Jantech EP3000 Server User Manual
Transcription
Jantech EP3000 Server User Manual
J@NTECH - Access Control System USER MANUAL J@NTECH Access Control System Table of Contents Foreword 0 Part I Software License 3 Part II Introduction 7 1 Welcome topic ................................................................................................................................... 7 2 Installation Procedures ................................................................................................................................... 8 3 Starting up ................................................................................................................................... 9 Part III Pull Down Menu 11 1 File ................................................................................................................................... 12 2 Edit ................................................................................................................................... 13 3 View ................................................................................................................................... 15 4 Info ................................................................................................................................... 16 Part IV Menu Items 16 1 Command List ................................................................................................................................... 17 System Parameter . ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ............... Controller Setting . ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ............... Set Card Setting . ... ....to...Controller .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ............... Set Door Setting . ... ....to...Controller .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ............... Get Door Setting . ... ....from ... .... ... Controller .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ............... Software User. ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ............... Menu Access. ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ............... Time Interval . ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ............... Time Zone . ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ............... Holiday . ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ............... Access Level. ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ............... Shift Setting . ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ............... Department Setting . ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ............... Job Title Setting . ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ............... Card User DB. ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ............... View Attendance . ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ............... Attendance Report . ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ............... Export Attendance . ... .... ...Data .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ............... View Event Log . ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ............... Transaction Report . ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ............... Export Transaction . ... .... ...Data .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ............... Card User Report . ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ............... Reindex Database . ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ............... Backup & Restore . ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ............... 17 20 21 22 23 24 27 28 29 31 31 33 35 36 38 40 42 44 45 46 48 49 50 51 2 Controller List ................................................................................................................................... 53 3 Card Holder ................................................................................................................................... List 54 4 Transaction List ................................................................................................................................... 55 © <2007-2010> .. . Jantech Technology Sdn Bhd Contents Part V Computer Specification Index © <2007-2010> ... Jantech Technology Sdn Bhd II 57 0 J@NTECH Access Control System 1 Software License J@NTECH User's License Documentation version 4.0 Copyright Notice Copyright © 2007-2010 Jantech Technology Sdn Bhd (Jantech) All Rights Reserved. Any technical documentation that is made available by Jantech is the copyrighted work of Jantech and is owned by Jantech NO WARRANTY. The technical documentation is being delivered to you AS-IS and Jantech makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained therein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors. Jantech reserves the right to make changes without prior notice. No part of this publication may be copied without the express written permission of Jantech Technology Sdn Bhd 117, Block P/F,Jalan Durian 1, Taman Cheras 56100 Kuala Lumpur, Malaysia. www.jantech.com.my © <2007-2010> .. . Jantech Technology Sdn Bhd 4 Software License IMPORTANT : PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT CAREFULLY BEFORE USING THE SOFTWARE. Jantech Technology Sdn Bhd ("JANTECH") IS WILLING TO LICENSE THE SOFTWARE TO YOU AS THE INDIVIDUAL, THE COMPANY, OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE (REFERENCED BELOW AS "YOU" OR "YOUR") ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS LICENSE AGREEMENT. THIS IS A LEGAL AND ENFORCEABLE CONTRACT BETWEEN YOU AND JANTECH. BY OPENING THIS PACKAGE, BREAKING THE SEAL, CLICKING ON THE "AGREE" OR "YES" BUTTON OR OTHERWISE INDICATING ASSENT ELECTRONICALLY, OR LOADING THE SOFTWARE, YOU AGREE TO THE TERMS AND CONDITIONS OF THIS AGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS, CLICK ON THE "I DO NOT AGREE" OR "NO" BUTTON, OR OTHERWISE INDICATE REFUSAL, MAKE NO FURTHER USE OF THE SOFTWARE, AND RETURN THE FULL PRODUCT WITH PROOF OF PURCHASE TO THE DEALER FROM WHOM IT WAS ACQUIRED WITHIN SEVEN (7) DAYS OF PURCHASE, AND YOUR MONEY WILL BE REFUNDED. 1. LICENSE: The software which accompanies this license (collectively the "Software") is the property of Jantech or its licensors and is protected by copyright law. While Jantech continues to own the Software, You will have certain rights to use the Software after Your acceptance of this license. This license governs any releases, revisions, or enhancements to the Software that Jantech may furnish to You. Except as may be modified by a Jantech license certificate, license coupon, or license key (each a "License Module") which accompanies, precedes, or follows this license, Your rights and obligations with respect to the use of this Software are as follows: YOU MAY: A. use one copy of the Software on a single computer. If a License Module accompanies, precedes, or follows this license, You may make that number of copies of the Software licensed to You by Jantech as provided in Your License Module. Your License Module shall constitute proof of Your right to make such copies. B. make one copy of the Software for archival purposes, or copy the Software onto the hard disk of Your computer and retain the original for archival purposes; C. use the Software on a network, provided that You have a licensed copy of the Software for each computer that can access the Software over that network; and D. after written notice to Jantech , transfer the Software on a permanent basis to another person or entity, provided that You retain no copies of the Software and the transferee agrees to the terms of this license. YOU MAY NOT: A. copy the printed documentation which accompanies the Software; B. sublicense, rent or lease any portion of the Software; reverse engineer, decompile, disassemble, modify, © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System translate, make any attempt to discover the source code of the Software, or create derivative works from the Software; C. use a previous version or copy of the Software after You have received a disk replacement set or an upgraded version. Upon upgrading the Software, all copies of the prior version must be destroyed; D. use, if You received the software distributed on media containing multiple Jantech products, any software on the media for which You have not received a permission in a License Module; nor Jantech E. use the Software in any manner not authorized by this license. 2. CONTENT UPDATES: Certain Jantech software products utilize content that is updated from time to time. You may obtain Content Updates for any period from our URL : www.jantech.com.my . 3. LIMITED WARRANTY: Jantech warrants that the media on which the Software is distributed will be free from defects for a period of seven (7) days from the date of delivery of the Software to You. Your sole remedy in the event of a breach of this warranty will be that Jantech will, at its option, replace any defective media returned to warranty period or refund the money You paid for the Software. Jantech within the Jantech does not warrant that the Software will meet Your requirements or that operation of the Software will be uninterrupted or that the Software will be error-free. THE ABOVE WARRANTY IS EXCLUSIVE AND IN LIEU OF ALL OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS. YOU MAY HAVE OTHER RIGHTS, WHICH VARY FROM COUNTRY TO COUNTRY. 4. DISCLAIMER OF DAMAGES: SOME STATES AND COUNTRIES, INCLUDING MEMBER COUNTRIES OF THE EUROPEAN ECONOMIC AREA, DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES SO THE BELOW LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW AND REGARDLESS OF WHETHER ANY REMEDY SET FORTH HEREIN FAILS OF ITS ESSENTIAL PURPOSE, IN NO EVENT WILL ENTRYPASS OR ITS LICENSORS BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL,INDIRECT OR SIMILAR DAMAGES, INCLUDING ANY LOST PROFITS OR LOST DATA ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE EVEN IF ENTRYPASS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN NO CASE SHALL ENTRYPASS'S OR ITS LICENSORS' LIABILITY EXCEED THE PURCHASE PRICE FOR THE SOFTWARE. The disclaimers and limitations set forth above will apply regardless of whether You accept the Software. 5. GENERAL This Agreement will be governed by the laws of Malaysia. This Agreement and any related License Module is the entire agreement between You and Jantech relating to the Software and: (i) supersedes all prior or contemporaneous oral or written communications, proposals and representations with © <2007-2010> .. . Jantech Technology Sdn Bhd 6 Software License respect to its subject matter; and (ii) prevails over any conflicting or additional terms of any quote, order, acknowledgment or similar communications between the parties. This Agreement shall terminate upon Your breach of any term contained herein and You shall cease use of and destroy all copies of the Software. The disclaimers of warranties and damages and limitations on liability shall survive termination. This Agreement may only be modified by a License Module which accompanies this license or by a written document which has been signed by both You and Jantech . Should You have any questions concerning this Agreement, or if You desire to contact Jantech for any reason, please write to: (i) Jantech Customer Service, © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System 2 Introduction 2.1 Welcome topic Thank you for purchasing the J@TECH Access Control System. You will find your decision to invest in the system to be value for money as we are confident it will deliver consistent superior performance and reliability. Many system aren't successful because of constant changes in technology infrastructure, integrations that must be redone, scalability when put into system, etc. From our pass experience, we have cater for all these. J@NTECH system