You are on page 1of 110

IntelligentKey Lock ApplicationSystem

RFID Embedded Web User Manual

Version 1.03

Copyright @ überGARD
Copyright @ überGARD
[Type here] Embedded Web User Manual

INDEX

1 SET UP STATIC IP ADDRESS 07

2 SUPER ADMIN LOGIN 10

3 GENERAL INFORMATION OF SUPER ADMIN 14

4 ADMIN SETUP 15

4.1 ADD ADMIN 15

4.2 EDIT ADMIN 19

4.3 DELETE ADMIN 20

5 SITE SETUP 22

6 TIME SETUP 26

7 NETWORK 28

7.1 NETWORK SETUP 28

7.2 EMAIL SETUP 30

7.3 EPS SETUP 32

8 ACCESS MODE 34

9 ADMIN LOGIN 36

10 GENERAL INFORMATION OF ADMIN 39

11 KEY STATUS 40

11.1 VIEW KEY STATUS 42

12 KEY INFO 43

12.1 EDIT KEY INFO 44

12.2 EDIT SUB KEY INFO 45

12.3 PRINT KEY DETAILS PAGE 46

13 SEARCH RECORDS 48

13.1 SEARCH BY DATE RANGE 49

Copyright @ überGARD Page | 3


[Type here] Embedded Web User Manual

13.2 SEARCH BY EVENT 49

13.3 SEARCH BY USERNAME/DEPT/KEY 52

13.4 SEARCH BY KEY STATUS 54

13.5 SEARCH RECORDS WITH CAMERA INSTALLED (OPTIONAL) 55

13.6 AUDIT LOG 57

13.7 BACKUP RECORD/AUDIT LOG/DATA 59

13.7.1 BACKUP RECORD AND AUDIT LOG 60

13.7.1A BACKUP FILE AS PDF 61


13.7.1B BACKUP FILE AS EXCEL 61
13.7.2 BACKUP DATA 63

14 USER 64

14.1 USER SETUP 65

14.1.1 ADD USER 65

14.1.2 EDIT USER 69

14.1.3 DELETE USER 70

14.2 DEPARTMENT & DESIGNATION 70

14.2.1 ADD DEPARTMENT 70

14.2.2 ADD DESIGNATION 72

14.2.3 EDIT DEPARTMENT/DESIGNATION 73

14.2.4 DELETE DEPARTMENT/DESIGNATION 73

14.3 ALARM USER GROUP 74

14.3.1 EDIT ALARM USER GROUP 75

14.4 CRITICAL KEY USER GROUP 76

14.4.1 ADD CRITICAL KEY USER GROUP 77

14.4.2 EDIT CRITICAL KEY USER GROUP 78

14.4.3 DELETE CRITICAL KEY USER GROUP 79

Copyright @ überGARD Page | 4


[Type here] Embedded Web User Manual

14.5 MULTI ACCESS USER 80

14.5.1 ADD MULTI ACCESS USER 81

14.5.2 EDIT MULTI ACCESS USER 82

14.5.3 DELETE MULTI ACCESS USER 84

14.6 USER GROUP 86

14.6.1 ADD NORMAL GROUP 87

14.6.2 ADD KEY CONTROL GROUP 88

14.6.3 EDIT USER GROUP 89

14.6.4 DELETE USER GROUP 89

15 GROUP 90

15.1 GROUP SETUP 91

15.1.1 ADD NEW GROUP 91

15.1.2 EDIT GROUP 92

15.1.3 DELETE GROUP 93

15.2 MULTI ACCESS KEY GROUP 93

15.2.1 ADD MULTI ACCESS KEY GROUP 93

15.2.2 EDIT MULTI ACCESS KEY GROUP 95

15.2.3 DELETE MULTI ACCESS KEY GROUP 95

16 SCHEDULE 96

16.1 NORMAL SCHEDULE 95

16.1.1 ADD NEW NORMAL SCHEDULE 97

16.1.2 EDIT NORMAL SCHEDULE DETAIL 98

16.1.3 DELETE NORMAL SCHEDULE 99

17 SYSTEMS 100

17.1 UPLOAD DATA TO PC 100

17.2 DOWNLOAD DATA FROM PC 101

Copyright @ überGARD Page | 5


[Type here] Embedded Web User Manual

17.3 UPLOAD DATA TO VMS 102

17.4 UPLOAD DATA THROUGH CSV 103

18 RFID TAGS REGISTRATION 106

18.1 RF TAGS REGISTRATION LOGIN 106

Copyright @ überGARD Page | 6


[Type here] Embedded Web User Manual

1. SET UP STATIC IP ADDRESS

Step 1) Click the Start button, and select Control Panel.

Step 2) Double click on Network and Internet. (Fig. 1.1)

Fig. 1.1

Step 3) Double click on Network and Sharing Center.

Step 4) Double click on Change adapter settings. (Fig. 1.2)

Fig. 1.2

Copyright @ überGARD Page | 7


[Type here] Embedded Web User Manual

Step 5) Right-click the Local Area Connection icon and select Properties. (Fig. 1.3)

Fig. 1.3

Step 6) Select Internet Protocol Version 4 (TCP/IPv4) and click on Properties button.
(Fig. 1.4)

Fig. 1.4

Copyright @ überGARD Page | 8


[Type here] Embedded Web User Manual

Step 7) Select the “Use the Following IP Address” option. (Fig. 1.5)

Fig. 1.5

**
If your Local Area Connection is not listed, you need to configure your Ethernet card. For assistance, refer to
your computer's documentation or contact your computer's vendor for instructions.

Step 8) Key in your IP Address (Default: 192.168.3.177)

Step 9) Key in your Subnet mask (Default: 255.255.255.0)

Step 10) Click OK twice to proceed.

**
These instructions are for the standard cross cable connection only. If the IP address is conflicted to other pc,
please contact your network administrator or your ISP to determine what IP address or addresses you can use.

Copyright @ überGARD Page | 9


[Type here] Embedded Web User Manual

Super Admin

Copyright @ überGARD Page | 10


[Type here] Embedded Web User Manual

2. SUPER ADMIN LOGIN

Step 1) Start-up Internet Explorer.

Step 2) Key in the IP address and press Enter. (Fig. 2.1)

Default: http://192.168.3.177/

Fig. 2.1

Step 3) Key in the User ID & Password. (Fig. 2.2)

Step 4) Click on Login to proceed. (Fig. 2.2)

Fig. 2.2

**
· Default User ID: 10000001 and Password: 123456
· User ID and password must be numbers only.
· You should change your Default password to your own unique pin after first login.
· Note: Default password is unsecured

Copyright @ überGARD Page | 11


[Type here] Embedded Web User Manual

Step 4) Click on Super Admin Login icon. (Fig. 2.3)

Fig. 2.3

Step 5) Key in Super Admin Login Site Password and click Login to proceed. (Fig. 2.4)

Fig. 2.4

Copyright @ überGARD Page | 12


[Type here] Embedded Web User Manual

**
· Default Super Admin Login Password: 123456
· Password must be numbers only.
· You should change your Default password to your own unique pin after first login.
· Note: Default password is unsecured

Step 6) Login success. (Fig. 2.5)

Fig. 2.5

Copyright @ überGARD Page | 13


[Type here] Embedded Web User Manual

3. GENERAL INFORMATION OF SUPER ADMIN

⑦ ⑧

① ② ③ ④ ⑤ ⑥

No. Name Description

① Admin Setup Admin details setup

② Site Setup Site details setup

③ Time Setup Synchronize time

④ Network Network detail setup

⑤ Access Mode Type of Access mode

⑥ Logout Logout system

⑦ Site Name Site ID and Site Name

⑧ Date and User ID Login Date and User ID Login

Copyright @ überGARD Page | 14


[Type here] Embedded Web User Manual

4. ADMIN SETUP

4.1. ADD ADMIN

Step 1) Click on Admin Setup Tab. (Fig. 4.1)

Step 2) Click on Add Admin. (Fig. 4.1)

Step 1

Step 2

Fig. 4.1

Copyright @ überGARD Page | 15


[Type here] Embedded Web User Manual

Fig. 4.2

Table. 4.1

Name Description

User ID / UID (* Compulsory field) User ID must be numeric (8 Digit)

Card ID / CID Card ID must be numeric(5 Digit) / 8 Hex

NRIC NRIC can be Alpha-numeric

New Password (* Compulsory field) Password must be numeric

Confirm New Password (* Compulsory field) Re-enter Password for confirmation

Admin Name (* Compulsory field) Name of Admin

Copyright @ überGARD Page | 16


[Type here] Embedded Web User Manual

Email Address Email address of Admin

Contact Contact number of Admin

Designation Designation of Admin

Department Department of Admin

Box Access Mode Select the type of Access Mode:

Disable Disable Admin/user access right

CID Card Access

CID + PIN Card Access + Pin

UID + PIN (Default) User ID + Pin

Admin Level Select Type of Admin: Admin & Senior Admin

Key Status Right If [Enabled] , Admin can be able to check status of Keys

Key Info Right If [Enabled] , Admin can be able to Check/Edit Key


Information

Record Right If [Enabled] , Admin can be able to access Records


(Transaction logs, Audit logs, and Backup)

User Right If [Enabled] , Admin can Add multiple User

Group Right If [Enabled] , Admin can Add multiple Group

Schedule Right If [Enabled] , Admin can Add Multiple Schedule

System Right If [Enabled] , Admin can be able to Upload/Download


Data to and from the system

Remote Release Right If [Enabled] , Admin can be able to Remotely


Release/Return the Key from the Key box

Step 3) Key in the Admin details (Tab. 4.1)

Copyright @ überGARD Page | 17


[Type here] Embedded Web User Manual

Step 4) Click on Submit (Fig. 4.3)

Step 4

Fig. 4.3

Step 5) Admin added success (Fig. 4.4)

Fig. 4.4

**

You should change your Default password to your own unique PIN after first Login.
Note: Default password is unsecured

Note: Field with * denoted compulsory field

Copyright @ überGARD Page | 18


[Type here] Embedded Web User Manual

4.2 EDIT ADMIN


**

Step 1

Fig. 4.6

Step 1) Click on the EDIT (Fig 4.6).

Step 2) Edit the necessary fields which need to be updated.

Step 3) Click on SUBMIT to proceed.

Copyright @ überGARD Page | 19


[Type here] Embedded Web User Manual

4.3 DELETE ADMIN

Step 1

Fig. 4.7

Step 1) Click on DELETE (Fig. 4.7) under Action column.

Fig. 4.8

Step 2) Click OK (Fig. 4.8) to DELETE the Admin(s).

Copyright @ überGARD Page | 20


[Type here] Embedded Web User Manual

Fig. 4.9

Step 3) Admin user(s) deleted success (Fig. 4.9).

Copyright @ überGARD Page | 21


[Type here] Embedded Web User Manual

5. SITE SETUP

Step 1

Step 3

Fig. 5.1

Step 1) Click on SITE SETUP (Fig. 5.1). Refer to the Table 5.1 for the function
details of the input box.

Table 5.1

Name Description
Site ID (SID) ID of the site
Site Name Name of the site
Site Description Description of the site
Site Password Password of the site
Confirm Site Re-enter the password again
Password
KeyBox Number of the keybox
Roll Call Enable/Disable notification feature to where the Admin(s) will
be given a report status for all the keys designated in the site.

Duress Alarm [Default: 9999] An alarm feature wherein the User can be able
to send out notification of forced access to the Keybox upon
entering User PIN (PIN + Duress alarm code: xxxx)
Door Expire Time Predefined door open duration

Copyright @ überGARD Page | 22


[Type here] Embedded Web User Manual

Site Alarm Group Enable/Disable to send out alarm message


Key Reminder Time Predefined reminder time
Key Expire Interval A predefine period of time between one alarm and the next
alarm of the key expires. It is available to set as 15mins,
30mins, 1 hour or 2 hours. This function is for the admin or
user (who selected under the alarm user group) to receive
the alarm message through Email/GSM and viewed under
“Record” (refer to section 13).
Key Expire No of times to send out the key expire alarm. It is available
Repetition to select 1, 2 or 3. This function is how many times the
admin or user (who selected under the alarm user group) to
receive the alarm message through Email/GSM and viewed
under “Record” (refer to section 13).
Screen Timeout (Default: 6 sec.) A predefined period of time from 6 sec. to
60 sec.
Change PIN Super Admin can be able to change PIN on a given specific
Frequency time interval (1 – 360 days). A zero “0” input will disable
this function.

**
Note: To make sure to send out the key expire alarm message through Email/SMS. The mobile number
& Email address must key in. Besides, it is required to select member under the Alarm User Group (refer
to section 14.3).
Define to send out the alarm message by Email or SMS. You could enable or disable the GMS/Email
under Alarm User Group (refer to section 14.3).

Copyright @ überGARD Page | 23


[Type here] Embedded Web User Manual

Step 2) Key in the details (Fig. 5.1) as per table (Table 5.1)

Step 3) Click SUBMIT & NEXT (Fig. 5.1)

Fig. 5.2

Step 4) Click OK (Fig. 5.2) to proceed to the next step.

Fig. 5.3

Step 5) Key in the details (Fig. 5.3) base on table (Table 5.2)

Copyright @ überGARD Page | 24


[Type here] Embedded Web User Manual

Table. 5.2

Name Name of the Key box


Description Description of the Key box
Key Amount Total key amount

Step 6) Click on SUBMIT (Fig. 5.3)

Step 7) Click on OK (Fig. 5.4)

Step 8) SITE SETUP edited successfully

Fig. 5.4

**
Note: Reset K-Master/Keybox system if you have editedSite Setup.
The system will be taken 30 seconds to load the new setting.

**
It is advised to use Postpaid Mobile Line to send alarm/reminder message for the Site
Alarm/Reminder. Site name to be displayed at theSMS notification will be the first 20 characters only.
Reminder will send notification to mobile phone & email.

**
The alarm notifications are Power Down, Force Open Door, Force Open Gate & Door Open Time Expire
through set up of the Alarm User Group (refer to section 14.3) & Critical User Group (refer to section
14.4) under User (refer to section 14).

Copyright @ überGARD Page | 25


[Type here] Embedded Web User Manual

6. TIME SETUP

Fig. 6.1

Key Master Time Keybox Time


Current Computer Computer Time
Time
Synchronization Synchronize both Keybox and Computer Time
Table 6.1

Step 1) Click on Time Setup (Fig 6.1 & Table 6.1)


Step 2) Click on Synchronization (Fig 6.1) to synchronize the time.

Fig. 6.2

Copyright @ überGARD Page | 26


[Type here] Embedded Web User Manual

Step 3) Click OK (fig 6.2).

Fig. 6.3

Step 4) Time Synchronization has been done (fig 6.3).

Copyright @ überGARD Page | 27


[Type here] Embedded Web User Manual

7 NETWORK

Step 1) Click on NETWORK (Fig. 7.1).

Fig. 7.1

7.1 Network Setup

Fig. 7.2

Copyright @ überGARD Page | 28


[Type here] Embedded Web User Manual

Step 1) Key in IP ADDRESS (Fig 7.2).


Step 2) Key in SUBNET MASK ADDRESS (Fig 7.2).
Step 3) Key in GATEWAY ADDRESS (Fig 7.2).
Step 4) Manufacturer pre -set MAC ADDRESS (Fig 7.2) which does not
require to change upon manufacturer instruction.
Step 5) Click on SUBMIT

Fig. 7.3

Step 6) Click OK (Fig 7.3) to proceed.

Copyright @ überGARD Page | 29


[Type here] Embedded Web User Manual

Fig. 7.4

Step 7) Network setup successfully. Click OK to proceed (Fig 7.4).

7.2 EMAIL SETUP

Fig. 7.5

Copyright @ überGARD Page | 30


[Type here] Embedded Web User Manual

Table 7.1

SMTP Server IP address of the email server


Port Sever Port Number
Email Address Email Address
User Name Authentication User name from email service provider
Password Authentication password from email service provider

Step 1) Key in the POP3 Server, Port and Email Address (Fig 7.5 & Table 7.1).
Step 2) Key in the Authentication User Name & Password (Optional) which
provided by the service provider.

Step 3) Click on SUBMIT (Fig 7.5).


Step 4) Click OK to proceed (Fig 7.6).

Fig. 7.6

Copyright @ überGARD Page | 31


[Type here] Embedded Web User Manual

Step 5) Email setup successful (Fig 7.7).

Fig. 7.7

7.3 EPS/CMS SETUP (Optional)

Fig. 7.8

Table 7.2

EPS Host IP IP address of the Host server


EPS Host Port Host Port Number

Copyright @ überGARD Page | 32


[Type here] Embedded Web User Manual

**
Note: Reset K-Master/keybox system if you have editedNetwork.
The system will be taken 30 seconds to load the new setting.

**
Note: For user/admin who is using LAN network cable to connect to corporate network. It is require to have
fix IP that won’t have conflict to other device. It conflict on IP occurred; user/admin unable to access system
due to the IP was taken by other.

