background image

 

P a g e

 | 1 

 

Copyright©2020 ZKTECO CO., LTD.    All rights reserved.

 

 

ZKTeco Industrial Park, No. 26, 188 Industrial Road,   

Tangxia Town, Dongguan, China. 

Phone : +86 769 - 82109991 

 

Fax : +86 755 - 89602394 

www.zkteco.com 

 

Copyright © 2020 ZKTECO CO., LTD. All Rights Reserved. 

Summary of Contents for C2-260/inBio2-260

Page 1: ...the instructions carefully before operation Follow these instructions to ensure that the product is functioning properly The images shown in this manual are for illustrative purposes only For further...

Page 2: ...amiliar with the design and that the said personnel have received thorough training in operating and maintaining the machine unit equipment It is further essential for the safe operation of the machin...

Page 3: ...of the machine unit equipment and such amendments shall not give any right to claim any compensation or damages under any circumstances ZKTeco shall in no way be responsible i in case the machine unit...

Page 4: ...ent research and development of biometric verification procedures and the productization of biometric verification SDK which was initially widely applied in PC security and identity authentication fie...

Page 5: ...ntion Description Button or key names for devices For example press OK Window names menu items data table and field names are inside square brackets For example pop up the New User window Multi level...

Page 6: ...L PANEL CONNECTION TERMINALS 14 3 4 CONNECTION WITH DOOR SENSORS EXIT SWITCHES AUXILIARY INPUT DEVICES AND RS485 EXTENSION 3 5 COMMUNICATION 15 CONNECTION WITH RS485 READERS 17 3 6 RELAY OUTPUT CONNEC...

Page 7: ...pped with insulating tapes to prevent any damage to the equipment by accidental contact of the exposed wires 6 Repair Do not attempt to have an unauthorized repair of the equipment Disassembly or deta...

Page 8: ...is recommended not to plug unplug connection terminals frequently when the system is powered on Be sure to unplug the connection terminals before starting any relevant welding job 3 Do not detach or r...

Page 9: ...mmended to make communications more stable 13 To protect the access control system against the self induced electromotive force generated by an electronic lock at the instant of switching off on it is...

Page 10: ...current protection for the power supply to card readers Instant over voltage protection for all input output ports Instant over voltage protection for communication ports Product Technical Parameters...

Page 11: ...C2 260 inBio2 260 Access Control Panel User Manual P a g e 10 Copyright 2020 ZKTECO CO LTD All rights reserved Indicator Diagram...

Page 12: ...reserved 3 Installation and Connection Installation Procedure 3 1 The following describes the rail installation process 1 Fix the guide rail on the wall 2 Fix the device to the guide rail The followin...

Page 13: ...connecting the wires otherwise it may cause severe damage to the equipment The access control wires must be separated according to heavy and light current the control panel wires electronic lock wires...

Page 14: ...unicate through TCP IP and RS485 network The communication wires should be kept away from high voltage wires as far as possible and should be neither routed in parallel with nor bundled with power wir...

Page 15: ...le is connected to the PC through this port The RS485 Reader port can be connected externally to RS485 reader Note Only inBio2 260 supports to connect the FR1200 readers 4 Restore factory setting Put...

Page 16: ...er if a door is not closed within a specified period after it is opened the door control panel will also raise the alarm It is recommended to select two core wires with a gauge over 0 22 mm2 A door se...

Page 17: ...t is recommended to use two core wires with a gauge over 0 3mm2 as the connection wire between an exit switch and the Control panel 3 Auxiliary input The control panel provides one auxiliary input int...

Page 18: ...ts four readers which can be connected in the two door two way mode RS485 reader connection Set the RS485 address device number of the reader by DIP switch or other ways RS485 address Control Panel 1...

Page 19: ...xiliary outputs The relays for auxiliary outputs may connect to monitors alarms doorbells etc Auxiliary outputs are set through the relevant access control software Please refer to the respective soft...

Page 20: ...ccess Control Panel User Manual P a g e 19 Copyright 2020 ZKTECO CO LTD All rights reserved Wiring diagram of lock connection NC Lock NO Lock Lock Lock Diode Diode Power Input Enlarged diagram of lock...

Page 21: ...ically They should be protected in casing pipes like plastic or iron water pipes to be selected according to the technical requirements of the indoor distribution Metal hoses are applicable to ceiling...

Page 22: ...vice to search for access controllers in the network and directly add from the search result RS485 Communication 4 3 1 Internationally accepted RVVSP shielded twisted pair wires should be used for com...

Page 23: ...bers 1 4 of the DIP switch are set as the device number for RS485 communication The code is binary and the numbering starts from left to right When the switch is set to ON position it indicates 1 ON w...

Page 24: ...ded browser and enter the IP address and server port in the address bar The IP address is http 127 0 0 1 8098 by default If the software is not installed in your server you may enter the IP address an...

Page 25: ...e default password for the new users is 111111 The username is not case insensitive but the password is case sensitive Device 5 4 The Device Settings adds an access device and then sets the communicat...

Page 26: ...cess Device Search Device to open the Search interface 2 Click Search and it will prompt Searching 3 After the search is complete the list and the total number of access controllers will be displayed...

Page 27: ...dding If this option is selected after adding a device the system will clear all data in the device except the event logs If the device is a push firmware device the following windows will pop up afte...

Page 28: ...in the Device when Adding If this option is selected then after adding a device the system will clear all data in the device except the event logs If you add the device merely for demonstration or tes...

Page 29: ...rface Enter the new IP address and other parameters Note Configure the gateway and IP address in the same network segment Note Some PUSH devices support SSL To use this function select the HTTPS port...

Page 30: ...details You can view all the auxiliary inputs in the Auxiliary Input interface Note Please select this method when adding DM10 and AUX485 5 4 3 Device Operation For the communication between the syste...

Page 31: ...device click Delete and click OK to delete the device For further details and settings of the above parameters see Device Some details cannot be edited The device Name should be unique and must not b...

Page 32: ...etween the device and the system is interrupted or the device fails the device may automatically appear in disabled status After adjusting the local network or device click Enable to reconnect the dev...

Page 33: ...click Choose File to select the firmware upgrade file named emfw cfg provided by the Access software and click OK to start upgrading Note The user shall not upgrade firmware without authorization Cont...

Page 34: ...Saving Time According to the requirements of different regions set the Daylight Saving Time rules Modify the fingerprint identification threshold Ensure that the access controller supports fingerprin...

Page 35: ...peated entries will not be shown twice When the network status is healthy and the communication between the system and device is normal the system will acquire the transactions of the device in real t...

Page 36: ...vice Modify IP Address Select a device and click Modify IP address to open the modification interface It will obtain a real time network gateway and subnet mask from the device Failed to do so you can...

Page 37: ...vice Users can view the threshold devices list More than one device can be changed by using the Batch operation function Add a user and a card 5 5 1 Click Personnel Management Personnel New Fields are...

Page 38: ...tain up to 6 digits It cannot be the same with other user s password and the duress password Card number The max length is 10 and it should not be repeated Personal Photo The picture preview function...

Page 39: ...the settings of IE browser as per the following a In Internet Explorer click Tools Internet Options Security Credible Sites add http localhost to the credible sites then restart the Internet Explorer...

Page 40: ...l P a g e 39 Copyright 2020 ZKTECO CO LTD All rights reserved e The system supports access from the Live20R fingerprint device and the fake fingerprint prevention function 2 To set the Access Control...

Page 41: ...Device Operation Role It will define the authority level in the device of the user Disabled Temporarily disables the personnel s access level Set Valid Time Doors can be set to open only within speci...

Page 42: ...and exit the personal details will be displayed in the added list Access Control Settings 5 6 The Access Control system can set the access levels of the registered users namely allowing some personnel...

Page 43: ...atus Door opened Relay opened Online status Door opened and the current firmware does not support the current action on the device Door opened alarm Relay closed Door opened alarm Relay opened Door op...

Page 44: ...zones can be opened at any time To close a door select Disable Intraday Passage Mode Time Zone first to avoid enabling other normal open time zones to open the door and then select Remote Closing Note...

Page 45: ...p up in a real time monitoring interface Right click that card number and a menu will pop out Click Issue card to person to assign that card to one person Multiple selections You can select several do...

Page 46: ...eal time 3 Auxiliary Output Here you can perform Remote open Remote Close Remote Normally Open functions Reports 5 8 Since the data quantity of access control event control is large you can view the s...

Page 47: ...ights reserved Media File You can view or download the photos and videos Clear All Data This function is used to clear all the transactions Click Clear All Data In the appearing pop up click OK to rem...

Page 48: ...privacy issues concerning your use of our product please directly contact your dealer Our other law enforcement fingerprint devices or development tools can capture the original images of citizen s fi...

Page 49: ...uantities Component Name Hazardous Toxic Substance Element Lead Pb Mercury Hg Cadmiu m Cd Hexavalent chromium Cr6 Polybrominate d Biphenyls PBB Polybrominated Diphenyl Ethers PBDE Chip Resistor Chip C...

Page 50: ...020 ZKTECO CO LTD All rights reserved ZKTeco Industrial Park No 26 188 Industrial Road Tangxia Town Dongguan China Phone 86 769 82109991 Fax 86 755 89602394 www zkteco com Copyright 2020 ZKTECO CO LTD...

Reviews: