Prorf User Manual v1.0 - Standalone
Prorf User Manual v1.0 - Standalone
Prorf User Manual v1.0 - Standalone
ProRF
Version: 1.0
Date: August 2018
Important Statement
Thank you for choosing our product. Before using this product, please read this user manual carefully to avoid risks
of danger to the users of this product or those nearby and damaging the device. Follow these instructions to
ensure that your product functions properly and completes verifications in a timely manner.
Unless authorized by our company, no group or individual shall take excerpts of or copy all or part of these
The products described in this manual may include software that is copyrighted by our company and its possible
licensors. No one may copy, publish, edit, take excerpts of, decompile, decode, reverse-engineer, rent, transfer,
sublicense, or otherwise infringe upon the software's copyright unless authorized by the copyright holder(s). This is
As this product is regularly updated, we cannot guarantee exact consistency between the actual
product and the written information in this manual. Our company claims no responsibility for any
disputes that arise due to differences between the actual technical parameters and the descriptions in
I
1. Must Know
access control machine with ID card but no screen and no press-key. These access control product series added
with ID card provide a more product choices for system access control solutions. It can be used as a separate
control lock, also can be used as an access controller connecting ID cards, to realize master-slave machine or
anti-passback function. The device can connect with Ethernet over TCP/IP. It can be embedded with Webserver to
management of the terminal over TCP/IP. The device can connect with Ethernet in the following two ways:
TCP/IP
PC
PC
TCP/IP …
TCP/IP
TCP/IP
The default IP address is 192.168.1.201. IP addresses of the server (PC) and the device must be in the same network
segment.
1
2. Access Control Software
Suppose the device has connected with PC well and the access control software has been installed already.
On the desktop, double-click the ZKAccess icon to enter the system. The user name of the super user is
[admin], and the password is [admin], then click [login]. After the first login to the system, please reset the password
The following briefly describes the co-operations between device and software. For details, please refer to
2
2.1 Adding a device
Add Device by manually
1) Click [Device] in the initial interface to pop up the interface as shown below:
Communication Password: Any character, up to a combination of 8 characters (No blank). You need to input this
field only when you add a new device with the communication password. It cannot be modified when you edit the
Note:
You do not need to input this field if the device has no communication password, such as when it is a new factory
3
Device type: Standalone device.
IP Address: Please enter the IP Address of the device, the default IP address is 192.168.1.201.
Auto Synchronizes Device Time: By default it is ticked, namely, it will synchronize device time with server time
each time connecting to the device. If it is not ticked, the user can manually synchronize device time.
Area: Specify areas of devices. After Area Setting, devices (doors) can be filtered by area upon Real-Time Monitoring.
Clear Data in the Device when Adding: If this option is being ticked, after adding device, the system will clear all
data in the device, except the event logs. If you add the device just for demonstration or testing of the system,
After editing, click [OK], and the system will try connecting the current device:
Note:
When you add a new device to the system, the system will clear all user information, time zones, holidays, and
access control levels settings (including access control group, anti-passback, interlock settings, linkage settings, etc.)
from the device, except the events record in the device. Unless the information in the device is unusable, we
recommend you not to delete the device in used, to avoid the loss of information.
3) One PC can connect with multiple devices, and the access control software in PC can manage multiple devices
at the same time. If you want to add devices, please click [Add]. If you want to delete devices, select devices and
click [Delete]. For details, please refer to “ZKAccess3.5 Security System User Manual”.
4
Add Device by Searching Access Controllers
(1) Click [Device Name] > [Search Device], to open the Search interface.
(3) After searching, the list and total number of access controllers will be displayed.
5
2.1.1 Device Settings
Includes that Modify IP Address, Close Auxiliary Output, Disable, Enable, Modify Communication Password,
Synchronize Time, Upgrade Firmware, Get Logs From SD Card, Import Data From USB disk and so on.
For more details, please refer to “ZKAccess3.5 Security System User Manual”.
Personnel No.: By default, the length cannot exceed 9 digits. A number with a length of less than 9 digits will be
preceded with 0 automatically to complete 9 digits. Numbers cannot be duplicated. Click [Verify] to see if it is
6
duplicated or not.
Department: Select from the pull-down menu and click [OK]. If the department was not set previously, you can
Card Number: Assign a card number to the person for access control use. This can be done manually or by using
card issuer.
Alternative Access Levels: Select access levels, start and end dates of access validity time and multi-card opening
personnel groups.
The access control system can set the opening levels of registered users, namely, allowing some personnel to open
some doors by verification during a time period. Access Control System Management primarily includes Access
Control Time Zones, Access Control Holiday, Door Settings, Access Levels, Personnel Access Levels, Real-Time
Anti-passback function.
Wiegand format.
7
Interlock function.
Linkage function.
Real-time monitoring.
For more details, please refer to “ZKAccess3.5 Security System User Manual”.
For the first time to use, after user information and ID cards are registered, user information can be uploaded from
PC to device through . After the registered ID cards are punched on device successfully,
attendance records will be generated in device. These attendance records can be downloaded from device to PC
through .
8
2) Click [Synchronize], the following interface will be shown.
Note:
9
The operation of Synchronize All Data is mainly to delete all data in the device first (except event record). Download
all settings again, please keep the net connection stable and avoid power down situations, etc. If the device is
working normally, please use this function with caution. Execute it in rare user situations to avoid impacting on
Get New Logs: The system only gets the new event entries since the last time event entries were collected and
records them into the database. Repeated Entries will not be rewritten.
Get All Logs: The system will get all of the event entries again. Repeated Entries will not be rewritten.
Clear logs after downloaded: After records are downloaded, the device will automatically delete all the records.
Note:
The device can restore up to 1 million of event entries. When the entries exceed this number, the device will
2) Select users required to download and click the button “Download” to download users into PC.
10
2.4.3 Get Personnel Data From Device
Renew the current information of personnel in the device. The final value will be displayed on the device list.
11
2.5 Monitor in real time
Suppose a user with an ID card has been uploaded to device, when this card is punched on the device, the device
will pass the verification (LED indicator light will turn green and be constant on for 2 seconds) and then generate
an attendance record.
In Access Control Software, click [Access Control] > [Access] > [Real-Time Monitoring] to monitor the statuses,
real-time events of doors and punching on device in real time. If you want to stop monitoring, please click [Stop
Monitoring].
12
www.zkteco.eu
© Copyright 2018. ZKTECO CO., LTD. ZKTeco Logo is a registered trademark of ZKTeco or a related company. All other product and
company names mentioned are used for identification purposes only and may be the trademarks of their respective owners. All
13
specifications are subject to change without notice. All rights reserved.