**
Note: The System will auto logout once any changes were made.

Copyright @ überGARD Page | 33


[Type here] Embedded Web User Manual

8. ACCESS MODE

Step 1

Step 2
Step 3

Fig. 8.1

Table 8.1

Group Key Return Key returned by group setting


Individual Key Return Key returned by individual

Step 1) Click on Access Mode (Fig. 8.1).

Step 2) Click to select KEY ACCESS MODE type (Fig. 8.1)

Step 3) Click SUBMIT (Fig 8.2)

Copyright @ überGARD Page | 34


[Type here] Embedded Web User Manual

Fig. 8.2

Step 4) Click OK (Fig 8.2) to proceed.

**
Note: Reset K-Master/Keybox system if you have edited Access Mode.
The system will be taken 30 seconds to load the new setting.

Copyright @ überGARD Page | 35


[Type here] Embedded Web User Manual

Admin

Copyright @ überGARD Page | 36


[Type here] Embedded Web User Manual

9. ADMIN LOGIN

Step 1) Start up Internet Explorer.

Step 2) Key in the IP Address. For default: http://192.168.3.177/

Step 3) Key in USER ID and PASSWORD. (Fig. 9.1)

Fig. 9.1

Step 4) Click on LOGIN (Fig. 9.1)

Copyright @ überGARD Page | 37


[Type here] Embedded Web User Manual

Step 5) LOGIN successful as shown in Fig. 9.2.

Step 6

Fig. 9.2

Step 6) Click on ADMIN LOGIN icon. (Fig. 9.2)

Fig. 9.3

Step 7) Login iKLASsuccessful as above shown (Fig. 9.3)

Copyright @ überGARD Page | 38


[Type here] Embedded Web User Manual

10. GENERAL INFORMATION ON ADMIN

① ② ③ ④ ⑤ ⑥ ⑦

Fig. 10.1 (Above) and Table 10.1 (Below)

No. Name Description

① Key Status View Key Status

② Key Info View and Edit Key Info

③ Record Show and Backup Records (Excel/PDF file


format)

④ User View/Add/Edit/Delete User

⑤ Group View/Add/Edit/Delete Group

⑥ Schedule View/Add/Edit/Delete Schedule

⑦ System Upload/Download data (Database file format)

Copyright @ überGARD Page | 39


[Type here] Embedded Web User Manual

11. KEY STATUS

① ③

Fig. 11.1 (Above) and Table 11.1 (Below)

① Keybox Info View key status per Keybox

② Key Number View the Key Information per Key Number

③ Key Status Legend Green (Normal) – Key In

Yellow (Drawn) – Key Out

Red (Alarm) – Key Expired / Lost Key

Grey (Not Install) – No Key Installed

Blue (Reserved) – Key Reserved

④ Release Admin can remotely release a Key from the Keybox

⑤ Refresh Click Refresh to Update Site

Copyright @ überGARD Page | 40


[Type here] Embedded Web User Manual

⑥ Auto Refresh [ON/OFF] Site will Auto update the key status when turned
ON

Step 1) Click on KEY STATUS (Fig. 11.1)

Step 2) Select the KEYBOX ( ) from the left navigation (Fig. 11.1)

Step 3) Click REFRESH to update the Key Status (Fig. 11.1)

Step 4) Click AUTO REFRESH to set the site to automatically update the Key Status every
time a transaction was made.

Step 5) Click OK to proceed.

Copyright @ überGARD Page | 41


[Type here] Embedded Web User Manual

11.1 VIEW KEY STATUS

Step 1) Click on the KEY NO to view the individual key status (Fig. 11.1item ② )

Fig. 11.2

Table 11.2

Item Description

Key No Key designated number

Key Name Name of the Key

Description Description of the Key

Key S/N Serial Number of the Key

Drawn By Name of the User who withdraw the key from Keybox

UID User ID

Copyright @ überGARD Page | 42


[Type here] Embedded Web User Manual

Contact Contact number of the User who withdraw the key

Drawn Date Date of the key withdrawn from Keybox

Drawn Time Time of the key withdrawn from Keybox

Expire Date Date of expiration

Expire Time Time of expiration

Alarm Alarm status

Date & Time Date and Time of the Alarm

Sub Key Name of the Sub Key

Description Description of the Sub Key

Step 2) Click BACK to go back to Key Status (Fig. 11.2)

