Do you have a question about the ZKTeco MA300 and is the answer not in the manual?
Explains recommended fingers and correct placement on the fingerprint reader for accurate scans.
Details how to swipe RF cards (ID/HID) for verification.
Advises on protecting the device from sunlight, temperature, and proper cable connections.
Describes the device's capabilities as an access controller and fingerprint reader.
Details the front and bottom views of the device, highlighting key components.
Explains the device's state after enrollment or timeouts and user verification process.
Defines administrator and ordinary user roles and how management cards control operations.
Specifies the default timeout period and system behavior upon timeout.
Details on enrolling and using management cards for device operations.
Outlines the steps for fingerprint and card-based user authentication.
Performing data transfer and firmware upgrades using a U-disk.
Functionality of the tamper switch for alarms and factory resets.
Accessing the web interface, default credentials, and password change procedures.
Viewing device information and configuring system/network parameters.
Setting up IP addresses, gateway, and cloud server connection.
Procedures for clearing access logs, managing data, and viewing operation history.
Configuring Wiegand input/output parameters and understanding formats.
Configuring device IP and gateway to communicate with the ZKBioAccess IVS server.
Steps to search and add the device to the ZKBioAccess IVS software.
Process of adding personnel and enrolling fingerprints via the software.
A table listing the basic functional parameters of the device.
Explains data collection, usage, and privacy protection measures.
Information on the product's eco-friendly operational period and hazardous substances.
Explains recommended fingers and correct placement on the fingerprint reader for accurate scans.
Details how to swipe RF cards (ID/HID) for verification.
Advises on protecting the device from sunlight, temperature, and proper cable connections.
Describes the device's capabilities as an access controller and fingerprint reader.
Details the front and bottom views of the device, highlighting key components.
Explains the device's state after enrollment or timeouts and user verification process.
Defines administrator and ordinary user roles and how management cards control operations.
Specifies the default timeout period and system behavior upon timeout.
Details on enrolling and using management cards for device operations.
Outlines the steps for fingerprint and card-based user authentication.
Performing data transfer and firmware upgrades using a U-disk.
Functionality of the tamper switch for alarms and factory resets.
Accessing the web interface, default credentials, and password change procedures.
Viewing device information and configuring system/network parameters.
Setting up IP addresses, gateway, and cloud server connection.
Procedures for clearing access logs, managing data, and viewing operation history.
Configuring Wiegand input/output parameters and understanding formats.
Configuring device IP and gateway to communicate with the ZKBioAccess IVS server.
Steps to search and add the device to the ZKBioAccess IVS software.
Process of adding personnel and enrolling fingerprints via the software.
A table listing the basic functional parameters of the device.
Explains data collection, usage, and privacy protection measures.
Information on the product's eco-friendly operational period and hazardous substances.
| Type | - |
|---|---|
| Product color | Metallic |
| Cards capacity | 10000 cards |
| Fingerprint reader | Yes |
| Authentication type | Biometric |
| International Protection (IP) code | IP65 |
| RS-485 ports | 1 |
| Built-in display | No |
| Operating temperature (T-T) | -10 - 60 °C |
| Operating relative humidity (H-H) | 10 - 90 % |
| Depth | 34.5 mm |
|---|---|
| Width | 148 mm |
| Height | 73 mm |
Loading...