administrators. Administration Setup 4-1

20 To add a new administrator 1. Right click to popup-menu. 2. Select Append command 3. Type the name of new administrator. The maximum length is set to 30 characters. Once the name has been entered, it is not allowed to change. Supervisor can delete it and append again. 4. Press 'Tab' to switch to the logoff time field. 5. Set Auto Logoff function. 6. Assign the privileges to the new administrator 7. Assign a password to the administrator. Note: There is no default password for a new administrator after appended. Supervisor is highly recommended to assign password to each administrator. Auto Logoff Function It is used to set the duration of Auto logoff time. The logoff time counter will be automatically reset if there is keystroke or mouse click to this program. It is only count the time duration of no input from keyboard or mouse pointer to this program only. The counter will not be reset even there is an operator to type a document for other program. The auto logoff time can only be set if the Disabled does not marked with tick. 15 to 30 minutes are the recommended time for this function. Too short time may disturb the normal program access. Too long time may also increase the probability for un-authorized access. Privileges Setup 1. Administration setup It is used to control the right to access administration setup. For high security system, it should be enabled ONLY for Supervisor. 2. Access privilege - System setup It is used to control the right to access all controllers of the system connection. With enable, the administrator can modify all the properties of controller such as Access Time Zone, PIN Time Zone, etc. 3. Access privilege - Card holder setup It is used to control the right to access the card holder database of the system. With enable, the administrator can add, delete & modify the global card holder database of the system. 4. Access privilege - Transaction setup It is used to control the right to capture transactions stored at controller. All administrators should be set to enable in order to have the right to collect transactions from controller. 5. Access privilege - Report setup It is used to control the right to generate reports of the system. With enable, the administrator can fully access to generate the attendance report, leave report, etc. Administration Setup 4-2

21 To delete an administrator 1. Select the administrator to be deleted. 2. Right click to popup menu. 3. Select Delete command to launch. Select this command to append a new administrator. Select this command to delete the selected administrator. Select this command to change the password for the current selected administrator. To change Logoff function & privileges of administrator 1. Select an administrator. 2. For using auto logoff function, click the Disabled to remove the tick mark from and set a proper time for auto logoff. 3. Set the tick mark to proper access privileges box for right access. Remove the tick mark for deselecting. To change the password of administrator 1. Select an administrator 2. Right click to popup menu. 3. Select Change Password. 4. The window Change Password will be displayed. 5. Type the new password at Password field 6. Type the password again at Verify field 7. Click OK to finish 8. Individual administrator can also change their own password after login and right click at "Login Status". Enter a new password; the maximum length is set to 15 characters. As a security precaution, the screen does not display the password but instead of the character '*'. Enter a new password again for verification; the maximum length is set to 15 characters. As a security precaution, the screen does not display the password but instead of the character '*'. The password must be matched with the Password field, so that the OK button can be click. Administration Setup 4-3

22 To change the password during Login 1. Select the Login tree node 2. Right click to popup menu. 3. Select Change Password. 4. The window Change Password will be displayed. 5. Type the Old password which is currently used 6. Type the new password at New Password field 7. Type the password again at Verify field 8. Click OK to finish 9. The password will tack effect after logout. Click this command to change password Multiple Login The Win Access 2000 Supports multiple administrators login under the following conditions: 1. For ACS controller s communication, it can only be processed at the Host computer. 2. For system connections data modification, it is highly recommended to process at Host computer although it can be done at other computers. 3. It is prohibited for several administrators login at same time to modify system data, such as roster table. Please consult your technical support term for proper setup for multiple login. Administration Setup 4-4

23 Chapter 5 System Connection & Controller Setup This Chapter provides the information to setup & configure the system connection to ACS controllers. Port Attachment The Port of the host computer should be attached first in order to settle ACS controllers along to. Administrator should first add a new active RS232 communication port to the access control system. This port must be physical exist in the PC. It can be directly connect to one ACS controller by means of RS232. Or connected up to 32 ACS controllers by using Win Access 2000 Key Guard. Right click the System Connection to pop-up the menu, and then select Attach New Port to launch the command. To attach a new port 1. Select proper port at Port Available and assign a port caption on it. The maximum length of the caption is 16 characters. 2. If you are not sure which port available at the PC, please consult your technical term. 3. Click OK to finish. Select the port number, which is used to connect to ACS controller, if the port is already attached, it will not be displayed at the list box. Enter the caption of the new port. Maximum 16 characters. System Connection & Controller Setup 5-1

24 Controller Attachment All ACS controllers should be attached to the port in order to link up for communication. When you do the attachment, the physical ACS controller may or may not be connected. If the controller is not connected to the system at the moment, do not do the command Send to Controller. Right click the Port tree node to pop-up the menu, and then select Attach New Controller to launch the command. To attach a new controller 1. Enter the controller's name at the Name field. The maximum length of the controller's name is 16 characters. Please do not set the same name to controllers in order to avoid confuse of controller selection. 2. Assign a number to the Controller ID, which is used during communication. If the number is already selected by other controller, it will not display at the list box. In order to easily manage controllers, please assign an ID on sequence. 3. Enter the ACS controller Serial Number at Serial No. Field. The serial number is located at the Left-top corner of the controller board. Note: Please make sure to enter the correct serial number; otherwise, the controller will not work properly. 4. If this controller is connected via a modem, the modem connection check box must be selected. And the telephone number must be provided at the field Tel No. 5. If the controller is not connected by using modem, such as connected by using Key Guard - RS485, the modem connection must be marked without tick. 6. Click OK button to finish 7. If the box is set to Send to Controller, then the controller ID will be automatically transmitted. If the box is set to Not Send to Controller, then the controller ID will not be transmitted until Assign Address. Administrator can click the box to toggle between them. And right click to Set as Default. System Connection & Controller Setup 5-2

25 This name is used to label the controller at the entire system. Please try to make unique name in order to distinguish between other controllers. Maximum length is 16 characters. Each controller must be assigned a unique number (01-63) in order to identify along the link. The serial number is displayed at the left-top corner of the controller board. This 10 digits serial number is unique in all ACS controllers. If the controller is connected locally via RS485, please remove the tick mark from this box. If the controller is connected at remote site via a modem, please set the tick mark to this box, and input the telephone number at Tel No. field. Once the modem connection is marked with tick, Tel No. must be entering. Otherwise, the OK button will not be enabled. It is used to indicate that immediately action after the OK button click. If the Send to Controller is display, after click the OK button, the address will be assigned into the controller automatically. If the Not Send to Controller is display, No communication will be done. This button only active when all field have been entered Click this button will attach the new controller under the port node. System Connection & Controller Setup 5-3

26 Controller Configuration Once an ACS controller is properly attached, some setting belongs to this controller should be configured for appropriated operation. To Setup Controller Configuration The controller configuration can be configured at this multi page window. 1. Configure the basic operation of an ACS controller. Pin Verification It is used to configure the PIN verification setting. Always Cardholder should always input the PIN after present the card. PIN Time Zone Verification For right PIN time zone level, there is no need to input the PIN after present the card. For no right PIN time zone level, the PIN is needed. Note: 1. For controller without keypad equipped: PIN Time Zone Verification should be marked with tick and all the PIN time zone should be set to "0" for all cardholder. 2. For keypad equipped controller: high security - set the tick mark to Always for Card+PIN access always. middle security - set the tick mark to PIN Time Zone Verification and to manage the PIN time zone for individual access person. low security - set the tick mark to PIN Time Zone Verification and set the PIN time zone to "0" all access person. Therefore, it is purely card access. System Connection & Controller Setup 5-4

27 Keypad Entry The keypad entry is used to control the access by purely keypad input only. It is only suitable for keypad-equipped controller. Enable Cardholder can use the keypad entry function without present the card. It is suitable for convenient door access. For EXP-06: 1. Press the key '#' to initiate the function 2. Input 8 digits Card No. 3. Input 4 digits PIN 4. The door will open, if the Card No & PIN are correct. For ACS-02 with Single Code Access Function: 1. Press the key '#' to initiate the function 2. Input 6 digits access code. 3. The door will open if the code is correct. For ACS-02 with NO Single Code Access Function: 1. Press the key '#' to initiate the function 2. Input 8 digits Card No. 3. Input 4 digits PIN 4. The door will open, if the Card No & PIN are correct. Disable Keypad entry is prohibited. And the purely keypad entry is impossible. It is suitable for high security access. Single Code Access - (For ACS-02 controller only) It is used to configure the Single Code Access function. This function is active only if the Keypad Entry is set to Enable. The single code can be used to access a door by input the 6 digits pre-set code. Therefore, there is no transaction stored for the access. This function is not recommended for high security access. Enable User can access the door by input the 6 digits code. Disable Single code access is prohibited. Code If the Enable is selected, this field is used to set the 6 digits code for access. Function Key Time Table It is used to configure the function key time table access status. The access status is used to store at transaction, #1 - #8 for key 1 to Key 8 status respectively for individual categories use. Auto Rectify The function key status will be automatically adjusted refer to the setting of Function Key Time Table. User can still press the individual key (Key 1 - Key 8) for special access. Manual Set User should press the key (Key 1 - Key 8) to set to suitable status for access. System Connection & Controller Setup 5-5

28 Function Key Name Display - (For TRS-05 use only) It is used to configure the function key label display at LCD screen of TRS-05 controller only. For ACS-02 & EXP-06 controller, they are forced to set to User Defined. Controller Default The pre-set function key name is used as the label to display at LCD screen at TRS-05 controller. For details, please refer to TRS-05 user's manual. User Defined The function key name displayed at controller will refer to the setting at Function Key Name. LCD Panel - (For ACS-02 use only) It is used to configure the status display at ACS-02 LCD screen. Show Status Bar If the Show Status Bar is marked with tick, the LCD screen of ACS-02 controller will display the current operation status at the bottom line. If the Show Status Bar is marked without tick, the LCD screen of ACS-02 controller will display the message from Status Field. For details, please refer to ACS-02 user's manual. Status Field Enter maximum 16 characters message to be displayed at ACS-02 controller. 2. Configures the door access related settings of controller. System Connection & Controller Setup 5-6

29 Transaction Storage It is used to configure the transaction storage method. It is highly recommended to set to Save All, under this mode, all events of access & alarm will be recorded and stored at controller. Save All All events, including valid access, invalid access & alarm, will be recorded into the memory of the controller. This mode is suitable for Access Control System & Alarm Control System. Valid only Only granted access transactions are recorded during this mode. Invalid access & alarm transaction will be abandoned. To prevent events lose; do not set to this mode. Transaction Overflow - (For TRS-05 use only) It is used to configure the transaction overflow process. For safety reason, ACS-02 & EXP-06 are all forced to set to Overwrite First Transaction mode. Reject When the transaction storage reaches the maximum level, the controller will restrict further door access and reject all transactions & events. Administrator must capture those transactions first to free some space. Therefore, no stored transaction will be erased. This mode is dangers for access control. Overwrite First Transaction When the transaction storage reaches the maximum level, the most previous transaction will be erased by the most recent transaction. During this mode, Administrator should frequently capture the transactions to avoid transaction losing. Controller Operation Mode It is used to configure controller operation mode. For EXP-06, only Access Control Mode is available. Access Control Mode At this mode, administrator should provide cardholder information for access. The cardholder access is controlled by Card Holder Database, Access Time Zone, & Pin Time Zone. Time Recording Mode At this mode, all cards will be accepted even if it is not found in controller cardholder database. It is only suitable for time recording system. Anti-Passback - (For In/Out Reader mode only) The anti-passback function is used to guard the access for regular In-Out-In-Out access. Caution: Do not turn this mode to Enable for single reader controller. Enable All cardholder should obey the following rules for access: 1. This function works for In/Out reader only. 2. After the issue of a new card (the initial stage), the user is free for access through In or Out Reader at first time only. 3. Once there are valid access through In or Out, it is only allowed to access through Out or In after and so on. 4. The function Reset Anti-passback can be used to set all users to the initial stage. This mode is suitable for Car-Park system usage. Disable There is no limitation for In & Out access. System Connection & Controller Setup 5-7

30 Reset Anti-Passback This command is used to reset all the access IN/OUT status. It is only useful for Anti-passback function access. Caution: Once the anti-passback is reset successfully, there is no IN/OUT controller for the first time. Administrator must take care for Car-Park system Reader Type Caution!: Do not alter the Reader Type, otherwise, the controller will not work properly. This feature is only available for some type of controllers. ABA Track 2 Consult your technician for configuration! Wiegand 26 bits Consult your technician for configuration! Transaction Size This value indicates the current controller transaction storage capacity. Controller memory size repartition Caution: All cardholder information will be erased after successfully performed this command. Administrator are not recommended to do this command expect it is necessary to do so. This command is used to divide the controller memory for transaction usage & cardholder information storage. It is only necessary to do when either side is insufficient. All transactions stored in controller should be captured first before performing this command. Otherwise, the controller will reject this command. System Connection & Controller Setup 5-8

31 3. Configures the door alarm related settings of controller. Alarm It is used to configure the alarm function of the controller. Alarm Auto Reset Box marked with tick indicates that the alarm will be resumed while the door sensor becomes normal. Box marked without tick indicates that the alarm can only be resumed by the command Reset Alarm. Break-In Alarm The break-in alarm is used against the force break-in attack of a door. Set the tick mark to this box to enable the function. Reset Alarm This command is used to resume the alarm of the controller to operate again. It is only used when the Alarm is NOT auto-reset. Door Open Alarm The door open alarm is used to prevent long time door open for security reasons. Enable The door open alarm is set to active. And the door open duration should be set at left side. Disable The door open alarm is set to inactive. Door Open duration (seconds) It is only active while Enable is marked with tick. System Connection & Controller Setup 5-9

32 For a reasonable time, this value should be set between 30 seconds to 60 seconds. Too short time (less than 10 seconds) will always generates force alarm. Too long time (over 60 seconds) also increase the risk of security. Door Open Time (seconds) When a cardholder is granted to access a door, a door lock relay will be turned on to active the door to open. This door open time is used to control the duration of the relay to remain ON. The relay will be force to OFF if the door is physically opened. Once the door is not physically opened after the certain time defined at this field, the door open relay will relock again. For general electric door lock, it is pre-set to 5 seconds. Too short time (less than 3 seconds) or too long time (over 8 seconds) settings are not recommended for he security reason. Auxiliary Relay Usage - (Old version ACS-02 use only) It is used to configure the single relay usage. For ACS-02 & EXP-06 controller, two relays assigned for individual usage. Turn ON Auxiliary Relay This command can be used to force manually turn ON the Auxiliary Relay of the controller. For automatically turn ON/OFF the Auxiliary Relay, please use Programmable Time Table to achieve. Turn OFF Auxiliary Relay This command can be used to force manually turn OFF the Auxiliary Relay of the controller. For automatically turn ON/OFF the Auxiliary Relay, please use Programmable Time Table to achieve. 4. Configures the image feature of alarm system used at transaction capture operation. System Connection & Controller Setup 5-10

33 Access Thumb Image Click this area to assign an image to the access transaction, usually this image will be displayed if the Exit button is pressed. For image assignment, the rules must be obeyed: 1. Only JPEG (*.jpg) & BMP (*.bmp) files format are allowed. JPEG file format is better for efficiency image processing. 2. Do not use long file name. The maximum allowable file name length is limited to 12 characters. 3. For multiple assignment of an image file, use the file located at system directory. 4. Do not drag too large or too small image area. To assign a image: 1. Select a file any hard disk or floppy disk directory. 2. The image will be fully displayed at screen. For over-large image, it will be stretched to just fit into screen. 3. Move the mouse pointer into proper start position. 4. Press Left button down and drag to any desired position to block an area that will be displayed as thumb. To avoid image distortion, the image aspect ratio is fixed. 5. Release the Left button to popup a menu. 6. Select OK to save &finish, or 7. Select Cancel to abort, or 8. Repeat step 3-5 for retry. Alarm Thumb Image Click this area to assign an image to the alarm transaction, this image will be displayed if break-in alarm/door open alarm occurred. For image assignment, the rules must be obeyed: 1. Only JPEG (*.jpg) & BMP (*.bmp) files format are allowed. JPEG file format is better for efficiency image processing. 2. Do not use long file name. The maximum allowable file name length is limited to 12 characters. 3. For multiple assignment of an image file, use the file located at system directory. 4. Do not drag too large or too small image area. To assign a image: 1. Select a file any hard disk or floppy disk directory. 2. The image will be fully displayed at screen. For over-large image, it will be stretched to just fit into screen. 3. Move the mouse pointer into proper start position. 4. Press Left button down and drag to any desired position to block an area that will be displayed as thumb. To avoid image distortion, the image aspect ratio is fixed. 5. Release the Left button to popup a menu. 6. Select OK to save &finish, or 7. Select Cancel to abort, or 8. Repeat step 3-5 for retry. Unload Access Thumb Image It is used to immediately discard the image function for controller access transaction (Exit button pressed). System Connection & Controller Setup 5-11