12. KEY INFO

Fig. 12.1

Copyright @ überGARD Page | 43


[Type here] Embedded Web User Manual

Table 12.1

Search Tab Search Key by Serial Number or Key Type

Key View and Edit Sub Key Information

Name Name of the Key

Description Description of the Key

Key Type Type of Key

S/N Key Serial Number

Status Status of the Key

Critical Group Enable/Disable Critical Group

Key Duration Predefined period of time on how long User can use the Key

12.1 EDIT KEY INFO

Fig. 12.2

Copyright @ überGARD Page | 44


[Type here] Embedded Web User Manual

Step 1) Key in the Name, Description, Key Type, and Serial Number (S/N) of the key (Fig.
12.2)

Step 2) Check only keys that are CRITICAL and select CRITICAL GROUP (Fig. 12.2)

Step 3) Click on SUBMIT (Fig. 12.2)

Fig. 12.3

Step 4) Click OK (Fig. 12.3) to successfully close the Key Information editing.

**

Note: RESET K-Master/Keybox system if you have edited CRITICAL KEY USER GROUP.
The system will take 30 seconds to load the new setting.

12.2 EDIT SUB KEY INFO

Fig. 12.4

Copyright @ überGARD Page | 45


[Type here] Embedded Web User Manual

Step 1) Click on Key No. (Fig.12.4) to EDIT Sub Key Info

Fig. 12.5

Step 2) Key in description of the Sub Key (Fig. 12.5)

Step 3) Click on SUBMIT (Fig. 12.5)

Step 4) Click OK (Fig. 12.3) Key Info Setup successful

12.3 PRINT KEY DETAILS PAGE

Step 1) Click on Print (Fig 12.6) under the Key Info details page.

Copyright @ überGARD Page | 46


[Type here] Embedded Web User Manual

Fig. 12.6

Step 2) Click on PRINT to proceed (Fig. 12.7)

Fig. 12.7

Copyright @ überGARD Page | 47


[Type here] Embedded Web User Manual

13. RECORDS

Step 1) Click on RECORD tab (Fig 13.1)

Fig. 13.1

Step 2) Click on RECORD at the left navigation.

Search Records by:

Item Description

Date Specify the Time and Date (from and to) to access the Records

Event A list of specific events that occurred in the system

Username The name of the user

Department Name Name of the department

Key Search by Key Number

Table 13.1

Copyright @ überGARD Page | 48


[Type here] Embedded Web User Manual

13.1 SEARCH BY DATE RANGE

Fig. 13.2

Step 1) Select from TIME / DAY / MONTH / YEAR to TIME / DAY / MONTH / YEAR
to access all the records within those specified dates (Fig. 13.2)

13.2 SEARCH BY EVENTS

Fig. 13.3

Step 1) Click on the dropdown menu on the Event (Fig. 13.3)

Step 2) Select the Event from the Event List (see Table 13.2)

Copyright @ überGARD Page | 49


[Type here] Embedded Web User Manual

Table 13.2

Event Description

Key withdraw and return All recorded keys withdrawn and returned

Critical key withdraw and return All recorded critical keys withdrawn and returned

Multi access key withdraw and All Multi Access key withdrawn and returned
return

Key Withdrawn All keys withdrawn from the Keybox

Key Return All keys returned to the Keybox

Key Expired (User) All keys that have expired from the allowable time duration

Critical Key Withdrawn All critical keys withdrawn from the Keybox

Critical Key Return All critical keys returned to the Keybox

Multi Access Key Return All multi access key returned to the Keybox

Multi Access Key Withdrawn All multi access key withdrawn to the Keybox

Door Open Expire Keybox door has been opened beyond the allowed time

Force Open Door Unauthorized access of Keybox door

Force Open Door (Gate) Unauthorized access of Keybox door (gate)

Unlock Front Door Manually Front door was manually unlock

Enter Maintenance Mode System in maintenance mode

Power Down System Power interruption

Power Resume System Power restored

Key Slot Lost Allotted Key Slot not found

Unauth User Access Unauthorized User Access

Key Pos Fault Faulty Position of keys

Copyright @ überGARD Page | 50


[Type here] Embedded Web User Manual

Key Return Reminder Reminder sent to user for Key Return

Site Login Succeed User able to access site

Camera Error Faulty Camera

GSM Modem Error Faulty GSM Modem

SD Card Error Faulty SD Card

Change CID by keypad Card ID changed by keypad

Change PIN by keypad PIN changed by keypad

Change IP address by keypad Site IP Address change by keypad

Daily report generated Report generated on a daily basis

RFID Tag Wrong Slot The RFID tag was placed wrongly

Invalid RFID Tag RFID tag not valid (Unregistered)