is designed in such a way that you can easily integrate with other system such as payroll system and etc. It is also designed with the open architecture which can accept most of the reader formats available in the market. The system is designed to manage up to 64 controllers, which mean it can control up to maximum of 64 doors. It offers a powerful access control solution. We have included features such as antipassback, card expiry checking and many more that is usually found in the more expensive systems to add value to the system. Using this system is unbelievably easy. Familiar Windows environment make it very user-friendly. The system can function in both on-line and off-line conditions. This means the host computer is not required to be online all the time for the system to work. When the computer is off-line, the events would be kept in the controller's memory. How many transactions would be stored rely on the controller model that you own. Our basis controller specification can cater for 5000 events memory, recorded on a first in first out basis at the controller's local memory. When communications is reestablished, the software will automatically upload all the events. J@NTECH offer you practical reports that can print out such as absentees and late comers reports to help you in analyzing your staff's attendance. Our development does not stop here; in fact if your business expands and you require integration to the access control system, we will be able to upgrade the system for you. Like what we state in our brochure, we make access more affordable for you. Again, thank you for choosing J@NTECH. © <2007-2010> .. . Jantech Technology Sdn Bhd 8 Introduction 2.2 Installation Procedures Compatible OS: Window ME, Window XP Home/Professional Edition, Window 2000 When installing, using , or uninstalling J@NTECH access control system, log on as the "Computer administrator" or "Administrator" 1) Turn on the computer and wait for Windows to start up. 2) Ensure the PC have at least a serial port. This section will guide you step by step on the installation process of the J@NTECH access control system. 1. 2. 3. 4. 5. 6. 7. Insert the CD into CD-ROM drive. The system shall autorun the installation process Go to My Computer and double click on the CD-ROM drive. Double click at the icon Software, look for JTsetup.exe. Double click at the JTsetup.exe. The software would, then, set up automatically as seen below. Follow the instructions on the window. The software would run the installation procedure by itself and allocate it to the default folder. To go back to the previous procedure or cancel the installation process, just click on the button Next or Exit. © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System 8. Now that the program is installed, you can run the program anytime by clicking the J@NTECH from the Start Menu. 9) System adminstrator can also click a short cut at the deskstop so that easier to access the J@NTECH access control software. This can be done by rigt click at the mouse to the following file : C:\Program Files\J@NTECH - Access Control System\Jantech.exe 2.3 Starting up When you first time running the software, you are requiring login to the application system and then configure a PC communication port that is being used to communicate with hardware control panel. © <2007-2010> .. . Jantech Technology Sdn Bhd 10 Introduction 1. Click at 'Login' button to start up application login session 2. 3. 4. Key in defaut system user id and password to gain access Default system user id is 'Admin' and password is 'Admin' Click at 'System Parameter' to configure communication port setting. © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System 3 Pull Down Menu Pull Down Menu is formed by 4 main menu 1) File 2) Edit 3) View 4) Info © <2007-2010> .. . Jantech Technology Sdn Bhd 12 Pull Down Menu 3.1 File There are 4 functions in this pull down menu, i) Login This software function allows system operator login to the J@NTECH system. the software prompt you to key in the user name and password. The manufacturer default user name and password are J@NTECH. After keying in the user name and password, click OK. Note. Both the User Name and Password are case sensitive. ii) Log Out This software function allows system user log out from J@NTECH system and yet still on-line the system without shutting down the application. All incoming transaction will still be shown at the computer console. To log out, the system user is require to input the logged on system password. © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System iii) Edit Password This system function allow logged on user to edit their own user password. iv) Close This is to shut down the software. Bear in mind that when the software is shut down, or offline, all the transaction records will store at the local controller memory. The software will automatically retrieve the records once it is online again. User are require to key in their password, or else the system will not permit the user to shut down the software. This is to ensure the software is shut down by the authorise user only. 3.2 Edit Here are the editing function that designed to assist the user on maintaining the system databases. As seen on the below listed, there are 4 main menu and submenus. System Setup © <2007-2010> .. . Jantech Technology Sdn Bhd 14 Pull Down Menu User Setup Viewing & Reporting System Utilities © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System 3.3 View There are 4 menu items under this menu section. System user can either click at the menu tab to access on Command List, Transaction List, Controller List or Card Holder List. © <2007-2010> .. . Jantech Technology Sdn Bhd 16 Pull Down Menu 3.4 Info This button allows system user to verify an information of the installed software. The display information indicated the software version no. 4 Menu Items © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System 4.1 Command List This is a main command centre of J@NTECH access control system. System user can simply click at the command button to launch an application function. 4.1.1 System Parameter System Parameter allow the system user to configure their company logo, company name, default startup screen, card user database user define fields and communication port setting for controller connection. © <2007-2010> .. . Jantech Technology Sdn Bhd 18 Menu Items Data Fields Company name & Logo This information would be display at the header of each and every reports. The report is being personalise with user's own identify. To capture a report logo image first of all, the system operator is require to select Capture button and then follow by assigning the location of pre-recorded BMP image file. The suggested logo image resolution is 100x100 pixel.. Start Screen This system setting allow system user to configure J@NTECH access control software default start up screen. System user can assign whether they want the application to be start up on 'Command List', 'Transaction List', 'Controller List' or 'Card Holder List' User Define #1, #2, #3 By default, system will provide users data field as shown below, © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System Users can add another 3 self define field. To add, just key in the desire field in the User define #1, #2, #3 data fields Example of additional field that added are handphone number, IC/Passport number, car number adn etc... Bus 0 Comm Port, Bus 1 Comm Port, Bus 2 Comm Port and Bus 3 Comm Port. This setting information is to configure the PC communication port that is being connected with hardware controller. The J@NTECH system software is supported up to 4 data buses. This setting is to identify the PC communication port that is used to communicates with the Door Controllers. Only filled in the Comm Port that in used, select Not USED for those unused communication electrical bus. Command Actions Capture This command action is allow system user to browse the pre-recorded report LOGO image file from computer hard disk. Clear This command action is to reset the report logo. Change © <2007-2010> .. . Jantech Technology Sdn Bhd 20 Menu Items This command action is to save all parameter setting into system database. Close This command action is to close the parameter setting function and return to main menu screen 4.1.2 Controller Setting In order for the software to manage and monitor a door, system user need to defined and include a door. The software identifies the installed door through the identifier of the a controller. The identifier is unique for every controller. (Unit no) To add new door controller, system user can select a 'Insert' button. To change the existing door setting , system user can select 'Modify' button. To edit controller tagname, system user can select 'Edit Tag' button To remove unwanted record, system user can select 'Delete' button. © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System The tagname is a keyfield for controller definition, system user require to specify an unique name as an identifier. J@NTECH access control system support up to 2 controller settings. Which are:= Door Access and Barrier Access. Both of these settings are similar except under the case of Barrier Access panel type. The control panel will activate 2 relays output instead of 1 relay output. (Relay-1 is for IN barrier, Relay-2 is for OUT barrier). The Busno and Unitno is hardware physical address, it must be unique. The door release time is a timing value for indicating how long you want a relay to be activated. The door open time is a timing value for indicating how long you want a relay to be remained open until an alert warning is enable. Beside door open time and release time. System user can also configure the card + pin time schedule as well as lock release schedule. Once, this setting information is assigned, the operation mode will be activated, if the time schedule is reach. 4.1.3 Set Card Setting to Controller This system command allow system user to update card holder information from PC database on to control panel. The card updates command are:= (1) Update Card - Insert/Modify card record from control panel (2) Delete Card - Remove unwanted card record from control panel (3) Block Card - Temporary disable card usage at control panel (4) Unblock Card - Reset card blocking flag back to normal © <2007-2010> .. . Jantech Technology Sdn Bhd 22 Menu Items (5) (6) (7) (8) (9) 4.1.4 Clear Antipassback - Reset card antipassback flag Enable Antipassback - Activate card antipassback mode Disable Antipassback - Deactivate card antipassback mode Enable Card Pin - Activate card pin mode Disable Card Pin - Deactive card pin mode Set Door Setting to Controller This system command allow system user to update door setting information for PC database to hardware control panel. The send information consist of time set, time zone, holiday list, door setting and PC date time. To send setting to control panel, first of all, system user must select the destinated controller from the © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System pick list and then follow by a 'Send' command to activate the command sending. 4.1.5 Get Door Setting from Controller This system command allow system user to retrieve control panel setting information. The avaliable command actions are:= (1) Holiday List (2) Time Set (3) Time Zone (4) Controller Setting © <2007-2010> .. . Jantech Technology Sdn Bhd 24 Menu Items To retrieve controller setting, first of all, system user require to highlight the controller that he/she want to retrieve from and then follow by the command action. The retrieve information will be presented under 'Retrieve Data' tab. 4.1.6 Software User This function defines the authority given to users to login into this software. An User ID and password is required to access to this software. Once the Software User is created, the default login password is identical to the User ID. This password can be changed in the System User settings – Change Password. Each user can be assign to a individual pre-defined menu access level. © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System To Add, click on Insert command, By clicking at the Menu Access, system adminstrator can select the appropriate access level for the software users by scrolling through the arrow button as seen in the below. © <2007-2010> .. . Jantech Technology Sdn Bhd 26 Menu Items Data Fields Information =============== User ID - this field defines identifier for the system operator User Name - this field defines detail description of the system operator Menu Access - this field defines the menu access permission right of the system operator. Action Button ======== 1. Insert Insert the software user record into system table 2. Edit Modify the previously saved record 3. Delete Remove the unwanted record information from software user table 4. Close To close the software user setting form and return to the main screen. © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System 4.1.7 Menu Access This menu defines the accessibility of the software user to select each menu and change any configuration in this software. A menu access level is created to assign different authority level so that you can have a list of software user with different authority level. Action Button ======== 1. Insert Insert the user definable record into system table 2. Modify Modify the previously saved record 3. Delete Remove the unwanted record information from system table 4. Save Store the edited record setting into the system table © <2007-2010> .. . Jantech Technology Sdn Bhd 28 Menu Items 5. Cancel/Close To close the menu access setting form and return to the main screen. 4.1.8 Time Interval There are 24 Time Set records available of which 22 records are programmable. The software selfgenerates 2 Time Set records by default. Time Set 000, which is No Access Time Set and Time Set 001, which is Free Access Time Set. The Time Set 000 disables the feature at all times and Time Set 001 enables the feature at all times. There are 4 intervals in the time schedule. These interval durations define the activation times of the feature. To add a new time set, simply click on the ADD icon and define the interval/s set of time. To do modification of existing time set, click on Edit then do the modification. To delete a time set, highlight the time set and then click at the delete button. Download icon allows you to send the configuration to the controller. The defined time set will be used in the time zone setting at the later section. Besides configuring the timer set, the software default has two pre-assigned timer set which are Free Access For All timer set and No Access timer set. For example: ======== You may specify the time set for office staff as follows: Time Set 02 Interval #1 09:00 to 12.00 Interval #2 13:00 to 17:00 Interval #3 00:00 to 00:00 Interval #4 00:00 to 00:00 © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System This allows the office staff accesses the system from 9:00am to 12:00 noon and from 1:00pm to 5:00pm. In other words, if the office staff accessed the system within these periods of time, he/she will be granted access. If it is outside these periods of time, he/she will not be granted access. 4.1.9 Time Zone Time Zone is the parameter that schedule the activation or execution time of each of the functions by defining the activation time set per day plus the activation time set during the holidays. By defining a time set for each of the day and holiday, we can define the activation time of each feature. The software will self generate Time Zone 000 for No Access – this will disable the selected feature at all times and Time Zone 001 for Free Access – this will enable the selected feature at all times. As in the Time Set Menu, you can add, edit, delete and download the time zones to the controller. Time Zone 000 001 Description No Access Free Access Time zone setting is made up of Timer set. You specify 7 time set in each time zone setting. (One for each day of the week plus a holiday). By specifying the time zone setting a card, the controller can then automatically control the different accessibility of the card from Sunday to Saturday and holiday. The example below shows the use of time zone and time set to control the accessibility of the card. © <2007-2010> .. . Jantech Technology Sdn Bhd 30 Menu Items Time Set Setting Time Set #1 (Interval #1 08:00 to Interval #4 00:00 to 00:00) Time Set #2 (Interval #1 09:00 to Interval #4 00:00 to 00:00) Time Set #3 (Interval #1 08:00 to Interval #4 00:00 to 00:00) Time Set #4 (Interval #1 00:00 to Interval #4 00:00 to 00:00) Time Set #5 (Interval #1 00:00 to Interval #4 00:00 to 00:00) Example: Time Zone Time Zone Time Zone Time Zone # #1 #2 #3 Sun 05 04 04 Mon 05 01 01 12:30; Interval #2 13:30 to 18:00; Interval #3 00:00 to 00:00; 12:00; Interval #2 13:00 to 17:00; Interval #3 00:00 to 00:00; 13:30; Interval #2 00:00 to 00:00; Interval #3 00:00 to 00:00; 00:00; Interval #2 00:00 to 00:00; Interval #3 00:00 to 00:00; 23:59; Interval #2 00:00 to 00:00; Interval #3 00:00 to 00:00; Tue Wed Thu 05 05 05 01 01 01 04 01 04 Fri 05 02 02 Sat 05 03 04 Hol 05 04 04 Each entry in the time zone setting above refers to the time set no. In the table above, 1. The Time Zone #1 specifies that the card will use Time Set #5 everyday where Time Set #5 is 00:00 to 23:59 (24 hours access) 2. The Time Zone #2 specifies that the card will use Time Set #4 on Sunday and holiday (No access at all), Time Set #1 on Monday till Thursday, Time Set #2 on Friday and Time Set on Saturday 3. The Time Zone #3 specific that the card will use Time Set #4 on Sunday, Tuesday, Thursday, Saturday and Holiday (No Access at all) and Time Set 1 on Monday, Wednesday and Saturday © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System 4.1.10 Holiday User can key in all the holidays at the beginning of the year or after the installation of this system so that this system can determine holidays and give the correct attendance report. This system allows the operator to define up to 50 days of holiday. After key in all the holidays, Edit the new settings and then Close this window. User can set the year and months of the holidays by clicking on the arrow keys. High light the day of holiday at the below listed screen and key in the description. Press Ok to store the setting. 