Fingerprint Access Control Terminal
101
Configuration Logs Searching
Purpose:
The Configuration Log files of the Access Control System can be searched by time ,including One-card
Configuration, Access Control Configuration, Downloading Permission and System Configuration.
Steps:
1.
Open the Log Search page.
2.
Select the radio button of Configuration Logs.
3.
Select the Operation Type of log files.
4.
Click the icon to specify the start time and end time.
5.
Click
Search
. The matched log files will display on the list.
You can check the operation time, log type and other information of the logs.
Note:
Please narrow the search condition if there are too many log files.
Control Logs Searching
Purpose:
The Control Log files of the Access Control System can be searched by time ,including Access Control and
Log Search.
Steps:
1.
Open the Log Search page.
2.
Select the radio button of Control Logs.
3.
Select the Operation Type of log files.
4.
Click the icon to specify the start time and end time.
5.
Click
Search
. The matched log files will display on the list.
You can check the operation time, log type and other information of the logs.
Note:
Please narrow the search condition if there are too many log files.
Searching Configuration Log
Searching One-card Configuration Logs
Purpose:
The One-card Configuration Log files include departments, persons and cards log files. One-card
Configuration of the Access Control System can be operated as adding ,modifying and deleting logs.
Steps: