General en│2
English
Original operating instructions –ID347/722/0/650
Table of contents
1General .......................................................................................................................3
1.1 Note ....................................................................................................................3
1.2 Product liability and limitation of liability ...................................................................3
2Notices, symbols and abbreviations............................................................................4
3Safety information ......................................................................................................4
3.1 Life-threatening danger resulting from electricity........................................................ 4
3.2 Safety against tampering ........................................................................................4
4Product description.....................................................................................................5
4.1 System overview ...................................................................................................5
4.2 Scope of delivery and required components ...............................................................5
4.3 Additional components required ...............................................................................5
4.4 Supported finger scanners.......................................................................................6
4.4.1 Function of the Crestron access control system ....................................................6
4.4.2 Components of the Crestron access control system...............................................6
4.4.3 Correct operation of the finger scanner ...............................................................7
4.4.4 Optical signals on the finger scanner................................................................... 8
5Installation and activation ..........................................................................................8
5.1 Activating the system .............................................................................................8
6Activating the finger scanner......................................................................................8
6.1 Activating the finger scanner ...................................................................................9
7User administration ..................................................................................................11
7.1 Identification methods.......................................................................................... 11
7.2 Storing a user ..................................................................................................... 11
7.3 Storing identification methods ............................................................................... 12
7.3.1 Storing fingers .............................................................................................. 12
7.3.2 Storing RFID transponders .............................................................................. 13
7.4 Managing existing users........................................................................................ 14
Deleting a user/finger and changing permissions............................................................... 14
8Logs ..........................................................................................................................15
9Maintenance .............................................................................................................16
10 Disposal ....................................................................................................................16