4.1.11 Access Level This menu determines the authority given to the access of each door/floor. Different levels can be defined so that different cards with different authority can access to specific area/s. The default level © <2007-2010> .. . Jantech Technology Sdn Bhd 32 Menu Items 000 will deny access to all doors whereas level 001 permits the 24 hours access to all doors. Accessibility function will allow the user to maintain and control a card user access privileges for each door installed. With this function, you can control whether a person can access to certain door or at what time he/she can access the door. The user is required to assign an unique access number and followed by a meaningful description. For a better control, the user must assign a door access time zone for certain access level, Firstly, the user is required to select the desire access level, the software application will automatically display all doors setting of the selected access level on the screen. The user can configure an individual door setting by placing the mouse pointer at the record and then double click on it. The time zone selection pop up screen will appear. At this point, the user can select the time zone set and assign to it to the door accordingly. If the user decided not to permit an access at this door for a particular access level, then the user is recommended to choose NO Free Time Zone. © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System Action Button ======== 1. Insert Insert the user definable record into system table 2. Modify Modify the previously saved record 3. Delete Remove the unwanted record information from system table 4. Close To close the door access area form and return to the main screen. 4.1.12 Shift Setting This is where you define the working hour shift where mainly used in time attendance reports. Every © <2007-2010> .. . Jantech Technology Sdn Bhd 34 Menu Items organisation member can have the different working hour as long as the working hour is predefined here. They can also have the same scheduled time by using the same working hour set. The operator can define different working hour for different day. By comparing the capture card reading time with time defined here, the system will automatic calculate for the overtime, early out, late in and etc for the install card holder. The OT Claims field is use to determine whether the selected work shift is qualified for over time processing or not. A Yes setting will trigger an overtime calculation. © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System Adding A New Shift Data To add a new job title, click on the Add button. At the Add Shift Data screen, enter the Tag Name, and the Description of the job title. Click OK to add the job title or Cancel to discard the actions. Editing An Existing Shift Data To change the Shift Data description, click the Edit button. The form below will be shown and the description can, now, be changed. Deleting An Existing Shift Data To delete an existing Shift Data, click the Delete button. At the confirmation dialog below, click Yes. 4.1.13 Department Setting User can key in all department available in their organisation here. The database here is used to defined the department of the organisation member. Below will show the process of adding, deleting or editing the database here. © <2007-2010> .. . Jantech Technology Sdn Bhd 36 Menu Items Adding A New Depatment dB To add a new department, click on the Add button. At the Add Department Record screen, enter the Tag Name, and the Description of the department. Click OK to add the department or Cancel to discard the actions. Editing An Existing Depatment dB To change the department description, click the Edit button. The form below will be shown and the description can, now, be changed. Deleting An Existing Depatment dB To delete an existing department, click the Delete button. At the confirmation dialog below, click Yes. 4.1.14 Job Title Setting This button allows you to enter different job titles available in your company. The job title is then selectable in the card database Upon clicking the Job Title dB, the following screen will be shown. © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System Adding A New Job Title dB To add a new job title, click on the Add button. At the Add Job Record screen, enter the Tag Name, and the Description of the job title. Click OK to add the job title or Cancel to discard the actions. Editing An Existing Job Title dB To change the job title description, click the Edit button. The form below will be shown and the description can, now, be changed. Deleting An Existing Job Title dB To delete an existing job title, click the Delete button. At the confirmation dialog below, click Yes. © <2007-2010> .. . Jantech Technology Sdn Bhd 38 Menu Items 4.1.15 Card User DB This window allow you to manage the card holder database by inputting or inter-relate the card holder with department, job title or shift data. User can add the new card holder by key in the card number printed on the proximity card. The staff number, card holder name, department and job title are fields that are use for reporting. The card holder's photo can be captured into card holder database from previous scanned photo. This is useful for visual verification purpose. Please note that the photo must be in bmp format and with attribute of 100x100pixel. Upon clicking the Insert button, the following form will be shown. © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System Data Fields Information =============== Card No - the 6 digit number printed on access card, which is the card ID. Staff No - you are able to key in you're your company staff number, which may use for report filtering. Name - the name of the card holder. Department - this field selects the department that was keyed in the Depart DB, it defined the department card holder belongs to. Job Title - this field selects the job title that was keyed in the Job Title DB, it defined the job title of the individual card holder. Access level - the door access define the accessibility of the card holder to all doors. Active Flag - this field blocks or unblocks this card. 