Beruflich Dokumente
Kultur Dokumente
Version 1.03
Copyright @ überGARD
Copyright @ überGARD
[Type here] Embedded Web User Manual
INDEX
4 ADMIN SETUP 15
5 SITE SETUP 22
6 TIME SETUP 26
7 NETWORK 28
8 ACCESS MODE 34
9 ADMIN LOGIN 36
11 KEY STATUS 40
12 KEY INFO 43
13 SEARCH RECORDS 48
14 USER 64
15 GROUP 90
16 SCHEDULE 96
17 SYSTEMS 100
Fig. 1.1
Fig. 1.2
Step 5) Right-click the Local Area Connection icon and select Properties. (Fig. 1.3)
Fig. 1.3
Step 6) Select Internet Protocol Version 4 (TCP/IPv4) and click on Properties button.
(Fig. 1.4)
Fig. 1.4
Step 7) Select the “Use the Following IP Address” option. (Fig. 1.5)
Fig. 1.5
**
If your Local Area Connection is not listed, you need to configure your Ethernet card. For assistance, refer to
your computer's documentation or contact your computer's vendor for instructions.
**
These instructions are for the standard cross cable connection only. If the IP address is conflicted to other pc,
please contact your network administrator or your ISP to determine what IP address or addresses you can use.
Super Admin
Default: http://192.168.3.177/
Fig. 2.1
Fig. 2.2
**
· Default User ID: 10000001 and Password: 123456
· User ID and password must be numbers only.
· You should change your Default password to your own unique pin after first login.
· Note: Default password is unsecured
Fig. 2.3
Step 5) Key in Super Admin Login Site Password and click Login to proceed. (Fig. 2.4)
Fig. 2.4
**
· Default Super Admin Login Password: 123456
· Password must be numbers only.
· You should change your Default password to your own unique pin after first login.
· Note: Default password is unsecured
Fig. 2.5
⑦ ⑧
① ② ③ ④ ⑤ ⑥
4. ADMIN SETUP
Step 1
Step 2
Fig. 4.1
Fig. 4.2
Table. 4.1
Name Description
Key Status Right If [Enabled] , Admin can be able to check status of Keys
Step 4
Fig. 4.3
Fig. 4.4
**
You should change your Default password to your own unique PIN after first Login.
Note: Default password is unsecured
Step 1
Fig. 4.6
Step 1
Fig. 4.7
Fig. 4.8
Fig. 4.9
5. SITE SETUP
Step 1
Step 3
Fig. 5.1
Step 1) Click on SITE SETUP (Fig. 5.1). Refer to the Table 5.1 for the function
details of the input box.
Table 5.1
Name Description
Site ID (SID) ID of the site
Site Name Name of the site
Site Description Description of the site
Site Password Password of the site
Confirm Site Re-enter the password again
Password
KeyBox Number of the keybox
Roll Call Enable/Disable notification feature to where the Admin(s) will
be given a report status for all the keys designated in the site.
Duress Alarm [Default: 9999] An alarm feature wherein the User can be able
to send out notification of forced access to the Keybox upon
entering User PIN (PIN + Duress alarm code: xxxx)
Door Expire Time Predefined door open duration
**
Note: To make sure to send out the key expire alarm message through Email/SMS. The mobile number
& Email address must key in. Besides, it is required to select member under the Alarm User Group (refer
to section 14.3).
Define to send out the alarm message by Email or SMS. You could enable or disable the GMS/Email
under Alarm User Group (refer to section 14.3).
Step 2) Key in the details (Fig. 5.1) as per table (Table 5.1)
Fig. 5.2
Fig. 5.3
Step 5) Key in the details (Fig. 5.3) base on table (Table 5.2)
Table. 5.2
Fig. 5.4
**
Note: Reset K-Master/Keybox system if you have editedSite Setup.
The system will be taken 30 seconds to load the new setting.
