SK-NET™ Operating & Installation Guide - Secura Key
SK-NET™ Operating & Installation Guide - Secura Key
SK-NET™ Operating & Installation Guide - Secura Key
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
5.22 Date and time ...................................................................... 27<br />
5.23 Setting the time and date ...................................................... 28<br />
5.24 Overriding U.S. Daylight Savings Time feature ....................... 28<br />
5.25 IN and OUT readers ............................................................. 29<br />
5.26 Programming an “IN” or an “OUT” reader ............................ 29<br />
5.27 Reader Groups ..................................................................... 30<br />
5.28 Creating a Reader Group ...................................................... 30<br />
5.29 Door Controls ....................................................................... 31<br />
5.30 Using Door Controls ............................................................. 31<br />
5.31 Inputs ................................................................................... 32<br />
5.32 Defining an Input ................................................................. 33<br />
5.33 Outputs ................................................................................ 34<br />
5.34 Defining an Output .............................................................. 36<br />
5.35 Programming custom Wiegand data formats ......................... 37<br />
5.36 Adding new readers to the system ......................................... 38<br />
5.37 Adding a Facility Code .......................................................... 39<br />
6. MANAGING USERS .............................................................. 40<br />
6.1 Entering Cardholder Information ........................................... 40<br />
6.2 Adding a new card number ................................................... 41<br />
6.3 Deleting a user ..................................................................... 41<br />
6.4 Changing the names of User data fields ................................ 42<br />
6.5 Sorting cardholders in the User List ....................................... 42<br />
6.6 Filtering Users ...................................................................... 43<br />
6.7 User Reports ......................................................................... 43<br />
6.8 Limited Use Cards ................................................................ 43<br />
6.9 Programming Limited Use Cards ........................................... 44<br />
7. MANAGING TRANSACTIONS ............................................... 46<br />
7.1 Changing Transaction View ................................................... 46<br />
7.2 Filtering Transactions ............................................................ 47<br />
7.3 Viewing cardholder photos ..................................................... 48<br />
7.4 Archiving older transactions .................................................. 48<br />
7.5 Viewing archived transactions ............................................... 49<br />
7.6 Excluding Transaction Types .................................................. 49<br />
7.7 Excluding Transaction Types (Globally) ................................... 50<br />
7.8 Excluding Transaction Types for One Reader .......................... 51<br />
8. REPORTS .............................................................................. 52<br />
8.1 Transaction Report ................................................................ 52<br />
8.2 Printing a User Report ........................................................... 53<br />
8.3 Printing a User Information Report ....................................... 53<br />
8.4 Printing a list of readers in a Location Report ......................... 54<br />
8.5 Printing a list of readers in an Access Group Report ............... 54<br />
8.6 Printing a list of Users in an Access Group Report .................. 55<br />
9. SECURITY .............................................................................. 56<br />
9.1 Changing an <strong>SK</strong>-NET Operator Password ........................... 56<br />
9.2 Assigning Operator Levels .................................................... 57<br />
9.3 System Activity Log ............................................................... 58<br />
9.4 Password Protection .............................................................. 59<br />
10. DIAGNOSTICS ...................................................................... 60<br />
10.1 Communicating with a Location ............................................. 60<br />
10.2 Network Messasges .............................................................. 60<br />
10.3 Self Testing from <strong>SK</strong>-NET .................................................... 61