34 5. Configures the alert feature of alarm system used at transaction capture operation. Alarm Alert Sound File This function is used to play a sound file when there is alarm occurred. It can ONLY be triggered when the associated alarm is focused. It is recommended for guardroom security control. For sound file assignment, the rules must be obeyed: 1. A sound card must be installed at the PC. 2. The sound playback function must be combined used with alarm thumb image. If the Alarm Thumb Image is NOT set, the sound alert function will be disabled. 3. Do not use long file name. The maximum allowable file name length is limited to 12 characters. 4. For multiple assignment of a sound file, use the file located at system directory. Unload Sound Alert It is used to immediately discard the alert function for alarm transaction. Sound Playback These three buttons are used to play, pause, & stop the loaded sound file. These buttons will be disabled if there is no sound file loaded or invalid format sound file. Remark This label is used for controller transaction description. It will be displayed during controller transaction (Exit button, Alarm Occurred) System Connection & Controller Setup 5-12

35 To Setup Access Card Holder The access cardholder is the information for a person who can access a gate that controlled by ACS controller. The access cardholder information contains the image of the person, the Password & PIN time zone level, access time zone level, and authority access level. This screen is only used to maintain the cardholders for the controller only. To manage & append a new cardholder, please refer to the Chapter 6 Card Holder Database Management. This area is used to display the thumb image of the selected cardholder. Click this area can display the full image of the cardholder. If there is no image assigned to the cardholder, there is nothing displayed here. This section lists the personal information of the select cardholder. This box lists all the cardholders stored at controller. Select a cardholder to display and to edit the details at the fields. This window is used to manage the cardholders information associated with this controller. It is mainly used to send the card holder information into controller For a card holder's information, such as password, name, employee's information, etc, can only be modified at system Card Holder database. To send a group of card holders into controllers: 1. Set the tick mark to the box at the left side of the cardholders. 2. Right click to popup menu 3. Select Send Selected to Controller. System Connection & Controller Setup 5-13

36 To Setup Access Time Zone Access Time Zone determines whether a cardholder is granted access at a door. When a cardholder tries to access a door, the system checks the cardholder record for the time zone assigned to the controller at the door. Access Time Zone is used to define the appropriate period that the cardholder can be authorized to entry the entrance within that time. There are totally 8 types of day can be set, i.e. Holiday, Monday, Tuesday, Wednesday, Thursday, Friday, Saturday and Sunday. Each day has 3 periods of entry time can be set. There are totally 8 (1-8) time zone tables, which can be used for categorization. Time Zone 0 is per-set 24 hours authorized to entry the entrance, i.e. Holiday, Monday, Tuesday, Wednesday, Thursday, Friday, Saturday and Sunday, each day has 24 hours entry time. The access time zone can be modified at this window for the corresponding controller. All access time zone setting must obey these rules: 1. The time is 24-hour format 2. hh:mm-hh:mm should be entering for each field. 3. The first hh:mm is the start time inclusively. 4. The last hh:mm is the end time exclusively :00-00:00 must be filled for void access time zone :00-24:00 can be used as whole day access time zone. For rapid edit, administrator can set the cursor to a proper cell (edit field) and right click to popup a menu for copy & paste. System Connection & Controller Setup 5-14

37 Typical examples of Access Time Zone Settings: 1. One period per day time zone access. Access is granted during 09:00 to 17:00 Monday to Friday, and 09:00 to 13:00 Saturday. There is no access allowed during Sunday & Public Holiday. 2. Multi-period per day time zone access. Access is granted during 09:00 to 13:00 and 14:00 to 17:00 Monday to Friday, and 09:00 to 13:00 Saturday. There is no access allowed during Sunday & Public Holiday. System Connection & Controller Setup 5-15

38 3. Overnight time zone access Important! Please read it carefully Access is granted during 18:00 to the next day morning 05:00 Monday to Saturday. There is no access allowed during Sunday & Public Holiday. 4. Whole day time zone access. Access is granted for the whole day from Monday to Saturday. There is no access allowed during Sunday & Public Holiday. System Connection & Controller Setup 5-16

39 To Setup Pin Time Zone Pin Time Zone is used to define the appropriate period that the cardholder can be authorized access by present the card only without key-in PIN code. There are totally 8 types of day can be set, i.e. Holiday, Monday, Tuesday, Wednesday, Thursday, Friday, Saturday and Sunday. Each day has 3 periods of time can be set. There are totally 2 (1-2) Pin time zone tables which can be used for categorization. Pin Time Zone 0 is per-set all time no need to key-in PIN code. The PIN time zone can be modified at this window for the corresponding controller. All PIN time zone setting must obey these rules: 1. The time is 24-hour format 2. hh:mm-hh:mm should be entering for each field. 3. The first hh:mm is the start time inclusively. 4. The last hh:mm is the end time exclusively :00-00:00 must be filled for void PIN time zone 6. 00:00-24:00 can be used as whole day PIN time zone. For rapid edit, administrator can set the cursor to a proper cell (edit field) and right click to popup a menu for copy & paste. System Connection & Controller Setup 5-17

40 To Setup Holiday Holiday table is used to define the holiday used at Access Time Zone, Pin Time Zone, Programmable Time Table, & Function Key Time Table. There are maximum 100 days can be defined as holiday. The holiday can be defined at Holiday Definition under the access transaction tree node. The description for holiday definition is located at chapter 8. This list box shows the currently assigned holidays to the controller. To remove the day from the list box, first click the box at the left side of the day, and click the right arrow sign box to remove it. Click the double right arrow sign box will remove all defined days stored at the list box. This list box shows the currently defined holiday tables, which are available to be used for controller. To assign the days to the controller, first click the box at the left side of the days, and click the left arrow sign box to assign to the controller. Click the double left arrow sign box will assign all defined days to the controller. The holidays used in controller can be assigned at this window for the corresponding controller. There are maximum 100 days, which can be assigned for a controller. For rapid selection, point the mouse to the controller list box and right click to select Auto Adaptation command. System Connection & Controller Setup 5-18

41 To Setup Programmable Time Table The programmable timetable can be used to automatically control the Auxiliary Relay of the controller on the time. There are totally 28 Programmable Time Table that can be defined. This list box shows the currently assigned programmable timetable to the controller. This section is used to configure each selected programmable timetable item. This window is used to define & modify the programmable timetable. There are maximum 28 timetables. From this windows, the first two items can be explained as "at every Monday morning 09:00, the Auxiliary Relay will turn ON, and every Monday afternoon 17:00, the Auxiliary Relay will turn OFF" The last item can be explained as "at every Tuesday afternoon 13:00, the Auxiliary will turn ON just for 5 seconds only and then turn OFF" To modify the defined timetable, first select it and then change the setting at lower side. To append a new timetable, right click to popup the menu and select Append. Maximum 28 timetables can be defined. To delete a timetable, first select the timetable to be deleted and then right click to popup the menu and select Delete. System Connection & Controller Setup 5-19

42 To Setup Function Key Name The Function Key Name is the label that used for categorized valid access in ACS-02 controller & TRS-05 controller. There are totally 8 names that can be set. Each name has 8 characters maximum in length. These fields are used to input maximum 8 characters for Function Key Name. System Connection & Controller Setup 5-20

43 To Setup Function Key Table The Function Key Time Table can be used for automatically control the Function Key Name display. Once the real time clock reaches the pre-set function key timetable, the function key name will be automatically changed. There are totally 8 types of day can be set, i.e. Holiday, Monday, Tuesday, Wednesday, Thursday, Friday, Saturday and Sunday. Each day has 8 section of time can be set. This window is used to edit the function key timetable. All Function Key Time Table setting must obey these rules: 1. The time is 24-hour format 2. hh:mm should be entering for each field. 3. The time input must be in sequence :00 must be filled for unused timetable. In order to edit the Function key timetable field, the cursor must be located at a certain field first. Since all fields have been masked, only digits are needed to input, such as key in "0900" to indicate "09:00". The key 'Tab' can be used to jump to next field, or Shift-Tab to jump to previous field. Double click mouse left button to highlight the whole field. Blank field or incomplete field is not allowed. For rapid edit, first set the cursor to a proper cell (edit field) and right click to popup a menu for copy & paste. The Copy & Paste commands can be used for rapid & duplication input. The cursor must be first located into the field to be copied or pasted, and right click mouse to popup the menu to do the action. System Connection & Controller Setup 5-21

44 Data Editing At most cases, some configuration setting for controllers are identical. You can use the Global Copy & Paste functions to speed up the data editing for Access Time Zone, Pin Time Zone, Programmable Time Table, & Holiday for every controllers along the system. Before do the paste command, you must first edit one controller configuration setting, and then copy it into memory, after that, the corresponding item at the port global paste will be enabled. Select the Access Time Zone for global paste first, then right click to pop-up the menu, and then select Copy to copy the Access Time Zone setting into memory. There are three categories of the settings can be pasted: 1. Pasted to entire controllers along the System Connection. Select the tree node System Connection, and then right click to pop-up the menu. Move the mouse pointer on Global Paste to All, a sub menu will be displayed. If the controller s setting is already copied into memory, the respective menu item will be enabled. At this time, the Access Time Zone is ready to paste to entire controllers. Click Access Time Zone to launch the paste. System Connection & Controller Setup 5-22

45 2. Paste to a tree only under the Port. This paste function is similar as the paste to system, but it only paste to the controllers under the port only. Others controllers outside the port will NOT be affected. Select the tree node under a Port, and then right click to pop-up the menu. Move the mouse pointer on Global Paste, a sub menu will be displayed. If the controller s setting is already copied into memory, the respective menu item will be enabled. At this time, the Access Time Zone is ready to paste to entire controllers. Click Access Time Zone to launch the paste. 3. Paste to a single controller. This paste function is only paste into an individual controller. Select a controller and set to its configuration setting tree item. Right-click to pop-up the menu and select Paste to launch the command. System Connection & Controller Setup 5-23

46 Controller Communication The controllers communication can only be performed at the Host computer, which connected with the Key Guard. Assign Address In order to recognize an individual ACS controller in the system, ACS controller should have a unique ID. This ID is called Controller Address. The Controller Address (ID) can be set during Attach New Controller. To fully identify every ACS controller, Assign Address must be done after new controller attached. This box lists all the controllers after the address assignment. If it is successfully assigned into controller, the word Success will be displayed, otherwise, Failed will be displayed. Right click to pop-up this menu for resend. Click Send all to Controllers to resend all, or Select one controller at list box and then click Send to Controller to send only individual. System Connection & Controller Setup 5-24

47 Send Date & Time In order to synchronous entire ACS controllers with System date & time, the command Send Date/Time must be performed after new controllers attached. Moreover, it can also be used to monitor the date & time at controller. This list box is used to select one ACS controller for date/time monitor & update. This field shows the host computer date/time. This field shows the selected ACS controller's date/time. Click this button to send the date/time to ACS controller. Receive Controller s Setting The settings stored at controllers can be browsed for reference. Both Controller Configuration, Card Holders database, Access Time Zone, Pin Time Zone, Holiday, Programmable Time Table, Function key Name, & Function Key Time Table, etc. can be received from controller for browsing. Select Access Time Zone and then right click mouse to pop-up this menu, Select Receive from Controller to collect the access time zone data from controller. After, a screen will be displayed for the received access time zone. You can also use the short cut key Ctrl+R to do it. System Connection & Controller Setup 5-25

48 Direct Send Setting into Controller The controller s settings can be directly send into controller after editing, while the Send to Controller is display at the left-bottom of each controller configuration edit screen. It is highly recommended for administrators to use this feature to directly update the controller s setting. For example, by looking at the Access Time Zone edit screen, there is a message Send to Controller or Not Send to Controller at left bottom corner. If the Send to Controller is display, after click the OK button, the access time zone will be transmitted into the controller automatically. If the Not Send to Controller is display, No communication will be done. The setting can also be set to a default value by first set to desire value, and then right click to popup a menu to set as default. It is highly recommended to set as default by Send to Controller. Individual Send Settings Administrators can also direct issue the Send to Controller command to update the settings. Select Access Time Zone and then right click mouse to pop-up this menu, Select Send to Controller to transmit the access time zone data to controller. You can also use the short cut key Ctrl+S to do it. System Connection & Controller Setup 5-26

49 Global Send Settings To update the whole settings into controller, or to update several controllers setting, the Global Send to Controller command is more suitable to be used. Select System Connection for entire controllers participation; select Port tree node for controllers participation under the port. Click Send to Controller to launch the Transmission screen. You can also use the short cut key Ctrl+S to do it. This screen is the panel for controller s setting transmission. Only ACS controllers under the port are list at the left side list box. Administrator can select the controllers to be participated for transmission by set the tick mark to the box at the left side. If the controller without tick mark, this controller will be skipped for the transmission. Note: Disabled controller can NOT be selected. System Connection & Controller Setup 5-27

50 There are total 14 commands can be selected for transmission. Only marked with tick command will be launched for transmission. 1. Assign address This command is used to assign the communication ID into controller. 2. Controller Date & Time This command is used to synchronize the date & time under the system. The current computer clock will be used as reference. Please make sure the computer real time clock is set to correct time before performing this command. 3. Controller memory size repartition Caution: All cardholder information will be erased after successfully performed this command. Administrator are not recommended to do this command expect it is necessary to do so. This command is used to divide the controller memory for transaction usage & cardholder information storage. It is only necessary to do when either side is insufficient. All transactions stored in controller should be captured first before performing this command. Otherwise, the controller will reject this command. 4. Controller operational setting This command is used to transmit all the operational setting of the controller. The controller setting can be modified at Controller Configuration under the controller tree node. 5. Access Card holder This command is used to transmit all the access cardholders into controller. Global access cardholder database can be modified at Card Holder or Controller Access Card Holder for individual controller cardholder database, 6. Access Time Zone This command is used to transmit the access time zone tables into controller. Access time zone can be modified at Access Time Zone under the controller tree node. 7. Pin Time Zone This command is used to transmit the PIN time zone tables into controller. PIN time zone can be modified at Pin Time Zone under the controller tree node. 8. Holiday This command is used to transmit the pre-defined holiday table into controller. Holiday can be picked at Holiday under the controller tree node. Holiday can be defined at Holiday Definition under the tree node of Access Transaction. For details of setup for Holiday, please refer to Chapter 8 Roster Setup. 9. Programmable Time Table This command is used to transmit the pre-defined programmable timetable into controller. Programmable timetable can be defined at Programmable Time Table under the controller tree node. 10. Function Key Name This command is used to transmit the function key name (label) into controller. The name is only useful for ACS-02 controllers & TRS-05 controllers. Function key name can be defined at Function Key Name under the controller tree node. 11. Function Key Time Table This command is used to transmit the function key timetable into controller. The name is only useful for ACS-02 controllers & TRS-05 controllers. Function key timetable can be defined at Function Key Time Table under the controller tree node. System Connection & Controller Setup 5-28

51 12. I/O Board Input (Alarm Board Version Only) This command is used to transmit the I/O Input sensor definition table into controller. This table can only be set at EXP-AL controllers. 13. I/O Board Output (Alarm Board Version Only) This command is used to transmit the I/O Output relay definition table into controller. This table can only be set at EXP-AL controllers. 14. I/O Board Extend Programmable Time Table (Alarm Board Version Only) This command is used to transmit the extend programmable timetable into controller. This table can only be set at EXP-AL controllers. System Connection & Controller Setup 5-29

52 Chapter 6 Card Holder Database Management This Chapter provides the fundamental information to manage the cardholders database for access control & attendance. Main Screen This screen is the main window for cardholder database management. Double click the tree node Card Users or click the Card Users button at speed bar to launch it. This box lists all cardholders. Select one cardholder can display the information on the below section. This section is used to edit the cardholder s information. Thumb Image area. Click on this area to assign an image for the selected user. The Card Users screen consists several parts: List Box: This box lists all the cardholders' information. These cardholders can be sorted by click the column bar. When a cardholder is selected at this box, the information associated with this person will be list at individual field for modification. Card Holder Database Management 6-1

53 Thumb Image: Click this area to assign an image to the cardholder; this image can be displayed at transaction capture. It is recommended for high security system. For image assignment, the rules must be obeyed: 1. Only JPEG (*.jpg) & BMP (*.bmp) files format are allowed. JPEG file format is better for efficiency image processing. 2. Do not use long file name. The maximum allowable file name length is limited to 12 characters. 3. For multiple assignment of an image file, use the file located at system directory. 4. Do not drag too large or too small image area. To assign a image: 1. Select a file any hard disk or floppy disk directory. 2. The image will be fully displayed at screen. For over-large image, it will be stretched to just fit into screen. 3. Move the mouse pointer into proper start position. 4. Press Left button down and drag to any desired position to block an area that will be displayed as thumb. To avoid image distortion, the image aspect ratio is fixed. 5. Release the Left button to popup a menu. 6. Select OK to save &finish, or 7. Select Cancel to abort, or 8. Repeat step 3-5 for retry. User s general information: There are used to edit the information for each cardholder. It consists several parts: 1. Card Number This field is used to display the card number. The card number cannot be changed at this field. 2. Password This field is used to set the password for a cardholder during access. The password is 4 digits number that used for personal access verification. This password can be changed by manual input or click the GEN button for automatically random generation. 3. Password Generation This button is used to generate a password by random. Do not click this button, until it is necessary to generate a new password. 4. Employee ID This field is used to display the employee ID of the cardholder. 5. Joined Date This field is used to set the joined date of the card holder. The date must be set to the date before the current date. 6. User name This field is used to set the cardholders name. The maximum length of this field is limited to 30 characters. 7. Department This field is used for input the department name of the cardholder. It is optional field. The maximum length is limited to 10 characters. It is recommended to use the Edit Department List for rapid selection. Card Holder Database Management 6-2

54 8. Access Group This field is used to assign the card holder for appropriated door access. The access groups should be established first by using Edit Access Group function. If the access groups is changed, the card holder must be register first to active. 9. Job Title This field is used for input the cardholder s job position. It is optional field. The maximum length is limited to 30 characters. It is recommended to use the Edit Job Title List for rapid selection. 10. Roster Flag This field is used to assign a roster table to the card holder for attendance using. Each roster table has a pre-set time table for weekly working schedule. Select the item "Attendance Exemption" if this card holder has exemption for attendance. For details, please see Roster Time Table. It is recommended to setup every possible roster time table first before setup the card holders. 11. Working Location This field is used for input the working location of the cardholder. This field is suitable for multi-site system. It is optional field. The maximum length is limited to 30 characters. It is recommended to use the Edit Working Location List for rapid selection. 12. Remark This field is used for input miscellaneous information of the cardholder. It is optional field. The maximum length is limited to 50 characters. It is recommended to use the Edit Remark List for rapid selection. Pop-up menu: The pop-up menu can be displayed by right click the mouse button. If there is no cardholder been selected at List Box, some item at the menu will be disabled. Select one cardholder at List Box, then right click to pop-up this menu. In this menu, each function will be described below: 1. Append It is used to append a new cardholder to the system database. Administrator should fill out these mandatory fields of the cardholder's record. 2. Find Card Holder Database Management 6-3

55 The find function display a dialog box for searching a card holder by means of the Card Number, User Name, Department, Working Location, Job Title and Remark. 3. Edit List The Edit List can be used as pre-set item for rapid data entry. It supports Department field, Job Title field, Working Location field, & Remark field. At these fields, administrator can direct click the down arrow to select a pre-set item as contents. This is very convenient for frequently input data fields. 4. Export to dbase File This window is used to export the database in to DBF format for active staff and expired staff. 5. Browse Expired Staff This window is used to browse all expired staff. It is not allowed to modify any information of these records. 6. User Profile There are three windows to input the person record. Main window: to input the personal information. Educational window: to input the educational records of the person. Employment window: to input the employment records of the person. 7. Print Card Print Card is a utility to print the badge of a card. The output size is fixed as 86mm x 54mm. Administrators can preset the layout of card as a template. 8. Replace Card This window is used to replace a new card to a cardholder and updated into ACS controllers. The Send to Controller must be selected in order to update the card replacement to the ACS controllers. 9. Expire Card This window is used to set the card holder into expire stage. Once it was set to expire, the card access will be removed from all ACS controllers. And the personal database will be transferred into expired database. 10. Load Card Holder Image/Unload Card Holder Image This command is used to assign an image to the cardholder. It is the same function as click the Thumb Image area. It is used to immediately discard the image linked to the cardholder. 11. Edit Access Group This function is used to set the access privileges groups for all card holders. 12. Register Cards This command is used to register & update the card holder's access group. A card holder must be registered in order to active the access right associated to the card holder. It is highly recommended to use the command Register Cards & Send to Controller so that the access information can be updated into controllers. 13. Register Cards & Send to Controllers This command is used to register & update the card holder's access group and send to controllers. 14. Send Selected to Controllers This command is used to send the selected cardholders information into all ACS controller guarded by their access right. 15. Delete Selected Caution: This will permanently delete the cardholders information. This command is used to permanently remove all the selected cardholders information from both system and ACS controllers. Card Holder Database Management 6-4

56 New Card Holder Appending A cardholder s database must be first added into the system for access through the system and attendance report. Before append a new card holder 1. Administrators are highly recommended to establish the possible access groups which can be assign to the cardholder by using the command Edit Access Group. 2. The system will automatically generated a roster time table for usage. It is highly recommended to the administrators to define all roster time tables before append a new card holder. To append a new card holder 1. Right click to popup menu. 2. Select Append. At Append Card Number window. This field is used to input the employee ID of the cardholder. This ID is unique for the entire database (both current card holder and expired card holder database) This field is set to read only after appending. This field is used to input the card number. The card number is 8 digits, unique number for the identification of the cardholder. This field is set to read only after appending. This field is used to set the joined date of the cardholder. This field can be changed after appending. 3. Input the card number of the card. 4. Input the Employee ID field. 5. Input the Joined date of the staff. 6. Click OK to save it. Return back to the main screen. 7. Input Department, Job Title, Working Location, & Remark at respective field. 8. Click the User Image area to assign an image to the cardholder. 9. At the Access group field, select a proper access group to the card holder. 10. At the Roster Table field, select a proper roster time table to the card holder. Select Attendance Exemption to exempt to the card holder for attendance reports. 11. Click User Profile to input the personal data. 12. After finishing appended cards, Right click to popup menu. 13. Select Register Cards & Send to Controllers. 14. A window will be displayed for the processing of transmission. The following section describes the screen for access group assignment. Card Holder Database Management 6-5

57 Controller Access Group Assignment This window is used to set the cardholder's access privileges for all ACS controllers. These fields are used to set the access level for the cardholder. This box lists all the ACS controllers at the system. Each item represents the access status of the controller at the current access group. Administrator can directly change the access status by set the tick mark(allow to access) or remove the tick mark(deny to access) to the box at the left side. For accessible controller, the access time zone, PIN time zone, authority level can be assigned individually by selected the item. In order to set access time zone, PIN time zone, & authority level to all controllers for a unique level, click the column bar to popup a menu for global assignment. Access Level Description: 1. Access Time Zone: This field is used to assign the access time zone level to the cardholder at the selected controller. Level 0: (non-restrict access) There is no day and time control to this cardholder, i.e. Holiday, Monday, Tuesday, Wednesday, Thursday, Friday, Saturday and Sunday, each day has 24 hours entry time. Level 1-Level 8: (restrict access) The access time is controlled by the Access Time Zone. Each level has the corresponding Access Time Zone table. The cardholder is only granted while the access time is within the time zone. For global assignment, click the Time Zone column bar of the List Box and then to select a level. Card Holder Database Management 6-6

58 2. Pin Time Zone: This field is used to assign the PIN time zone level to the cardholder at selected controller. Level 0: (no-pin access) There is no need to enter PIN during access. Level 1-Level 2: (PIN time zone dependence access) If the access time is within the PIN time zone, there is no need to enter PIN for access. If the access time is out of the PIN time zone, PIN must be entering for verification. For global assignment, click the Pin Zone column bar of the List Box and then to select a level. 3. Authority Level: This field is used to assign the level of authorized control to the controller. For details of usage of the Authority Level, please consult your technical support term. Level 0: (no-authority control level) This cardholder can only use the card for access only. Level 1: The cardholder can use the card to turn ON the auxiliary relay. Level 2: The cardholder can use the card to turn ON and OFF the auxiliary relay. Level 3 - Level 7: (for further use) Administrator is not recommended to assign these levels to cardholder. For global assignment, click the Authority Level column bar of the List Box and then to select a level. To append a new access group: 1. Click the Append button, the maximum groups are limited at At Caption field, input the name for this access group. 3. Set proper access level for individual controllers. Once a access group is appended, It is NOT allowed to delete it. To restrict access to a controller: 1. Select a controller at list box 2. Remove the tick mark from the box of a controller at left side. 3. The access will be set to Deny at Entry column. To permit access through a single controller: 1. Select a controller at list box. 2. Set the tick mark to the box of a controller at left side. 3. The access will be set to Allow at Entry column. 4. Set Time Zone to proper level at Access Time Zone field. 5. Set PIN Zone to proper level at PIN Time Zone field. 6. Set Authority Level to proper level at Authority Level field. To set permit access to all controllers: 1. Click the Entry column. 2. The popup menu is displayed 3. Select Allow to All to set to all controllers. Card Holder Database Management 6-7

59 To set access time zone level to all controllers: 1. Click the Time Zone column. 2. The popup menu is display. 3. Assign a proper level to it. Click the column bar to popup this menu. And select a proper Time Zone level. To set PIN time zone level to all controllers: 1. Click the PIN Zone column. 2. The popup menu is display. 3. Assign a proper level to it. Click the column bar to popup this menu. And select a proper Pin Zone level. To set authority level to all controllers: 1. Click the Authority Level column. 2. The popup menu is display. 3. Assign a proper level to it. Click the column bar to popup this menu. And select a proper Authority Level. Card Holder Database Management 6-8

60 Personal Information Maintenance (User s Profile) There are three windows to input the person record. It is optional fields and for human resources usage only. 1. Main window: to input the personal information. 2. Educational window: to input the educational records of the person. 3. Employment window: to input the employment records of the person. There three windows are used to input the personal profile of the selected cardholder. Card Holder Database Management 6-9

61 Hardcopy of Badge Print Card is a utility to print the badge of a card. The output size is fixed as 86mm x 54mm. Administrators can pre-set the layout of card as a template. For the printer specification, it is highly recommended to use photo quality color printer. For the details of connection about the printer, please consult your IT department or the technical support term. This field is the Template box. It can store up to 30 templates. This area display the actual image of the badge to be print out. This coordinate is used to set the printing position of the badge located to print page. To configure the layout and stored into Template 1(Template Setup): 1. Select Template 1 at Template field. 2. Right click to popup menu. 3. Select Set Image to locate the Cardholder's thumb image. 4. After finish the image setup, right click to popup menu again. 5. Select Set Fixed Texts to locate constants texts. 6. After finish the fixed texts setup, right click to popup menu again. 7. Select Set Card Holder Texts to locate the cardholder information. 8. The setting will be stored into Template 1 automatically. Card Holder Database Management 6-10

62 To configure the image layout of a Template: This window is used to setup the background image and the cardholder thumb image for the current selected template. Tick this box to enable the background image. Click the Load Image File to select a background image. Tick this box to enable the user s thumb image and set the position of the image. This is used to select the orientation of the print card. Landscape: 86mm (W) x 54mm (H) Portrait: 54mm (W) x 86mm (H). 1. Select the output orientation for landscape or portrait. 2. If a background image is necessary, set Background Image to Enable and then load a graphic file. The image will be stretched to fit into the preview area. 3. Set Thumb Image to enable and set the position of the thumb image located refers to the left-top corner of the preview area. 4. Set the width of the thumb image. The height of the thumb image will be set automatically. 5. Click OK to finish & save. To configure the user s Text of a Template: This window is used to setup the cardholder texts used for the current selected template. There are totally 6 texts can be located. There are total 6 types of user s text can be set. If the Enable is tick, the Text will be used for printing. These three sections are used to set the attribute of the text for location, background color, & font. Card Holder Database Management 6-11

63 1. Click the Enable check box to enable the text. 2. Select the Horizontal & Vertical position for anchor of the text. 3. Set the align method at Align field. 4. If the background color is necessary, click the enable and select the color. 5. The font can be selected by click the Set Font button. The size & color can also be selected at the Font dialog box. 6. Repeat Step 1-5 for others text setup. To configure the Fixed Text of a Template: This window is used to setup the constant text used for the current selected template. There are totally 6 texts can be located. 1. Click the Enable check box to enable the text. 2. Type proper text at the Text field. 3. Select the Horizontal & Vertical position for anchor of the text. 4. Set the align method at Align field. 5. If the background color is necessary, click the enable and select the color. 6. The font can be selected by click the Set Font button. The size & color can also be selected at the Font dialog box. 7. Repeat Step 1-6 for others fixed text setup. Card Holder Database Management 6-12

64 Card Replacement This window is used to replace a new card to a cardholder and updated into ACS controllers. The Send to Controller must be selected in order to update the card replacement to the ACS controllers. After successfully replaced the card, the new card will tack effect immediately. This field shows the cardholder's name for card replacement. This field is used to input the new card number for the cardholder. It is used to indicate that immediately action after the OK button click. If the Send to Controller is display, after click the OK button, the card replacement will be updated into the controllers automatically. If the Not Send to Controller is display, No communication will be done. Card Holder Expired This window is used to set the card holder into expire stage. Once it was set to expire, the card access will be removed from all ACS controllers. And the personal database will be transferred into expired database. For immediately new card activation, it is highly recommended to select the Send to Controller for the card replacement. These fields show the cardholder's number, employee no. & name for card expiration. This field is used to set the expire date of the cardholder. It is used to indicate that immediately action after the OK button click. If the Send to Controller is display, after click the OK button, the card replacement will be updated into the controllers automatically. If the Not Send to Controller is display, No communication will be done. Card Holder Database Management 6-13

65 Update to Controller The cardholder information must be update before exist the card holder s setup window. Register Cards A card holder must be registered in order to active the access right associated to the card holder. This command is used to register & update the card holder's access group. It is highly recommended to use the command Register Cards & Send to Controller so that the access information can be updated into controllers. Register Cards & Send to Controllers A card holder must be registered in order to active the access right associated to the card holder. This command is used to register & update the card holder's access group and send to controllers. Update through the Send Selected to Controller command from the popup menu 1. Select the card holders by tick the mark at the list box 2. Right click to pop-up the menu 3. Select the Send Selected to Controller. Mouse the mouse pointer here and left click to set the tick. The tick can be removed by click it again. Card Holder Database Management 6-14

66 Chapter 7 Transactions Collection & Amendment This Chapter provides the information to collect the transactions stored at ACS controller by using Win Access 2000 program. The transaction capture is used to collect all the transactions stored at ACS controllers along the system. The collected transactions can be used to process for attendance report. And the transactions can also be exported for others application usage, such as pay roll system. Preparation & Configuration This screen is used to setup the transaction capture configurations. The settings will be automatically stored for using at next time. And the settings are also used for Win Access 200 Capture Express program. If the capture is started, this page will be disabled. Controllers List Box This box lists all the controllers under the system. Set the tick mark to the box at the left side of a controller to select for transaction capture. Remove the tick mark from the box to deselect. Disabled controller cannot be selected for transaction capture. Transactions Collection & Amendment 7-1

67 Auto Popup This function is used to automatically popup the image associated with the currently captured alarm transaction. It is recommended for Guard Monitor Panel captures purpose. Non-stop Alarm Sound Alert This function is used to repeatedly play the sound alert associated with the currently captured alarm transaction until this alarm transaction is acknowledged. It is recommended for Guard Monitor Panel capture purpose. The high speed PC (run over 450MHz) is required for this function. Auto Stop This function is used to automatically stop the transaction capture when all transactions stored at the controller are received. Note: The fresh generated transactions may exist at controller after stopped the transaction capture. It is NOT recommended for administrator to use this function for transaction capture. Auto Panel Lock This function is used to automatically lock the transaction capture panel when it is stated to capture transaction. When the panel is locked, all functions of the program will be disabled, until the panel is unlocked. It is recommended for administrator to use this function against unauthorized access of the program. Send Date/Time This function is used to automatically synchronize the date & time between host computer & all selected controllers during transaction capturing. Note: Please make sure the computer date/time is set properly before select this function. Capture Express Auto Start This function is used for Capture Express only. Selected the tick to automatically start capture transactions while the computer is turned ON. Note: For scheduling transactions capture, please use the Schedule function at Capture Express. Maximum Access Transaction Buffer It is NOT recommended to set the value over 1200 in order to save the system resources. This value is used to limit the maximum transactions stored at the Access Transactions List Box. Once the transactions displayed at the list box are overflow, the very beginning transactions are removed from the list box in order to free the space for the fresh transactions. Note: The very beginning transactions are only removed from the list box only. There are still stored at hard disk. Maximum Alarm Transaction Buffer It is NOT recommended to set the value over 1200 in order to save the system resources. This value is used to limit the maximum transactions stored at the Alarm Transactions List Box. Once the transactions displayed at the list box are overflow, the very beginning transactions are removed from the list box in order to free the space for the fresh transactions. Note: The very beginning transactions are only removed from the list box only. There are still stored at hard disk. Transaction Refresh Rate This value is used to update the received transaction into working transactions database. Otherwise, during the capturing process, the transactions within this time period will not be updated for reporting. Transactions Collection & Amendment 7-2

