stonelock network user manual version 17.2 · pdf filestonelock network user manual version...

34
STONELOCK NETWORK USER MANUAL Version 17.2.1

Upload: lamkhue

Post on 17-Mar-2018

217 views

Category:

Documents


2 download

TRANSCRIPT

STONELOCK NETWORK USER MANUAL Version 17.2.1

www.stonelock.com

About StoneLock Pro ................................................................4

1.0 Overview1.01 ..................System Introduction .........................................4

1.02 .................System Components ........................................4

1.03 ................. Installation ........................................................5-6

1.04.................Uninstall .................................................................6

2.0 Instructions for Use 2.01 .................System Startup ............................................. 7-10

2.02 ................System Settings .................................................11

2.03 ................Role Management .............................................11

2.04................Operator Management ...................................12

2.05 ................System Configuration ............................... 13-14

2.06 ................Operation Log ....................................................15

2.07 ................Database Management ..................................16

2.08 ................Device Settings..................................................17

2.09 ................Device Management ........................................18

2.10 .................Device Maintenance .........................................21

2.11 ..................Data Synchronization .....................................22

2.12 .................Electronic Map ..................................................23

2.13 ................. Real-Time Records Management ...............24

2.14 .................User Management ...........................................25

2.15 .................Time Group Management .............................26

2.16 .................Holiday Management .....................................27

2.17 .................Permission Management ..............................27

2.18 .................User Management ....................................28-29

2.19 .................Batch Modify User .......................................... 30

2.20 ................Group Management .................................. 31-32

2.21 .................Data Management ...........................................33

2.22 ................Verification Records Management ............33

2.23 ................Alarm Records Management ......................33

Table of Contents

NETWORK USER MANUAL – www.stonelock.com 2

1.0

About StoneLock Pro

StoneLock Pro is an extremely fast and

accurate IR facial recognition biometric unit

for access control applications. It incorporates

proprietary biometrics along with a keypad

and HID® iClass SE Multi-Class Reader into a

3-point device.

StoneLock Pro™ includes a faceplate unit and

a control unit.

StoneLock Global is a provider of high

quality biometric products for access control

applications.

Section 1: Overview

The StoneLock Network (SLN) software is a security management platform for managing StoneLock

access controls and related systems across a network.

Functions include StoneLock hardware management, user management, privilege management, remote

user enrollment, records checking and alarm controls.

1.01 SYSTEM INTRODUCTION

The SLN software platform integrates StoneLock’s advanced face recognition technology, the access

control functions, along with keypad entries and/or ID cards in various authentication combination

modes.

The SLN software platform centralizes data management, allowing the unique advantages of face

recognition to be quickly pushed across an entire facility, or even multiple facilities, each with multiple

entrance locations. Events can be easily monitored, greatly improving the level of security control.

The SLN platform, allows for control of all access control terminals, including StoneLock units, user

information, user privilege management, records management, system alarm controls and other

functions.

1.02 SYSTEM COMPONENTS

•!StoneLock Network Software Platform

•!StoneLock Pro Access Control Device (up to 64 units on one network)

StoneLock Pro

Faceplate

StoneLock Pro

Control Unit

10:36:2307/17/2013 Wednesday

www.stonelock .com

Cameras(NIR Camera

not visible)

NIR Lights

Light Bar

LCD Display

Keypad

Light Sensor

HIDCardReader

NETWORK USER MANUAL – www.stonelock.com3

1.0

1.03 INSTALLATION

Follow these steps to install the full security management platform software (SLN):

1) Double-click the installer to begin the installation.

2) On the Welcome interface, select [Next] to continue the installation (Figure 1.03-1).

3) At the License Agreement screen (Figure 1.03-2), check the box “I have read and agree to the above

agreement”, and then select [Next] to continue the installation.

4) At the “Choose Install Location” screen (Figure 1.03-3), the system default installation

directory is: C: \ Program Files \ SLN2.3

a. Select [Next] to continue the installation.

b. If you need to modify the installation path, select the [Browse] button to

select the installation folder.

Fig 1.03-1

Fig 1.03-2

Fig 1.03-3

NETWORK USER MANUAL – www.stonelock.com 4

1.0

5) Installation

Select [Install] to install the SLN software.

The Installation Process: Database Initialization window will prompt you to initialize the database.

Within the Database Initialization you will need to establish a destination folder to house the database.

i.e. C:\SLNdata

Initialize: Select the database type (SQL 2000, SQL 2005, SQL 2008, Access or Firebird), then enter the

server address, user name, and password and then select [Initialize] to initialize the database.

Note: If you have a previous version of the SLN installed, click on the OK button, as you will not need to initialize the database again. (Figure 1.03-4)

[Upgrade]: This function is specific to changing your database. This step will only need to be performed

if you are changing from a previous database, i.e. SQL2000 to SQL2008.

6) Select [Exit], and then select [Finish] to complete the installation. (Figure 1.03-5)

1.04 UNINSTALL

Before uninstalling:

a. Exit and close the SLN

b. Go to the Start Menu / All Programs / StoneLock Network and select the [Uninstall] option.

Fig 1.03-4

Fig 1.03-5

Fig 1.03-3

1.0

5

2.0

NETWORK USER MANUAL – www.stonelock.com

Section 2: Instructions for Use

2.01 SYSTEM STARTUP

a) Double-click the desktop icon (Figure 2.01-1) to run the SLN. A prompt box of

“System Register” will pop up in the initial startup.

In the Registration dialog box (Figure 2.01-2), select [Register] to initiate a quick

registration sequence, or select [Trial] button for a 30-day trial period.

b) After successful registration, the system automatically connects with SQL SERVER

database and loads the system resources. If the database connection fails, the

message box “failed to connect database” will pop up (Figure 2.01-3).

Fig 2.01-1

Fig 2.01-3

Fig 2.01-2

6

2.0

NETWORK USER MANUAL – www.stonelock.com

Click [Yes] to pop up the database initialization window (Figure 2.01-3), and then configure relevant

parameters according to actual situation.

Database Type: The system supports SQL Server 2000, 2005, 2008, MS Access, Firebird.

Server: Fill the LAN server rooted by SLN (ie the database server) with actual IP address.

User Name, Password: database type for SQL Server 2000, 2005, 2008; users fill out the SQL Server, the

user name and password usually sa; for Access, the user name and password are empty; for the Firebird,

the user Name Fill sysdba, password is masterkey.

c) When the database connection is successful, the system login interface will appear

(Figure 2.01-5).

Fig 2.01-3

Fig 2.01-4

Fig 2.01-5

7

2.0

NETWORK USER MANUAL – www.stonelock.com

Enter the correct user name and password (the default super administrator user name: admin, password:

888888 to enter the main interface (Figure 2.01-6).

The S-Admin can change the password after the initial login.

d) Service Mode: In the main interface, click [Transit service configuration] icon (Figure 2.01-7);

the pop-up transit server configuration window is shown in (Figure 2.01-8).

Service Mode (Figure 2-8):

Local mode: Only allow one SLN application to connect with a StoneLock Pro unit.

Transit mode: Allow multiple SLN applications to connect with StoneLock Pro units when

transit daemon is run. You must first modify the mode as transit mode and fill in the correct

transit server IP.

Fig 2.01-6

Fig 2.01-7

Fig 2.01-8

8

2.0

NETWORK USER MANUAL – www.stonelock.com

Transit Service IP: Enter the actual IP address of the server on which transit daemon is run (i.e. the

transit server). The Transit IP is recommended to be consistent with database IP; that is, the transit

server and database server are the same.

Open background service transit: transit mode set, you must open the transit daemons. Open the

“Start Menu - All Programs - SLN”; run “transit background services”.

In the Transit Service dialog box, (Figure 2.01-9), enter the correct user name and password to enter

the background transit service main interface (Figure 2.01-10).

Client List: Displays client information connected with background transit service.

Online Device: Display StoneLockTM device information connected with background

transit service.

Offline Device: Display StoneLockTM device information disconnected from the background

transit service.

Device Load: Display load information of online StoneLock device.

Fig 2.01-9

Fig 2.01-10

9

2.0

NETWORK USER MANUAL – www.stonelock.com

2.02 SYSTEM SETTINGS

Click the [System Settings] menu, and it will appear in a menu bar (Figure 2.02-1).

2.03 ROLE MANAGEMENT

See Interface (Figure 2.03-1)

New Role Permissions: Select [New]; the system adds a new role.

New: Click the [New] button to add a new role with a default name. Select desired

Function Module and Details for the role. Choose a name for the Role.

Note: Checking [Enabled] within the Function Module and/or within the Details

section selects all permissions.

Note: Once any permission within a role has been changed, the administrator

roles must be reassigned to the Operator.

SELECT [SAVE] FOR ANY CHANGES TO TAKE PLACE.

Fig 2.02-1

Fig 2.03-1

10

2.0

NETWORK USER MANUAL – www.stonelock.com

2.04 OPERATOR MANAGEMENT

See Interface (Figure 2.04-1)

Add: Click the [Add] button to add a system operator. The name will default to i.e. Oper #. This Operator

will default to the initial password of 888888 until it is changed by the super admin.

Set the new Operator’s user name, password, assign a role and area of privilege.

Click [Save] button.

Reset Password: Choose an Operator; click the [Reset password] button to reset the password back to

default 888888.

Remote Password: This password will be used for remote log-ins. This password can be reset at any time by

the administrator logging in the system.

Single Use: Checking this indicates that the remote password becomes invalid following a single use. This

password can only be reset by the administrator.

Advanced Settings: Select an operator; click the [Advanced Settings] button to set this operator’s mobile-

phone number, address and other details. (Figure 2.04-2)

Note: Admin is the system’s super Administrator. The Admin’s privileges can not be deleted or modified. They can manage all SLN features as well as all StoneLock Pro units within the system. A non-admin operator

can only manage the terminals within their assigned roles and area.

Tip: Passwords may contain 0-16 characters (including letters, numbers, special characters and spaces), and

are not case-sensitive.

Fig 2.04-1

Fig 2.04-2

11

2.0

NETWORK USER MANUAL – www.stonelock.com

2.05 SYSTEM CONFIGURATION

See User Configuration interface (Figure 2.05-1)

Card parameters: Choose appropriate card port as well as card type.

Default Profile ID Number: By checking this box the SLN will automatically generate

an ID number for the individual users profile. By not checking this box the Admin or

Operator will need to assign an ID number to each user, i.e. employee ID number

User Expiration: Users not verified for a long period (60 days by default) become

expired. Expired users will be displayed in “Pending Delete User” nodes in the window

“User Management - User Profile Management” (Figure 2.05-2)

Configure the system information for:

• Days of alarm record keeping

• Days of verification record keeping

• Days of operation log keeping

• Days of His-Changed Photo keeping

Expired time of each type of data can be configured, and the system default time is

60 days. Click the [Clear] button to clear this default number in the window “System

Settings - Database Management”.

Fig 2.05-1

Fig 2.05-2

12

2.0

NETWORK USER MANUAL – www.stonelock.com

See [System related] interface (Figure 2.05-3)

Enable remote password authentication: By checking this option, this provides the system

administrator for StoneLock access to the terminal for remote operation (i.e.: remote open,

remote close, emergency locking, emergency unlocking, etc.).

Time Calibration: Click on the [timing] button to sync the current time on all connected

units.

Hourly calibrating: Check and save this option when the SLN is running, the system will

automatically calibrate the time on the attached StoneLock Pro units.

Automatic Logout: By checking this option, you can set a time interval to automatically

log the Admin/Operator out of the system when it is idle for a specified amount of time.

See [Alarm related] Interface (Figure 2.05-4)

Enable Voice Alarm: Check this option to will turn on voice prompts when events happen.

Times: Choose the drop down menu to select number of times the alarm sounds when a

corresponding event occurs. Note: If the number of alarm times is not selected, the alarm

plays in an infinite loop.

Note: Double-clicking color will enable the user to color code various alarm events for quick

reference in the Real Time Record Management screen under Device Settings.

Fig 2.05-3

Fig 2.05-4

13

2.0

NETWORK USER MANUAL – www.stonelock.com

2.06 OPERATION LOG

See Interface (Figure 2.06-1)

• Click the drop down in the Operator field to select the Operator.

• Click the drop down in the Start Date to choose the start date.

• Click the drop down in the End Date to choose the end date.

• In the Operation field, type keyword(s) to search events (optional).

• Click the [Search] button; the system will search the selected operator’s entire activity log.

The log information includes: time of event, the operation, the operator, and the server name.

Fig 2.06-1

14

2.0

NETWORK USER MANUAL – www.stonelock.com

2.07 DATABASE MANAGEMENT

See Interface (Figure 2.07-1)

1) Data Cleanup

Click the [Clear] button to delete any expired records based on the set number of days

in the Data Related fields under System Configuration.

Note: Expired data should be cleared periodically to maintain optimal data storage.

2) Database Backup

Click the [Browse] button to specify the storage directory of the database

backup files.

Click the [Backup] button, database backup files labeled with current system time will

be generated immediately and stored in the specified path.

3) Database Restore

Click the [Browse] button to select a backup database file from specified directory.

Click the [Restore] button to restore the database immediately.

Note: Restore will overwrite the existing data with the data in the backup file chosen.

Fig 2.07-1

15

2.0

NETWORK USER MANUAL – www.stonelock.com

2.08 DEVICE SETTINGS

Click the menu “Device Settings”, a menu bar will appear. (Figure 2.08-1)

2.09 DEVICE MANAGEMENT

See Device Information tab (Figure 2.09-1)

Creating a New Area: Select [New] in the Area Window. The new Area Window will appear

(Figure 2.09-2)

Use the Superior drop down menu to select to define where the new area will be created.

Name the new area by typing in the Area Name Field.

Click [OK], the new added area will be displayed in the area list. The system supports multi-

level areas. Repeat the above steps to create sub-areas within each main area.

Click [Edit] to edit area names and to move the area under other areas. The hierarchy can

also be rearranged by dragging and dropping.

Click [Delete] to delete any highlighted area.

Click [Search] to find any unassigned devices that are connected to SLN.

Fig 2.08-1

Fig 2.09-1

Fig 2.09-2

16

2.0

NETWORK USER MANUAL – www.stonelock.com

Setting up a new device within an area: Select an area and click the [New] button on the device window to

add a device. In the Device Information tab you may:

• name the device

• confirm the device is in the correct area

• select operate mode

• Secondary identity verification (i.e. a card or code)

• IP address of the connected unit

• Choose Hold-Open Time for the controlled door

• Door Contact Over-Time

• Click the [Save] button

Super Password: The Super Password can only be used to open the door in particular situations by the

S-Admin. Check the “validate Super Password” option, the StoneLock Pro unit will validate the super

password (or else invalidate). A Super Password can contain from 4-8 digits.

Operation Modes:

1:1 mode: When this mode is set, users are required to present a card or input an employee number first at a

StoneLock Pro unit, then accept face recognition authentication.

1:N mode: When this mode is set, users can use face only at a StoneLock Pro unit.

Mixed mode:

Caution: Mixed mode should only be established via the SLN. Don’t say we didn’t warn you!

When Mixed mode is selected, the network administrator can allow select individual users to be

authenticated with face only. All other users default to card plus face. (Refer to 2.18 to learn how to set a user

to Mixed mode)

Note: In Mixed mode, a maximum of 200 users can be registered with face-only on a single StoneLock Pro

device. All others users must be card plus face in this same device.

Card verification: Users directly swipe authorized IC \ ID card for authentication.

Fig 2.09-2

17

2.0

NETWORK USER MANUAL – www.stonelock.com

Auxiliary:

Empty: Allows no assisted verification in specified operating mode. This will default the device to is face only.

Card Verification: Allow cards verification in specified operating mode.

ID Verification: Allow employee ID# verification in specified operating mode.

Card Verification/ID Verification: Allows both cards verification and employee ID# verification in specified operating mode.

Device IP: Device IP is set as the actual IP address of StoneLock device. It connects with its corresponding devices when SLN is successfully

connected via network.

1There is a bug in the setup, which allows a non-card-registered S-Admins to establish Mixed Mode and thereby “fatally” lock everyone out of all advanced functions (the only fix for this is to reset the unit with SLN software). Until we get this bug corrected we recommend only Mixed Mode from an SLN. Yes, it happened to us. Yes, StoneLock is very secure.

Note: To identify the corresponding devices ID, a Super Admin must authenticate themselves at a terminal, go the Network, click OK, scroll down to IP settings, click OK and the IP address is shown. To change the IP address click OK and enter the number using the arrow keys will allow you to navigate from field to field, click OK, Esc, Esc.

Device permissions: Configure the open permission for StoneLock device

Allow: Unauthorized users are allowed to open the door after successfully being verified by the StoneLock access device.

Refuse: Unauthorized users are not allowed to open the door after successfully being verified by the StoneLock Pro unit.

18

2.0

NETWORK USER MANUAL – www.stonelock.com

See Device Status tab (Figure 2.09-3)

Display Real-time Record: When this option is selected, user

verification records can be viewed on the window “Device

settings/ Real-Time Records Management” verified by the

StoneLock Pro unit.

Remote loading of User: When this option is selected, a remote

user can be verified via swipe card or the keypad entering of

an employee ID at the StoneLock Pro unit, providing the user

information has already established.

User Synchronization: When this option is selected, user’s

information can be synchronously updated to SLN when SLN

is run and this user has been registered or reregistered by a

StoneLock Pro unit.

Abducting alarm: When this option is selected, the system can

Fig 2.09-3

immediately send abducting alarm signal to SLN and display it onto “Device Settings /Real-

Time Record Management” window when the user enter abducting password, making sure

that SLN can receive distress calls the first time.

Door Contact: When this option is selected, a StoneLock Pro unit will monitor the door

contact state. When an error condition is detected (e.g.: illegal open or a door contact

timeout), the system can immediately send alarm Information and display it onto “Device

Settings /Real-Time Record Management ”window.

Hardware Arming: When this option is selected, the system will trigger an alarm when

any abnormal treatment of a StoneLock Pro unit is detected (such as striking, shaking, or

otherwise manhandling the unit).

Save Failed Record: When this option is selected, failures recorded by a StoneLock Pro unit

will be recorded in the database.

Sub-Door Interlock: When this option is selected, the two sub-doors of the device will exert

a linkage interlock function such that sub-door 2 cannot be opened while the door contact

of sub-door 1 stays open, even with verification. Only when the door contact of two sub-

doors are in their closed state can the system open either one of them again.

Remote Confirm For door 1: When this option is selected, the StoneLock Pro unit in sub-

door 1 sends an OPEN request remotely to the SLN after it has successfully verified an

authorized user. The SLN will present a Remote Open Request window to display the door’s

real-time video and verification details. After the administrator’s confirmation, the door

finally opens.

Remote Confirm For door 2: When this option is selected, the StoneLock Pro unit in sub-

door 2 sends an OPEN request remotely to the SLN after it has successfully verified an

authorized user. The SLN will present a Remote Open Request window to display the door’s

real-time video and verification details. After the administrator’s confirmation, the door

finally opens.

19

2.0

NETWORK USER MANUAL – www.stonelock.com

See Sub Door Information Tab page (Figure 2.09-4)

Remote Open Door: You can open the selected sub-door of StoneLock Pro unit remotely.

Remote Close Door: You can close the selected sub-door of StoneLock Pro unit remotely.

Emergency Unlocking: When this option is selected, the selected Sub-Door of this device stays

open until the administrator selects Normalization (same function as in Device Maintenance).

Emergency Locking: When selected, the selected Sub-Door of this device stays closed until the

administrator selects Normalization (same function as Device Maintenance).

Recover normal: When selected, the door of this device reverts back to normal operation from

emergency locking or emergency unlocking. This function is the same as Normalization in Device

Maintenance.

2.10 DEVICE MAINTENANCE

See Device Maintenance tab (Figure 2.10-1)

Upgrade: Click the [Browse] button to select the upgrade file path and then select the device

expected to be updated in the device list, click the [Upgrade] button to upgrade the device.

Reboot: reboot the specified StoneLock Pro unit remotely.

Format: When selected, all the data in the specified device will be formatted to factory settings.

Warning: All profiles in the device will be cleared.

Emergency Unlocking: When selected, the door of this device stays open until the administrator

chooses Normalization (same function as in Sub-Door Information tab).

Emergency Locking: When selected, the door of this device stays closed until the administrator

chooses Normalization (same function as in Sub-Door Information tab).

Normalization: When selected, the door of this device reverts back to normal operation

from emergency locking or emergency unlocking (same function as in Sub-Door

Information tab).

Fig 2.09-4

Fig 2.10-1

20

2.0

NETWORK USER MANUAL – www.stonelock.com

2.11 DATA SYNCHRONIZATION

See Interface (Figure 2.11-1)

Automatic Synchronization: Check this option to configure the automatic sync cycle and

time to automatically push and pull information to all networked StoneLock devices. Click

[Save].

Manual Synchronization: Choose the device from the Device list on the right, the content

you want to synchronize, and then select [Synchronize]. The chosen device and its content

will be made available within the SLN.

Time group: This function allows synchronizing information for a designated time group for

a specified StoneLock Pro unit.

Holiday: Synchronizes holiday time for a specified StoneLock Pro unit.

User Data: Synchronizes user data for a specified StoneLock Pro unit.

