Do you have a question about the F7 and is the answer not in the manual?
Questions and answers
Summary of Contents for Zksoftware F7
Page 1
User Manual Version 1.1 Date: March 2012...
Page 2
Table of contents Instructions 1.1 Fingerprint Placement... . .3 1.2 Instruction for Card Swipe ...3 1.3 Precautions ....3 Introduction of device 2.1 Overview of Device Functions .
Page 3
Table of contents...continue 1 User...continue 4.1.4 Fingerprint and Password Enrolment ..9 4.2 Verifying User ....10 4.2.1 1:1(one to one) / 1:N(one to many) ..10 4.2.2 Voice Message .
Page 4
Table of contents...continue 2 Data 6.1.1 Deleteing Transaction Logs ..15 6.1.2 Deleteing all Data ... . 15 6.1.3 Managing User Priviledges ..15 6.1.4 Resetting to Factory Settings .
Page 5
Table of contents...continue 3 Autotest 9.1 Who Should do the Autotest ..20 9.2 Run All Tests at Once ... . 20 9.3 Flash Test .
Page 6
1. Intructions Summary 1.1 Fingerprint Placement Recommended fingers: The index finger, middle finger or the ring finger; the thumb and * Please ensure correct little finger are not recommended (because they are usually clumsy on the fingerprint placement of finger on collection screen).
2. Introduction of Device Summary 2.1 Overview of Device Functions * Different user access As an integrated fingerprint & access control device, our product can be connected modes availbale on the with either an electronic lock or an access controller. This device features simple and unit flexible operations and supports the use of management cards.
Page 8
Summary Bottom view: * Reset button is situated below the unit Reset Button Reset button: Used to restart the device. • Rear View: * USB port is situated on the side of unit Tamper switch Wiring terminal Wiring terminal: Connects with locks and power supply through cables. •...
2.4 Date & Time Summary The terminals displays the date and time at the home screen. Choose the date and time format based on your preference. * Ensure correct time and date Set your time and date: * Ensure correct time and •...
2.8 Restarting and Resetting Terminal Summary If a feature isn’t functioning as it should, try restarting or resetting the terminals 2.8.1 Restarting the Terminal * If unit is not functioning as • Push the On/Off button or “reset button” on the terminal to restart the terminal. If per normal, press the RESET you can’t restart the terminal, or if the problem persists, you might want to reset.
Page 11
3.2 RS232/RS485/Wiegand Port Summary • RS232 – Connection to a computer using RS232 cable. * Set BAUDRATE to use • RS485 Single Connection - Connection to a single computer using RS485 wire. RS232 connection • RS485 Network Connection - Connection to multiple computers using Daisy Chain connection.
4. User Summary 4.1 Enrolling User * Ensure to enrol an admin- The terminals can enroll fingerprint templates, passwords and card information. This istrator on the unit before chapter covers all possible user enrollments in the terminals. Caution: Enrollment of enrolling users supervisor or administrator is important to ensure the terminals data safety.
Page 13
4.2 Verifying User Summary 4.2.1 1:1 (One to One) / 1:N (One to Many) * 1:1 - User need to enter VERIFICATION METHOD WHAT IS IT FOR his ID first before scanning • 1:1 (One to One) You have to identify your User ID before inputting any biometrics fingerprint feature for verification. For example, your user ID is 1008. One to one method re- * 1:N - No need to enter ID...
4.3 Types of Verification Methods Summary The fingerprint terminals offer various verification methods which include fingerprint (FP), User ID (PIN), Password (PW), and RFID (RF). You can configure the terminal to offer multi * Depending on securit verification methods. level, you can use more than one verification setup •...
Summary 5.1.2 Date Format Date format differs based on countries for example in Malaysia the format used is, date month year whereas in America, month comes first. Choose your date format accord- * Ensure correct date & ing to your preference. The default format is dd-mm-yy. time format •...
Summary 5.2.4 Defining Work Codes The fingerprint terminal provides work code feature which allowing user to key in a pre- defined numbers after verification. The work code numbers are predefined in software. The following table is showing examples of work codes. * Customised work codes available Reasons...
Page 17
Summary 5.3.5 Number of Password Users Available in the Terminal (Password User) Users can do verification using PIN password and a combination of fingerprint and pass- word. To find out how many users are using password: * Check number of pass- word / pin users •...
Page 18
5.4 Log Information (Log Opt) Summary A terminal can only retain certain amount of information before the terminal becomes full and stops accepting anymore data . To maintain the performance of a terminal, you can set an alarm to alert you when the data reaches a certain warning level. * System will stop if buffers 5.4.1 Alarm Super Log are full...
7. ACCESS Summary 7.1 Using The Terminal as Door Access * Downloaded user data The terminals can be connected to door access accessories like electromagnetic lock, can be uploaded to other door bolt, exit button, etc to control access to doors. Make sure you understand the units access options offered in the terminal and do necessary configurations for your door * Short message will display...
7.3 User Account Options Summary After a user has been enrolled, you can configure his/her access option settings. • Press Menu > Options > Access Options > User Acc Opts > Input the user ID that you want to set the access option for > Determine the below matter: USER ACC OPTS WHAT YOU SHOULD DO Belong to Group...
7.7 Door Sensor Mode Summary Door sensor mode is to configure the time to alert an internal buzzer if the door is not closing properly. The standard of door locking system includes: * Internal alarm when door is closing properly Normally Closed (NC): An electrical contact that regularly allows electricity to flow •...
Page 22
Summary 7.10.3 Trigger Methods The terminals offer 3 types of alarm trigger method. * 3 trigger methods • Press Menu > Options > Access Options > Duress Options > Choose your method > Y. You can choose one method only.RM TRIGGER METHOD WHAT DOES IT MEAN? 1:1 Trigger Triggering alarm using 1:1 method 1:N Trigger Triggering alarm using 1:N method Password Trigger Triggering alarm using password method...
Page 23
8. Autotest Summary * User need to verify ac- 8.1 Who Should do the Auto Test? cess with more than one method Auto Test page is to diagnose or analyze the conditions in the terminal. There are 6 tests available in the Auto Test page and only the administrator is allowed to perform the test.
Summary 9. TROUBLESHOOTING 9.1 “Unable to Connect” Appears When this message appears, it means that the settings for the terminals and the com- puters are not properly done. Find out which method you are using to connect. Refer to Chapter 3: Connection - Syncing Terminal to further understand the topic. 9.2 “Admin Affi...
9.6 RFID Card Doesn’t Respond Summary Two possibilities for this problem • Have you registered the card to the terminal? The card must be registered to the terminal before the terminal could read the information in the card. Refer to chap- ter 8 User, page 29 for card enrollment.
Page 26
10.6 No Sound Summary A few things could cause this problem: • The terminal voice mode is silent • Perhaps someone has turned off the voice in your terminal or reduced its volume to 0%. Refer to Chapter 5 System to under Voice to rectify. •...
Page 27
Appendix A: F7 Pinout Power In +12V RS 232 Lock 485 + RS 485 485 - AL + Alarm AL - Wiegand Out DATA 0 DATA 1 +5V Output BELL + Bell BELL -...
Need help?
Do you have a question about the F7 and is the answer not in the manual?
Questions and answers