68 Enable Transaction Transfer The Transaction Transfer function is used to relocate the old transactions to history file in order to speed up the report generation process. It is automatically processed function. It is highly recommended to enable this function and set the refresh date to 6 months. Transaction Date This field is used to set the refresh date. 6 month is recommended date for this setting. For huge transactions generated system, 3-4 months is also acceptable. For compact transactions generated system, 12 months is perfect. Capture Monitoring Two screens are used to monitoring the transaction capturing: Access Transaction screen & Alarm Transaction screen. Before Start: 1. Select proper controllers at Controller List Box. 2. For usual transaction capture, remove the tick mark from the Auto Popup box; For Guard Monitor capture purpose, set the tick mark to the Auto Popup box. 3. Set the tick mark to the Auto lock to automatically lock the panel after start capturing. It is recommended for administrator to do so for security reason. 4. Click Start to turn ON the capture. During the capturing state: 5. If the panel is unlock, other functions except communications can also be performed, such as report generation, & 6. If the panel is locked, only unlock can be done. It is highly recommended to close the transaction capture panel before to perform controller related process, such as cardholder modification. Stop Capture: 1. If the panel is locked, unlock the capture panel first. A password entry dialog box will be display for the current login administrators to unlock the panel. 2. Click Stop button to turn OFF the capture. Transactions Collection & Amendment 7-3

69 Access Transaction Monitoring: This screen is used to lists all the received access transactions. Select individual transaction to display the details information about the transaction at Details Box. The Focus on last received transaction box can be marked with tick to direct select the last captured transaction. It is functional during the capturing state. This box lists all the transactions received from ACS controllers. Click this button to stop capturing. Click this button to lock the panel. List Box This box lists all the access transactions captured from ACS controllers. The top one the most recent captured transaction. The maximum number of transaction is limited by the Maximum Access Transaction Buffer. Each transaction stored at the box can be selected in order to display the details of the transaction. The vertical scroll bar can be used to scroll up & down to select a transaction. User Image This area is used to display the thumb image of the current selected transaction that is associated with the cardholder. Click this area to display the full image. If no image is assigned to the cardholder, nothing displayed at this area. Details These fields are used to display the personal information of the cardholder for the current selected transaction. Focus on last received transaction This function is used to automatically select the most recent captured transaction. And display the details at the Details Box. It is recommended for Guard Monitor Panel captures purpose. Transactions Collection & Amendment 7-4

70 Alarm Transaction Monitoring: This screen is used to lists all the received alarm transactions. Select individual transaction to display the details information about the transaction at Details Box. This box lists all the transactions received from ACS controllers. This area shows the map of the alarm location. Click on this area to display the full image. This area lists the details information about the alarm. List Box This box lists all the alarm transactions captured from ACS controllers. The top one the most recent captured transaction. The maximum number of transaction is limited by the Maximum Alarm Transaction Buffer. Each transaction stored at the box can be selected in order to acknowledge the alarm. Right click to popup a menu for further action for the alarm transaction. Note: all transactions are already stored at hard disk before display at the box. User Image This area is used to display the thumb image of the current selected alarm transaction. Click this area to display the full alarm image for acknowledgment. If the Auto Alarm Popup is enabled, the full image will be displayed automatically for acknowledgment. If no image is assigned to the alarm transaction, nothing displayed at this area. Details These fields are used to display the personal information of the cardholder for the current selected transaction. It is used for cardholder triggered alarm events only. Transactions Collection & Amendment 7-5

71 Alarm Transaction Acknowledgment: This command is used to acknowledge the alarm transaction. This is the necessary step for alarm monitor system in order to notify that the reaction of the alarm events has been done. The acknowledgment can also be performed at the full alarm image window. Manual (Direct acknowledgment) 1. Select a fresh (Red Text) alarm transaction. 2. Right click to popup menu 3. Select Acknowledge command. 4. Once it is acknowledged, the text color is changed to Green. It does not necessary to acknowledge it again. The following two methods for acknowledge can only be performed if there is an image file assigned to the alarm transaction. Automatically popup: 1. The first captured alarm transaction will be automatically display at full image. And if a sound file is associated to the alarm transaction, the sound will be playing. 2. When the full image is displaying, select the menu item Acknowledge from the menu Alarm Information. 3. The alarm image window will be closed. And it finished the acknowledgment. 4. If there still have any fresh (Red Text) alarm transactions, the next alarm transaction will be popup. 5. Repeat step 2-3 for acknowledgment until there is no more fresh (Red Text) alarm transactions. 6. Right click to popup menu. 7. Select Remove Acknowledge or Remove All Acknowledge to clear the acknowledged alarm transactions if it is necessary for clearance display. Manual (Notification) 1. Select a fresh (Red Text) alarm transaction. 2. Double click to display the full alarm image. Or click the thumb image area. 3. When the full image is displaying, select the menu item Acknowledge from the menu Alarm Information. 4. The alarm image window will be closed. And it finished the acknowledgment. 5. Right click to popup menu. 6. Select Remove Acknowledge or Remove All Acknowledge to clear the acknowledged alarm transactions if it is necessary for clearance display. This menu shows the information of the current displayed alarm transaction. Click Acknowledge to acknowledge & close the window. Transactions Collection & Amendment 7-6

72 Capture Status Panel: This page operates while capturing transactions. It is used to monitor the transactions capture status & statistics. It shows the starting time of capture. If the panel is capturing, it shows the current time. If the capture is stopped, it shows the stop time of capture. Status List Box This box shows the capture status & statistics for the controllers capture. Status column: 1. Bypassed: This controller is bypassed during capture, because it is disabled. 2. Capturing: This controller is currently being captured. 3. Idled: This controller is currently idled for capture. Transactions Received: It shows the transactions captured from the controller. Call Times: It shows the number of times to call the controller for transaction. Failed: It shows the number of failed times to capture transaction. Transactions Collection & Amendment 7-7

73 Transaction Amendment When a cardholder does not clock the transaction under any reasons, the administrator should make an amendment in order to generate correct attendance report. The transaction amendment can be used to amend attendance records for attendance report. The cardholder must be loaded first so that all amended transactions associated to this person can be displayed. This box lists all the amended transactions for a cardholder. The cardholder must be loaded first so that all transaction associated to this person can be displayed. These fields are used to modify the amended transaction of the cardholder. To load a card holder for amendment 1. Right click to popup menu. 2. Select Load Card Holder if the card number of the cardholder is given. 3. Or select Load from Card Holder List to pick up the cardholder. To append a transaction 1. Load the cardholder; all amended transactions will be listed at the list box. 2. Right click to popup menu 3. Select Append, the current date will be used as this transaction. 4. At Controller field select a proper controller. 5. At Function Key field set to "1". 6. At date field change the date for this amendment. 7. At time field change the time for this amendment. 8. At remark field assign a proper reason to this transaction. Transactions Collection & Amendment 7-8

74 To append a transaction for entire cardholders 1. Right click to popup menu 2. Select Global Amendment 3. At Controller field select a proper controller. 4. At Function Key field set to "1". 5. At date field change the date for this amendment. 6. At time field change the time for this amendment. 7. At remark field assign a proper reason for the amendment. These fields are used to modify the amended transaction of the cardholder. Click OK to amend the transaction for every cardholders. To delete a transaction 1. Select the transaction to be deleted 2. Right click to popup menu 3. Select Delete If there is no transaction selected, the Delete command will be disabled. To modify a transaction 1. Select a transaction to be modified. 2. At Controller field select a proper controller. 3. At Function Key field set to "1". 4. At date field change the date for this amendment. 5. At time field change the time for this amendment. 6. At remark field assign a proper reason to this transaction. Transactions Collection & Amendment 7-9

75 Leave Amendment When a cardholder takes a normal leave, such as annual leave, the record of attendance will not display at the attendance report. The leave amendment can be used to amend the attendance report. The leave applicant must be loaded first so that all leave records associated to this person will be displayed. This box lists all leave records for this leave applicant. The leave applicant must be loaded first so that all leave records associated to this person can be displayed. These fields are used to modify the amended transaction of the cardholder. To load a leave applicant 1. Right click to popup menu. 2. Select Load Card Holder if the card number of the leave applicant is given. 3. Or select Load from Card Holder List to pick up the leave applicant. To append a leave record 1. Load the leave applicant; all leave records will be listed at the list box. 2. Right click to popup menu 3. Select Append, the current date will be used as this record. 4. At date field change the date to proper date. 5. At time field change the time to proper time range. 6. At remark field assign a proper leave reason to this record. Transactions Collection & Amendment 7-10

76 To delete a leave record 1. Select the leave record to be deleted 2. Right click to popup menu 3. Select Delete If there is no record selected the Delete command will be disabled. To modify a leave record 1. Select a leave record to be modified. 2. At date field change the date to proper date. 3. At time field change the time to proper time range. 4. At remark field assign a proper leave reason to this record. To append several leave records 1. Load the leave applicant; all leave records will be listed at the list box. 2. Right click to popup menu 3. Select Batch Append 4. A window will be displayed 5. At From field, set the start date of the leave 6. At To field, set the end date of the leave 7. At Time field, set the time range of leave for every day. 8. Depends on individual situation, set/remove to the boxes of Exclude Holiday, Exclude Sunday, Exclude Saturday for selecting/deselecting respectively. 9. Click OK to append these days. 10. The command Delete can be used to remove some leave records. 11. Modification is also possible to minor change some records Used to specify the date/time range of the leave amendment. Select the excluding option. Used to set the leave reasons or leave description. Transactions Collection & Amendment 7-11

77 Transactions Export The transactions can be exported to other files format for application usage & processing, such as pay roll system. Used to specify the date/time range of the transaction export. Click it to select all transactions stored at system without date/time range. There are three type of export: TXT file format The TXT file format for transaction export: 1. user name, Length 1-31, 30 characters + 1 space 2. card number, Length 32-40, 8 characters + 1 space 3. controller name, Length 41-57, 16 characters + 1 space 4. status name, Length 58-78, 20 characters + 1 space 5. date, Length 79-89, 10 characters + 1 space 6. time, Length 90-95, 5 characters + 1 space 7. port, Length 96-97, 1 character + 1 space 8. address, Length , 2 characters + 1 space 9. status ID, Length , 2 characters + 1 space 10. mode, Length , 1 character + 1 space 11. entry, Length , 1 character Description: 1. user name: it is the user name of the transaction. 2. card number: it is the card number of the card holder. This field has 8 digits only. 3. controller name: it is the name of the controller of the access transaction. 4. status name: it is the name of the transaction type. 5. date: it is the date of the transaction generated. The format is yyyy/mm/dd 6. time: it is the time of the transaction generated. The format is hh:mm. 7. port: it is the communication port of the controller linked with. 8. address: it is a two digits ID of the controller. 9. status ID: it is two digits ID for the status of the transaction 00 - Not used status 01 - valid access # valid access # valid access # valid access # valid access # valid access # valid access # valid access # invalid anti-passback 10 - invalid PIN input 11 - invalid access time zone Transactions Collection & Amendment 7-12

78 12 - invalid card number 13 - card holder turn ON aux. relay 14 - card holder turn OFF aux. relay 15 - controller alarm occurred 16 - system access 17 - duress alarm occurred 18 - exit button pressed 19 - IO board alarm occurred 20 - IO board alarm resumed 21 - card number not exist 22 - access denied 23 - amendment transaction 10. mode: it is one digit ID for the operation mode of the controller 0 - System used mode 1 - Alarm control mode 2 - Time recording mode 3 - Access control mode 11. entry: it is one digit ID for the access of In/Out entry. 0 - single reader 1 - IO board 2 - Out reader 3 - In reader DBF file format The DBF file format for transaction export: 1. USER_NAME, Character, Length is 30, 2. CARD_NO, Character, Length is 8, 3. PORT, Character, Length is 1, 4. ADDR, Character, Length is 2, 5. CTRL_NAME, Character, Length is 16, 6. MODE, Character, Length is 1, 7. ENTRY, Character, Length is 1, 8. STATUS, Character, Length is 2, 9. DATE, Character, Length is 10, 10. TIME, Character, Length is 5, Description: 1. USER_NAME: it is the user name of the transaction. 2. CARD_NO: it is the card number of the card holder. This field has 8 digits only. 3. PORT: it is the communication port of the controller linked with. 4. ADDR: it is a two digits ID of the controller. 5. CTRL_NAME: it is the name of the controller of the access transaction. 6. MODE: it is one digit ID for the operation mode of the controller 0 - System used mode 1 - Alarm control mode 2 - Time recording mode 3 - Access control mode 7. ENTRY: it is one digit ID for the access of In/Out entry. 0 - single reader 1 - IO board 2 - Out reader 3 - In reader 8. STATUS: it is two digits ID for the status of the transaction 00 - Not used status 01 - valid access # valid access # valid access # valid access # valid access # valid access # valid access #7 Transactions Collection & Amendment 7-13

79 08 - valid access # invalid anti-passback 10 - invalid PIN input 11 - invalid access time zone 12 - invalid card number 13 - card holder turn ON aux. relay 14 - card holder turn OFF aux. relay 15 - controller alarm occurred 16 - system access 17 - duress alarm occurred 18 - exit button pressed 19 - IO board alarm occurred 20 - IO board alarm resumed 21 - card number not exist 22 - access denied 23 - amendment transaction 9. DATE: it is the date of the transaction generated. The format is yyyy/mm/dd 10. TIME: it is the time of the transaction generated. The format is hh:mm. WinAcc 6.xx file format The file format for transaction export: 1. user name, Length 1-31, 30 characters + 1 space 2. card number, Length 32-40, 8 characters + 1 space 3. controller name, Length 41-57, 16 characters + 1 space 4. status name, Length 58-78, 20 characters + 1 space 5. date, Length 79-87, 8 characters + 1 space 6. time, Length 88-93, 5 characters + 1 space 7. port, Length 94-95, 1 character + 1 space 8. address, Length 96-98, 2 characters + 1 space 9. status, Length , 1 characters + 1 space Description: 1. user name: it is the user name of the transaction. 2. card number: it is the card number of the card holder. This field has 8 digits only. 3. controller name: it is the name of the controller of the access transaction. 4. status name: it is the name of the transaction type. 5. date: it is the date of the transaction generated. The format is yyyy/mm/dd 6. time: it is the time of the transaction generated. The format is hh:mm. 7. port: it is the communication port of the controller linked with. 8. address: it is a two digits ID of the controller. 9. status ID: it is one digit ID for the status of the transaction 1 - valid access #1 2 - valid access #2 3 - valid access #3 4 - valid access #4 5 - valid access #5 6 - valid access #6 7 - valid access #7 8 - valid access #8 L - invalid anti-passback P - invalid PIN input A - invalid access time zone N - invalid card number O - card holder turn ON aux. relay C - card holder turn OFF aux. relay F - controller alarm occurred T - system access Transactions Collection & Amendment 7-14

80 Transactions Import This window is used to import transactions from other application program. The transactions import is only used for tailor make. Please consult your technical support term for this function. Used to select the type of the import file of transactions. Specified the location of the file to be imported. Transactions Collection & Amendment 7-15

81 Chapter 8 Roster Setup This Chapter provides the explanation to setup the roster timetables for attendance report generation. It also gives the information to define the holiday for attendance. Roster Time Table Setup The roster timetable is used to guide the attendance report generation. This box lists the entire available roster table to be setup. This date range indicated the selected range for roster plan assignment. This box lists the entire available roster plan for assignment. This calendar shows the current assigned roster plan to the time table. Double click the date can directly goes into the corresponding roster plan assigned to the date for edit. Administrator can use the arrow button to browse other months. Roster Setup 8-1

82 Before Setup Roster Timetable 1. Administrators should organized all possible roster plan for entire cardholders. 2. Administrators then should setup those roster plans by right click to popup a menu, and select Edit Roster Plan. To assign roster plan to table (by date range) 1. Use Mouse to click the Left arrow or Right arrow to set the start date. 2. Drag & draw to the end date, so that the selected date range will be highlight. 3. Select a proper roster plan assign to the range. 4. Right click to popup a menu. 5. Select Assign to the Range (Current Table) to assign the plan to the date range. To assign roster plan to table (by monthly) 1. Use Mouse to click the Left arrow or Right arrow to locate the month. 2. Select a proper roster plan assign to the range. 3. Right click to popup a menu. 4. Select Assign to this month (Current Table) to assign the plan to the month. To assign roster plan to entire tables (by date range) 1. Use Mouse to click the Left arrow or Right arrow to set the start date. 2. Drag & draw to the end date, so that the selected date range will be highlight. 3. Select a proper roster plan assign to the range. 4. Right click to popup a menu. 5. Select Assign to the Range (Entire Table) to assign the plan to the date range. 6. This command is useful for some special date arrangement, such bad weather working hours. To append a new roster timetable 1. Right click to popup a menu. 2. Select Append New Roster Timetable. 3. A roster timetable is appended with the first roster plan assigned to entire date range (1 Jan, Dec, 2089). 4. There are maximum 200 roster timetable can be append. It is NOT allowed to delete a roster timetable. To edit roster time plan 1. Right click to popup a menu. 2. Select Edit Roster Plan. 3. A windows will be shown for the roster plan edit. Roster Setup 8-2

