A0U571B KelNet Lock - User Guide
3
Contents
1 INTRODUCTION ................................................................................................................... 5
2 PRODUCT DESCRIPTION ................................................................................................... 6
2.1 Input Unit ........................................................................................................................................ 6
2.2 Digital display ................................................................................................................................. 6
2.3 Sound ............................................................................................................................................. 7
2.4 Power supply .................................................................................................................................. 8
3 USING THE LOCK ................................................................................................................ 9
3.1 User categories .............................................................................................................................. 9
3.2 Identification settings ..................................................................................................................... 9
3.3 Opening procedure (Class B lock) ............................................................................................... 10
3.4 Opening procedure (Class C or D lock) ....................................................................................... 12
3.5 Closing procedure (Class B lock)................................................................................................. 15
3.6 Closing procedure (Class C or D lock) ........................................................................................ 16
3.7 Emergency blocking ..................................................................................................................... 17
3.8 CIT anti-passback procedure ....................................................................................................... 17
3.9 Wrong code blocking rules ........................................................................................................... 17
3.10 Messages ..................................................................................................................................... 18
3.11 Mandatory changing of the opening code when using the lock for the first time ......................... 19
3.12 Changing the opening code by the user himself .......................................................................... 20
4 INPUT UNIT CONFIGURATION ......................................................................................... 22
4.1 Basic Input Unit configuration ...................................................................................................... 22
4.2 Advanced configuration (Technician menu) ................................................................................ 23
5 SECURE UNIT CONFIGURATION ..................................................................................... 24
5.1 Access to configuration menu ...................................................................................................... 24
5.2 Menus list ..................................................................................................................................... 26
5.3 User's parameters configuration .................................................................................................. 28
5.4 Schedules configuration ............................................................................................................... 29
5.5 Delays configuration .................................................................................................................... 30
5.6 Calendar configuration ................................................................................................................. 31
5.7 Identification configuration ........................................................................................................... 32
5.8 Secure Unit configuration ............................................................................................................. 33
5.9 System configuration ................................................................................................................... 37
5.10 Maintenance ................................................................................................................................. 38
5.11 Audit ............................................................................................................................................. 39
6 CHANGING THE CONFIGURATION WITH A USB KEY .................................................... 40
6.1 Introduction .................................................................................................................................. 40
6.2 Writing configuration with a USB key ........................................................................................... 40
6.3 Reading configuration and saving on a USB key ........................................................................ 41
6.4 Writing schedules with a USB key ............................................................................................... 42
6.5 Reading schedules and saving on a USB key ............................................................................. 43
7 FINGERPRINT .................................................................................................................... 44
7.1 Instructions for enrolling fingerprints ............................................................................................ 44
7.2 Enrolment in mode “Code + Fingerprint” ..................................................................................... 44
7.3 Enrolling procedure ...................................................................................................................... 45
7.4 Opening procedure with fingerprint .............................................................................................. 48
7.5 Changing the fingerprint by the user himself ............................................................................... 49
7.6 Deleting a fingerprint by the user himself .................................................................................... 50
7.7 Deleting all fingerprints ................................................................................................................ 51
8 REDUNDANT LOCK SPECIFICITIES ................................................................................. 52
9 FACTORY SETTINGS ......................................................................................................... 53
10 RECYCLING ........................................................................................................................ 54
10.1 Recycling the Secure Unit’s authentication keys ......................................................................... 54
10.2 Recycling the Secure Unit’s address ........................................................................................... 54
10.3 Complete recycling of the Secure Unit ........................................................................................ 55
10.4 Recycling the Input Unit’s authentication keys ............................................................................ 55