background image

 

P a g e

 |  1   

Copyright©2023 ZKTECO CO., LTD.    All rights reserved 

Thank you for choosing our product. Please read the instructions carefully 
before operation. Follow these instructions to ensure that the product is 
functioning properly. The images shown in this manual are for illustrative 
purposes only. 

For further details, please visit our Company’s website 

www.zkteco.com

. 

   

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

User Manual 

PA22 

Date: February 2023 

Doc Version: 1.0 

English 

Summary of Contents for PA22

Page 1: ...structions carefully before operation Follow these instructions to ensure that the product is functioning properly The images shown in this manual are for illustrative purposes only For further detail...

Page 2: ...t It is an essential pre requisite for the satisfactory operation and maintenance that the operating and maintenance personnel are fully familiar with the design and that the said personnel have recei...

Page 3: ...for better operation and safety of the machine unit equipment The said additions or amendments are meant for improvement better operations of the machine unit equipment and such amendments shall not g...

Page 4: ...dependent research and development of biometric verification procedures and the productization of biometric verification SDK which was initially widely applied in PC security and identity authenticati...

Page 5: ...ion Button or key names for devices For example press OK Window names menu items data table and field names are inside square brackets For example pop up the New User window Multi level menus are sepa...

Page 6: ...enu 13 3 User Management 14 3 1 Adding Users 14 3 2 Search User 17 3 3 Deleting User 17 3 4 Edit User 18 3 5 Display Style 18 4 User Role 19 5 Communication Settings 21 5 1 Network Settings 21 5 2 Ser...

Page 7: ...on 43 9 4 Anti passback Setup 44 9 5 Duress Options Settings 45 10 USB Manager 47 10 1 USB Download 47 10 2 USB Upload 48 11 Attendance Search 49 12 Autotest 50 13 System Information 51 14 Troubleshoo...

Page 8: ...w circle at the bullseye position as much as possible Note For best registration or verification results it is recommended to place your palm within 5 90 to 19 69 inches 15 to 50 centimeters of the ne...

Page 9: ...palm verification mode 1 Enter the user ID and press M OK 2 If the user has registered the password and card in addition to his her palm and the verification method is set to Password Card Palm verif...

Page 10: ...rd number in the card induction area with all the card number data that is available on the device The device enters the Card Verification mode when a user put his her card on the induction area 1 Pla...

Page 11: ...authentication method Enter the User ID on the main screen to enter 1 1 card verification mode 1 Enter the user ID and click M OK If the user has registered a password and a palm in addition to his h...

Page 12: ...enter the 1 1 password verification mode 1 Enter the user ID and click M OK If an employee has registered a fingerprint and face in addition to the password the following screen will appear Select the...

Page 13: ...register the required verification information before using the combination verification mode otherwise the verification may fail For example if a user uses Palm Registration but the verification mod...

Page 14: ...ng palm parameter reset and USB upgrade Personalize To customize settings of interface display including user interface voice and bell schedules Data Mgt To delete all relevant data in the device back...

Page 15: ...l registration and can t be modified later 4 The User ID cannot be duplicated If there is a voice prompt about a duplicate User ID then you need to choose another User ID that should be unique Setting...

Page 16: ...m registration page Select the palm to be enrolled Place the palm in the area that can be collected by the palm collector When registering please keep the yellow circle at the bullseye position as muc...

Page 17: ...interface Note The password may contain one to eight digits by default Access Control Role User access control sets the door unlocking rights of each person including the group and the time period tha...

Page 18: ...Choose a user from the list and select Delete to enter its interface Select the user information to be deleted and click M OK Delete Operations Delete User Deletes all the user information deletes th...

Page 19: ...r interface Note The process of editing the user information is the same as adding a new user except that the User ID cannot be modified when editing a user 3 5 Display Style Select Display Style on t...

Page 20: ...lect User Role on the main menu interface 1 Select an item to set a defined role Select the Enable Defined Role option to enable the defined role Select Name and enter the name of the role 2 Select De...

