STONELOCK NETWORK USER MANUAL Version

Similar documents
WinPak 2 & 2005 Quick Reference

First Access Express OPERATOR GUIDE

USER MANUAL. Disclaimer

ivms-4200 Access Control Client User Manual UD00895N

IMS Client Operation Guide Version V1.1 Date

Access Control Software User Manual

Access Control Software User Manual

IS2000. Administrative Operator s Guide

D3000.Lite User s Guide

OnGuard Integration User Guide. v

Symmetry Integration User Guide. v

HP ALM Overview. Exercise Outline. Administration and Customization Lab Guide

R A D I O N I C S. READYKEY K6100 Readykey for Windows. User Guide. Logging In. Logging Out. If an ID device has been issued:

VWR Protocole Builder Software User manual Summary

Smart Access Control System Software User Manual (Client Version)

ACCESS CONTROL QUICK INSTALL GUIDE. tel: +44 (0) fax: +44 (0) web:

DCMS. User Manual. Version V1.0

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1

HikCentral Control Client. User Manual

Version: 1.1 Software Version: For Access 4.5.8/5.0.8 and above Version Date: July, 2011

uface800 Time Clock User Manual uface800

IS2000. Administrative Operator s Guide. AOG-101 (07/2005) Software Version 7.45

Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface

IP Device Search and Configuration Tool Operation Manual

Smart Access Control System Software. User Manual. Version 1.0

Midpoint Security,

NVMS1000. User Manual

Installation Guide. ZKAccess CLASSIC 3.5. www. zkaccess.com

User Manual. Hotel Lock System. Software Version: Document Version: V2.0 Date: August, Contents

User Guide V6.1g / 48730B

USER MANUAL. Mac Version

CME E-quotes Wireless Application for Android Welcome

STONELOCK PRO USER MANUAL Version 2.0

Quick Operation Guide of ivms-4200

Grandstream Networks, Inc. IPVideoTalk Cloud Conferencing System IPVideoTalk Portal User Guide

Manual Version: V1.01. Video Management Server Client Software User Manual

Understanding Door Configuration

CMS USER S MANUAL VER:

SKY l SYS DVR USER S MANUAL TABLE OF CONTENTS. Skydreamers Systems DVR Page 1

Installing the PC-Kits SQL Database

Manual Version: V1.01. ISS Manager Video Management Software User Manual

NVMS User Manual. Version 2.1.0

Digital computer management software

W Box VMS BOX T E C H N O L O G I E S.

DSS User Guide. End User Guide. - i -

S2 NetBox v4.8 Basic End-User Admin Training

User Manual v

WebStation User Manual

Perceptive Nolij Web. Administrator Guide. Version: 6.8.x

NVMS User Manual

EntraPass WebStation. User Manual DN

End User Manual. December 2014 V1.0

APPENDIX B: INSTALLATION AND SETUP

LockState RL 4000 User Guide

Welcome To Account Manager 2.0

IT Essentials v6.0 Windows 10 Software Labs

1. Introduction Minimum system requirements Basic Concept Server mode

QSalesData User Guide

HikCentral Control Client. User Manual

Edit contains commands for adding, deleting, and changing configurations. The functions listed are dependent on what is highlighted in the tree.

Quick Start Guide (V1.03) UD.6L0201B1064A01

Table of Contents. Revu ipad. v3.6. Navigation. Document Manager. File Access. Markups. Signature Tool. Field Verification Measurements

TCS Access Control System Cheat Sheet

MagicInfo VideoWall Author

Vanguide Application Set Installation Guide. Overview. Introduction

NVMS User Manual

4.2. LockView N. Instruction Man

StoneLock Gateway Installation Manual. v.1.7

Print Station. Point-and-Click Printing WHITE PAPER

Keycode Installation Guide. BCM Business Communications Manager

User Manual. perfectionlearning.com/technical-support

ATX Document Manager. User Guide

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

Configuring Cisco Access Policies

Controlsoft Identity and Access Management Software Controlsoft Identity Access Management Software

Restoring data from a backup

NORDSON CORPORATION AMHERST, OHIO USA

ChromQuest 4.2 Chromatography Data System

Sagem MEMS 7.3 Quick Installation Guide

ZKAccess3.5 Security System

User Guide. 3CX Audio Scheduler. Version

Portals 14 What is a portal? 14 Hardware 15 RS232 to RS USB to RS TCP/IP to RS Add a Serial Portal 16 Add a Network portal 16

HHH Instructional Computing Fall

Sync User Guide. Powered by Axient Anchor

Video Capture Card Manual

Car Park Control System Software User Manual

QST Mobile Application for Android

Starting ParTEST. Select Start, Programs ParTEST ParTEST Enter your User Name and password

HIP2P Network Video Camera Client Terminal User Manual

USER MANUAL. smartengine 30 RELEASE DATE: 15/06/2010

9.4 Authentication Server

OneRoof CyberCafePro Client Installation, Setup and User Manual

Chapter 1. Configuring VPGO

GRS Enterprise Synchronization Tool

User s Manual of DVR ULTIMAX. Remote Client Software V wersja 2.40

ivms-5200 Mobile Surveillance Quick Start Guide UD06370B

2015 Optima Healthcare Solutions Page 2

Grandstream Networks, Inc.

Secure Guard Central Management System

SmartLock Surf OPERATOR GUIDE

Transcription:

STONELOCK NETWORK USER MANUAL Version 17.2.1

Table of Contents About StoneLock Pro...4 1.0 Overview 1.01...System Introduction...4 1.02...System Components...4 1.03...Installation...5-6 1.04...Uninstall...6 Instructions for Use 1...System Startup... 7-10 2...System Settings...11 3...Role Management...11 4...Operator Management...12 5...System Configuration...13-14 6...Operation Log...15 7...Database Management...16 8...Device Settings...17 9...Device Management...18 2.10...Device Maintenance...21 2.11...Data Synchronization...22 2.12...Electronic Map...23 2.13... Real-Time Records Management...24 2.14...User Management...25 2.15...Time Group Management...26 2.16...Holiday Management...27 2.17...Permission Management...27 2.18...User Management...28-29 2.19...Batch Modify User... 30 2.20...Group Management... 31-32 2.21...Data Management...33 2.22...Verification Records Management...33 2.23...Alarm Records Management...33 www.stonelock.com

About StoneLock Pro Section 1: Overview StoneLock Pro Faceplate The StoneLock Network (SLN) software is a security management platform for managing StoneLock access controls and related systems across a network. Light Bar Functions include StoneLock hardware management, user management, privilege management, remote 1.0 Cameras (NIR Camera not visible) user enrollment, records checking and alarm controls. NIR Lights 1.01 SYSTEM INTRODUCTION LCD Display 10:36:23 07/17/2013 Wednesday The SLN software platform integrates StoneLock s advanced face recognition technology, the access control functions, along with keypad entries and/or ID cards in various authentication combination Light Sensor Keypad www.stonelock.com HID Card Reader StoneLock Pro Control Unit StoneLock Pro is an extremely fast and accurate IR facial recognition biometric unit for access control applications. It incorporates proprietary biometrics along with a keypad modes. The SLN software platform centralizes data management, allowing the unique advantages of face recognition to be quickly pushed across an entire facility, or even multiple facilities, each with multiple entrance locations. Events can be easily monitored, greatly improving the level of security control. The SLN platform, allows for control of all access control terminals, including StoneLock units, user information, user privilege management, records management, system alarm controls and other functions. and HID iclass SE Multi-Class Reader into a 3-point device. StoneLock Pro includes a faceplate unit and a control unit. 1.02 SYSTEM COMPONENTS StoneLock Network Software Platform StoneLock Pro Access Control Device (up to 64 units on one network) StoneLock Global is a provider of high quality biometric products for access control applications. 2

1.03 INSTALLATION Follow these steps to install the full security management platform software (SLN): 1) Double-click the installer to begin the installation. 2) On the Welcome interface, select [Next] to continue the installation (Figure 1.03-1). 1.0 Fig 1.03-1 3) At the License Agreement screen (Figure 1.03-2), check the box I have read and agree to the above agreement, and then select [Next] to continue the installation. Fig 1.03-2 4) At the Choose Install Location screen (Figure 1.03-3), the system default installation directory is: C: \ Program Files \ SLN2.3 a. Select [Next] to continue the installation. b. If you need to modify the installation path, select the [Browse] button to select the installation folder. Fig 1.03-3 3

5) Installation Select [Install] to install the SLN software. The Installation Process: Database Initialization window will prompt you to initialize the database. 1.0 Within the Database Initialization you will need to establish a destination folder to house the database. i.e. C:\SLNdata Fig 1.03-3 Initialize: Select the database type (SQL 2000, SQL 2005, SQL 2008, Access or Firebird), then enter the server address, user name, and password and then select [Initialize] to initialize the database. Note: If you have a previous version of the SLN installed, click on the OK button, as you will not need to initialize the database again. (Figure 1.03-4) [Upgrade]: This function is specific to changing your database. This step will only need to be performed if you are changing from a previous database, i.e. SQL2000 to SQL2008. Fig 1.03-4 6) Select [Exit], and then select [Finish] to complete the installation. (Figure 1.03-5) 1.04 UNINSTALL Before uninstalling: a. Exit and close the SLN b. Go to the Start Menu / All Programs / StoneLock Network and select the [Uninstall] option. Fig 1.03-5 4

Section 2: Instructions for Use 1 SYSTEM STARTUP a) Double-click the desktop icon (Figure 1-1) to run the SLN. A prompt box of System Register will pop up in the initial startup. Fig 1-1 In the Registration dialog box (Figure 1-2), select [Register] to initiate a quick registration sequence, or select [Trial] button for a 30-day trial period. Fig 1-2 b) After successful registration, the system automatically connects with SQL SERVER database and loads the system resources. If the database connection fails, the message box failed to connect database will pop up (Figure 1-3). Fig 1-3 5

Click [Yes] to pop up the database initialization window parameters according to actual situation. (Figure 1-3), and then configure relevant Fig 1-3 Database Type: The system supports SQL Server 2000, 2005, 2008, MS Access, Firebird. Server: Fill the LAN server rooted by SLN (ie the database server) with actual IP address. User Name, Password: database type for SQL Server 2000, 2005, 2008; users fill out the SQL Server, the user name and password usually sa; for Access, the user name and password are empty; for the Firebird, the user Name Fill sysdba, password is masterkey. Fig 1-4 c) When the database connection is successful, the system login interface will appear (Figure 1-5). Fig 1-5 6

Enter the correct user name and password (the default super administrator user name: admin, password: 888888 to enter the main interface (Figure 1-6). The S-Admin can change the password after the initial login. Fig 1-6 d) Service Mode: In the main interface, click [Transit service configuration] icon (Figure 1-7); the pop-up transit server configuration window is shown in (Figure 1-8). Fig 1-7 Service Mode (Figure 2-8): Local mode: Only allow one SLN application to connect with a StoneLock Pro unit. Transit mode: Allow multiple SLN applications to connect with StoneLock Pro units when transit daemon is run. You must first modify the mode as transit mode and fill in the correct transit server IP. Fig 1-8 7

Transit Service IP: Enter the actual IP address of the server on which transit daemon is run (i.e. the transit server). The Transit IP is recommended to be consistent with database IP; that is, the transit server and database server are the same. Open background service transit: transit mode set, you must open the transit daemons. Open the Start Menu - All Programs - SLN ; run transit background services. Fig 1-9 In the Transit Service dialog box, (Figure 1-9), enter the correct user name and password to enter the background transit service main interface (Figure 1-10). Client List: Displays client information connected with background transit service. Online Device: Display StoneLockTM device information connected with background transit service. Offline Device: Display StoneLockTM device information disconnected from the background transit service. Device Load: Display load information of online StoneLock device. Fig 1-10 8

2 SYSTEM SETTINGS Click the [System Settings] menu, and it will appear in a menu bar (Figure 2-1). Fig 2-1 3 ROLE MANAGEMENT See Interface (Figure 3-1) New Role Permissions: Select [New]; the system adds a new role. New: Click the [New] button to add a new role with a default name. Select desired Function Module and Details for the role. Choose a name for the Role. Note: Checking [Enabled] within the Function Module and/or within the Details section selects all permissions. Note: Once any permission within a role has been changed, the administrator roles must be reassigned to the Operator. SELECT [SAVE] FOR ANY CHANGES TO TAKE PLACE. Fig 3-1 9

4 OPERATOR MANAGEMENT See Interface (Figure 4-1) Add: Click the [Add] button to add a system operator. The name will default to i.e. Oper #. This Operator will default to the initial password of 888888 until it is changed by the super admin. Set the new Operator s user name, password, assign a role and area of privilege. Click [Save] button. Fig 4-1 Reset Password: Choose an Operator; click the [Reset password] button to reset the password back to default 888888. Remote Password: This password will be used for remote log-ins. This password can be reset at any time by the administrator logging in the system. Single Use: Checking this indicates that the remote password becomes invalid following a single use. This password can only be reset by the administrator. Advanced Settings: Select an operator; click the [Advanced Settings] button to set this operator s mobile- phone number, address and other details. (Figure 4-2) Note: Admin is the system s super Administrator. The Admin s privileges can not be deleted or modified. They can manage all SLN features as well as all StoneLock Pro units within the system. A non-admin operator can only manage the terminals within their assigned roles and area. Fig 4-2 Tip: Passwords may contain 0-16 characters (including letters, numbers, special characters and spaces), and are not case-sensitive. 10

5 SYSTEM CONFIGURATION See User Configuration interface (Figure 5-1) Card parameters: Choose appropriate card port as well as card type. Default Profile ID Number: By checking this box the SLN will automatically generate an ID number for the individual users profile. By not checking this box the Admin or Operator will need to assign an ID number to each user, i.e. employee ID number Fig 5-1 User Expiration: Users not verified for a long period (60 days by default) become expired. Expired users will be displayed in Pending Delete User nodes in the window User Management - User Profile Management (Figure 5-2) Configure the system information for: Days of alarm record keeping Days of verification record keeping Days of operation log keeping Days of His-Changed Photo keeping Expired time of each type of data can be configured, and the system default time is 60 days. Click the [Clear] button to clear this default number in the window System Settings - Database Management. Fig 5-2 11

See [System related] interface (Figure 5-3) Enable remote password authentication: By checking this option, this provides the system administrator for StoneLock access to the terminal for remote operation (i.e.: remote open, remote close, emergency locking, emergency unlocking, etc.). Time Calibration: Click on the [timing] button to sync the current time on all connected units. Hourly calibrating: Check and save this option when the SLN is running, the system will automatically calibrate the time on the attached StoneLock Pro units. Fig 5-3 Automatic Logout: By checking this option, you can set a time interval to automatically log the Admin/Operator out of the system when it is idle for a specified amount of time. See [Alarm related] Interface (Figure 5-4) Enable Voice Alarm: Check this option to will turn on voice prompts when events happen. Times: Choose the drop down menu to select number of times the alarm sounds when a corresponding event occurs. Note: If the number of alarm times is not selected, the alarm plays in an infinite loop. Note: Double-clicking color will enable the user to color code various alarm events for quick reference in the Real Time Record Management screen under Device Settings. Fig 5-4 12

6 OPERATION LOG See Interface (Figure 6-1) Click the drop down in the Operator field to select the Operator. Click the drop down in the Start Date to choose the start date. Click the drop down in the End Date to choose the end date. In the Operation field, type keyword(s) to search events (optional). Click the [Search] button; the system will search the selected operator s entire activity log. The log information includes: time of event, the operation, the operator, and the server name. Fig 6-1 13

7 DATABASE MANAGEMENT See Interface (Figure 7-1) 1) Data Cleanup Click the [Clear] button to delete any expired records based on the set number of days in the Data Related fields under System Configuration. Note: Expired data should be cleared periodically to maintain optimal data storage. 2) Database Backup Click the [Browse] button to specify the storage directory of the database backup files. Fig 7-1 Click the [Backup] button, database backup files labeled with current system time will be generated immediately and stored in the specified path. 3) Database Restore Click the [Browse] button to select a backup database file from specified directory. Click the [Restore] button to restore the database immediately. Note: Restore will overwrite the existing data with the data in the backup file chosen. 14

8 DEVICE SETTINGS Click the menu Device Settings, a menu bar will appear. (Figure 8-1) 9 DEVICE MANAGEMENT Fig 8-1 See Device Information tab (Figure 9-1) Creating a New Area: Select [New] in the Area Window. The new Area Window will appear (Figure 9-2) Use the Superior drop down menu to select to define where the new area will be created. Name the new area by typing in the Area Name Field. Fig 9-1 Click [OK], the new added area will be displayed in the area list. The system supports multilevel areas. Repeat the above steps to create sub-areas within each main area. Click [Edit] to edit area names and to move the area under other areas. The hierarchy can also be rearranged by dragging and dropping. Click [Delete] to delete any highlighted area. Click [Search] to find any unassigned devices that are connected to SLN. Fig 9-2 15

Fig 9-2 Setting up a new device within an area: Select an area and click the [New] button on the device window to add a device. In the Device Information tab you may: name the device confirm the device is in the correct area select operate mode Secondary identity verification (i.e. a card or code) IP address of the connected unit Choose Hold-Open Time for the controlled door Door Contact Over-Time Click the [Save] button Super Password: The Super Password can only be used to open the door in particular situations by the S-Admin. Check the validate Super Password option, the StoneLock Pro unit will validate the super password (or else invalidate). A Super Password can contain from 4-8 digits. Operation Modes: 1:1 mode: When this mode is set, users are required to present a card or input an employee number first at a StoneLock Pro unit, then accept face recognition authentication. 1:N mode: When this mode is set, users can use face only at a StoneLock Pro unit. Mixed mode: Caution: Mixed mode should only be established via the SLN. Don t say we didn t warn you! When Mixed mode is selected, the network administrator can allow select individual users to be authenticated with face only. All other users default to card plus face. (Refer to 2.18 to learn how to set a user to Mixed mode) Note: In Mixed mode, a maximum of 200 users can be registered with face-only on a single StoneLock Pro device. All others users must be card plus face in this same device. Card verification: Users directly swipe authorized IC \ ID card for authentication. 16

Auxiliary: Empty: Allows no assisted verification in specified operating mode. This will default the device to is face only. Card Verification: Allow cards verification in specified operating mode. ID Verification: Allow employee ID# verification in specified operating mode. Card Verification/ID Verification: Allows both cards verification and employee ID# verification in specified operating mode. Device IP: Device IP is set as the actual IP address of StoneLock device. It connects with its corresponding devices when SLN is successfully connected via network. 1 There is a bug in the setup, which allows a non-card-registered S-Admins to establish Mixed Mode and thereby fatally lock everyone out of all advanced functions (the only fix for this is to reset the unit with SLN software). Until we get this bug corrected we recommend only Mixed Mode from an SLN. Yes, it happened to us. Yes, StoneLock is very secure. Note: To identify the corresponding devices ID, a Super Admin must authenticate themselves at a terminal, go the Network, click OK, scroll down to IP settings, click OK and the IP address is shown. To change the IP address click OK and enter the number using the arrow keys will allow you to navigate from field to field, click OK, Esc, Esc. Device permissions: Configure the open permission for StoneLock device Allow: Unauthorized users are allowed to open the door after successfully being verified by the StoneLock access device. Refuse: Unauthorized users are not allowed to open the door after successfully being verified by the StoneLock Pro unit. 17

immediately send abducting alarm signal to SLN and display it onto Device Settings /Real- Time Record Management window when the user enter abducting password, making sure that SLN can receive distress calls the first time. Door Contact: When this option is selected, a StoneLock Pro unit will monitor the door contact state. When an error condition is detected (e.g.: illegal open or a door contact timeout), the system can immediately send alarm Information and display it onto Device Settings /Real-Time Record Management window. Fig 9-3 Hardware Arming: When this option is selected, the system will trigger an alarm when any abnormal treatment of a StoneLock Pro unit is detected (such as striking, shaking, or otherwise manhandling the unit). See Device Status tab (Figure 9-3) Display Real-time Record: When this option is selected, user verification records can be viewed on the window Device settings/ Real-Time Records Management verified by the StoneLock Pro unit. Save Failed Record: When this option is selected, failures recorded by a StoneLock Pro unit will be recorded in the database. Sub-Door Interlock: When this option is selected, the two sub-doors of the device will exert a linkage interlock function such that sub-door 2 cannot be opened while the door contact of sub-door 1 stays open, even with verification. Only when the door contact of two subdoors are in their closed state can the system open either one of them again. Remote loading of User: When this option is selected, a remote user can be verified via swipe card or the keypad entering of an employee ID at the StoneLock Pro unit, providing the user information has already established. User Synchronization: When this option is selected, user s information can be synchronously updated to SLN when SLN is run and this user has been registered or reregistered by a StoneLock Pro unit. Abducting alarm: When this option is selected, the system can Remote Confirm For door 1: When this option is selected, the StoneLock Pro unit in subdoor 1 sends an OPEN request remotely to the SLN after it has successfully verified an authorized user. The SLN will present a Remote Open Request window to display the door s real-time video and verification details. After the administrator s confirmation, the door finally opens. Remote Confirm For door 2: When this option is selected, the StoneLock Pro unit in subdoor 2 sends an OPEN request remotely to the SLN after it has successfully verified an authorized user. The SLN will present a Remote Open Request window to display the door s real-time video and verification details. After the administrator s confirmation, the door finally opens. 18

See Sub Door Information Tab page (Figure 9-4) Remote Open Door: You can open the selected sub-door of StoneLock Pro unit remotely. Remote Close Door: You can close the selected sub-door of StoneLock Pro unit remotely. Emergency Unlocking: When this option is selected, the selected Sub-Door of this device stays open until the administrator selects Normalization (same function as in Device Maintenance). Emergency Locking: When selected, the selected Sub-Door of this device stays closed until the administrator selects Normalization (same function as Device Maintenance). Recover normal: When selected, the door of this device reverts back to normal operation from emergency locking or emergency unlocking. This function is the same as Normalization in Device Maintenance. 2.10 DEVICE MAINTENANCE See Device Maintenance tab (Figure 2.10-1) Fig 9-4 Upgrade: Click the [Browse] button to select the upgrade file path and then select the device expected to be updated in the device list, click the [Upgrade] button to upgrade the device. Reboot: reboot the specified StoneLock Pro unit remotely. Format: When selected, all the data in the specified device will be formatted to factory settings. Warning: All profiles in the device will be cleared. Emergency Unlocking: When selected, the door of this device stays open until the administrator chooses Normalization (same function as in Sub-Door Information tab). Emergency Locking: When selected, the door of this device stays closed until the administrator chooses Normalization (same function as in Sub-Door Information tab). Normalization: When selected, the door of this device reverts back to normal operation from emergency locking or emergency unlocking (same function as in Sub-Door Information tab). Fig 2.10-1 19

2.11 DATA SYNCHRONIZATION See Interface (Figure 2.11-1) Automatic Synchronization: Check this option to configure the automatic sync cycle and time to automatically push and pull information to all networked StoneLock devices. Click [Save]. Fig 2.11-1 Manual Synchronization: Choose the device from the Device list on the right, the content you want to synchronize, and then select [Synchronize]. The chosen device and its content will be made available within the SLN. Time group: This function allows synchronizing information for a designated time group for a specified StoneLock Pro unit. Holiday: Synchronizes holiday time for a specified StoneLock Pro unit. User Data: Synchronizes user data for a specified StoneLock Pro unit. Permissions: Synchronizes permissions for a specified StoneLock Pro unit. Verification Records: Downloads all verification records from the specified StoneLock Pro units to the SLN. Alarm Records: Downloads all alarm records from the specified StoneLock Pro unit to the SLN. Note: The system can only perform the data synchronization functions when the chosen StoneLock Pro units are online. 20

2.12 ELECTRONIC MAP See Interface (Figure 2.12-1) Import a facility map/floor plan from a folder on your computer. These files must be saved as jpg or bmp files. This function enables you to easily mark where all of the StoneLock Pro units are on your map, as well as a quick reference of activity that has occurred at each device. Import Map: Right-click the mouse on the map interface and choose [Edit] from the pop-up menu. On the right, choose [Select map] to browse for a saved map. Click the open button, map appears on screen. (Figure 2.12-2) Fig 2.12-1 Mark Position: Once a map has been imported, left click on the [Mark Position] to add a unit, and then left click on the map to position the unit. Once placed, you can left click and drag the unit anywhere on the map. To add subsequent units, repeat the above steps. To name each unit, right click on a placed unit; choose Edit Device from the pop up menu, and click the drop down. Choose the specified device name. Click [OK]. Repeat this for each device within the map. Note: Only named devices will be visible after exiting the map editor. To delete each added device, right click on the placed device. Choose Delete Device from the pop up menu. Repeat this for each device within the map. Fig 2.12-2 Exit Map Editor: Scroll down to the [Exit Map Editor] and click to leave edit mode. To view map in full screen: Right click and choose Full Screen from the pop-up menu 21

2.13 REAL-TIME RECORDS MANAGEMENT See Interface (Figure 2-30) Real-time Records Display: the window of Real-time record management displays verification details about the user immediately after they are successfully verified by a connected StoneLock Pro unit. Information provided includes; name, ID, department, event, device accessed, time, and a realtime photo of the event. This window contains the last 100 records. Fig 2.13-1 Note: Real-Time records can only be displayed when you check Display Real-time Record from the Device Settings - Device Management - Device Status window. For detailed operations, see 2.3.1 Device Manager. Click the [Filter Setting] button to pop up Filter Settings window (Figure 2-31). You can only filter real-time records on any device checked. Click [OK]. Fig 2.13-2 22

Click the [Subtitle Settings] button to open the dialog box shown in Figure 2.13-3. User can specify the font and color of the window caption. Click the [Mute] button to mute the system s current event alarm. Remote Assistance: The system does not display Remote Assistance window by default, unless when StoneLock device sends a request to open the door remotely. Once the administrator confirms the request, the window will be hidden. Fig 2.13-1 2.14 USER MANAGEMENT Click the [User Management] menu to pop up the menu bar as shown in Figure 2.14-1. Fig 2.14-1 23

2.15 TIME GROUP MANAGEMENT See Time Group Management Interface (Figure 2.15-1) New: Click the [New] button to create a new time group. Set its name, start and end dates and times. Choose time, day, month, year filters as desired. Click [Save] button. Take time group 1 in Figure 2.15-1 for example, different detecting method bring different valid period of permission as follows: Note: All filters actions are driven from the chosen start date. Check Year: The valid period is valid 2011 to end of 2012. Check Month: The valid period is from start date in May to June in any year. Check Day: The valid period is from 16th to 27th in any month and year. Check Time: The valid period is 08:00:00-18:00:00 in any day. Fig 2.15-1 Check Week: If Monday is checked, the valid period is Monday in any month and year. Simultaneous check year and month: The valid period is from May, 2011 to June, 2012. Simultaneous check year, month and day: The valid period is from May 16, 2011 to June 27, 2012. Simultaneous check month and day: The valid period is from May 16, to June 27 in any year. Simultaneous check year and day: The valid period is from 16th to 27th in every month from 2011 to 2012. 24

2.16 HOLIDAY MANAGEMENT See Holiday Management Interface (Figure 2.16-1) New: Click the [New] button to add a new holiday, set its name, start and end time. Click [Save]. Note: All users cannot open the door on the holiday, unless the Access allowed on Holiday option is checked from the User Management Permission Management window. For detailed operation see 2.17 Permission Managment. Fig 2.16-1 2.17 PERMISSION MANAGEMENT See Permission Management Interface (Figure 2.17-1) New: Click the [New] button to add a new permission. Set its name. Select the unified device set time group to show established time groups. Choose the area, select the device, its output(s) and the time group(s). Click [Save]. To apply Permissions to all connected devices in a specified area, the user can check the Select all feature. To allow access on Holidays: Check the box Access allowed on Holiday for the Permission. Click [Save]. To delete a permission, click the [Delete] button. Fig 2.17-1 25

2.18 USER MANAGEMENT See User Management Interface (Figure 2.18-1) [Add]: Click the [Add] button to add a new Department.. In the Edit Department menu, shown in Figure 2.18-2, under Superior drop down, select the location of the department. In Department field provide a name. Click [OK]. Fig 2.18-1 To add a New user: Select the user s department; then click the [New User] button to add a new user. Enter Job ID, Name, Select gender from drop down, Card ID (optional), Import Photograph (optional) using the [Import] button, Select user type from the drop down, go the Regional to select areas from the drop down, and select the available permissions for the selected area (refer to 2.17 for Permissions). Select Expiry date and use drop down to establish the expiration date. Click [Save] button., Read card: When a valid reader connects with SLN, its information can be read into card ID by clicking [read card] button. After saving, this card is tied to the user s profile, allowing the user to verify their identity by swiping the card at StoneLock device. Loss Report: If a user loses a card, click on the [loss report] button to report the loss. The card will no longer allow access. Attempted use of the card at a StoneLock device will immediately srecord alarm information with the scene photo and will be displayed in the Device Settings/Real-time Record Management. Fig 2.18-2 Download: Click this button to download all added or modified user information from connected/online devices to the SLN. Any user which has not been assigned to an area and a permission will appear in the unassigned user list and will not be synchronized with any StoneLock device. Synchronize: Click this button to synchronize the user information for all users that have been assigned to an area and permission profile. WARNING! Any users that have not been assigned during the previous step will be deleted from the StoneLock devices. User Type: Set user s type in the SLN. Common User is the default. It is denoted as user on the StoneLock device. 26

Super Administrator: Users set as super administrator can operate all settings on the StoneLock device. It is denoted as S-Admin on the StoneLock device. Registry Device: Click this button to open a dialogue box and choose the device you wish to use for Remote Enrollment. Select the device and click [OK]. Common Administrator: Users set as common administrator can perform new user enrollment of a user and query records. It is denoted as Admin on the StoneLock device. Remote Registry: Click this button to remotely register a user using the Registry device selected. You must select a Registry device as mentioned above to remotely enroll a user. Common User: Users Set as common user can only be verified at a StoneLock device. It is noted as User on the StoneLock device. Expiry Date: This function becomes active by checking the box and setting a date with the Drop down. Users are allowed to be verified at a StoneLock device until the date set on the expiry date field. If access is attempted after the expiration date, an alarm event with a scene photo will be sent to the SLN and displayed on the Device settings/real-time record management window. Blacklist: Check this option to put a user into the blacklist. The user will never be verified at a StoneLock device, if the blacklisted user attempts access, alarm information with a scene photo will be sent to the SLN and displayed on the window of Device settings/real-time record management. Unassigned users: Any new user that is enrolled or downloaded from a device will be defaulted as an unassigned user. To assign an unassigned user, select the unassigned new user on the left, enter Job/Employee ID, Name, Select gender from drop down, Card ID (optional), Import Photograph (optional) using the [Import] button, Select user type from the drop down, go the Regional to select areas from the drop down, and select the available permissions for the selected area (refer to 2.4.3 for permissions). Select Expiry date and use drop down to establish the expiration date. Click [Save] button. Deleting user: Users that are on a device and have been pulled in via the [Synchronize] button will be placed in this category since they are unassigned. Mixed Mode: When this box is checked, this function enables a user to gain access at a StoneLock device using either a [Card + Face] or Face only. Note: There is a limit of up to 200 users that can be set to mixed mode in the SLN and the device must also be set to Mixed Mode (Refer to 2.3.1 to learn more). 27

2.19 BATCH MODIFY USER See Interface (Figure 2.19-1) Perform a search by first selecting a condition using the dropdown and typing a keyword search in the content box. The keyword must be an exact match and is case sensitive. The only condition that does not require keyword is the all users selection. Fig 2.19-1 Choose the the user from the search list you want to modify, then click [Batch Modify] button to bring out the Batch Modify window (Figure 2-39). Use the dropdowns to modify its department, belongs area and permissions. You can also batch modify, expiry time, mixed mode or blacklist. Once your modifications are set, click [Batch Modify] for the changes to take effect within the SLN. You need to then use the [Synchronize] button in User management/user management to apply these changes. Fig 2.19-2 28

2.20 GROUP MANAGEMENT See Interface (Figure 2-20-1) Fig 2.20-1 New: Click the [New] button to open the Add Group window (Figure 2.20-2). Configure its name, defined device(s); click [OK]. Fig 2.20-2 Two sub user groups are added and displayed by default. Sub-users groups cannot be deleted, as show in (Figure 2.20-3). Fig 2.20-3 29

Add User: Select a sub user group, click the [Add User] button to open the Select User window (Figure 2.20-4). Perform a search by first selecting a condition using the dropdown and typing a keyword search in the content box. The keyword must be an exact match and is case sensitive. The only condition that does not require keyword is the all users selection. Choose up to SIX users by checking the box next to the user from the search list, then click [OK]. Fig 2.20-4 To move a user up or down in a list, click on the user in the list and then click the [Upward] and [Downward] buttons respectively. To delete a user in a list, click on the user in the list and then click the [Delete] button. Click [Save] to save all modifications to the group. Fig 2.20-5 Less No. of: Set the at least turnout in sub user group. Take the number in Figure 2.20-5 for example; any two of users in the sub use group that appear will do. Orderly: If you check this option, users in sub user group must be verified orderly, otherwise combine verification is invalid. You can reorder it by clicking [up], [down] buttons. Note: Two sub user groups by default can be set in a combination, and each contain a maximum of six users. When checking recognizing orderly, the first group will be verified before the second one. Fig 2.20-6 30

2.21 DATA MANAGEMENT Click [Data Management] to open the menu bar (Figure 2.21-1). Fig 2.21-1 2.22 VERIFICATION RECORDS MANAGEMENT See Interface (Figure 2.22-1) Click the [Search] button, the system by default will search the current day s verification records of all devices and users. The search can be expanded by setting the start and end dates/times of the search. You can filter the search by choosing the device, the department, name, id number, card number, type of verification and the event associated with that verification/denial.. Note: All records are downloaded automatically or can be manually downloaded by an administrator from a StoneLock device to the SLN. Refer to 2.11-1 for Data Synchronization. Fig 2.22-1 2.23 ALARM RECORDS MANAGEMENT See Interface (Figure 2.23-1) Click the [Search] button, the system by default will search the current day s alarm records of all devices. The search can be expanded by setting the start and end dates/times of the search. You can filter the search by choosing the device, the alarm type, id number and card number. Note: All records are downloaded automatically or can be manually downloaded by an administrator from a StoneLock device to the SLN. (Refer to 2.11-1 for Data Synchronization). Fig 2.23-1 31

Please contact StoneLock with any comments or questions regarding the material in this User Guide. Visit our website at: www.stonelock.com

StoneLock, Inc. 1-800-970-6168 support@stonelock.com www.stonelock.com Rev 1.2017