Prosonic PRO-698 Скачать руководство пользователя страница 7

 

 

Access

 

 

 

Control

 

 

 

Instruction

 

 

 

Manual

 

 

 

4.3 Download Data  

Download user data back up to Pen drive, Prevent loss the data , and to facilitate data upload in 

future. 

4.4 Upload Data 

 

Uploaded data to more than device via Pen drive, avoid double entry operation.  

5. Download Log 

Operating steps:  

Step 1: Insert Pen drive into the device;  

Step 2: Enter the main menu, click "Report";  

Step 3: Click" Logs", Prompt "Encrypt Data?", Press "OK" or "NO", Prompt 

"processing...", Download the original logs to the Pen drive, Pulling out Pen 

drive after prompt "Download success"   

Step 4: Generate the original record as GLogData.txt file in the Pen drive, when 

the “Encrypt Data” select “NO”, Check logs via TEXT or access control 

software;  

“Encrypt Data” select “Yes”, Check logs only via access control software, For 

details, refer to the software manual.  

6. Settings 

Press “Settings” in main menu

, Settings including Device setting, Rec. Rule, 

Network and Lock Ctrl.  

6.1. Device Settings  

In “Settings” menu, Click “Device” enter the device settings. 

 

firmware  

Device No.: 

 

Device number, 1-255 optional  

Language: 

 

Switchable language  

Admins: 

 

It can set up to 10  

Warning Tone: 

  Verify the success of voice prompts  

Volume: 

 

1-6 optional  

Time: 

 

Enter the time setting, click YYYY-MM-DD to set the 

date, Click hh:mm:ss to enter the time setting, Click  

“          ”after the setting is completed,  

 

Save automatically and exit  

Set Alarm: 

 

Up to 24 sets of rings can be set a day, Ringing the 

number of 0-60 optional  

Verify Mode: 

 

“F” is fingerprint, “P” is password, “C” is ID/IC card 

 

Reset Default: 

  Restore all the setting information to the state when the 

device is shipped from the factory, But it will not clear 

the user registration information and attendance logs.  

Delete All Log: 

  Delete all attendance logs, but not delete user 

information, the password is 8282.  

Delete All Data: 

  Delete all registered users and attendance logs, please 

use with caution, the password is 8282.  

Upgrade: 

 

Firmware into the Pen drive root directory, Pen drive 

inserted in the machine, Click here to upgrade the  

Содержание PRO-698

Страница 1: ...User Manual PRO 698 Fingerprint Time Attendance and Access Control PRO 698 Fingerprint Time Attendence and Access Control...

Страница 2: ...ccess Control Instruction Manual 1 Access Control Manual 1 Notice for use 1 1 Access Control wiring diagram 1 2 Access Control External Power wiring diagram recommendation General Power wiring diagram...

Страница 3: ...ation height is confirmed the installation positioning template is affixed to the installation location According to the positioning template identifies drilling and fix it The red mark is the drillin...

Страница 4: ...the number Click the button to enter the main menu Click the button to enter the quick search operation Click the button on menu interface you can return to the initial interface quickly Click the bu...

Страница 5: ...Step 4 View records through the access control software to download the original records of equipment for data analysis 3 2 The initial interface and main menu After the device is connected to the po...

Страница 6: ...the initial interface 4 1 2 Password registration Click Password According to the hint enters the employee number and name Enter the same password twice to complete the registration then back to init...

Страница 7: ...rk and Lock Ctrl 6 1 Device Settings In Settings menu Click Device enter the device settings firmware Device No Device number 1 255 optional Language Switchable language Admins It can set up to 10 War...

Страница 8: ...mpted 6 2 2 Punch interval min In the set time repeated punching no logs generated 6 3 Network Click Network in Settings menu enter the network settings If you need to open real time monitoring To set...

Страница 9: ...ings the screen as follows For example Allow the door to open at 04 00 11 00 03 00 06 00 11 00 18 00 By analogy you can define multiple time periods as needed Note the system default time1 open all da...

Страница 10: ...ally used in banks and other important places 6 4 6 Turn Off Alarm After the alarm is triggered eliminate the wrong operation and stop the alarm by clicking this item 6 4 7 Tamper Alert Tamper alert h...

Страница 11: ...iew user registration admin registration fingerprints registration ID IC card registration password registration attendance logs and other information 7 3 Dev Info Information such as manufacturer dat...

Отзывы: