EasyManua.ls Logo

FingerTec Kadex User Manual

FingerTec Kadex
31 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
support@fingertec.com
w
13-01-01 MON
Kadex
Standard RFID Card Door Access Control &
Time Attendance System
User Guide

Other manuals for FingerTec Kadex

Question and Answer IconNeed help?

Do you have a question about the FingerTec Kadex and is the answer not in the manual?

FingerTec Kadex Specifications

General IconGeneral
BrandFingerTec
ModelKadex
CategoryCard Reader
LanguageEnglish

Summary

1. GETTING STARTED

Terminal Included Accessories

Details the items included in the package: USB Extension, Door Accessories Cable, Screwdriver, RS232/RS485/Wiegand Output Cable, Bolts, TCP/IP Connector, Power Supply Cable, RFID/HID Cards, TCP/IP Cable.

2. BASICS

Security Features

Covers Admin Affirm for administrator access and the Tamper Switch that triggers an alarm if the terminal is dismantled.

3. CONNECTION – SYNCING TERMINALS

Communications

Illustrates connection points for power and communication, including diagrams for RS485 and Wiegand connections.

Ingress Online Activation

Explains the process of activating the terminal with Ingress software via the internet.

Connecting the Terminals to Ingress

USING TCP/IP

Details setting up Ethernet and configuring IP address, Netmask, Gateway, and NetSpeed for TCP/IP connection.

Using USB to Download/Upload Data

Describes using USB flash disks for data transfer when PC connection is difficult or impossible.

4. USER

Enrolling User

Covers enrolling users with passwords and card information, emphasizing administrator enrollment first for data safety.

CARD ENROLLMENT

Details the steps for enrolling RFID cards, including waving the card at the scanning area.

PASSWORD ENROLLMENT

Explains how to enroll a 5-digit password for user verification, showing a '-P' indicator.

CARD AND PASSWORD ENROLLMENT

Describes enrolling users with both card and password for enhanced security, indicated by '-OP'.

Types of Verification Methods

Lists verification types: PIN, PW, RF, PW/RF, PW & RF, and how to configure multi-verification.

Deleting User

Details how an administrator can delete user records from the terminal.

Access Level/Privilege

Defines different user roles: Normal User, Enroller, Administrator, and Supervisor, with their respective access permissions.

5. SYSTEM

Update Firmware

Instructs on updating terminal firmware via a PC and USB flash disk, advising to consult resellers.

6. DATA

Deleting Transaction Logs

Explains how to delete attendance logs from the terminal, warning that data will be lost.

Deleting All Data

Details the process to clear all data including user info, logs, and templates, with a strong warning.

Managing User Privileges

Explains how to clear administrator privileges, making the system menu accessible to all users.

Resetting to Factory Settings

Describes restoring the terminal to its original factory settings, requiring confirmation.

7. USB

Understanding the Need for USB Flash Disk

Explains the importance of USB for data transfer when PC connection is difficult or impossible.

Downloading Attendance Logs

Details how to download attendance logs from the terminal to a PC via USB flash disk.

8. ACCESS

Using The Terminal as Door Access

Explains connecting the terminal to door access accessories like locks and exit buttons.

Access Options

Determines user accessibility and authority to enter certain doors.

TIME ZONE

Defines the period when a user is allowed access, with 50 time zones available, each with 7 time slots.

User Account Options

Describes configuring user access options like belonging to a group, using TPs, and verification types.

Access Combination

Details combining different users' verification methods and time zones for access, offering 10 combos.

Duress Options

Explains how the terminal triggers an alarm system after a successful verification from a duress password.

9. RFID CARD FUNCTION

Enrollment of RFID Card

Details the easy enrollment of RFID cards, alone or with a password, including waving the card.

Multi-verification Methods Using RFID

Allows users to use two or more verification methods for access, referencing Chapter 4.

Deleting RFID Card

Explains how to delete RFID card information before inserting new data.

10. HID CARD FUNCTION

Registering HID Card

Explains that registering HID cards is similar to RFID cards, involving user ID and waving the card.

Deleting HID Card

Details how to delete HID card information before inserting new card data.

11. AUTO TEST

TROUBLESHOOTING

"Unable to Connect" Appears

Addresses connection issues, suggesting checking settings and communication methods like LAN, RS232, RS485, USB.

RFID Card Doesn't Respond

Troubleshoots RFID card issues, checking registration and verification group settings.