**
It is advised to use Postpaid Mobile Line to send alarm/reminder message for the Site
Alarm/Reminder. Site name to be displayed at theSMS notification will be the first 20 characters only.
Reminder will send notification to mobile phone & email.
**
The alarm notifications are Power Down, Force Open Door, Force Open Gate & Door Open Time Expire
through set up of the Alarm User Group (refer to section 14.3) & Critical User Group (refer to section
14.4) under User (refer to section 14).
6. TIME SETUP
Fig. 6.1
Fig. 6.2
Fig. 6.3
7 NETWORK
Fig. 7.1
Fig. 7.2
Fig. 7.3
Fig. 7.4
Fig. 7.5
Table 7.1
Step 1) Key in the POP3 Server, Port and Email Address (Fig 7.5 & Table 7.1).
Step 2) Key in the Authentication User Name & Password (Optional) which
provided by the service provider.
Fig. 7.6
Fig. 7.7
Fig. 7.8
Table 7.2
**
Note: Reset K-Master/keybox system if you have editedNetwork.
The system will be taken 30 seconds to load the new setting.
**
Note: For user/admin who is using LAN network cable to connect to corporate network. It is require to have
fix IP that won’t have conflict to other device. It conflict on IP occurred; user/admin unable to access system
due to the IP was taken by other.
**
Note: The System will auto logout once any changes were made.
8. ACCESS MODE
Step 1
Step 2
Step 3
Fig. 8.1
Table 8.1
Fig. 8.2
**
Note: Reset K-Master/Keybox system if you have edited Access Mode.
The system will be taken 30 seconds to load the new setting.
Admin
9. ADMIN LOGIN
Fig. 9.1
Step 6
Fig. 9.2
Fig. 9.3
① ② ③ ④ ⑤ ⑥ ⑦
① ③
⑥ Auto Refresh [ON/OFF] Site will Auto update the key status when turned
ON
Step 2) Select the KEYBOX ( ) from the left navigation (Fig. 11.1)
Step 4) Click AUTO REFRESH to set the site to automatically update the Key Status every
time a transaction was made.
Step 1) Click on the KEY NO to view the individual key status (Fig. 11.1item ② )
Fig. 11.2
Table 11.2
Item Description
Drawn By Name of the User who withdraw the key from Keybox
UID User ID
Fig. 12.1
Table 12.1
Key Duration Predefined period of time on how long User can use the Key
Fig. 12.2
Step 1) Key in the Name, Description, Key Type, and Serial Number (S/N) of the key (Fig.
12.2)
Step 2) Check only keys that are CRITICAL and select CRITICAL GROUP (Fig. 12.2)
Fig. 12.3
Step 4) Click OK (Fig. 12.3) to successfully close the Key Information editing.
**
Note: RESET K-Master/Keybox system if you have edited CRITICAL KEY USER GROUP.
The system will take 30 seconds to load the new setting.
Fig. 12.4
Fig. 12.5
Step 1) Click on Print (Fig 12.6) under the Key Info details page.
Fig. 12.6
Fig. 12.7
13. RECORDS
Fig. 13.1
Item Description
Date Specify the Time and Date (from and to) to access the Records
Table 13.1
Fig. 13.2
Step 1) Select from TIME / DAY / MONTH / YEAR to TIME / DAY / MONTH / YEAR
to access all the records within those specified dates (Fig. 13.2)
Fig. 13.3
Step 2) Select the Event from the Event List (see Table 13.2)
Table 13.2
Event Description
Key withdraw and return All recorded keys withdrawn and returned
Critical key withdraw and return All recorded critical keys withdrawn and returned
Multi access key withdraw and All Multi Access key withdrawn and returned
return
Key Expired (User) All keys that have expired from the allowable time duration
Critical Key Withdrawn All critical keys withdrawn from the Keybox
Multi Access Key Return All multi access key returned to the Keybox
Multi Access Key Withdrawn All multi access key withdrawn to the Keybox
Door Open Expire Keybox door has been opened beyond the allowed time
RFID Tag Wrong Slot The RFID tag was placed wrongly
Remote Key Withdrawn Key withdrawn from Keybox through Remote Release
Remote Key Return Key returned from Keybox through Remote Release
Expired Critical Key Return Critical Key returned after the allowed time period
Expire Key Return Key returned after the allowed time period
Time In Time In
Step 2) Click on DEPARTMENT to select the Department on dropdown list (Fig. 13.4)
Step 4) Click on KEY STATUS to select All/Key In/Key Withdrawn/Key Expired. (Fig.13.4)
Fig 13.4
Step 1) Click on User Name to select the User and view transaction records. (Fig. 13.4)
Step 2) Click on Department Name to select Department and its transaction records. (Fig.
13.4)
Step 3) Click on Key to select the Key and its transaction history. (Fig. 13.4)
**
Without selecting date range, Event, Username, Department, and Key, the system will show the
records of the current day with all the transactions done on the site.
***
Display Records by 10, 20, or 50 records per page
Fig 13.5
Fig 13.6
Step 3) Search successful. (Fig. 13.7)Refer to (Table 13.3) for details of Key Status page.
Fig 13.7
Table 13.3
Item Description
No Index
(Year/Month/Date – Hour/Minute/Second)
(Year/Month/Date – Hour/Minute/Second)
Fig 13.8
Step 3) Click on Image. (Fig. 13.7). The User image will be shown (Fig. 13.10)
Fig 13.9
**
The System Database will store the last 10,000 transactions. First In First Out (FIFO) methodology will apply.
***
The Images will be stored in the SD Card inserted in the SD Card slot within the Main Control Unit (MCU).
Fig 13.11
Clicking Selected Day without specifying other information will provide you current day log.
Fig 13.12
Step 4) Click on the Action Box to see the changes applied to the system by user.
(Fig.13.13 below)
Fig 13.14
Table 13.4
Item Description
Record Backup A support system wherein user can be able to save all of
specific Transaction Logs made on the site.
Audit Log Backup A support system wherein user can be able to save all or
specific Change Log made on the site
Data Backup A support system where the user can save all data submitted in
the system (User/Key/Key group/Multi Key
group/Schedule/Department/Designation)
Step 1
Step 2
Fig 13.12
Step 1) Select the DATE RANGE (Fig. 13.12) and export the file in EXCEL or PDF file
format
**
The Export File in EXCEL Format will automatically download to your download folder unless otherwise spec
ified.
***
The Export File in PDF will need to be save manually by the user.
Step 4
Step 5
Step 3
Fig 13.13
Step 4) Assign File name for the Audit Log in PDF format. (Fig 13.13)
Step 6) Select [EXCEL] on the Export File Format. Click BACKUP. (Fig. 13.12)
Step 7
Fig 13.14
Step 8
Step 8) Click on Open to check/verify file. (Fig. 13.15)
Step 9) Upon Opening/Verifying the File, Click [Save As] to save file to your assigned folder.
Fig 13.15
Step 1
Fig 13.16
Table 13.5
Item Description
Step 2) Files will automatically be in EXCEL format. SAVE the file to your preferences
folder.
14. USER
Item Description
Alarm User Group Group of Admin/User that are set to receive Alarm notification
Critical Key User Group Group of Admin/User that are set to receive Alarm notification on
all critical keys
Multi Access User A 2/3 way access to the Keybox wherein a Normal user along with
have the Key control user should enter both CID/UID to be
able to access the keys.
User Group To create a Normal group composed of Normal Users and a Key
Control Group composed of Key Control Users.
Fig 14.2
Table 14.1
Item Description
User Expiry Date [YYYY-MM-DD] Pre-defined time where the user can use his Access Rights
Maintenance Staff: User can check the info details and do a key/s search only
Backup User: User have less access rights compared to main user.
Normal User: Can access keys as per normal operation and will be included in
the Normal User group.
Key Control User: Can access key as per normal operation and will be
included in the Key Control User Group
UID + PIN (Default) Access Keybox with User’s UID and PIN
Max Key per Box Maximum number of key(s) that a User can take out from the Keybox
Duration Allowed Time duration for the User to access the key(s) from the Keybox
Withdraw Mode Select the type of key withdraw mode for user:
Select Key - User will have to enter the key number he want to access
**
By default, the drop down menu is not available or disabled.
User should do the section on Add New Designation, Add New Department to add new Designations and
Department.
**
Level, Box Access Mode, Duration, Max Key, Schedule, and Key Group needsto be selected in order to access
the Keybox except for the user(s)/admin who have assigned for multi access user.
**
CID needs to be filled up if the user is going to be assigned as a Multi Access User (Refer to Sec. 14.5).
Multi Access User are only allowed to flash card to access.
Fig 14.3
Fig 14.4
Step 2) Edit the necessary field for update (Fig. 14.2). You cannot edit UID.
Step 3) For change of password, key in the new password and confirm the new password
**
It is not advised to re-use the UID when the existing user in no longer tight with it. It will have an effect with the
records. It is advisable to delete the UID and create a new UID.
Fig 14.5
Step 1) Click on DEPARTMENT & DESIGNATION on the left navigation. (Fig. 14.6)
Fig 14.6
Fig 14.8
Step 1) Click on DEPARTMENT & DESIGNATION from left navigation (Fig. 14.6)
Fig 14.9
Fig 14.10
Fig 14.11
Fig 14.12
Fig 14.13
Tab 14.2
Item Description
Step 1) Click on ALARM USER GROUP (Fig. 14.13) on the left navigation.
Fig 14.14
**
Reminder message only functions if Super Admin has enabled the Site Alarm Group under the SITE SETUP.
Advise to use prepaid mobile line to send out reminder messages to user(s).
**
By default, the drop down menu of the group member is not available or disabled if Super Admin/Admin did not
add any Admin/User.
**
If you have hundreds of users created to the system, it will take longer time to show the members list from the
drop down menu.
**
The Alarm notifications are Power Down, Force Open Door, Force Open Gate, and Door Open Time Expire
through setup of the Alarm User Group (Section 14.3) and Critical User Group (Section 14.4) and User (Section
14).
Fig 14.15
Tab 14.3
Item Description
Step 2) Click on CRITICAL KEY USER GROUP (Fig 14.15) at the left navigation
Fig 14.16
Step 5) Select the GROUP MEMBER (01-05) from the drop down list
**
By default, the drop down menu of the group members is not available or disabled if Super Admin did not add any
Admin/User to the system..
**
If there are hundreds of users created to the system, it will take longer time to view the members list in the drop
down menu.
Fig 14.17
Fig 14.18
Fig 14.19
Step 2) Click OK to delete the selected Critical Key User Group. (Fig. 14.19)
**
The alarm notifications are Power Down, Force Open Door, Force Open Gate, and Door Open Time Expire
through email or SMS to a mobile phone.
Fig 14.20
**
Multi Access User can access the system by flashing his Card ID (CID)
Table 14.4
Item Description
Fig. 14.21
Step 2) Click on MULTI ACCESS USER (Fig. 14.21) at the left navigation
Fig. 14.22
Table 14.5
Item Description
Key Control User Group Select pre-assigned Key Control User group
Step 6) Select NUMBER OF USER (Fig. 14.22). You can set at least 2 users and maximum
of 3 users
**
If Admin have not set multi group in the GROUP tab, the drop downmenu for this feature will be disabled (see
Section 15 for the ADD MULTI ACCESS KEY GROUP).
**
If Admin have not set Key Control group in the User Group, the drop down menu for this feature will be disabled
(see Section 14.6 for the ADD KEY CONTROL GROUP).
**
If Admin have not set Normal group in the User Group, the drop down menu for this feature will be disabled (see
Section 14.6 for the ADD NORMAL GROUP).
**
If you have hundreds of users created to the system, it will take longer time to showhet member list from drop down
menu.
Fig. 14.23
Fig. 14.24
Fig. 14.25
Table 14.6
Item Description
User Group Admin to set Normal User and Key Control User
They operate as Normal users but cannot acquire key without the Key
Control Group Access
Add Key Control Group Key Control group can either be a User or an Admin.
Fig. 14.26
**
The Admin group will automatically set toNO if the group is under NORMAL GROUP. It will automatically set to
YES for the KEY CONTROL GROUP.
Fig. 14.27
Fig. 14.28
15. GROUP
Fig. 15.1
Table 15.1
Item Description
Multi Access Key Assign key(s) in groups which can only be accessed by multi access user(s)
Group
Fig. 15.2
Step 3) Key in the NAME and DESCRIPTION of the group (Fig. 15.2).
Step 5) Select the KEYS (Fig. 15.2) that will allow the group to draw out from the Keybox.
**
If Admin ENABLE the INTERLOCKINGfeature, groups cannot access the same keys. Setting a group wilhALL
KEYS will automatically disable this feature.
Fig. 15.3
Step 2) Key in necessary fields to update. SELECT/DESELECT the keys which need to be
changed.
Fig. 15.4
Fig. 15.5
Step 3) Select the KEYS (Fig. 15.5) to be set for Multi Access User.
**
Only those keys that have not been selected / assigned in a Group can be selected in MULTI
a USER GROUP.
Fig. 15.6
Step 2) Edit all necessary fields. Select/Deselect the keys which needs to be changed. (Fig.
15.5)
Step 4) Click on DELETE (Fig. 15.6) under action or DELETE ALL to delete all groups.
16. SCHEDULE
Item Description
No Number of schedule
Fig. 16.2
Step 3) Select TIME START and TIME END under segment 1, 2, and 3 (Table 16.2).
Table 16.2
Item Description
Fig. 16.3
Step 4) Click on DELETE (Fig. 16.3) under action column or DELETE ALL to delete all
submitted schedules (Fig. 16.3)
17. SYSTEMS
Item Description
Upload Data through CSV Transfer data through .csv file format
Step 2) Click UPLOAD DATA TO PC (Fig. 17.1) from the left navigation
Step 3) Click UPLOAD to transfer data from the Keybox to your PC.
Fig. 17.2
Fig. 17.3
Fig. 17.4
Step 1) Click on DOWNLOAD DATA FROM PC (Fig. 17.4) from the left navigation.
Step 3) Select the .db file (Fig. 17.5) in your PC directory and click OPEN (Fig. 17.5)
Fig. 17.5
Fig. 17.7
Step 3) Select on UPLOAD USER DATA / UPLOAD KEY LIST to VMS (Fig. 17.7)
Fig. 17.8
Step 1) Click on UPLOAD DATA THROUGH CSV (Fig. 17.8) on the left navigation.
Fig. 17.9
Step 3) Select the .csv file from the PC directory and click Open to upload file. (Fig. 17.9)
Fig. 17.10
Tags Registration
Fig. 18.1
Fig. 18.2
Fig. 18.3
Step 4) Click on the Key box ( ) number to select which Keybox to register the RF Tags.
**
By default, the Tag ID registration column will have 0000000001 value. Delete and Enter the new RF Tag ID.
Fig. 18.4
Fig. 18.5
NOTICE TO USERS
The iKLAS development team will constantly upgrade/improved our iKLAS system to maintain
High Security Standards. We welcome feedbacks from our customers on any improvements that
can be made to our system. Therefore changes will be made to the manual as we continue to
improve our IKLAS system to better serve our customers and maint ain High Security Standards.
The IKLAS development team will inform our highly valued customers of any changes to our
manual.
- END –