Page 21: ...A22 User Manual P a g e 20 Copyright 2023 ZKTECO CO LTD All rights reserved If no super administrator is registered the device will prompt Please enroll super admin first after selecting the enable ba...

Page 22: ...Comm Settings interface Function Description Function Descriptions IP Address The factory default value is 192 168 1 201 Please set them according to the actual network situation Subnet Mask The fact...

Page 23: ...and it can be connected to the RS485 fingerprint card reader Baud Rate The rate at which the data is communicated with PC there are 4 options of baud rate 115200 default 57600 38400 and 19200 The high...

Page 24: ...elity and establishes a wireless network environment Wi Fi is enabled by default in the device If you don t want to use the Wi Fi network you can toggle the Wi Fi to disable the button Select Wireless...

Page 25: ...ame process to search for the added Wi Fi name Advanced Setting On the Wireless Network interface select Advanced to set the relevant parameters as required Function Description Function Descriptions...

Page 26: ...ttp will be used such as http www XYZ com while XYZ denotes the domain name Disable Domain Name Server Address The IP address of the ADMS server Server Port Port used by the ADMS server Enable Proxy S...

Page 27: ...It consists of 26 bits of binary code The 1st bit is the even parity bit of the 2nd to 13th bits while the 26th bit is the odd parity bit of the 14th to 25th bits The 2nd to 9th bits are the site cod...

Page 28: ...device codes and15th to 20th bits are the site codes and the 21st to 36th bits are the card numbers Wiegand50 ESSSSSSSSSSSSSSSSCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCO It consists of 50 bits of binary code...

Page 29: ...tance within a specified time Pulse Interval us The time interval between pulses ID Type Select the ID types as either User ID or card number 5 7 Network Diagnosis To set the network diagnosis paramet...

Page 30: ...time zone 24 Hour Time The device displays a 24 Hour time format when enabled Date Format Select the date format Daylight Saving Time To enable or disable the function If enabled tap Daylight Saving...

Page 31: ...sable the function or set a valid value between 1 and 9999 Periodic Del of Access Logs When access logs reach their maximum capacity the device automatically deletes a set of old access logs Users may...

Page 32: ...factory state such as communication settings system settings etc Do not clear registered user data Select the Reset option on the System interface Select OK to reset 6 5 USB Upgrade Insert the U disk...

Page 33: ...Communication To avoid being unable to use it when the device is offline you can download the C S software such as ZKBio Access IVS on your computer in advance for offline use SSH SSH is used to ente...

Page 34: ...eference Language It helps to select the language of the device Menu Screen Timeout s When there is no operation and the time exceeds the set value the device automatically goes back to the initial in...

Page 35: ...scription Function Descriptions Voice Prompt Select whether to enable voice prompts during operating and press M OK to enable it Keyboard Prompt Select whether to enable keyboard voice while pressing...

Page 36: ...at the scheduled bell Ring Tone Select a ringtone Internal Bell Delay s Set the replay time of the internal bell Valid values range from 1 to 999 seconds All Bell Schedules Once the bell is scheduled...

Page 37: ...All Data To delete information and access records of all registered users Delete Admin Role To remove administrator privileges Delete Access Control To delete all access data Delete Wallpaper To dele...

Page 38: ...data of the device to the device or a USB drive Select the Backup Data option on the Data Mgt interface 1 Press to select Backup to Device and press M OK 2 Press and M OK to select the local configura...

Page 39: ...rface of the device Backup to USB Disk the operations are similar to those performed to Backup to Device 8 2 Restore Date Restore the data stored on the device or in the USB drive to the device Select...

Page 40: ...al information then press M OK 4 Press to select Start Restore and press M OK And press to select Yes or No and press M OK Note Before you restore data from a USB drive insert the USB drive into the U...

Page 41: ...combo then the verification of those group s members is also required to unlock the door In default settings new users are allocated into the first group with the default group time zone where the ac...

Page 42: ...ve device is a check out record In A record of verification on the slave device is a check in record Auxiliary Input Configuration Sets the door to unlock the time period and auxiliary output type of...

Page 43: ...fore the Start Time such as 23 57 to 23 56 It is the time interval for valid access when the End Time occurs after the Start Time such as 08 00 to 23 59 The door is accessible for the whole day when t...

Page 44: ...select Delete Press M OK to confirm the deletion After deletion this holiday does not display on the All Holidays interface 9 3 Combined Verification Access groups are arranged into different door un...

Page 45: ...oup 9 If the Door unlock combination 4 is set as 03 05 08 00 00 It indicates that the unlock combination 4 consists of only three people The first person is from AC Group 3 the second person is from A...

Page 46: ...heck in freely In Anti passback The user can check in again only if the last record is a check out record otherwise an alarm is raised However the user can check out freely In Out Anti passback In thi...

Page 47: ...rd verification method an alarm signal will be generated otherwise there will be no alarm signal Alarm Delay s Alarm signal will not be transmitted until the alarm delay time is elapsed The value rang...

Page 48: ...ding data from to the USB disk insert the USB disk into the USB slot first Select USB Manager on the main menu interface 10 1 USB Download Select Download on the USB Manager interface Function Descrip...

Page 49: ...rs from the USB disk into thedevice You can choose Upload selected picture or Upload all pictures The images display as screensaver on the device s main interface after upload Wallpaper To upload all...

Page 50: ...tendance Search on the main menu interface and input the User ID The interface is shown below 1 Enter the user ID to be searched and select Confirm OK If you want to search for records of all users se...

Page 51: ...o check whether the screen displays the colors accurately Test Voice To automatically test whether the audio files stored in the device are complete and the voice quality is good Test Keyboard The ter...

Page 52: ...ons Device Capacity Displays the current device s user storage administrators password palm card and access records Device Info Displays the device s name serial number MAC address palm algorithm plat...

Page 53: ...again Invalid time zone is displayed after verification Contact Administrator to check if the user has the privilege to gain access within that time schedule Verification succeeds but the user cannot...

Page 54: ...ng to set the server address and server port Server address Set the IP address as of ZKBio Access IVS server Server port Set the server port as of ZKBio Access IVS The default is 8088 Software Side Lo...

Page 55: ...type Area and Add to Level from each dropdown and click OK to add the device 15 3 Add Personnel on the Software 1 Click Personnel Person New 2 Fill in all the required fields and click OK to register...

Page 56: ...ting to set the Server address and Server port Server Address Set the IP address of the ZKBioSecurity Server Server Port Set the Server port of ZKBioSecurity The default is 8088 In Software Login to Z...

Page 57: ...PA22 User Manual P a g e 56 Copyright 2023 ZKTECO CO LTD All rights reserved 4 Click Add to add the required device...

Page 58: ...23 ZKTECO CO LTD All rights reserved 16 3 Add Personnel on the Software 1 Click Personnel Person New to add new personnel 2 After setting all the parameters click OK Note For other specific operations...

Page 59: ...ader sending a digital signal in bits to the access controller The Wiegand in this diagram follows the SIA access control standard protocol which targets at 26 bit Wiegand card reader with a pulse tim...

Page 60: ...e saved on the device according to the device type you have selected to verify the unique similarity between you and the User ID you have registered You can optionally enter your Name and Code The abo...

Page 61: ...ity risk In such a case you shall take the responsibility for storing the data You shall know that some data cannot be downloaded for sake of data security 6 All the personal information in our produc...

Page 62: ...erational period is 5 years Hazardous or Toxic substances and their quantities Component Name Hazardous Toxic Substance Element Lead Pb Mercury Hg Cadmium Cd Hexavalent Chromium Cr6 Polybrominated Bip...

Page 63: ...t 2023 ZKTECO CO LTD All rights reserved ZKTeco Industrial Park No 32 Industrial Road Tangxia Town Dongguan China Phone 86 769 82109991 Fax 86 755 89602394 www zkteco com Copyright 2023 ZKTECO CO LTD...

Reviews: