Kedacom KSCA120 Series User Manual

Access control system
Hide thumbs Also See for KSCA120 Series:

Advertisement

Quick Links

KEDACOM
User Manual for Access Control System
V1.1 (May, 2020)

Advertisement

Table of Contents
loading

Summary of Contents for Kedacom KSCA120 Series

  • Page 1 KEDACOM User Manual for Access Control System V1.1 (May, 2020)
  • Page 2 Access Control System User Manual Trademark Kedacom™ and are trademarks of Suzhou Keda Technology Co., Ltd. in China and various other countries. All other trademarks mentioned in this document are the property of their respective holders. Suzhou Keda Technology Co., Ltd.
  • Page 3 Access Control System User Manual Target Audience Administrators and Operators of Video Surveillance Products Document Version V1.1 Applicable Models KSCA120 series Related Document Quick Start Guide Convention Icon Convention Notes and warnings: necessary supplements to operations Menu, e.g. Drag to Zoom >...
  • Page 4: Table Of Contents

    Access Control System User Manual Contents Product Brief ............................5 Device Touch Screen ..........................7 Startup ............................. 7 2.1.1 Local Activation ......................... 7 2.1.2 Stand-By Interface ........................8 Login ..............................8 Personnel Management ........................9 2.3.1 Personnel Registration ......................10 2.3.2 Personnel Search ........................
  • Page 5 Access Control System User Manual Camera ............................61 3.4.1 Image ............................61 3.4.2 OSD ............................65 3.4.3 Video ............................66 3.4.4 Audio ............................68 Event .............................. 69 3.5.1 Alarm Input ..........................69 3.5.2 Alarm Output ........................... 71 3.5.3 Abnormality Linkage ........................ 72 Storage ............................
  • Page 6: Product Brief

    User Manual 1. Product Brief KSCA120 series are a kind of face recognition access control and attendance system. It supports multiple opening modes, including face/card, face & card, and remote help. It manages access electric lock and checks on work attendance through face recognition. Usually, it is applied to communities, financial places, enterprises, governments, schools, public security bureaus, judiciary authorities and buildings where people access needs to be controlled.
  • Page 7 Access Control System User Manual  Binocular UHD wide-angle lens, face recognition distance 0.3~2m, suitable for height range 1.2 to 1.9m;  Deep-learning algorithm, support 2,0000-face archive and 100,000-card archive, fast recognition speed and high accuracy rate;  Live face detection, prevent photo-fraud and video-fraud effectively; ...
  • Page 8: Device Touch Screen

    Access Control System User Manual 2. Device Touch Screen 2.1 Startup 2.1.1 Local Activation Electrify and start the device. If the device is not activated before use, it will come to the activation interface automatically. Picture 2-1 Activation prompt Operation steps are as follows: ...
  • Page 9: Stand-By Interface

    Access Control System User Manual Note:  To ensure the safety of device on internet, it is strongly recommended that you set a strong password composed of at least 2 kinds of the following, numbers, upper-case letters, lower-case letters or specific symbols with length of 8 to 16 characters.
  • Page 10: Personnel Management

    Access Control System User Manual Picture 2-4 Menu  Login Long-press on the touch screen for over 3 seconds and the login interface will pop Enter the password set during activation; Click “OK” to enter menu interface.  Exit Tap the “<” key at top left corner of the screen and tap “OK” to exit login and return to stand-by interface.
  • Page 11: Personnel Registration

    Access Control System User Manual Picture 2-5 Personnel management 2.3.1 Personnel Registration Tap Menu>Personnel>Personnel Registration, and add new user and register information such as name, ID type, Identity ID and etc. Tap Menu>Personnel>Personnel Registration, face toward the camera with optimum distance of 1 m, tap the button at the bottom to capture a snapshot. Picture 2-6 Personnel registration Tap “OK”...
  • Page 12: Personnel Search

    Access Control System User Manual Picture 2-7 Register information Tap “Finish” to complete personnel registration; Note: If the identity ID of the same ID type already exists when saving the information, it will pop up “the identity ID already exists, please confirm if you would like to save.”...
  • Page 13 Access Control System User Manual Picture 2-8 Personnel search Input name, identity ID and/or card number and tap “Search” to enter the information interface. Picture 2-9 Search result The searched personnel will show on the list; select any one and tap to view the details. Tap “Filter”...
  • Page 14: Access Control Configuration