'No' means the card is blocked, the card cannot be used to access the door until this flag is being enable. Expiry Date - this field identifies the expire date of this card, together with start date, it defined the period that this card can be used Shift code - this time attendance shift settings defined the working hours of the card holder, mainly used for attendance reports. Pin mode - this field to set card + pin mode of a card user. A 'Yes' is to activate a card+pin mode and 'No' is to disable the function. Antipassback - this field to set antipassback mode of a card user. A 'Yes' is to activate the function mode and 'No' is to disable. © <2007-2010> .. . Jantech Technology Sdn Bhd 40 Menu Items 4.1.16 View Attendance This screen will display the most recent posted time attendance records. As seen in the above, this screen will display the attendance report in 2 colors, black represent the staff that attence to works whereas the red represent the staff that offended, it can be absent, late or etc... At the lower part of the screen, there are 1) Attendance Data The highlighted staff's clocking information will be show here. system will calculate the work hour of the day, overtime and lunch time information 2) Attendance Flag The highlighted staff's attendance status will be show here. early in, late in, early out and other status will be shown with the tick in the small box. 3) Extra Info This is to show the highlighted staff's additional information. © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System Command Actions To process time attendance data To process time attendance data, click on the POST button. At the attendance posting screen, select a require process start date and end date. Beside that, system user require to specify the attendance records is to be fetch from In-Reader or In & Out-Reader. When you select In- Reader only , the posting process will locate first Valid In record from In-reader as IN record and Last in from In-Reader as OUT. On the otherhand, if you select In & Out Reader selection, posting process will locate first Valid In from In-Reader as IN and Last Valid Out record from Out-Reader as OUT. Click OK to start the posting process or Cancel to discard the actions. To Clear posted time attendance records. To initialize and delete all time attendance records, system user can simply click at CLEAR commands to begin clearing process. A confirmation dialog screen will be prompt. He/She must choose a 'Yes' selection to confirm record deletion and 'No' selection for discard the operation. Attendance Record Editing © <2007-2010> .. . Jantech Technology Sdn Bhd 42 Menu Items J@NTECH access control software come with a time attendance record editing function for authorized system user to amend a staff attendance record. System user is allow to modify a staff attendance records for their clock in time, clock out time, lunch in time, lunch out time as well as inputting a remark statement to indicate the reason of modification. 4.1.17 Attendance Report J@NTECH access control system come with a non-overnight time attendance features. It allow system user to generate various time attendance reports. The supported reports are as:(1) Daily Summary (2) Absentee Listing (3) Early In Listing (4) Ealry Out Listing (5) Late In Listing (6) Late Out Listing (7) InComplete Listing (8) Over time Listing © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System The system user can filter the attendance data either by date, time or card no. REMARKS System user require to perform a time attendance posting process before he/she can generate the attendance reports. © <2007-2010> .. . Jantech Technology Sdn Bhd 44 Menu Items 4.1.18 Export Attendance Data J@NTECH system software comes with flexible and powerful data exporting engine. It is useful for 3rd party data integration. This system tool provide an interface to save the posted time attendance record onto MS-EXCEL format or delimiter ASCII text file. © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System System user can select the require export fields, field positioning, date format, delimiter as well as record filtering date. REMARKS System user require to perform a time attendance posting process before he/she can export an attendance records. 