With years of experience in the industrialization of biometric verifications, ZKTeco was officially established in 2007 and now has been one of the globally leading enterprises in the biometric verification industry owning various patents and being selected as the National High-tech Enterprise for 6 consecutive years.
Document Conventions Conventions used in this manual are listed below: GUI Conventions For Software Convention Description Bold font Used to identify software interface names e.g. OK, Confirm, Cancel. Multi-level menus are separated by these brackets. For example, File > Create > >...
Page 7
Set the Communication Address ............................ 18 Add Device on the Software ............................19 Add Personnel on the Software and Card Registration ..................20 Set Access Levels .................................. 21 Set Access by Levels ................................24 Synchronize All Data to Devices ............................. 26 Real-Time Monitoring .................................
-20°C~65°C. As an advanced terminal, ProRF is equipped with 2 relays of lock, alarm control, SRB for enhanced security, and auxiliary smoke detection input for fire security linkage. Its large storage capacity of up to 100,000 users/cards and 600,000 transactions is perfectly applicable to mega-size enterprise.
Wiring Description 1.3.1 Power Connection Recommended power supply 12V ± 10%, at least 3000mA. To share the device’s power with other devices, use a power supply with higher current ratings. 1.3.2 Ethernet Connection 1) The device connects to the computer over an Ethernet through a switch.
2) The device directly connects to the computer. Lock Relay Connection 1.3.3 The system supports Normally Opened Lock and Normally Closed Lock. Take Normally Closed Lock as an example below: Notes: The system supports Normally Opened Lock and Normally Closed Lock. The NO LOCK (normally...
opened at power on) is connected with ‘NO’ and ‘COM’ terminals, and the NC LOCK (normally closed at power on) is connected with ‘NC’ and ‘COM’ terminals. When electrical lock is connected to the Access Control System, you must add one FR107 diode in parallel (equipped in the package) to prevent the self-inductance EMF from affecting the system.
1.3.6 RS232 Connection (Optional) 1.3.7 Wiegand Output Connection After a successful verification, the device will send Wiegand signals to the SRB access controller, then the SRB will output relay signals to trigger the relay to unlock the door. 1.3.8 Wiegand Input Connection...
Connect to Webserver Login Webserver A user can open the web application to set the relevant parameters of the device. Open a browser to enter the address to log in to the WebServer, the address is https:// Serial IP Address. For example: https://192.168.1.201.
Forgot Password You can use the magnetic tamper switch to restore factory settings. First remove the back plate of the device and power on the device. Put the magnet on the tamper switch three times after you hear the tamper alarm sound for 30 seconds but no more than 60 seconds. Then the device will short beeps for a while, indicating that it is restoring.
Function Name Description Displays the device's name, serial number, MCU version, MAC address, platform and Device Info manufacturer information. Device Capacity Displays the current device's user storage, password, card storage and T&A records. Firmware Info Displays the firmware version and other version information of the device. Device Setup 2.4.1 Communication Settings...
The default DNS address is 0.0.0.0. It can be modified according to network availability. Note: After the IP address of the device is changed successfully, you need to log out of the currently WebServer and log in again to the IP address you just changed to connect to the device. For WebServer login details, please refer to Login WebServer.
2.4.3 System Settings Click System on the WebServer. It helps to set related system parameters to optimize the accessibility of the device. Function Name Description Communication Set the communication protocol of the device. Currently only supports PUSH Protocol Protocol. Set the device as an access control terminal or attendance terminal. Note: After changing the device type, the device will delete all the data and restart, Device Type and some functions will be adjusted accordingly.
2.4.5 Wiegand Setup Click Wiegand Setup on the WebServer. It is used to set the Wiegand input and output parameters.
Page 21
Function Name Description Wiegand Format Its value can be 26 bits, 34 bits, 36 bits, 37 bits and 50 bits. Wiegand Bits The number of bits of the Wiegand data. The value of the pulse width sent by Wiegand is 100 microseconds by default, Pulse Width(us) which can be adjusted within the range of 20 to 400 microseconds.
Device Management 2.5.1 Device Management Click Device Management on the WebServer. Function Name Description Clear Choose whether to change the super administrator into a normal user. Administrator Delete Access To delete the access control data from the device. Control Delete All Data To delete the information and attendance logs/access records of all registered users.
settings to the default factory settings (this function does not clear registered user data, but the access levels of the users need to be re-synchronized through the software). Note: After reset, the device will reboot, the password of Webserver is restored to default, and the IP of the device is restored to the original 192.168.1.201, please refer to 2.4.1 Communication Settings to modify the IP.
2.5.3 Change Password Click Change Password on the WebServer. In this interface, you can change the password of WebServer. 2.5.4 Operation Log Click Operation Log on the WebServer. All the user’s operation records on the device or WebServer are saved. Users can search and download these logs by time.
Connect to ZKBio CVSecurity Software Set the Communication Address Click COMM. in the WebServer to set the IP address and gateway of the device. Note: The IP address should be able to communicate with the ZKBio CVSecurity server, preferably in the same network segment with the server address) In the WebServer, click Cloud Server Setup to set the server address and server port.
Add Device on the Software Add the device by searching. The process is as follows: Click Access > Device > Search, to open the Search interface in the software. Click Search, and it will prompt [Searching……]. After searching, the list and total number of access controllers will be displayed. Click Add in operation column, a new window will pop-up.
OK. device. Select the device which you just added on the software, and click the Then you can swipe your card on the ProRF, the card number will be displayed automatically in the box.
Select the access level of the user, and set the related permissions. (For the setting of access levels, please refer to 3.4 Set Access Levels) Click OK to save the user. Set Access Levels Click Access > Access Rule > Access Levels > New to add access level. Fill in the level name, select the time zone and area and click OK.
Page 29
Click the icon behind the access level you want to add door. Select the door which is corresponding to the device, click the icon and click OK.
Page 30
After the process is complete, the door will be displayed in the right of the interface.
Set Access by Levels Click Access > Access Rule > Access Levels > Set Access by Levels. Click the icon behind the access level you want to add personnel. Select the personnel who need to be assigned to the access level, click the icon and click OK.
Page 32
After the process is complete, the personnel will be displayed in the right of the interface.
Note: The user can also set access by person or by department. For other access control settings, please refer the ZKBio CVSecurity User Manual. Synchronize All Data to Devices Click Access > Device, check the device you want to operate and click Control > Synchronize All Data to Devices.
Page 34
After the process is complete, the users who registered cards can verify on the ProRF.
Real-Time Monitoring Click Access > Real-Time Monitoring, the user can view the status of the door and the real-time events of the device. Note: For other specific operations, please refer the ZKBio CVSecurity User Manual.
Manufacturer: ZKTECO CO., LTD. Address: No.32, Industrial Road, Tangxia Town, Dongguan City, Guangdong Province, China 523728 Hereby, ZKTECO CO., LTD. declares that this device is in compliance with the essential requirements and other relevant provisions of Directive 2014/53/EU. Importers: ZKTECO EUROPE SL Address: Carretera de Fuencarral, 44 Edificio 1, Planta 2, 28108 Alcobendas, Madrid- Spain A copy of the declaration of conformity can be obtained with this user manual;...
FCC Warning This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. NOTE: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.
Eco-friendly Operation The product's "eco-friendly operational period" refers to the time during which this product will not discharge any toxic or hazardous substances when used in accordance with the prerequisites in this manual. The eco-friendly operational period specified for this product does not include batteries or other components that are easily worn down and must be periodically replaced.
Need help?
Do you have a question about the ProRF and is the answer not in the manual?
Questions and answers