Do you have a question about the ZKTeco C2-260/inBio2-260 and is the answer not in the manual?
Brand | ZKTeco |
---|---|
Model | C2-260/inBio2-260 |
Category | IP Access Controllers |
Language | English |
Company's physical location and contact information.
Provides an overview of the manual's content and purpose.
Explains formatting and symbols used in the software interface.
Defines the meaning of icons used throughout the document.
Essential safety guidelines for device operation and handling.
Procedures and precautions for installing the access control panel.
Key features and capabilities of the access control system.
Specifications including power, environment, and dimensions.
Explains the meaning of the status lights on the control panel.
Step-by-step guide for physically mounting the device.
Details on connecting wires for the access control panel.
Overall system setup for the control panel.
Description of all connection ports on the control panel.
How to connect sensors, switches, and RS485 modules.
Guidance for connecting RS485 readers to the panel.
Wiring instructions for door locks and auxiliary outputs.
Guidelines for setting up network cables for communication.
Configuration for network communication via TCP/IP.
Best practices for stable RS485 network connectivity.
How to configure device addresses using DIP switches on the panel.
Logging in, system activation, and password management.
Step-by-step guide to add new access control devices.
Modifying or removing a device from the system interface.
Process for updating the device's firmware.
Changing the network IP address of a connected device.
Process for registering new users and assigning access cards.
Guide for enrolling biometric data for personnel.
Defining access rules based on time zones and specific positions.
Configuring access levels, time zones, and holidays for users.
Live tracking of door status and system events.
Performing rapid operations like remote opening/closing of doors.
Tracking and displaying normal and abnormal access control events.
Viewing and analyzing historical access control transaction data.
Company's policy on user data privacy and biometric information.
Information on the product's environmental impact and hazardous substances.