    Access Control System User Manual 2.4 Access Control Configuration Tap Menu>Access Control to configure default verification mode, temporary authorization mode, smoke sensor, door magnetism, closing delay, opening exception detection time, alarm threshold and tamper alarm. Tap “Save” to finish configuration. Picture 2-10 Access control ...
  • Page 15: Search Events

    Access Control System User Manual  Opening Exception Detection Time: Configure the alarm threshold for door opening timeout, the range being 0~3600 s, the default being 30 s; when the door opening exceeds the threshold, an alarm will be triggered. ...
  • Page 16: Network

    Access Control System User Manual stop time; tap “Search” to view the events filtered by name, identity ID, event type and trigger time. Picture 2-12 Search result 2.6 Network Tap Menu>Network and configure Ethernet, WiFi and Peripheral. Picture 2-13 Network 2.6.1 Ethernet Tap Menu>Network>Ethernet and configure Ethernet parameters.
  • Page 17: Wifi

    Access Control System User Manual Picture 2-14 Ethernet Select “Mode”. If selecting “Static”, input “IP Address”, “Subnet Mask” and “Default Gateway” manually; tap “Save” to finish configuration. 2.6.2 WiFi Tap Menu>Network>WiFi and configure WiFi parameters. WiFi mode options include “Disable” and “Station Mode”. Picture 2-15 WiFi ...
  • Page 18: Peripheral

    Access Control System User Manual Picture 2-19 Station mode Tap “Refresh” and the nearby AP hotspots will show on the list below. Select a hotspot from the list and enter the “WiFi Setting” interface; select mode according to actual request, including “Static” and “Dynamic”, the latter being the default and if selecting the former, configure IP address manually;...
  • Page 19: User

    Access Control System User Manual Picture 2-20 Peripheral Select a peripheral device, options including “Access Control Host”, “Entrance Control Module”, “Elevator Control Module”, “Card Reader” and “No external equipment”. Tap “Save” to finish. 2.7 User Tap Menu>User and edit the password for “admin” user. Picture 2-21 User Tap user to select and enter the “Administrator”...
  • Page 20: Storage

    Access Control System User Manual Picture 2-22 Change password Note:  To ensure the safety of device on internet, it is strongly recommended that you set a strong password composed of at least 2 kinds of the following, numbers, upper-case letters, lower-case letters or specific symbols with length of 8 to 16 characters.
  • Page 21 Access Control System User Manual Picture 2-23 Storage  Storage Status Tap “Storage Status” to enter “Storage Status” interface and view “Capacity Status” and “External Storage”. Picture 2-24 Storage status  Capacity Status: This table shows the “Max Quantity” and “Used Quantity” of “User”, “Card”...
  • Page 22: Function Test

    Access Control System User Manual Tap to select the storage strategy, options including “Cover” and “Stop when full”. If selecting “Cover”, when the storage is full, the device will cover the earliest data automatically; if selecting “Stop when full”, when the storage is full, the device will stop storing data.
  • Page 23: Card Reader Test

    Access Control System User Manual Picture 2-26 Audio test Tap “Start Test” and talk to the device. If you can hear what you said in 5 s normally, the audio function of the device is OK. 2.9.2 Card Reader Test Tap Menu>Function Test>Card Reader Test and test if the card reader works normally.
  • Page 24: Network Test

    Access Control System User Manual Picture 2-28 IO test  Door Magnetic Button Test: Confirm the device is connected to the doo lock correctly. Tap “Start Test” and if the door lock is normal, the door megnetic button triggers normally. ...
  • Page 25: System

    Access Control System User Manual Picture 2-29 Network test  In “IP Address”, input the IP address of the destination device and tap “Ping” to display the result of accessing the destination IP address. It is used to test if the network between the device and the destination device is connected.
  • Page 26: Device Information

    Access Control System User Manual Picture 2-30 System 2.10.1 Device Information Tap Menu>System>Device Information and view information such as “Device Model”, “Device SN”, “Hardware Version”, “Software Version”, “ISP Version”, “Ethernet MAC Address”, “WiFi MAC Address” and etc. Picture 2-31 Device information 2.10.2 Device Log Tap Menu>>System>Device Log and configure device log.
  • Page 27 Access Control System User Manual Picture 2-32 Device log  Enable Log Records Tap “Enable Log Records” and the device will record user operations, alarm messages, system tasks and system exception logs.  Search Logs Tap “Search Logs” to enter the log searching interface. Picture 2-33 Search logs...
  • Page 28: Settings

    Access Control System User Manual Tap “Log Type” and select a type, options including “All”, “User Operation”, “Alarm”, “System Task” and “System Exception”; select “Log Time”, options including “Today”, “Yesterday”, “This Week”, “Last Week”, “This Month”, “Last Month”, “All” and “Custom”.
  • Page 29 Access Control System User Manual Picture 2-35 Basic information  Voice Volume Tap “Voice Volume” and drag the slide bar to adjust device volume, the range being 0~100 and the default being 90.  Text Prompt Tap “Text Prompt” to enter the text prompt interface; select the prompt text displayed on the main interface when the device recognizes a user, options including “Name”, “ID”, “Name &...
  • Page 30: Time

    Access Control System User Manual Tap “Auto Blackout Duration” to enable or disable the function. If enabled, you can configure the auto blackout time, the range being 10~300 s. If no operation is done to the device in the configured duration, the device will go in stand-by mode. If disabled, the device will not black out automatically.
  • Page 31: Face

    Access Control System User Manual  Start Time: Tap “Start Time” to enter time setting interface and configure DST start time manually, the default being 2:00 on the first Sunday of April; tap “Save” to validate setting.  Stop Time: Tap “Stop Time” to enter time setting interface and configure DST stop time manually, the default being 2:00 on the last Sunday of October;...
  • Page 32: Temperature Screening

    Access Control System User Manual than the preset one, the face recognition will not pass, and face matching or face inputting will fail.  Face Matching Threshold (1:N): Configure the threshold score for face matching by 1:N, the range being 0~100 points. The higher the preset value is, the lower the false recognition rate will be but the higher the rejection rate will be.
  • Page 33 Access Control System User Manual Picture 2-38 Temperature screening Note: Temperature screening is only available on fever screening models.  Temp. Screening: Tap the button to enable or disable the function of temperature screening.  Temp. Threshold: Configure the temperature threshold for triggering an alarm, the range being 0.0°...
  • Page 34: Advanced

    Access Control System User Manual Picture 2-39 Temperature threshold  Thermal View Display: Tap the button to show or hide thermal view on the screen.  Room Temp.: The range is -20.0° C~50.0° C, and the default is 20.0° C. Only when the room temperature is extremely hot or cold, you need to configure this parameter;...
  • Page 35 Access Control System User Manual Tap “Restore to Default Setting” and and it will pop up a prompt dialogue box. Tap “OK” and the device will reboot automatically and restore to default setting.  Restore Factory Setting Tap “Restore Factory Setting” and it will pop up a prompt dialogue box. Tap “OK” and the device will reboot automatically and restore to factory default.
  • Page 36 Access Control System User Manual Tap “Save” to validate setting.
  • Page 37: Web Client

     Activate through IPCSearch Get IPCSearch from our website and install it according to the prompts (address: https://www.kedacom.com/cn/softtools/index.jhtml). After finishing installation, run IPCsearch and the system will search the cameras in LAN and display the list as shown below.
  • Page 38 Access Control System User Manual Picture 3-1 IPCSearch Note: Alias is subject to the actual search result. Select the device to be activated, right click and select “Activate”. On the popup interface, configure admin user password and email for claiming password. Click “Activate”...
  • Page 39: Configure Network Parameters

    Access Control System User Manual Picture 3-3 Activate through browser Configure admin user password and email for claiming password. Click “Activate” to activate the device.  Activate through device Start the device and it will prompt activation automatically. Operate according to the prompts to finish activation.
  • Page 40: Login And Log Out Of The Web Client

    Access Control System User Manual Select a camera whose network parameters should be modified. Click “Modify Params” or right click the mouse. Modify parameters and fill admin user name (admin) and the password set when activating the device. Picture 3-4 Modify Parameter Click “OK”...
  • Page 41 Access Control System User Manual After activating the camera and modifying its network parameters, the camera will reboot automatically. After rebooting, select either of the following methods to login:  Select the device from IPCSearch and click “Login” or double-click the line which the device is in to enter the web client.
  • Page 42 Access Control System User Manual Note: After login to the web client successfully for the first time, it will pop up the quick setting interface. Click “Quick Setting” to perform simple settings to the camera. User can go to Settings > Local Setting and unselect “Enable Configuration Guide”, or select “No Prompt”...
  • Page 43: Reset Password

    Access Control System User Manual Click the icon at the top right corner of the interface to view the help file. 3.1.4 Reset Password If user enters a wrong username or password for 6 times (configurable), the camera IP will be locked up for 10 minutes (configurable), during which user cannot login to this camera.
  • Page 44: Main Interface

    Access Control System User Manual 3.1.5 Main Interface On the main interface of the client, you can view live video, playback video records, manage snapshots and configure settings.  Live View: preview camera live video and adjust parameters;  Playback: search, playback and download video records by timeline or record types; ...
  • Page 45 Access Control System User Manual  Brightness: Drag Brightness slide bar to adjust image brightness by request. The higher the value is, the brighter the image will be.  Contrast: Drag Contrast slide bar to adjust image contrast by request. The higher the value is, the clearer contrast between the dark and the bright of the image there will be.
  • Page 46 Access Control System User Manual Note: Go to Settings > Camera > Video and enable “Triple-Stream”. Then “Third Stream” option will display on the live view window.  Toolbar Icon Function Play/ Pause, click this button to play or pause a viewing. Stop, click this button to stop live view.
  • Page 47: Playback

    Access Control System User Manual To enable this function, go to Settings > Local Setting > Play, select “Display Status Info” and click “Save”. Video freeze, click this button and the image will freeze at the last frame before clicking. Click again to recover image. During video freeze, the PTZ function is disabled.
  • Page 48: Snapshot

    Access Control System User Manual Click the "Play" button on the interface to playback the video recording. During the playback, user can perform operations such as clipping, accelerating and downloading the video recording; Put the cursor of the mouse on the timeline to show the time of the video. Double-click or press the left button of the mouse and drag the timeline to the left or right to skip playing.
  • Page 49: Local Setting

    Access Control System User Manual Picture 3-15 Snapshot Snapshot search and download steps: Select required picture type(s) on the left checkboxes; Select duration of snapshots from "Time". If selecting "Custom", specify the Start Time and End Time; Click "Search" and the search result will show on the right list, from which you can see picture ID and snapshot time;...
  • Page 50 Access Control System User Manual Picture 3-16 Local setting  Play  Protocol: Select the stream output protocol, options including UDP and TCP, default being TCP; UDP is applicable when the request for image quality is not high and the network is unstable. ...
  • Page 51 Access Control System User Manual is, the more obvious the noise reduction will be. Usually it’s unnecessary to enable this option as it will cause streaking on moving objects.  Enable Vertical Synchronization: When there is image tearing, enable vertical synchronization to improve image quality.
  • Page 52: Network

    Access Control System User Manual path. Click “Opendir” to open the folder where the recordings are saved currently.  Camera Snapshot Save Path: Configure the local save path for snapshots downloaded from "Snapshot" interface. Click the button of "View" to customize the save path.
  • Page 53 Access Control System User Manual Picture 3-17 LAN  IP Address Configuration IP Version: Select IPV4. Mode: Select Static or DHCP mode. When selecting static mode, you need to configure IP Address, Subnet Mask and Default Gateway manually; when selecting DHCP mode, the system obtains IP address automatically;...
  • Page 54: Access Protocol

    Access Control System User Manual 3.3.1.2 Port On the interface of Port, configure HTTP Port, HTTPS Port, RTSP Port and Multicast Port. When logging in through network, configure corresponding ports by request. Picture 3-18 Port  HTTP Port: Hypertext Transport Protocol Port. When login through browser, you need to add a port number behind camera IP address.
  • Page 55 Access Control System User Manual Picture 3-19 VSIP Select a method from the dropdown list of VMS Method, "IP Address" or "Domain". If selecting "IP Address", input VMS address in "VMS Address (IPv4)"; if selecting "Domain", input VMS domain name in "Registered VMS Domain";...
  • Page 56 Access Control System User Manual 3.3.2.2 ONVIF Picture 3-20 ONVIF Basic: ONVIF protocol is enabled by default. User can register camera to ONVIF-supported VMS, VMS port being 80 by default. The camera will generate "Server Address (URL)" automatically. Authentication: Set authentication method for ONVIF login. When selecting "N/A", user can login freely;...
  • Page 57: Other Protocol

    Access Control System User Manual Picture 3-21 GB28181 Select “Enable” and select the “Registered VMS” (Registered VMS 1 or Registered VMS 2). The camera supports registered to 2 different VMS; Enter Network Access ID, VMS ID, VMS Port Number, User Name/ Password and Video Encoding Channel ID, which are all provided by VMS;...
  • Page 58 Access Control System User Manual names at different server websites and then visit the device by domain names directly even if the IP address has been modified. Picture 3-22 DDNS Select "Enable"; Select DDNS Server type; Input the domain login information according to the selected DDNS server;...
  • Page 59 3.3.3.4 K-SNMP Picture 3-25 K-SNMP The camera supports KEDACOM private network management protocol. Configuration steps are as follows: Input "Network Management Server IP Address" and "Device Location"; Configure "CPU Utilization Threshold", "Memory Utilization Threshold" and "Packet Loss Rate Threshold". The default values are all 100, ranging 1 ~ 100;...
  • Page 60 Access Control System User Manual 3.3.3.5 Note: QoS function needs support of network transmission device such as a router. Picture 3-26 QoS QoS stands for Quality of Service, which can solve the problem of network delay and network congestion efficiently. Configuration steps are as follows: Select “Enable”...
  • Page 61 Access Control System User Manual to the Ethernet device, thus the firewall module on the gateway or router starts to open this port to other PCs on the internet. By UPnP protocol, it's able to set up mapping relation between private network and the internet.
  • Page 62: Camera

    Access Control System User Manual Input SMTP server IP address and port number, which ranges 1 ~ 65535, 25 by default; Input "Sender" and "Sender Address"; optionally select "Server Authentication" and input correct user name and password; Input email topic; optionally select "Attachment" and choose attached file format, then the email sent will attach the relative file;...
  • Page 63 Access Control System User Manual 3.4.1.1 Image Adjustment The image adjustment in this part is the same as that on the Live View interface, which can be referred to in the chapter of Image Adjustment. 3.4.1.2 Exposure Picture 3-30 Exposure ...
  • Page 64 Access Control System User Manual "Manual", you can select Shutter Level from the dropdown list below. Then the value of shutter will remain.  Anti-flicker: When there are floating cross stripes on the image, select the correct anti-flicker frequency (50Hz or 60Hz or natural light) to solve the problem.
  • Page 65 Access Control System User Manual 3.4.1.4 Night Cut Picture 3-32 Night Cut Select night cut mode from the dropdown list up to request. Explanation of different modes is as follows:  Day: Under "Day" mode, the image keeps colored all the time. ...
  • Page 66: Osd

    Access Control System User Manual 3.4.2 Picture 3-33 OSD On OSD interface, you can configure OSD text on the surveillance window. Configuration steps are as follows: Select options in “Content” according to requirements and preview the effect in the window below, options including "Time", "Label", "Alarm", "PTZ" and "OSD"; Click “Advanced”...
  • Page 67: Video

    Access Control System User Manual Click "Save" to validate setting. Note:  A number, an English letter or a punctuation mark occupies one character.  You can load “Default Font”, "Large Font", "Medium Font" or "Small Font". Then edit content and position according to the above steps. 3.4.3 Video Video parameters include Encoding Format, ROI, Privacy Mask and Video Info Overlay.
  • Page 68 Access Control System User Manual  Bit Rate Type: Options include CBR and VBR, by which you can control stream rate. CBR is fixed bit rate while VBR means the bit rate is adaptive within the upper limit. CBR transfers stream by average bitrate with high speed compressing, but there may be mosaic on the images;...
  • Page 69: Audio

    Access Control System User Manual meanwhile it will also occupy the CPU resource of more devices. Suggest using the default level. 3.4.3.2 Video Info Overlay Picture 3-35 Video info overlay  GPS: Select GPS to show camera coordinates.  Basic Intelligent Feature: After configuring intelligent functions (on the interface of Settings >...
  • Page 70: Event

    Access Control System User Manual  Encoding Format: Select audio encoding format from the dropdown list, by default G.711 a (PCMA).  Echo Cancellation: Select the checkbox to cancel noises in the input audio and thus improve the audio quality. 3.4.4.2 Audio Decoding Picture 3-37 Audio decoding...
  • Page 71 Access Control System User Manual Picture 3-38 Alarm Input Operation steps are as follows: Confirm that the alarm input device is always enabled or always disabled and has been rightly connected with the alarm input port of camera; Go to Settings > Event > Alarm Input and select “Enable”; Select a number from the dropdown list of Alarm Input ID (corresponding to the connected input ID);...
  • Page 72: Alarm Output

    Access Control System User Manual Enter alarm name. If the alarm input device is always disabled, which means the circuit is usually open, user must select “Always Disabled” from the dropdown list of Alarm Type. If the alarm input device is always enabled, which means the circuit is usually loop, user must select “Always Enabled”...
  • Page 73: Abnormality Linkage

    Access Control System User Manual 3.5.3 Abnormality Linkage Picture 3-40 Abnormality Linkage Configure the alarm linkage method for abnormal events. Operation steps are as follows: Select "Enable" and select an option from the dropdown list of Abnormality Type; Note:  Disk Full: when the disk storage is insufficient.
  • Page 74: Recording

    Access Control System User Manual Picture 3-41 Storage Management  Disk Full Strategy: Configure the video recording strategy when there is insufficient storage space. Overwrite earlier data: when there is insufficient storage space, overwrite the oldest videos; Stop: when there is insufficient storage space, stop video recording automatically.
  • Page 75 Access Control System User Manual Go to Settings > Storage > Storage Management to configure disk full strategy and format the storage card recognized by the camera. If formatting is successful, the Status will turn “Normal” which means the storage card can be used normally; Go to Settings >...
  • Page 76: Snapshot

    Access Control System User Manual Picture 3-42 Scheduled Recording 3.6.3 Snapshot After configuring snapshot parameters, the camera will capture images automatically. Go to Settings > Storage > Storage Management to configure disk full strategy and format the storage card recognized by the camera. If formatting is successful, the Status will turn “Normal”...
  • Page 77 Access Control System User Manual  Set durations: select a day and put the mouse on a point of the timeline, left-click and drag the mouse to the right to draw a bright blue color bar, on the top of which shows the start time and end time;...
  • Page 78: System

    Access Control System User Manual Picture 3-43 Scheduled Snapshot System 3.7.1 Device Info Device info includes device name, device model, device serial No. and etc. User can customize device name and select “Set as OSD text”. Device name doesn’t support specific symbols.
  • Page 79: User Security

    Access Control System User Manual Picture 3-44 Device info 3.7.2 User Security 3.7.2.1 User On "User" interface, you can add or delete user, edit username and password, configure user authorizations and etc. Picture 3-45 User  Anonymous Access: After select the checkbox, you will be able to select "Anonymous Login"...
  • Page 80 Access Control System User Manual  Some settings take effect after rebooting the camera, which requires user with both the authorizations of configuration and reboot.  Delete user: Select user and click “Delete” to delete the user.  Modify user: Select user and click “Modify” to modify on the popup interface.
  • Page 81: Time

    Access Control System User Manual  Delete Black/ White List: Select IP address from the black/ white list and click “Delete” to delete the IP address. Click “Delete All” to clear all the added IP addresses. 3.7.2.4 Security Service Picture 3-48 Security Service ...
  • Page 82: Serial Port

    Access Control System User Manual Picture 3-49 Time Setting  Time Setting: Set Device timezone and device time. Click "Manual Setting", select timezone and set time on the popup interface. You can select "Synchronize time with PC" and click "Save" to validate setting.
  • Page 83: Log

    Access Control System User Manual Picture 3-50 Serial port Note: It’s suggested not to edit the parameters of RS485 port in case the PTZ will be out of control. 3.7.5 On Log interface, you can select "Enable Log Record" to search, view and download logs. Picture 3-51 Log Operation steps are as follows: On the dropdown list of Log Type, select a log type, otherwise the default is "Search All";...
  • Page 84: System Maintenance

    Access Control System User Manual 3.7.6 System Maintenance Picture 3-52 System maintenance On the interface of "System Maintenance", you can reboot and upgrade cameras or perform other maintenance over the device.  Reboot: Click "Reboot" to reboot the camera.  Auto Maintenance: Select "Enable", and configure Maintenance Cycle and Maintenance Time.
  • Page 85: Appendix: Personnel Import Through Web Client

    Note: The pictures in the folder will display in the sequence of file names. After inputting all the personnel information, the status bar will show the number of processed entries and indicate starting compression; click “Compression” and there will be a file named “kedacom.zip” generated under directory “compression”.
  • Page 86 Access Control System User Manual 10) Comparing with “map.txt” file, find the corresponding columns in “config.csv” and modify the parameters. Edit “config.csv” and “map.txt” files and make sure the relationship and personnel information are all correct. 11) Rename the file “config.csv” as “user.csv”; after confirmation, compress the files of “images”, “user.csv” and “map.txt”...

Table of Contents