Permissions: Synchronizes permissions for a specified StoneLock Pro unit.

Verification Records: Downloads all verification records from the specified StoneLock Pro

units to the SLN.

Alarm Records: Downloads all alarm records from the specified StoneLock Pro unit to the

SLN.

Note: The system can only perform the data synchronization functions when the chosen StoneLock Pro units are online.

Fig 2.11-1

21

2.0

NETWORK USER MANUAL – www.stonelock.com

2.12 ELECTRONIC MAP

See Interface (Figure 2.12-1)

Import a facility map/floor plan from a folder on your computer. These files must be

saved as jpg or bmp files. This function enables you to easily mark where all of the

StoneLock Pro units are on your map, as well as a quick reference of activity that has

occurred at each device.

Import Map: Right-click the mouse on the map interface and choose [Edit] from the

pop-up menu. On the right, choose [Select map] to browse for a saved map. Click the

open button, map appears on screen. (Figure 2.12-2)

Mark Position: Once a map has been imported, left click on the [Mark Position] to

add a unit, and then left click on the map to position the unit. Once placed, you can

left click and drag the unit anywhere on the map. To add subsequent units, repeat the

above steps.

To name each unit, right click on a placed unit; choose Edit Device from the pop up

menu, and click the drop down. Choose the specified device name. Click [OK]. Repeat

this for each device within the map. Note: Only named devices will be visible after

exiting the map editor.

To delete each added device, right click on the placed device. Choose Delete Device

from the pop up menu. Repeat this for each device within the map.

Exit Map Editor: Scroll down to the [Exit Map Editor] and click to leave edit mode.

To view map in full screen: Right click and choose Full Screen from the

pop-up menu

Fig 2.12-1

Fig 2.12-2

22

2.0

NETWORK USER MANUAL – www.stonelock.com

2.13 REAL-TIME RECORDS MANAGEMENT

See Interface (Figure 2-30)

Real-time Records Display: the window of “Real-time record management” displays verification

details about the user immediately after they are successfully verified by a connected StoneLock Pro

unit. Information provided includes; name, ID, department, event, device accessed, time, and a real-

time photo of the event. This window contains the last 100 records.

Note: Real-Time records can only be displayed when you check “Display Real-time Record” from the “Device Settings - Device Management - Device Status” window. For detailed operations, see 2.3.1 Device Manager.

Click the [Filter Setting] button to pop up “Filter Settings” window (Figure 2-31). You can only filter

real-time records on any device checked.

Click [OK].

Fig 2.13-1

Fig 2.13-2

23

2.0

NETWORK USER MANUAL – www.stonelock.com

Click the [Subtitle Settings] button to open the dialog box shown in Figure 2.13-3. User can specify the

font and color of the window caption.

Click the [Mute] button to mute the system’s current event alarm.

Remote Assistance: The system does not display “Remote Assistance” window by default, unless when

StoneLock device sends a request to open the door remotely. Once the administrator confirms the

request, the window will be hidden.

2.14 USER MANAGEMENT

Click the [User Management] menu to pop up the menu bar as shown in Figure 2.14-1.

Fig 2.13-1

Fig 2.14-1

24

2.0

NETWORK USER MANUAL – www.stonelock.com

2.15 TIME GROUP MANAGEMENT

See Time Group Management Interface (Figure 2.15-1)

New: Click the [New] button to create a new time group. Set its name, start and end dates and

times. Choose time, day, month, year filters as desired. Click [Save] button.

Take time group 1 in Figure 2.15-1 for example, different detecting method bring different valid period

of permission as follows:

Note: All filters actions are driven from the chosen start date.

Check Year: The valid period is valid 2011 to end of 2012.

Check Month: The valid period is from start date in May to June in any year.

Check Day: The valid period is from 16th to 27th in any month and year.

Check Time: The valid period is 08:00:00-18:00:00 in any day.

Check Week: If Monday is checked, the valid period is Monday in any month and year.

Simultaneous check year and month: The valid period is from May, 2011 to June, 2012.

Simultaneous check year, month and day: The valid period is from May 16, 2011 to June 27, 2012.

Simultaneous check month and day: The valid period is from May 16, to June 27 in any year.

Simultaneous check year and day: The valid period is from 16th to 27th in every month from 2011 to

2012.

Fig 2.15-1

25

2.0

NETWORK USER MANUAL – www.stonelock.com

2.16 HOLIDAY MANAGEMENT

See Holiday Management Interface (Figure 2.16-1)

New: Click the [New] button to add a new holiday, set its name, start and end time. Click [Save].

Note: All users cannot open the door on the holiday, unless the “Access allowed on Holiday” option is checked from the “User Management — Permission Management” window. For detailed operation

see 2.17 Permission Managment.

2.17 PERMISSION MANAGEMENT

See Permission Management Interface (Figure 2.17-1)

New: Click the [New] button to add a new permission. Set its name. Select the “unified device set

time group” to show established time groups. Choose the area, select the device, its output(s) and

the time group(s). Click [Save].

To apply Permissions to all connected devices in a specified area, the user can check the “Select all”

feature.

To allow access on Holidays: Check the box “Access allowed on Holiday” for the Permission. Click

[Save].

To delete a permission, click the [Delete] button.

Fig 2.16-1

Fig 2.17-1

26

2.0

NETWORK USER MANUAL – www.stonelock.com

2.18 USER MANAGEMENT

See User Management Interface (Figure 2.18-1)

[Add]: Click the [Add] button to add a new Department..

In the Edit Department menu, shown in Figure 2.18-2, under Superior drop down, select the location of the

department. In Department field provide a name. Click [OK].

To add a New user: Select the user’s department; then click the [New User] button to add a new user.

Enter Job ID, Name, Select gender from drop down, Card ID (optional), Import Photograph (optional) using

the [Import] button, Select user type from the drop down, go the Regional to select areas from the drop

down, and select the available permissions for the selected area (refer to 2.17 for Permissions). Select Expiry

date and use drop down to establish the expiration date. Click [Save] button.,

Read card: When a valid reader connects with SLN, its information can be read into “card ID” by clicking

[read card] button. After saving, this card is tied to the user’s profile, allowing the user to verify their

identity by swiping the card at StoneLock device.

Loss Report: If a user loses a card, click on the [loss report] button to report the loss. The card will

no longer allow access. Attempted use of the card at a StoneLock device will immediately srecord

alarm information with the scene photo and will be displayed in the “Device Settings/Real-time Record

Management”.

Download: Click this button to download all added or modified user information from connected/online

devices to the SLN. Any user which has not been assigned to an area and a permission will appear in the

unassigned user list and will not be synchronized with any StoneLock device.

Synchronize: Click this button to synchronize the user information for all users that have been assigned to

an area and permission profile. WARNING! Any users that have not been assigned during the previous step will

be deleted from the StoneLock devices.

User Type: Set user’s type in the SLN. “Common User” is the default. It is denoted as “user” on the

StoneLock device.

Fig 2.18-1

Fig 2.18-2

27

2.0

NETWORK USER MANUAL – www.stonelock.com

Super Administrator: Users set as super administrator can operate all settings

on the StoneLock device. It is denoted as “S-Admin” on the StoneLock device.

Common Administrator: Users set as common administrator can perform new

user enrollment of a user and query records. It is denoted as “Admin” on the

StoneLock device.

Common User: Users Set as common user can only be verified at a StoneLock

device. It is noted as “User” on the StoneLock device.

Expiry Date: This function becomes active by checking the box and setting

a date with the Drop down. Users are allowed to be verified at a StoneLock

device until the date set on the expiry date field. If access is attempted after the

expiration date, an alarm event with a scene photo will be sent to the SLN and

displayed on the “Device settings/Real-time record management“ window.

Blacklist: Check this option to put a user into the blacklist. The user will never

be verified at a StoneLock device, if the blacklisted user attempts access, alarm

information with a scene photo will be sent to the SLN and displayed on the

window of “Device settings/Real-time record management“.

Mixed Mode: When this box is checked, this function enables a user to gain

access at a StoneLock device using either a [Card + Face] or Face only.

Note: There is a limit of up to 200 users that can be set to mixed mode in the SLN and the device must also be set to Mixed Mode (Refer to 2.3.1 to learn more).

Registry Device: Click this button to open a dialogue box and choose the

device you wish to use for Remote Enrollment. Select the device and click [OK].

Remote Registry: Click this button to remotely register a user using the

Registry device selected. You must select a Registry device as mentioned above

to remotely enroll a user.

Unassigned users: Any new user that is enrolled or downloaded from a device

will be defaulted as an unassigned user. To assign an unassigned user, select

the unassigned “new user” on the left, enter Job/Employee ID, Name, Select

gender from drop down, Card ID (optional), Import Photograph (optional) using

the [Import] button, Select user type from the drop down, go the Regional to

select areas from the drop down, and select the available permissions for the

selected area (refer to 2.4.3 for permissions). Select Expiry date and use drop

down to establish the expiration date. Click [Save] button.

Deleting user: Users that are on a device and have been pulled in via

the [Synchronize] button will be placed in this category since they are

“unassigned”.

28

2.0

NETWORK USER MANUAL – www.stonelock.com

2.19 BATCH MODIFY USER

See Interface (Figure 2.19-1)

Perform a search by first selecting a condition using the dropdown and typing a keyword search in the

content box. The keyword must be an exact match and is case sensitive. The only condition that does not

require keyword is the ‘all users’ selection.

Choose the the user from the search list you want to modify, then click [Batch Modify] button to bring out

the “Batch Modify” window (Figure 2-39). Use the dropdowns to modify its department, belongs area and

permissions. You can also batch modify, expiry time, mixed mode or blacklist. Once your modifications are

set, click [Batch Modify] for the changes to take effect within the SLN.

You need to then use the [Synchronize] button in “User management/user management” to apply these

changes.

Fig 2.19-1

Fig 2.19-2

29

2.0

NETWORK USER MANUAL – www.stonelock.com

2.20 GROUP MANAGEMENT

See Interface (Figure 2-20-1)

New: Click the [New] button to open the “Add Group” window (Figure 2.20-2). Configure its

name, defined device(s); click [OK].

Two sub user groups are added and displayed by default. Sub-users groups cannot be deleted,

as show in (Figure 2.20-3).

Fig 2.20-1

Fig 2.20-2

Fig 2.20-3

30

2.0

NETWORK USER MANUAL – www.stonelock.com

Add User: Select a sub user group, click the [Add User] button to open the “Select User” window

(Figure 2.20-4).

Perform a search by first selecting a condition using the dropdown and typing a keyword search

in the content box. The keyword must be an exact match and is case sensitive. The only condition

that does not require keyword is the ‘all users’ selection.

Choose up to SIX users by checking the box next to the user from the search list, then click [OK].

To move a user up or down in a list, click on the user in the list and then click the [Upward] and

[Downward] buttons respectively.

To delete a user in a list, click on the user in the list and then click the [Delete] button.

Click [Save] to save all modifications to the group.

Less No. of: Set the at least turnout in sub user group. Take the number in Figure 2.20-5 for

example; any two of users in the sub use group that appear will do.

Orderly: If you check this option, users in sub user group must be verified orderly, otherwise

combine verification is invalid. You can reorder it by clicking [up], [down] buttons.

Note: Two sub user groups by default can be set in a combination, and each contain a maximum

of six users. When checking “recognizing orderly”, the first group will be verified before the second

one.

Fig 2.20-4

Fig 2.20-5

Fig 2.20-6

31

2.0

NETWORK USER MANUAL – www.stonelock.com

2.21 DATA MANAGEMENT

Click [Data Management] to open the menu bar (Figure 2.21-1).

2.22 VERIFICATION RECORDS MANAGEMENT

See Interface (Figure 2.22-1)

Click the [Search] button, the system by default will search the current day’s verification records of all

devices and users. The search can be expanded by setting the start and end dates/times of the search.

You can filter the search by choosing the device, the department, name, id number, card number, type of

verification and the event associated with that verification/denial..

Note: All records are downloaded automatically or can be manually downloaded by an administrator from a StoneLock device to the SLN. Refer to 2.11-1 for Data Synchronization.

2.23 ALARM RECORDS MANAGEMENT

See Interface (Figure 2.23-1)

Click the [Search] button, the system by default will search the current day’s alarm records of all

devices. The search can be expanded by setting the start and end dates/times of the search.

You can filter the search by choosing the device, the alarm type, id number and card number.

Note: All records are downloaded automatically or can be manually downloaded by an administrator from a StoneLock device to the SLN. (Refer to 2.11-1 for Data Synchronization).

Fig 2.21-1

Fig 2.22-1

Fig 2.23-1

Please contact StoneLock with any comments or questions regarding the material in this User Guide.

Visit our website at:

www.stonelock.com

StoneLock, Inc.1-800-970-6168 • [email protected] • www.stonelock.com Rev 2.01.2017