4.1.19 View Event Log This command action allow the system user to open the saved log file and preview it. © <2007-2010> .. . Jantech Technology Sdn Bhd 46 Menu Items 4.1.20 Transaction Report This system command allow system user to generate transaction event listing. J@NTECH system event reporting comes with various report filtering option. Which are:= The supported filters are:(1) Date (2) Time (3) Card number (4) Department © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System A 'Preview' button will start the report generation. A 'Close' button is to return the screen control back to the main menu. A softcopy report will be displayed at computer system for system user to review. Once system user has confirmed on the report contents, he/she can select a print button to generate a hardcopy report. © <2007-2010> .. . Jantech Technology Sdn Bhd 48 Menu Items 4.1.21 Export Transaction Data J@NTECH system software comes with flexible and powerful data exporting engine. It is useful for 3rd party data integration. This system tool provide an interface to save the transaction event record onto MS-EXCEL format or delimiter ASCII text file. © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System System user can select the require export fields, field positioning, date format, delimiter as well as record filtering date. 4.1.22 Card User Report This command action allow system user to generate a listing of installed card holder information. System user is allow to filter the records by card number. © <2007-2010> .. . Jantech Technology Sdn Bhd 50 Menu Items The listed information consist of := (1) Card number (2) Staff number (3) Staff name (4) Department code (5) Job Title code (6) Shift code (7) Access level (8) Antipassback Flag (9) Card Expiry Date (10) Active Flag (11) Access Pin number 4.1.23 Reindex Database Reindex Database gives the operator options of update the index files. It is generally use for maintaining and correcting the damaged files. © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System 4.1.24 Backup & Restore There are basically 2 types of files that can be backup, ie : System Files (which contains the software settings, card user lists, etc) and the Transaction Files (which is the transaction log files). Users are advised to perform the backup of all their files, be it System Files or Transactions Files monthly. This can be done by going into the backup window, click on Add File To Back Up List and choose type of files to be backup. Then click on the icon Create Back Up Archive, the window will prompt you to locate the back up file. To backup Step 1. Click Add Item To Backup List button to select the backup file. Step 2. Please specify what type of files to be backup. Step 3. © <2007-2010> .. . Jantech Technology Sdn Bhd 52 Menu Items Click Backup button to start data backing process by specifying the destination of the backup process. The backup function will compress and merge multiple data file into a single filename compress file. Step 4. After the system successfully back up, click 'OK' To restore After backing-up the files, and, for some reason, the files might need to be restored. To restore files, go to the Restore Tab. Step 1. Select the previously backup back files. Select the backup file to be restored. Notice that the Content list box is now filled with the files from the backup file. Step 2. Select Restore path setting for the data restore process. If you are wish to restore other folder then the runtime folder, please input at the pathname edit box, Step 3. Press Restore Backup File button to begin data restoring process. Once you have completed the © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System restoring process, Please re index system database, this is to ensure that all database indexes are up to date. 4.2 Controller List Click on this, screen that display the total door available in the system will be display as below, All the doors and their configuration will be shown. Due the system can support 4 buses, system adminstrator can choose which ever bus they want to view. System will only display bus by bus. Some basic action command can be perform through this screen. (1) (2) (3) (4) (5) (6) Send setting to Panel - Send PC database setting to control panel Get setting from Panel - Retrieve setting from control panel Pulse Door open - Remote pulse open a door Security ON - Enable security mode of a control panel Security OFF - Disable security mode of a control panel Cold Start - Reset control panel setting back to factory default. © <2007-2010> .. . Jantech Technology Sdn Bhd 54 Menu Items 4.3 Card Holder List This screen will list out all the card holder records inside the system. The card holder listing screen equipped with various operating function for managing control panel card operation. The supported card operations are:= (1) (2) (3) (4) (5) (6) (7) (8) (9) Insert Card - Insert new card user information onto control panel Remove Card - Delete unwanted card user information from control panel Clear AntiPB - Clear card user information antipassback flag Block Card - Suspend card user information Unblock Card - Reset card blocking status Enable Pin - Activate card pin feature Disable Pin - Deactivate card pin feature Enable AntiPB - Activate card user antipassback function Disable AntiPB - Deactivate card user antipassback function © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System 4.4 Transaction List This screen will display all the transaction events which include user command and physical door events of J@NTECH access control system. The displayed information consist of event date, event time, card no, card holder name, location, transaction code, transaction description and control panel physical address. This lastest transaction is a FIFO message queue. It keeps up to 500 records, the oldest record information will be replaced with new transaction record in the event of message queue is full. In additional, J@NTECH software system come with an online card user photo popup display. It allow system user to have visual verification on card user swipe transactions. Detail information of card swiped transaction will be listed, if this command action is activated. © <2007-2010> .. . Jantech Technology Sdn Bhd 56 Menu Items Beside the card user photo popup function, J@NTECH access control system allow system user to enrol card record in a quicker way. © <2007-2010> ... Jantech Technology Sdn Bhd J@NTECH Access Control System 5 Computer Specification Software Operating System Processor Monitor resolution Minimum RAM J@NTECH access control system Windows 2000, NT, Pentium IV 1 Ghz XP 800 X 600 256 MB The above listed is the min. specification of running J@NTECH access control system. © <2007-2010> .. . Jantech Technology Sdn Bhd THANK YOU