The system will then ask for the Terminal ID. It can be accessed via any standard Web browser by entering the systems IP address. This feature is also useful because if an inactive user attempts to access your facility and your system is configured to log unauthorized access see pg 23 then your access log will show their failed attempt to access the building. Open this file and click the Go button to restore the data from the backup file. For an existing user input their Employee ID when prompted. Static Press Func key to continue. This could mean that the iGuard is turned off, or that a network connection has been lost. Enter the new time then press the Func key to continue.
Optional Door Sensor Connection terminals on the iGuard can be used to alarm if the door stays open longer than 10 seconds. Administration via the Web interface i. The report you see should look something like this: You will be prompted to select a location for the. Shows whether the Employee has a finger print registered SC: Changing this code will disable any smart cards which are already registered, and you will have to re-register them at an iGuard terminal.
This allows you to incorporate the F functionality into your Anti Passbackrules.
iGuard LM Series
To do this, click Backup under Tools in the Navigation Bar. Optional Door Sensor Connection terminals on the iGuard can be used to alarm if the door stays open longer than 10 seconds.
The size of each is shown beside it in parentheses. If slave, provide the IP address of the segies unit. Web Interface iGuard is managed through any standard Web browser.
iGuard Factory Default (Model: LM520-FOSC)
aeries To begin using the program, you must first add iGuard units. Once a user enters the facility, he or she must authenticate at an. To use these triggers, see Other Options pg 22 of this manual. The fingerprint image matches the igard stored in the card, the user is authenticated.
Enroll only one finger: Embedded Web Server Like the firmware, iGuard stores the technology necessary to act as its own Web server on its internal memory.
Please see Appendix C: For this reason, Function 7 allows you to shut down, restart, or reset the system. Remote Door Relay Set-Up xii.
Any smart card with a code that does not match is not recognized by the system. It should be a unique name which clearly identifies the terminal such as Front for the front door. On the Remote Relay Board: The same applies for OUT. This is useful for identifying users who are consistently getting false.
Dear, Sir I already downloaded the file but do not know where I can export this file in I Guard system Thanks you for your cooperation Best regards ,.
The current date is displayed. The Display will show the Test Mode status as shown. Lift the shutter and place either your primary finger right-hand thumb or your secondary finger left-hand thumb on the sensor.
Click Ok in the Save Changes Dialog box. Started by nasto12 Nov 19, Replies: Click Go to upload your employees to iGuard. Once serkes have edited the global user names and passwords, click the Save button.
Administration oguard the Terminal i. For advanced reporting capabilities, see Appendix A: The NetBios name of a network node can be used as a familiar name by other network nodes. Select the parameters for the report you wish to export, and click the Export button. So once the smartcards have been assigned, donot change this Company Code.
Press the Func key to confirm the ID. This will activate the other settings in the tab.
The next sections will familiarize you. To begin adding departments, select Add Department from the Department section of the Navigation Bar. This is useful for identifying users who are consistently getting false rejections and have to attempt access multiple times. This feature is only for viewing. It can be used in conjunction with either a fingerprint, a smart card or both, however the use of user password only is not recommended for use in access control due to the possibility of security compromise.
If you have changed those settings, please make note of the changes. This setting determines how the Terminal will log each clock event. The following table describes how to customize these settings. A typical magnetic lock will have two connection wires: This is because these are the only characters on the keypad of the terminal. A good fingerprint image captured during the enrollment process can significantly reduce the false-reject rate during later verification.
Ivuard increase the security level in access control applications, use the optional Remote Relay together with the iGuard unit. Determines whether the door unlocks when a user clocks in at this terminal. This feature is also useful because if an inactive user attempts to access your facility and your system is configured to log unauthorized access see pg 23 then your access igguard will show their failed attempt to access the building.
The applicable part numbers and product details are as follows: Web Server Options v.
This is useful if you have more than a handful. System Configuration Enter 5 to select the System Configuration menu.