83 Roster Time Plan The roster plans are use for roster time table assignment. Each roster plan consists two sections, one is used for time schedule setup; another is for the attendance report calculation setup. This box lists the entire available roster plan to be setup. Click it to toggle to enable/disable recess time function. This page is used to setup the calculation method associated with this time schedule at attendance report. Click it to toggle to enable/disable OT working time function. Time Table Setup In Time The In time is used to specify the official working start time. This time can also be used to measure the late time. Recess Out It is used to specify the time range for recess out. In general, it is for lunch OUT time. For accurate attendance report generation, the range of the recess out time should cover the time during recess out period. For example, if the official recess in time is 13:00, the Recess In time can be set to 12:50-13:00-13:15. And the attendance report will only search the period 12:50-13:15 as validates of recess out time. Also the early leave will be counted for the person who leaves between before 13:00. Roster Setup 8-3

84 Recess In It is used to specify the time range for recess in. In general, it is for lunch IN time. For accurate attendance report generation, the range of the recess in time should cover the time during recess in period. For example, if the official recess in time is 14:00, the Recess In time can be set to 13:20-14:00-14:30. And the attendance report will only search the period 13:20-14:30 as validates of recess in time. Also the late will be counted for the person who comes back from 14:00. Out Time The Out time is used to specify the official working end time. This time can also be used to measure the early leave time & over time working. Over Time Work The OT working time is used to specify the start time & stop time for over time counting. For example, if the official OT is set between 18:00-21:00, the OT time will be counter only between this time periods. If the person who working until 17:50, there is no OT count for him. And if the person works until 21:30, the OT time is only 3 hours, but not 3 hour 30 minutes. It can be disabled by using Disable OT. Cut Off Time The cut off time is used to specify the time for day boundary. It is highly recommended to set the same cut off time for all days. To append a new roster plan 1. Right click to popup menu 2. Select Append 3. Set the validate time. 4. Set the proper calculation method at Attendance Report Calculation. 5. Set a proper caption for this table. To copy roster plan to another roster plan 1. Setup all roster flags to desire time setting 2. Right click to popup menu 3. Select Copy Table 4. Switch to another roster plan 5. Right click to popup menu 6. Select Paste Table 7. Give a new caption for this roster table. 8. Set the attendance calculation setting Attendance Report Calculation. Roster Setup 8-4

85 To setup the calculation method for attendance report This page is used to specify the calculation method of the current roster plan for attendance report calculation. Difference roster plan can setup a difference calculation method. Deduct Recess Time This function is used to deduct the exact recess time from the total working time of the attendance report. Marked without tick: The recess time will not be deduced from the calculation of total working time. The formula is: Total working time = Out time - In time Marked with tick: The exact recess time will be deduced from the calculation of total working time. Roster Setup 8-5

86 The formula is: Total working time = Out time - In time - (Recess In - Recess Out) Deduct Over Time This function is used to deduct the working Over Time from the total working time of the attendance report. Marked without tick: The Over Time will not be deduced from the calculation of total working time. The formula is: Total working time = Out time - In time Marked with tick: The Over Time will be deduced from the calculation of total working time. The formula is: Total working time = Out time - In time - Over Time (OT) Exact Working Time This option is used to calculate the total working time exactly. Alternatively, the Roster Time Bounded method can be used for round calculation. The formula is: Total working time = Out time - In time Roster Time Bounded This option is used to calculate the total working time base on the roster timetable. The rules are: 1. If the actual In time is after the Roster pre-set In time (such as late), the In time for calculation will be the exact In time. 2. If the actual In time is before the Roster pre-set In time (early In), the In time for calculation will be the exact In time. Roster Setup 8-6

87 3. If the actual Out time is after the Roster pre-set Out time (OT working), the Out time for calculation will be rounded to Roster Out time. 4. If the actual Out time is before the Roster pre-set Out time (early leave), the Out time for calculation will be the exact Out time. 5. In time & Out time can NOT compensate. Tread Holiday, Saturday, Sunday working as OT This option is used to set the total working hours as Overtime working. Use OT Permission for OT calculation This option is used to calculate the over time working by the OT permission amendment. Marked without tick: The OT is calculated for entire person in the report. Marked with tick: 1. OT is calculated only if the person has OT permission amendment at the date. 2. OT will be reset to zero if there is no OT permission amendment at the date. Use OT Unit Rate This option is used to calculate the OT working time by round out within a certain rate. Marked without tick: The OT working time is calculated exactly. Marked with tick: The OT working time is round out. In this example, the OT unit rate is set to 15 minute. OT Unit Rate This field is used to specify the unit rate of OT calculation. Roster Setup 8-7

88 Recess Time Calculation This option is used to calculate the early leave/late for recess time. Marked without tick: The early leave/late calculation is only for IN time & OUT time. Marked with tick: The early leave/late calculated for Recess IN & Recess OUT also. Enable Working Late Tolerance This field is used to enable the late tolerance at IN time. The tolerance time should be specified. Working Late Tolerance Time (in minute) This field is used to specify the late tolerance in minute. Exact Late Time Click the box to disable the late tolerance, and the system will count the exact late time at the attendance report. Enable Recess Time Late Tolerance This field is used to enable the late tolerance at IN time. The tolerance time should be specified. Recess Time Late Tolerance Time (in minute) This field is used to specify the late tolerance in minute. Exact Late Time Click the box to disable the late tolerance, and the system will count the exact late time at the attendance report. Roster Setup 8-8

89 Holiday Definition This window is used to define all the holidays used in the system. The defined holidays can be used at Controller Holiday, Roster Time Table, and all report generation. There is no limit for the number of holidays can be defined. It is not suggest removing the past holidays. This box lists all defined holidays. The selected holiday will be displayed at the edit fields. This field is used to set the date as holiday. This field is used to edit the holiday description. The maximum length is 30 characters. The name can be pre-set by using the command Edit Holiday Name List. To append a new holiday 1. put the mouse pointer into the list box 2. right click to popup menu 3. select the command Append To modify a defined holiday 1. select the holiday to be modified 2. change the date at Date field 3. change the name at the Holiday Description field To delete a holiday 1. select the holiday to be deleted 2. right click to popup menu 3. select the command Delete To select a pre-set holiday description 1. click the down arrow to popup a list of name 2. select a proper one from the list. To edit the Holiday Description List 1. put mouse pointer into Edit List Box 2. right click to popup menu 3. select the command Edit Holiday Name List Roster Setup 8-9

90 Typical Examples (Roster Time Table Setting) There are three examples to demonstrate hot to setup the roster timetable under the situation. Day off: For the off days, it is recommended to set holiday row all to 05:00 as the cut off time. No recess time: It is recommended to set the recess in & recess out to Out time. Alternatively, if there is no recess time for all days, use the function Disable Recess Time at popup menu. Set all values into Out time to skip the recess time calculation. Over night shift working: In this example, the In time is 18:00, and the Recess Out time is 23:00, the Recess In time is 00:00 (mid-night), the Out time is 05:00 (Next day), OT is counted from 06:00 to 10:00, finally the cutoff time is 12:00 (noon of next day). Roster Setup 8-10

91 Chapter 9 Attendance Report Generation This Chapter provides the step-by-step information to generate the daily attendance & individual attendance reports by using Win Access 2000 program. Daily Attendance Report Generation The daily attendance report is used to list and calculate the attendance of individual cardholders at a specified date. There are four screens for daily attendance generation. All settings will be automatically stored and used as default at next time. Select Controllers It is used to select the controllers to be involved for the report. Click this box to select all controllers along the system. For individual controllers selection, remove the tick mark from this box and set the tick mark to the controller at controller list box instead. This box lists all the controllers along the system. These controllers are enabled to select when the Entire Controllers does not marked with tick. Individual controllers can be selected for the report by set the tick mark to the box at the left side of each controller. Attendance Report Generation 9-1

92 For entire controllers: 1. Set the tick mark to the Entire Controllers for all current existed controllers and previously detached controllers. 2. Or remove the tick mark from the Entire Controllers, and then right click to popup a menu and click Select All. For individual controllers: 1. Remove the tick mark from the Entire Controllers box. 2. Set the tick mark to the box for individual controllers. At least one controller should be selected for report generation. Select Users It is used to select the cardholders to be involved in the attendance report. This box is used to setup the selection of the cardholders to be involved in the attendance report. For ranged selection, right click the mouse button to pop-up a menu and select Set Optional Selection. For Global card holders: Set all types at Global to Yes. For Account Department: 1. Select type Department 2. Right click to popup menu 3. Select Set Optional Selection 4. Type "Account" at From field 5. Click OK 6. Make sure others types to set to Global For QC Department and only Job titled with Engineering 1. Select type Department 2. Right click to popup menu 3. Select Set Optional Selection Attendance Report Generation 9-2

93 4. Type "QC" at From field 5. Click OK 6. Select type Job Title 7. Right click to popup menu 8. Select Set Optional Selection 9. Type "Engineering" at From field 10. Click OK Specify Date It is used to specify the date for the daily attendance report. It is used to specify the date of the report. Also you can right click the mouse button to popup the menu for the date of today, & yesterday. With this box marked with tick, the report generator will search the history file for transactions. When the date is set to recent months, there is no need to include this item to speed up the report generation. Attendance Report Generation 9-3

94 Daily Attendance Report Browsing After sets the daily report generation settings, click this button Generate to start report generation. The report window will be displayed after a short time system process. The following screen shows the daily attendance report. You can right click the mouse button to pop-up a menu for the following actions. To edit the output report title: 1. Right click to popup menu. 2. Select Edit List (Report Title). 3. A window will be displayed. At the edit list window, 4. Input any desire report title name. 5. Click OK to save & finish. 6. The report title can be selected at the Report Title Box. To make a hard copy: 1. Right click to popup menu. 2. Select Output to Printer. To save as Text File: 1. Right click to popup menu. 2. Select Output to File. 3. Select Text Format. 4. Input the name. 5. The report will be saved. Attendance Report Generation 9-4

95 To transfer to DBF format: 1. Right click to popup menu. 2. Select Output to File. 3. Select dbase Format. 4. Input the name 5. The report will be saved. To display attendance by category: 1. Right click to popup menu. 2. Select Display, 16 display categories will be listed for select. 3. Select a proper category for display. 4. The records will be filtered during the current selection. Attendance Report Generation 9-5

96 To arrange the display items in column: 1. Right click to popup menu. 2. Select Display Item Arrangement. This box lists all the items of the report with the current order (Index). There are 16 items of the report: 1. Department: The department of the cardholder. 2. User Name: The name of the cardholder. 3. Card number: The card number of the cardholder. 4. Employee ID: The employee number of the cardholder. 5. Shift: The roster flag of the cardholder. 6. In Time: The working In time of the cardholder. 7. Recess Out: The recess out time of the cardholder. 8. Recess In: The recess in time of the cardholder. 9. Out Time: The working Out time of the cardholder. 10. OT: The total OT time of the cardholder. 11. Late: The total late time of the cardholder 12. Early. The total early leave time of the cardholder. 13. Total: The total working time of the cardholder. 14. Leave From: The applied leave start time. 15. Leave To: The applied leave end time. 16. Remark: The remark of the record. The shadow indicates the item is NOT output to printer or to text file. The column bar can be clicked for sorting. To change the display order 1. Select an item. 2. Click the Up arrow to move it one step up. 3. Or click the Down arrow to move it one step down. Alternatively, 4. Drag an item by mouse, and drop down to proper position. Attendance Report Generation 9-6

97 To enable/disable item output. A disabled item will not be involved for output to printer & will not be involved for output to text file format. 1. To enable an item for output, set the tick mark to the box of the item at left side. 2. To disable an item for output, remove the tick mark from the box of the item at left side. To amend attendance time: The amendment function is used to directly adjust the time at attendance report. After the amendment, the associated time will be marked a "*" for indication and the working time calculation will be processed automatically. 1. Select a cardholder record to be amended. The amendment function will be disabled, if there is no record selected. 2. Right click to popup menu. 3. Select Amendment 4. There are 4 type of time can be amended. Clock In time, Recess Out time, Recess In time, & Clock Out time. 5. The amendment window will be displayed. At amendment window, 6. Input desire time of the attendance. 7. The Erase All Amendment can be used to clear all pre-set and to use the system record for the time. 8. Click OK to finish. This window is used to amend the attendance time. The amended time can be Clock In, Recess Out, Recess In & Clock Out time. Once the time is amended, it will be used at attendance report forever until the Erase All Amendment is set. In general, administrator is highly recommended to use Transaction Amendment for manual time recording amendment. Time can be directly changed at this field. Set tick here to reset & erase all previous direct amended time. A mark * will be display at the time to indicated that it is direct amended time. Attendance Report Generation 9-7

98 Individual Attendance Report Generation This window is used to prepare the individual attendance report generation. It has four pages to specify the details of report generation. The individual attendance report is used to list and calculate the attendance of individual cardholders within a period. Select Controllers It is used to select the controllers to be involved for the report. Click this box to select all controllers along the system. For individual controllers selection, remove the tick mark from this box and set the tick mark to the controller at controller list box instead. This box lists all the controllers along the system. These controllers are enabled to select when the Entire Controllers does not marked with tick. Individual controllers can be selected for the report by set the tick mark to the box at the left side of each controller. For entire controllers: 1. Set the tick mark to the Entire Controllers for all current existed controllers and previously detached controllers. 2. Or remove the tick mark from the Entire Controllers, and then right click to popup a menu and click Select All. For individual controllers: 1. Remove the tick mark from the Entire Controllers box. 2. Set the tick mark to the box for individual controllers. At least one controller should be selected for report generation. Attendance Report Generation 9-8

99 Select Users It is used to select the cardholders to be involved in the attendance report. This box is used to setup the selection of the cardholders to be involved in the attendance report. For ranged selection, right click the mouse button to pop-up a menu and select Set Optional Selection. For Global card holders: Set all types at Global to Yes. For Account Department: 1. Select type Department 2. Right click to popup menu 3. Select Set Optional Selection 4. Type "Account" at From field 5. Click OK 6. Make sure others types to set to Global For QC Department and only Job titled with Engineering 1. Select type Department 2. Right click to popup menu 3. Select Set Optional Selection 4. Type "QC" at From field 5. Click OK 6. Select type Job Title 7. Right click to popup menu 8. Select Set Optional Selection 9. Type "Engineering" at From field 10. Click OK Attendance Report Generation 9-9

100 Specify Date It is used to specify the date range for the individual attendance report. It is used to specify the date of the start date inclusively. It is used to specify the date of the end date inclusively. With this box marked with tick, the report generator will search the history file for transactions. When the date is set to recent months, there is no need to include this item to speed up the report generation. Attendance Report Generation 9-10

101 Individual Attendance Report Browsing After sets the daily report generation settings, click this button Generate to start report generation. The report window will be displayed after a short time system process. The following screen shows the individual attendance report. This box lists all the attendance record for the person in the date range. This section lists the summary of the attendance report. To switch to another person: Press Ctrl+Left arrow or Ctrl+Right arrow to view another person. You can right click the mouse button to pop-up a menu for the following actions. To edit the output report title: 1. Right click to popup menu. 2. Select Edit List (Report Title). 3. A window will be displayed. At the edit list window, 4. Input any desire report title name. 5. Click OK to save & finish. 6. The report title can be selected at the Report Title Box. To amend attendance time: 1. Select a cardholder record to be amended. The amendment function will be disabled, if there is no record selected. 2. Right click to popup menu. 3. Select Amendment Attendance Report Generation 9-11

102 4. There are 4 type of time can be amended. Clock In time, Recess Out time, Recess In time, & Clock Out time. 5. The amendment window will be displayed. At amendment window, 6. Input desire time of the attendance. 7. The Erase All Amendment can be used to clear all pre-set and to use the system record for the time. 8. Click OK to finish. To make a hard copy: 1. Right click to popup menu. 2. Select Output to Printer. To save as Text File: 1. Right click to popup menu. 2. Select Output to File. 3. Select Text Format. 4. Input the name. 5. The report will be saved. To transfer to DBF format: 1. Right click to popup menu. 2. Select Output to File. 3. Select dbase Format. 4. Input the name 5. The report will be saved. To arrange the display items: 1. Right click to popup menu. 2. Select Display Item Arrangement. This box lists all the items of the report with the current order (Index). Attendance Report Generation 9-12

103 There are 13 items of the report: 1. Date: The attendance date of the report. 2. Week: The attendance date week of the report. 3. In Time: The working In time of the cardholder. 4. Recess Out: The recess out time of the cardholder. 5. Recess In: The recess in time of the cardholder. 6. Out Time: The working Out time of the cardholder. 7. OT: The total OT time of the cardholder. 8. Late: The total late time of the cardholder 9. Early. The total early leave time of the cardholder. 10. Total: The total working time of the cardholder. 11. Leave From: The applied leave start time. 12. Leave To: The applied leave end time. 13. Remark: The remark of the record. The shadow indicates the item is NOT output to printer or to text file. The column bar can be clicked for sorting. To change the display order 1. Select an item. 2. Click the Up arrow to move it one step up. 3. Or click the Down arrow to move it one step down. Alternatively, 4. Drag an item by mouse, and drop down to proper position. To enable/disable item output. A disabled item will not be involved for output to printer & will not be involved for output to text file format. 1. To enable an item for output, set the tick mark to the box of the item at left side. 2. To disable an item for output, remove the tick mark from the box of the item at left side. To display Attendance Summary Report: 1. Right click to popup menu. 2. Select Attendance Summary Report. Attendance Report Generation 9-13

104 Attendance Summary Report The attendance summary report can be displayed through the individual attendance report. The following screen shows the individual attendance report. This box lists the attendance summary records for all persons. You can right click the mouse button to pop-up a menu for the following actions. To edit the output report title: 1. Right click to popup menu. 2. Select Edit List (Report Title). 4. A window will be displayed. At the edit list window, 4. Input any desire report title name. 5. Click OK to save & finish. 6. The report title can be selected at the Report Title Box. To make a hard copy: 1. Right click to popup menu. 2. Select Output to Printer. To save as Text File: 1. Right click to popup menu. 2. Select Output to File. Attendance Report Generation 9-14

105 3. Select Text Format. 4. Input the name. 5. The report will be saved. To transfer to DBF format: 1. Right click to popup menu. 2. Select Output to File. 3. Select dbase Format. 4. Input the name 5. The report will be saved. To arrange the display items in column: 1. Right click to popup menu. 2. Select Display Item Arrangement. This box lists all the items of the report with the current order (Index). There are 9 items of the report: 1. Department: The department of the cardholder. 2. User Name: The name of the cardholder. 3. Card number: The card number of the cardholder. 4. Employee ID: The employee number of the cardholder. 5. Shift: The roster flag of the cardholder. 6. Total Working: The total working time of the cardholder. 7. Early leave: The total early leave time of the cardholder. 8. Late: The total late time of the cardholder. 9. Over Time: The total over time working of the cardholder. The shadow indicates the item is NOT output to printer or to text file. The column bar can be clicked for sorting. Attendance Report Generation 9-15

106 Report Export Both daily attendance report & individual attendance report can be export to two difference format: Text Format It is plain text format that can be used for modification. The output items and output format are controlled by Display Items Arrangement. dbase Format It is DBF file format that can be used for other purposes. All items of the leave report will be output to the file. Attendance Report Generation 9-16

107 Chapter 10 Others Report Generation This Chapter provides the further information to generate several reports provided by the Win Access 2000 program. Transaction Report Generation The transaction report is used to list the transactions records during a specified period with specified controllers & cardholders. This window is used to prepare the transaction report generation. It has four pages to specify the details of report generation. Select Controllers It is used to select the controllers to be involved for the report. Click this box to select all controllers along the system. For individual controllers selection, remove the tick mark from this box and set the tick mark to the controller at controller list box instead. This box lists all the controllers along the system. These controllers are enabled to select when the Entire Controllers does not marked with tick. Individual controllers can be selected for the report by set the tick mark to the box at the left side of each controller. Others Report Generation 10-1

108 For entire controllers: 1. Set the tick mark to the Entire Controllers for all current existed controllers and previously detached controllers. 2. Or remove the tick mark from the Entire Controllers, and then right click to popup a menu and click Select All. For individual controllers: 1. Remove the tick mark from the Entire Controllers box. 2. Set the tick mark to the box for individual controllers. At least one controller should be selected for report generation. Select Users It is used to select the cardholders to be involved in the transactions report. This box is used to setup the selection of the cardholders to be involved in the attendance report. For ranged selection, right click the mouse button to pop-up a menu and select Set Optional Selection. For Global card holders: Set all types at Global to Yes. For Account Department: 1. Select type Department 2. Right click to popup menu 3. Select Set Optional Selection 4. Type "Account" at From field 5. Click OK 6. Make sure others types to set to Global Others Report Generation 10-2

109 Specify Date It is used to specify the date range for the transactions report. It is used to specify the date of the start date inclusively. It is used to specify the date of the end date inclusively. With this box marked with tick, the report generator will search the history file for transactions. When the date range is set to recent months, there is no need to include this item to speed up the report generation. It is recommended to set the tick mark to this box to ensure there are no transactions missing. There are 6 pre-defined date range can be selected by right click the mouse button to popup menu: Today, Yesterday, This Week, Last Week, This Month, Last Month. Others Report Generation 10-3

110 Specify Type of Transactions for Report It is used to specify the types of transactions for the report. This box is used to select the type of transactions to be listed in the report. Set the tick mark for selecting; remove the tick mark for deselecting. There are totally 23 types of transaction can be selected separately. For speed selection, right click to pop-up a menu and there are three categories of type selection is available: Valid Transaction This command is used to select the transaction type 1, 2, 3, 4, 5, 6, 7, 8, 23. And all others will be deselected. Invalid Transaction This command is used to select the transaction type 9, 10, 11, 12, 21 & 22. And all others will be deselected. Alarm Transaction This command is used to select the transaction type 15, 17, 19, & 20. And all others will be deselected. Others Report Generation 10-4

111 Transaction Report Browsing After sets the transaction report generation settings, click this button Generate to start report generation. The report window will be displayed after a short time system process. The process time may last so long for a huge amount of transactions. The following screen shows the transactions report. The shadow indicates the item is NOT output to printer or to text file. The column bar can be clicked for sorting. To make a hard copy: 1. Right click to popup menu. 2. Select Output to Printer. To save as Text File: 1. Right click to popup menu. 2. Select Output to File. 3. Select Text Format. 4. Input the name. 5. The report will be saved. To transfer to DBF format: 1. Right click to popup menu. 2. Select Output to File. 3. Select dbase Format. 4. Input the name 5. The report will be saved. Others Report Generation 10-5

112 To arrange the display items in column: 1. Right click to popup menu. 2. Select Display Item Arrangement. There are 9 items of the report: 1. Department: The department of the cardholder of the transaction. 2. User Name: The name of the cardholder of the transaction. 3. Card number: The card number of the cardholder of the transaction. 4. Employee ID: The employee number of the cardholder of the transaction. 5. Controller: The controller name for the transaction. 6. Access Status: The access status name of the transaction. 7. Date: The date of the transaction generated. 8. Time: The time of the transaction generated. 9. Remark: The remark of the transaction. To change the display order 1. Select an item. 2. Click the Up arrow to move it one step up. 3. Or click the Down arrow to move it one step down. Alternatively, 4. Drag an item by mouse, and drop down to proper position. To enable/disable item output. A disabled item will not be involved for output to printer & will not be involved for output to text file format. 1. To enable an item for output, set the tick mark to the box of the item at left side. 2. To disable an item for output, remove the tick mark from the box of the item at left side. Others Report Generation 10-6

113 Leave Report Generation The leave report is used to list the card user s leave records for attendance. This window is used to prepare the leave report generation. It has two pages to specify the details of report generation. Select Users It is used to select the cardholders to be involved in the transactions report. This box is used to setup the selection of the cardholders to be involved in the leave report. For ranged selection, right click the mouse button to pop-up a menu and select Set Optional Selection. For Global card holders: Set all types at Global to Yes. For Account Department: 1. Select type Department 2. Right click to popup menu 3. Select Set Optional Selection 4. Type "Account" at From field 5. Click OK 6. Make sure others types to set to Global Others Report Generation 10-7

114 Specify Date It is used to specify the date range for the leave report. It is used to specify the date of the start date inclusively. It is used to specify the date of the end date inclusively. With this box marked with tick, the report generator will search the history file for transactions. When the date range is set to recent months, there is no need to include this item to speed up the report generation. It is recommended to set the tick mark to this box to ensure there are no transactions missing. There are 6 pre-defined date range can be selected by right click the mouse button to popup menu: Today, Yesterday, This Week, Last Week, This Month, Last Month. Others Report Generation 10-8

115 Leave Report Browsing After sets the leave report generation settings, click this button Generate to start report generation. The report window will be displayed after a short time system process. The following screen shows the leave report. To make a hard copy: 1. Right click to popup menu. 2. Select Output to Printer. To save as Text File: 1. Right click to popup menu. 2. Select Output to File. 3. Select Text Format. 4. Input the name. 5. The report will be saved. To transfer to DBF format: 1. Right click to popup menu. 2. Select Output to File. 3. Select dbase Format. 4. Input the name 5. The report will be saved. Others Report Generation 10-9

116 To arrange the display items in column: 1. Right click to popup menu. 2. Select Display Item Arrangement. There are 7 items of the report: 1. Department: The department of the cardholder of the transaction. 2. User Name: The name of the cardholder of the transaction. 3. Card number: The card number of the cardholder of the transaction. 4. Employee ID: The employee number of the cardholder of the transaction. 5. Date: The date of the transaction generated. 6. Time Range: The time range of leave of the date. 7. Remark: The remark of the leave. To change the display order 1. Select an item. 2. Click the Up arrow to move it one step up. 3. Or click the Down arrow to move it one step down. Alternatively, 4. Drag an item by mouse, and drop down to proper position. To enable/disable item output. A disabled item will not be involved for output to printer & will not be involved for output to text file format. 1. To enable an item for output, set the tick mark to the box of the item at left side. 2. To disable an item for output, remove the tick mark from the box of the item at left side. Others Report Generation 10-10

117 Administrator Log Report Generation The administrator report is used to list the Win Access 2000 program operator s log report. This window is used to prepare the administrator report generation. It has three pages to specify the details of report generation. Select Administrators It is used to select the administrators to be involved in the administrator log report. Click this box to select all administrators. For individually selection, remove the tick mark from this box and set the tick mark to the Name of administrators. This box lists all the administrators. Set tick to individual administrators for selection. Others Report Generation 10-11

118 Specify Date It is used to specify the date range for the leave report. It is used to specify the date of the start date inclusively. It is used to specify the date of the end date inclusively. With this box marked with tick, the report generator will search the history file for transactions. When the date range is set to recent months, there is no need to include this item to speed up the report generation. It is recommended to set the tick mark to this box to ensure there are no transactions missing. There are 6 pre-defined date range can be selected by right click the mouse button to popup menu: Today, Yesterday, This Week, Last Week, This Month, Last Month. Others Report Generation 10-12

119 Specify Type of Log Events It is used to specify the types of transactions for the report. This box is used to select the type of log events to be listed in the report. Set the tick mark for selecting; remove the tick mark for deselecting. There are totally 74 types of events can be selected separately. For speed selection, right click to pop-up a menu and there are 7 categories of type selection is available: System Events This command is used to select the events from And all others will be deselected. Report Events This command is used to select the events from And all others will be deselected. Controller Events This command is used to select the events from And all others will be deselected. Transmission Events It is used to select some events of transmission category only. Others Report Generation 10-13

120 Administrator Log Report Browsing After sets the administrator log report generation settings, click this button Generate to start report generation. The report window will be displayed after a short time system process. The following screen shows the administrator report. To make a hard copy: 1. Right click to popup menu. 2. Select Output to Printer. To save as Text File: 1. Right click to popup menu. 2. Select Output to File. 3. Select Text Format. 4. Input the name. 5. The report will be saved. To transfer to DBF format: 1. Right click to popup menu. 2. Select Output to File. 3. Select dbase Format. 4. Input the name 5. The report will be saved. Others Report Generation 10-14

121 Transactions Summary Report Generation The transactions summary report is used to count the daily number of transactions during a specified period with specified controllers & cardholders. This window is used to prepare the transaction summary report generation. It has 3 pages to specify the details of report generation. Select Controllers It is used to select the controllers to be involved for the report. Click this box to select all controllers along the system. For individual controllers selection, remove the tick mark from this box and set the tick mark to the controller at controller list box instead. This box lists all the controllers along the system. These controllers are enabled to select when the Entire Controllers does not marked with tick. Individual controllers can be selected for the report by set the tick mark to the box at the left side of each controller. Others Report Generation 10-15

122 For entire controllers: 1. Set the tick mark to the Entire Controllers for all current existed controllers and previously detached controllers. 2. Or remove the tick mark from the Entire Controllers, and then right click to popup a menu and click Select All. For individual controllers: 1. Remove the tick mark from the Entire Controllers box. 2. Set the tick mark to the box for individual controllers. At least one controller should be selected for report generation. Select Users It is used to select the cardholders to be involved in the transactions summary report. This box is used to setup the selection of the cardholders to be involved in the attendance report. For ranged selection, right click the mouse button to pop-up a menu and select Set Optional Selection. For Global card holders: Set all types at Global to Yes. For Account Department: 1. Select type Department 2. Right click to popup menu 3. Select Set Optional Selection 4. Type "Account" at From field 5. Click OK 6. Make sure others types to set to Global Others Report Generation 10-16

123 Specify Date It is used to specify the date range for the transactions report. It is used to specify the date of the start date inclusively. It is used to specify the date of the end date inclusively. With this box marked with tick, the report generator will search the history file for transactions. When the date range is set to recent months, there is no need to include this item to speed up the report generation. It is recommended to set the tick mark to this box to ensure there are no transactions missing. There are 6 pre-defined date range can be selected by right click the mouse button to popup menu: Today, Yesterday, This Week, Last Week, This Month, Last Month. Others Report Generation 10-17

124 Transaction Summary Report Browsing After sets the transaction summary report generation settings, click this button Generate to start report generation. The report window will be displayed after a short time system process. The following screen shows the transactions report. This value shows the total summary of the listed date below. To make a hard copy: 1. Right click to popup menu. 2. Select Output to Printer. To save as Text File: 1. Right click to popup menu. 2. Select Output to File. 3. Select Text Format. 4. Input the name. 5. The report will be saved. To transfer to DBF format: 1. Right click to popup menu. 2. Select Output to File. 3. Select dbase Format. 4. Input the name 5. The report will be saved. Others Report Generation 10-18

125 Application Specified Reports (Tailor Make Reports) These reports are only designed & used for specified customers. Please contact your technical support term for details. Others Report Generation 10-19

126 Chapter 11 Capture Express Operation Win Access Capture Express is a utility to capture the access transactions stored at ACS controller. For door access system & time recording system, this utility is more convenience to collect the transactions from ACS controllers. For instant access monitor system, it is NOT recommended to use this utility for transaction capture. Main Features Background operation: This program can be minimized as an icon display at right-bottom corner. When the Win Access 2000 main program is logged in, the capture of the program will be automatically suspended to avoid communication conflicts. The capture will be resumed when the Win Access 2000 main program is logged out. The Capture Express is running: Click this icon to pop a menu to start/stop the capture process. Then Capture Express is suspended: Scheduled capture operation: It is used to start the capture of transactions at a specified time. The Captures Express starts the capture of transaction each time of Windows started and stops when the transactions stored at each ACS controllers has been collected. For modem linked up system, this function is necessary in order to avoid the heavy loading of the telephone lines. Capture Express Operation 11-1

127 Configuration For the security reasons, all the capture settings are carry out at the Win Access 2000 program only in order to keep the track of the operator. In the Capture Express program, only the schedule setup of capture start time can be set. It is more safe & secure to avoid un-authorized access of the program. For details of the capture setup, please refer to Chapter 7-1. Schedule Setup It is used to start the capture of transactions at a specified time. The Captures Express starts the capture of transaction each time of Windows started and stops when the transactions stored at each ACS controllers has been collected. This field is used to set the start time of transaction capture. It can be enabled when the Enabled box is set with a tick. For safety reason, the schedule setup panel is not editable until the Edit button is click. And after setup the time schedule, the Save button must be click to confirm and save the settings. Click this box to set the capture running at non-stop mode. And all the schedule time will be disabled for edit. To set the Capture Express run at schedule time: 1. Click the Edit button to activate the schedule setup 2. Un-tick the Non-stop Capture. 3. Set tick to Enable at Start Time 4. Input the time at the Start Time. 5. Repeat step 3~4 for another capture time setting. 6. Click Save to finish. 7. During the edit stage, the capture process will be stopped. Capture Express Operation 11-2

128 Status & Statistics The capture status panel is used to monitor the capture process; administrator can supervise this panel to get the information of communication status. The capture statistics panel is used to monitor the communications between the PC & ACS controllers. Operation Mode This field displays the current capture mode: 1. Non-Stop Mode: The capture process will run until stop by administrators. 2. Scheduled Mode: The capture process will start at the pre-set time and stopped when transactions are totally received at all ACS controllers. Operation Status This field displays the current capture process status: 1. Capturing: The capture is in processing. 2. Idled: The capture process is stopped. 3. Paused: The capture process is suspended since the Win Access 2000 Main program is running. The process will be resumed when the Main program is logged out. Start Time/Next Capture Time During the Capturing status: This field display the start time of the capture process. During the Idled status: This field display the next capture time. Controller Addr This field displays the currently captured controller address during the capturing status. Controller Name This field displays the currently captured controller name during the capturing status. Transaction Rece This field displays the total transactions received from all controllers. Capture Express Operation 11-3

Smart Access Control System Software. User Manual. Version 1.0

Smart Access Control System Software. User Manual. Version 1.0 Smart Access Control System Software User Manual Version 1.0 Copyright MaCaPS International Ltd. 2002 This manual was produced by MaCaPS International Ltd. MaCaPS International Ltd. http://www.macaps.com.hk

More information

Car Park Control System Software User Manual

Car Park Control System Software User Manual Disclaimer Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced

More information

Smart Access Control System Software User Manual (Client Version)

Smart Access Control System Software User Manual (Client Version) Disclaimer Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced

More information

MODEL: SMARTGUARD Standard V5.5

MODEL: SMARTGUARD Standard V5.5 Operations Guide MODEL: SMARTGUARD Standard V5.5 CASS TECHNOLOGY SDN BHD (338857-X) ALL RIGHT RESERVED WWW.CASTLE.COM.MY Table of Content About This User Manaul... 3 Audience... 3 How to Use This Manual...

More information

GV-ASManager. User's Manual V1.1

GV-ASManager. User's Manual V1.1 GV-ASManager User's Manual V1.1 2008 GeoVision, Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written consent of GeoVision. Every effort

More information

TCS Access Control System Cheat Sheet

TCS Access Control System Cheat Sheet TCS Access Control System Cheat Sheet Access Control Main Screen 1 Toolbar 2 Device View Toolbar No. Name Function 1 Login Logs in the ASServer. 2 Logout Logs out the ASServer. 3 Devices Defines controllers

More information

Time Reorder Utility User Manual

Time Reorder Utility User Manual Time Reorder Utility User Manual Revisions...3 Introduction...4 Getting Started...5 Running Modes...7 Tray icon menu...7 Enter Password...8 Connections...8 Define Connections...8 Verify Connections...9

More information

First Access Express OPERATOR GUIDE

First Access Express OPERATOR GUIDE First Access Express OPERATOR GUIDE October 2016 Cutting edge simplicity Table of Contents Introduction... 4 PC Requirements... 5 Step 1. Software Installation... 5 Complete Installation Server and Client...

More information

Video Management Software

Video Management Software Video Management Software User Manual Web: europesecurity.eu Mail: info@europesecurity.eu Tel.: 0541 352 952 User s Manual 2 Contents CHAPTER : XMS CENTRAL USER MANUAL 1 PC REQUIREMENT 3 2 INSTALL 3 3

More information

IS2000. Administrative Operator s Guide

IS2000. Administrative Operator s Guide IS2000 Administrative Operator s Guide Table of Contents Logging Off... 7 Event Manager... 7 HARDWARE MANAGER... 8 Maneuvering the Hardware Tree... 8 Unlocking the Module... 8 Viewing the Hardware Tree...

More information

You have accessed an older version of a Paradyne product document.

You have accessed an older version of a Paradyne product document. You have accessed an older version of a Paradyne product document. Paradyne is no longer a subsidiary of AT&T. Any reference to AT&T Paradyne is amended to read Paradyne Corporation. Paradyne 6700-A2-GB41-10

More information

TOF-Watch SX Monitor

TOF-Watch SX Monitor TOF-Watch SX Monitor User manual Version 1.2 Organon (Ireland) Ltd. Drynam Road Swords Co. Dublin Ireland Contents General information... 3 Getting started... 3 File Window... 7 File Menu... 10 File Open

More information

Remote Monitoring System. User Manual DVR8A+/ 16B+ DVR4/ 8/ 16E+

Remote Monitoring System. User Manual DVR8A+/ 16B+ DVR4/ 8/ 16E+ Remote Monitoring System User Manual For DVR Model (Version 1.02.004 Onwards): DVR8A+/ 16B+ DVR4/ 8/ 16E+ ifocus Pte Ltd Copyright Statement Copyright 1999-2008. Version 3.1 All rights reserved. No part

More information

Access Control Unit User s Guide

Access Control Unit User s Guide NetAXS Access Control Unit User s Guide The configurations described in this document have not been reviewed by Underwriters Laboratories Inc. June 2007 2007 Honeywell. All rights reserved. 800-00233,

More information

User Manual. Central Monitoring Software for TER-series recorders. CenPro

User Manual. Central Monitoring Software for TER-series recorders. CenPro EN User Manual Central Monitoring Software for TER-series recorders CenPro Contents CENPRO USER MANUAL 1 PC REQUIREMENT 3 2 INSTALL 3 3 UNINSTALL 5 4 BASIC OPERATION 7 4.1 Log In 7 4.2 Screen Layout 8

More information

Axxis Biometrics LLC. BioAxxis L113 Fingerprint Door Lock Programming Kit

Axxis Biometrics LLC. BioAxxis L113 Fingerprint Door Lock Programming Kit Axxis Biometrics LLC BioAxxis L113 Fingerprint Door Lock Programming Kit Revision 0.14 Dec 2005 Table of Contents 1. Introduction... 2 Product Overview... 2 Main Features... 2 Packing Lists... 3 2. Operation

More information

Access Control Database User Manual

Access Control Database User Manual Access Control Database User Manual P/N 270961 Rev 1.0 25OCT01 DEVELOPED BY COPYRIGHT NOTICE TRADEMARKS CREDITS Edwards Systems Technology 6411 Parkland Drive Sarasota, FL 34243 (941) 739-4300 Copyright

More information

GV-ASManager. User's Manual V ASMV40-A-EN

GV-ASManager. User's Manual V ASMV40-A-EN GV-ASManager User's Manual V4.2.0.0 ASMV40-A-EN 2012 Guardian Security Solutions, L.C. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written

More information

SK-NET. Version 2. Installation and Operating Manual

SK-NET. Version 2. Installation and Operating Manual SK-NET Version 2 Installation and Operating Manual Version Note: This manual covers features available in SK-NET Version 2.40. A few features described in this manual are only available with SK-ACP and

More information

Access Control Software User Manual

Access Control Software User Manual Access Control Software User Manual Version: 2.4.4.1040 Date: Dec. 2011 Table of Contents Table of Contents 1. Install and Uninstall Software...1 1.1 Install Software...1 1.2 Uninstall Software...4 2.

More information

IS2000. Administrative Operator s Guide. AOG-101 (07/2005) Software Version 7.45

IS2000. Administrative Operator s Guide.  AOG-101 (07/2005) Software Version 7.45 IS2000 Administrative Operator s Guide www.imron.com AOG-101 (07/2005) Software Version 7.45 Table of Contents INTRODUCTION...6 Overview...6 GENERAL INFORMATION...6 Logging On...7 Logging Off...9 Event

More information

STONELOCK NETWORK USER MANUAL Version

STONELOCK NETWORK USER MANUAL Version STONELOCK NETWORK USER MANUAL Version 17.2.1 Table of Contents About StoneLock Pro...4 1.0 Overview 1.01...System Introduction...4 1.02...System Components...4 1.03...Installation...5-6 1.04...Uninstall...6

More information

HikCentral Control Client. User Manual

HikCentral Control Client. User Manual HikCentral Control Client User Manual Legal Information User Manual 2018 Hangzhou Hikvision Digital Technology Co., Ltd. About this Manual This Manual is subject to domestic and international copyright

More information

ACCESS CONTROL SOFTWARE V3.1 REFERENCE MANUAL

ACCESS CONTROL SOFTWARE V3.1 REFERENCE MANUAL ACCESS CONTROL SOFTWARE V3.1 REFERENCE MANUAL 01/2004 Centaur is a registered trademark of Position Technology INC. Pro-Report, Tracker, FrontGuard and FrontView are trademarks of Position Technology Inc.

More information

Network Camera Recording and Monitoring System. Network Video Recorder. VK-64/ VK-16 v1.1. User s Manual. Ver. 1.1

Network Camera Recording and Monitoring System. Network Video Recorder. VK-64/ VK-16 v1.1. User s Manual. Ver. 1.1 Network Camera Recording and Monitoring System Network Video Recorder VK-64/ VK-16 v1.1 Storage Server & Viewer User s Manual Ver. 1.1 Introduction Thank you for purchasing Network Video Recorder VK-64

More information

DriveWizard Plus Instruction Manual

DriveWizard Plus Instruction Manual DriveWizard Plus Instruction Manual To properly use the product, read this manual thoroughly. MANUAL NO. TOEP C730600 20C Table of Contents Safety Symbols and Markings...4 Manual Overview...5 Related Manuals...5

More information

Access Control Software User Manual

Access Control Software User Manual Access Control Software User Manual Version: 2.4.3.1038 Date: November 2010 Table of Contents Table of Contents 1. Install and Uninstall Software...1 1.1 Install Software...1 1.2 Uninstall Software...4

More information

GETTING STARTED. Installing the System 2000 Hardware. Configuring Your System 2000 Hardware. Troubleshooting. Configuring Your System 2000 Network

GETTING STARTED. Installing the System 2000 Hardware. Configuring Your System 2000 Hardware. Troubleshooting. Configuring Your System 2000 Network SYSTEM 2000 GETTING STARTED Installing the System 2000 Hardware Whether you are upgrade an existing System 2, or this is a brand new installation, there will be some hardware installation involved. We

More information

Power Vision 1.5 (Cod )

Power Vision 1.5 (Cod ) ELECTRICAL NETWORK ANALYSIS SOFTWARE Power Vision 1.5 (Cod. 775 353) USER S MANUAL (Cod. M 981 358 / 02 D) 2002 - CIRCUTOR, S.A. INDEX 1.- POWER VISION SOFTWARE INSTALLATION...4 2.- INTRODUCTION TO POWER

More information

ivms-4200 Access Control Client User Manual UD00895N

ivms-4200 Access Control Client User Manual UD00895N ivms-4200 Access Control Client User Manual UD00895N User Manual About this Manual This Manual is applicable to ivms-4200 Access Control Client. The Manual includes instructions for using and managing

More information

CamGuard Security System CamGuard Security System Manual

CamGuard Security System CamGuard Security System Manual CamGuard Security System Manual ZhiSoftware Brief Introduction...3 Features...3 System Requirements...3 Configuration...4 Add Camera...4 Device Options...4 About Alarm...5 Alarm Actions...6 Alarm Schedule...8

More information

D3000.Lite User s Guide

D3000.Lite User s Guide D3000.Lite User s Guide 2011 Datawatch Systems, Inc. Datawatch Systems is a registered trademark of Datawatch Systems, Inc. For Datawatch D3000.Lite Version 1.2 Manual release date: March 1, 2010 Datawatch

More information

Midpoint Security,

Midpoint Security, User Manual Revision: 6, Date: October 4, 009 Midpoint Security, UAB, Kaunas, Lithuania www..emssa.net TABLE OF CONTENTS Copyright notice... Liability waiver... Introduction... 4 Overview... Settings tab...

More information

-Table of Contents- 1. Overview Installation and removal Operation Main menu Trend graph... 13

-Table of Contents- 1. Overview Installation and removal Operation Main menu Trend graph... 13 Thank you for buying Data Analysis Software. In order to use this software correctly and safely and to prevent trouble, please read this manual carefully. Notice 1. No part of this manual can be reproduced

More information

Using LaunchPad. Contents. Section 1-7. This section: Describes how to use LaunchPad to run your access control programs.

Using LaunchPad. Contents. Section 1-7. This section: Describes how to use LaunchPad to run your access control programs. Section 1-7 Using LaunchPad This section: Describes how to use LaunchPad to run your access control programs. Describes how to change your login name and password Describes how to add new operators. Describes

More information

FaxFinder Fax Servers

FaxFinder Fax Servers FaxFinder Fax Servers Models: FF130 FF230 FF430 FF830 Client User Guide FaxFinder Client User Guide Fax Client Software for FaxFinder Series PN S000460B, Version B Copyright This publication may not be

More information

963 User Guide. Issue 1/D 1/4/04 Part No: TC200635

963 User Guide. Issue 1/D 1/4/04 Part No: TC200635 963 User Guide Issue 1/D 1/4/04 Part No: TC200635 Trend Control Systems Limited PO Box 34 Horsham Sussex RH12 2YF Tel: +44 (0) 1403 211888 www.trend-controls.com CONTENTS Copyright: Trend Control Systems

More information

Multi-NVR Manager. Quick Start Configuration Usage

Multi-NVR Manager. Quick Start Configuration Usage Multi-NVR Manager Quick Start Configuration Usage 2014. All rights are reserved. No portion of this document may be reproduced without permission. All trademarks and brand names mentioned in this publication

More information

PIVOT CMS CLIENT SOFTWARE USER MANUAL

PIVOT CMS CLIENT SOFTWARE USER MANUAL PIVOT CMS CLIENT SOFTWARE USER MANUAL 1 CMS USER GUIDE 1.1 PC REQUIREMENT Recommended PC Requirement OS CPU VGA RAM HDD Graphics Card OS CPU VGA RAM HDD Windows Vista, 7 or higher Intel Core2Quad Q9400

More information

A-1300 Biometric Access Control System USER'S MANUAL

A-1300 Biometric Access Control System USER'S MANUAL A-1300 Biometric Access Control System USER'S MANUAL Table of Contents 1. General Information... 1 1.0 Notification... 2 1.1 System Overview... 2 1.2 Main Features... 2 1.3 Equipment... 3 2. Basic Concepts...

More information

Horizon Launcher Configuration Guide

Horizon Launcher Configuration Guide Horizon Launcher Configuration Guide Windows NT and Windows 2000 are registered trademarks of Microsoft Corporation. All other product or company names are trademarks or registered trademarks of their

More information

Product and company names appearing in this document are trademarks of each respective company or organization.

Product and company names appearing in this document are trademarks of each respective company or organization. . CMS_beta LEGAL INFORMATION Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without the prior written permission of the company is prohibited.

More information

Configuring Cisco Access Policies

Configuring Cisco Access Policies CHAPTER 11 This chapter describes how to create the Cisco Access Policies assigned to badge holders that define which doors they can access, and the dates and times of that access. Once created, access

More information

Manual Version: V1.01. ISS Manager Video Management Software User Manual

Manual Version: V1.01. ISS Manager Video Management Software User Manual Manual Version: V1.01 ISS Manager Video Management Software User Manual Notice The information in this manual is subject to change without notice. Every effort has been made in the preparation of this

More information

Power Vision 1.7 (Cod )

Power Vision 1.7 (Cod ) ELECTRICAL NETWORK ANALYSIS SOFTWARE Power Vision 1.7 (Cod. 775 353) USER S MANUAL (Cod. M 981 358 / 05B) 2005 - CIRCUTOR, S.A. INDEX 1.- POWER VISION SOFTWARE INSTALLATION...4 2.- INTRODUCTION TO POWER

More information

Central Management Software. Cam Viewer 3 Lite. User Manual

Central Management Software. Cam Viewer 3 Lite. User Manual Central Management Software Cam Viewer 3 Lite User Manual Version 1.0.0 Table of Contents 1. System Requirement...4 2. Software Installation...5 3. Configuration Wizard...9 3.1 Channel...10 3.1.1 Adding

More information

Integrated for Océ Setup Guide

Integrated for Océ Setup Guide Integrated for Océ Setup Guide Version 1.2 2016 OCE-20160914 Equitrac Integrated for Océ Setup Guide Document History Revision Date September 14, 2016 Revision List New supported devices/card reader web

More information

Secure Single Sign On with FingerTec OFIS

Secure Single Sign On with FingerTec OFIS Secure Single Sign On with FingerTec OFIS User Guide CONTENTS 3 1 INTRODUCTION Welcome to OFIS Gateway 4-11 2 INSTALLATION & SETUP Registering Your OFIS Gateway Installing & Setting Up Your OFIS Gateway

More information

User s Manual CAP 531*1.5 Configuration and Programming tool

User s Manual CAP 531*1.5 Configuration and Programming tool User s Manual CAP 531*1.5 Configuration and Programming tool This manual belongs to: Contents Chapter Page About this manual 1 Introduction 3 Technical descriptions 81 References 177 Customer feedback

More information

DTAP200 DTSX200 Control Visualization Software Las2.0 Data Conversion Guide

DTAP200 DTSX200 Control Visualization Software Las2.0 Data Conversion Guide User s Manual DTAP200 DTSX200 Control Visualization Software Las2.0 Data Conversion Guide 2nd Edition Blank Page < Introduction > i Introduction About this Manual Thank you for purchasing the DTSX200 Control

More information

Finger Authentication Server

Finger Authentication Server Futronic Technology Company Ltd. Finger Authentication Server User's Guide Version 5.7 Copyright 2003-2010 Futronic Technology Company Ltd. Copyright 2003-2010 Futronic Technology Company Ltd. All rights

More information

ATX Document Manager. User Guide

ATX Document Manager. User Guide ATX Document Manager User Guide ATX DOCUMENT MANAGER User Guide 2008 CCH Small Firm Services. All rights reserved. 6 Mathis Drive NW Rome, GA 30165 No part of this manuscript may be copied, photocopied,

More information

Attendance Management Software User Manual

Attendance Management Software User Manual Attendance Management Software User Manual About this Manual: This manual provides software operation instruction, for example install and uninstall program, collect data, assign shift and output report,

More information

Visitor Management System Module Settings and Operation Guide

Visitor Management System Module Settings and Operation Guide Visitor Management System Module Settings and Operation Guide Visitor Management System Module Settings and Operation Guide. Introduction.. 4 Starting and stopping the Visitor Management System software

More information

Preface. Honorable customers,

Preface. Honorable customers, Preface Honorable customers, Thanks for choosing products of this company. OA200, with world cutting edge technologies fingerprint recognition, computer communication, as well as microelectronics, is considered

More information

GV-ASManager. User's Manual V2.11

GV-ASManager. User's Manual V2.11 GV-ASManager User's Manual V2.11 2009 GeoVision, Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written consent of GeoVision. Every

More information

Doors32 for use with Windows

Doors32 for use with Windows Doors32 for use with Windows Access Control Software Users Guide v3.4 $49.00 USD 1998 Keri Systems, Inc. ALL RIGHTS RESERVED Document Number 01821-001, Revision 3.4 November, 1998 Keri Systems, PXL-250,

More information

Preface. Thanks for choosing products of our company. The product with world cutting edge technologies-fingerprint recognition, computer

Preface. Thanks for choosing products of our company. The product with world cutting edge technologies-fingerprint recognition, computer Preface Honorable customers, Thanks for choosing products of our company. The product with world cutting edge technologies-fingerprint recognition, computer communication, as well as microelectronics,

More information

Versa XS 3.0. Advanced Programming Guide. Versatile Access Control Programming Software for EL Models

Versa XS 3.0. Advanced Programming Guide. Versatile Access Control Programming Software for EL Models TM Versa XS 3.0 Advanced Programming Guide Versatile Access Control Programming Software for EL Models TM VERSA XS SET UP & OVERVIEW............... 2-9 About Versa XS.............................. 2 Direct

More information

Software Manual. For Fingerprint Attendance System

Software Manual. For Fingerprint Attendance System Software Manual For Fingerprint Attendance System Content: 1 PRECAUTION... 4 2 GETTING STARTED...4 2.1. HOW TO COMMUNICATE THE SYSTEM WITH THE READER TERMINAL... 4 3 HOW TO USE FINGERPRINT T & A MANAGEMENT

More information

Access Easy Controller 2.1 APC-AEC21-UPS1. Software Manual

Access Easy Controller 2.1 APC-AEC21-UPS1. Software Manual Access Easy Controller 2.1 APC-AEC21-UPS1 en Software Manual Access Easy Controller 2.1 Table of Contents en 3 Table of Contents 1 Introduction 9 1.1 Access Easy Controller 2.1 Functional Features 9 1.2

More information

Version: 1.1 Software Version: For Access 4.5.8/5.0.8 and above Version Date: July, 2011

Version: 1.1 Software Version: For Access 4.5.8/5.0.8 and above Version Date: July, 2011 User Manual Version: 1.1 Software Version: For Access 4.5.8/5.0.8 and above Version Date: July, 2011 About This Manual This document introduces the main function, the user interface and operations of the

More information

Portals 14 What is a portal? 14 Hardware 15 RS232 to RS USB to RS TCP/IP to RS Add a Serial Portal 16 Add a Network portal 16

Portals 14 What is a portal? 14 Hardware 15 RS232 to RS USB to RS TCP/IP to RS Add a Serial Portal 16 Add a Network portal 16 PROS LITE User Manual Version 2.0.0 www.visual-plus.com Table of Contents Getting Started 5 Starting PROS Lite 5 Create a Portal 5 Adding a control panel 6 Adding a user 7 Upload users to a controller

More information

RAS (Remote Administration System)

RAS (Remote Administration System) RAS (Remote Administration System) Digital Video Recorder Software User Guide Document 900.0314 Rev 2.00 RAS User Guide Revisions Issue Date Revisions 1.00 08/04 New document. 1.01 04/05 Update template,

More information

WinPak 2 & 2005 Quick Reference

WinPak 2 & 2005 Quick Reference WinPak 2 & 2005 Quick Reference Initializing a Panel (sending changes in the programming to the panels) From the menu bar select Operations Control Map Click the (+) to expand the tree and display the

More information

Etarmis. LITE User Guide

Etarmis. LITE User Guide LITE User Guide Contents Creating A New Personal Record 3 Changing A Password 6 Creating a Site Administrator 7 Deleting An Employee 8 Making A Correction 10 Deleting A Correction 12 Modifying A Booking

More information

MICROTRAK EVOLUTION.NET USER GUIDE

MICROTRAK EVOLUTION.NET USER GUIDE MAN047-08 AUGUST 2016 GETTING STARTED Microtrak Evolution.NET consists of easy to use, intuitive modules. They cover the main areas of operation - User Management, Personnel Management, Facility Management,

More information

AKCess Pro Server Access Control User Manual

AKCess Pro Server Access Control User Manual www.akcp.com AKCess Pro Server Access Control User Manual Help Version updated till version 118 Copyright 2012, AKCess Pro Co., Ltd.. 1) Introduction A) What is the AKCess Pro Server / Access Control?

More information

R A D I O N I C S. READYKEY K6100 Readykey for Windows. User Guide. Logging In. Logging Out. If an ID device has been issued:

R A D I O N I C S. READYKEY K6100 Readykey for Windows. User Guide. Logging In. Logging Out. If an ID device has been issued: R A D I O N I C S READYKEY K6100 Readykey for Windows User Guide Logging In If an ID device has been issued: 1. Use your ID device with the desktop administration or Central Network Controller (CNC) reader,

More information

exchange Call Center Agent Guide

exchange Call Center Agent Guide exchange Call Center Agent Guide Version 4.6 NBX System Release 6.5 http://www.3com.com Part Number: 900-0419-01 Published April 2009 3Com Corporation, 350 Campus Drive, Marlborough MA 01752-3064 Copyright

More information

Digital Signage Player Management Software

Digital Signage Player Management Software 3-296-173-11 (1) Digital Signage Player Management Software Operating Instructions Before operating the software, please read this manual thoroughly and retain it for future reference. VSPA-D7 Version

More information

Mirasys N series. Network Video Recorder Quick Guide

Mirasys N series. Network Video Recorder Quick Guide Mirasys N series Network Video Recorder Quick Guide 2006-2007 Mirasys Ltd. All rights reserved. No part of this document may be reproduced for any purpose, even in part. TRADEMARKS Mirasys and Mirasys

More information

Configuring Personnel and Badges

Configuring Personnel and Badges CHAPTER 10 This chapter describes how to create the personnel records and badges used to access doors in the Cisco Physical Access Control system. Note For instructions to synchronize Cisco PAM with personnel

More information

CONTROL ROOM SOFTWARE

CONTROL ROOM SOFTWARE CONTROL ROOM SOFTWARE Starting QTWatch... Main screen... Control Monitor Screen... Action page... Site Map page... Standard Operations page... Handling calls on Actions... How to log a manual/remote call...

More information

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Access Control Software Operation Guide

Access Control Software Operation Guide Access Control Software Operation Guide Mar. 25, 2014 CONTENTS Part 1 Installation and Unload of Software... 5 1.1 Basic Steps of Installation... 5 1.2 Basic requirements for hardware of Installation...

More information

GUARD1 PLUS Documentation. Version TimeKeeping Systems, Inc. GUARD1 PLUS and THE PIPE are registered trademarks

GUARD1 PLUS Documentation. Version TimeKeeping Systems, Inc. GUARD1 PLUS and THE PIPE are registered trademarks GUARD1 PLUS Documentation Version 3.02 2000-2005 TimeKeeping Systems, Inc. GUARD1 PLUS and THE PIPE are registered trademarks i of TimeKeeping Systems, Inc. Table of Contents Welcome to Guard1 Plus...

More information

Manual Version: V1.15. Video Management Software Guard Station User Manual

Manual Version: V1.15. Video Management Software Guard Station User Manual Manual Version: V1.15 Video Management Software Guard Station User Manual Thank you for purchasing our product. If there are any questions, or requests, please do not hesitate to contact the dealer. Disclaimer

More information

STARWATCH DUAL PRO I Software User Manual

STARWATCH DUAL PRO I Software User Manual 5F, Ace Techno Tower B/D Phone : 82 2 2659 0055 684-1 Deungchon-Dong Fax : 82 2 2659 0086 Gangseo-Gu Web : www.idteck.com Seoul, Korea STARWATCH DUAL PRO I Software User Manual Table of Contents STARWATCH

More information

Quick Start Guide (V1.03) UD.6L0201B1064A01

Quick Start Guide (V1.03) UD.6L0201B1064A01 ivms-4200 PCNVR Quick Start Guide (V1.03) UD.6L0201B1064A01 Thank you for purchasing our product. If there is any question or request, please do not hesitate to contact the dealer. This manual applies

More information

TIDOMAT smartone version 2. - User manual -

TIDOMAT smartone version 2. - User manual - TIDOMAT smartone version 2 - User manual - Copyright information 2008 Tidomat AB. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any

More information

UNIVERSAL SOFTWARE. Universal Software. Data Sheet

UNIVERSAL SOFTWARE. Universal Software. Data Sheet Universal Software Data Sheet System Requirements: The minimum requirements for using the Software are: 1). Windows XP/Vista/7 2). A minimum of 512 MB RAM 3). 1 GB of hard disk space 4). Microsoft Office

More information

Superview INSTRUCTIONS. Version 2.0x

Superview INSTRUCTIONS. Version 2.0x INSTRUCTIONS Version 2.0x INDEX INDEX... 1 INTRODUCTION... 2 INSTALLING SUPERVIEW... 3 SYSTEM REQUIREMENTS... 3 INSTALLATION PROCEDURES... 3 FIRST STEPS... 4 CREATING A SIMPLE APPLICATION... 4 Start...

More information

Equitrac Integrated for Océ

Equitrac Integrated for Océ Equitrac Integrated for Océ 1.2 Setup Guide 2014 Equitrac Integrated for Océ Setup Guide Document History Revision Date Revision List November 2, 2012 Updated for Equitrac Office/Express version 4.2.5

More information

Océ DS10. Operator s manual

Océ DS10. Operator s manual Océ DS10 Operator s manual Océ-Technologies B.V. Trademarks Products in this manual are referred to by their trade names. In most, if not all cases, these designations are claimed as trademarks or registered

More information

Preface. Thanks for choosing products of this company. T5, with world cutting edge

Preface. Thanks for choosing products of this company. T5, with world cutting edge Preface Honorable customers, Thanks for choosing products of this company. T5, with world cutting edge technologies fingerprint recognition, computer communication, as well as microelectronics, is considered

More information

Remote Backup Software. User Manual

Remote Backup Software. User Manual Remote Backup Software User Manual Legal Information About this Manual This Manual is subject to domestic and international copyright protection. Hangzhou Hikvision Digital Technology Co., Ltd. ("Hikvision")

More information

Vivotek ST3402 User s Manual

Vivotek ST3402 User s Manual Vivotek ST3402 User s Manual 0 Contents Chapter 1 Installation... 1-3 1.1 System Hardware Requirements... 1-3 1.1.1 Recommended minimum system hardware requirements... 1-3 1.2 Software Installation...

More information

PACH AND COMPANY 946 Calle Amanecer Ste. L&M Phone: San Clemente, CA Fax:

PACH AND COMPANY 946 Calle Amanecer Ste. L&M Phone: San Clemente, CA Fax: MANAGEMENT SOFTWARE PACH AND COMPANY 946 Calle Amanecer Ste. L&M Phone: 1-888-678-7224 www.pach-co.com San Clemente, CA 92673 Fax: 949-498-6879 TABLE OF CONTENTS Limitations of Liability Chapter 1. Getting

More information

SAFEGUARD CONTENTS. Digital Video Recorder. Version 1.3. Page. DVR Server S A F E G U A R D

SAFEGUARD CONTENTS. Digital Video Recorder. Version 1.3. Page. DVR Server S A F E G U A R D S A F E G U A R D SAFEGUARD Digital Video Recorder Version 1.3 CONTENTS Chapter 1 Chapter 2 Chapter 3 3.1 3.2 3.3 3.4 3.5 3.6 3.7 3.8 3.9 Chapter 4 4.1 4.2 Remote Client Chapter 5 Chapter 6 Chapter 7 7.1

More information

RemoteWare OS/2 Client

RemoteWare OS/2 Client RemoteWare OS/2 Client User s Guide Version 4.1 Service Pack 1A RemoteWare OS/2 Client User s Guide Version 4.1 Service Pack 1A This document was prepared to assist licensed users of RemoteWare by XcelleNet,

More information

Océ User manual. Océ VarioPrint 1055/65/75. Configuration and maintenance manual

Océ User manual. Océ VarioPrint 1055/65/75. Configuration and maintenance manual Océ User manual Océ VarioPrint 1055/65/75 Configuration and maintenance manual Océ-Technologies B.V. Océ-Technologies B.V. Copyright 2005, Océ-Technologies B.V. Venlo, The Netherlands. All rights reserved.

More information

Programming Manual KX-TVA50 KX-TVA200. Voice Processing System. Model No.

Programming Manual KX-TVA50 KX-TVA200. Voice Processing System. Model No. Programming Manual Voice Processing System KX-TVA50 KX-TVA200 Model No. Thank you for purchasing a Panasonic Voice Processing System. Please read this manual carefully before using this product and save

More information

Self-Service Attendance Terminal User Manual

Self-Service Attendance Terminal User Manual Self-Service Attendance Terminal User Manual Version: 4.1 Date: May. 2014 Scope: SSR self-service attendance terminal with a firmware version later than V3.0, 2.8 inch network attendance machine About

More information

GUARD1 PLUS Manual Version 2.8

GUARD1 PLUS Manual Version 2.8 GUARD1 PLUS Manual Version 2.8 2002 TimeKeeping Systems, Inc. GUARD1 PLUS and THE PIPE are registered trademarks of TimeKeeping Systems, Inc. Table of Contents GUARD1 PLUS... 1 Introduction How to get

More information

Engineering Tool for PC SDWP001 Operating Manual

Engineering Tool for PC SDWP001 Operating Manual Inverter HF-520/HF-X20 Series SF-520 Series Engineering Tool for PC SDWP001 Operating Manual 1 Manual No. DM2308E-1 Table of Contents Safety Symbols and Markings...4 Safety Notes and Instructions...4 Manual

More information

Programming Manual KX-TVA50 KX-TVA200. Voice Processing System. Model

Programming Manual KX-TVA50 KX-TVA200. Voice Processing System. Model Voice Processing System Programming Manual Model KX-TVA50 KX-TVA200 Thank you for purchasing a Panasonic Voice Processing System. Please read this manual carefully before using this product and save this

More information

Full User Manual and Quick Start Guide

Full User Manual and Quick Start Guide Full User Manual and Quick Start Guide 2 W hile every precaution has been taken in the preparation of this manual, we assume no responsibility for errors or omissions. Neither, is any liability assumed

More information

NETOP GUEST FOR ANDROID GUIDE

NETOP GUEST FOR ANDROID GUIDE 31.01.2017 NETOP GUEST FOR ANDROID GUIDE Contents 1 Introduction... 2 1.1 Document Scope... 2 2 Installing the Netop Guest... 3 2.1 Enter the Netop Guest license key... 3 3 Using the Netop Guest... 5 3.1

More information

Visit us on the World-Wide Web at Programming Guide. Controller Boards

Visit us on the World-Wide Web at   Programming Guide. Controller Boards Visit us on the World-Wide Web at www.chamberlain.com PRO Systems Programming Guide Controller Boards -106 & -107 PROKey PROCard TABLE OF CONTENTS INTRODUCTION About the PRO System................................3

More information