Breathalyzer Test Failed Unsuccessful Testing of breath analyzer

Remote Login Succeeded A remote site login was successfully done

Remote Key Withdrawn Key withdrawn from Keybox through Remote Release

Remote Key Return Key returned from Keybox through Remote Release

Send SMS Failed No SMS was sent during Alarm notification

Send Email failed No Email was sent during Alarm notification

Key Reservation Reminder Reminder for Key Reservation

Unauthorized Key Withdrawal Key withdrawn by unauthorized user

Search Key Search Key

Expired Critical Key Return Critical Key returned after the allowed time period

Expire Key Return Key returned after the allowed time period

Copyright @ überGARD Page | 51


[Type here] Embedded Web User Manual

Time Out Time Out

Time In Time In

Site Login Failure Unsuccessful Site Login by User

Change SA PIN SA PIN changed

Check Record Records which are checked by user

Upload Record Records uploaded by user

Box Resume Keybox restart

Key Expired (Key) Key already exceeded allowable usage time

Draw Key Excess Excess of keys withdrawn by user

Duress Alarm Type of alarm condition

Box Lost Keybox not found

13.3 SEARCH RECORDS BY USERNAME / DEPARTMENT NAME / KEY

Step 1) Click on USERNAME to select User on dropdown list (Fig. 13.4)

Step 2) Click on DEPARTMENT to select the Department on dropdown list (Fig. 13.4)

Step 3) Click on KEY to select specific key on dropdown list

Step 4) Click on KEY STATUS to select All/Key In/Key Withdrawn/Key Expired. (Fig.13.4)

Fig 13.4

Copyright @ überGARD Page | 52


[Type here] Embedded Web User Manual

Step 1) Click on User Name to select the User and view transaction records. (Fig. 13.4)

Step 2) Click on Department Name to select Department and its transaction records. (Fig.
13.4)

Step 3) Click on Key to select the Key and its transaction history. (Fig. 13.4)

**
Without selecting date range, Event, Username, Department, and Key, the system will show the
records of the current day with all the transactions done on the site.

***
Display Records by 10, 20, or 50 records per page

Step 5) Successfully searched records. (Fig. 13.5)

Fig 13.5

Copyright @ überGARD Page | 53


[Type here] Embedded Web User Manual

13.4 SEARCH BY KEY STATUS

Fig 13.6

Step 1) Click on KEY STATUS dropdown list. (Fig. 13.6)

Step 2) Select KEYBOX. (Fig. 13.6)

Step 3) Search successful. (Fig. 13.7)Refer to (Table 13.3) for details of Key Status page.

Fig 13.7

Copyright @ überGARD Page | 54


[Type here] Embedded Web User Manual

Table 13.3

Item Description

No Index

Keybox Keybox Number

Key No Key Number

UID/ACC User who have withdrawn the key

Name Name of the User

Tel Telephone number of the user

Drawn Out Time Date and Time of the withdrawn key

Display as: YYYY-MM-DD HH:MM:SS

(Year/Month/Date – Hour/Minute/Second)

Returned Time Date and Time of the returned key

Display as: YYYY-MM-DD HH:MM:SS

(Year/Month/Date – Hour/Minute/Second)

Back Loads back to previous page

13.5 RECORDS WITH CAMERA INSTALLED (OPTIONAL)

Step 1) Select Record by Date/Event/Username/Department/Key/Key Status.

Step 2) Click on SELECTED DAY. (Fig. 13.8)

Copyright @ überGARD Page | 55


[Type here] Embedded Web User Manual

Fig 13.8

Step 3) Click on Image. (Fig. 13.7). The User image will be shown (Fig. 13.10)

Fig 13.9

Fig 13.10 (Actual sample Image taken from Camera)

Copyright @ überGARD Page | 56


[Type here] Embedded Web User Manual

**
The System Database will store the last 10,000 transactions. First In First Out (FIFO) methodology will apply.

***
The Images will be stored in the SD Card inserted in the SD Card slot within the Main Control Unit (MCU).

13.6 AUDIT LOG

Fig 13.11

Step 1) Click on AUDIT LOG on the left navigation. (Fig. 13.11)

Step 2) Select DATE RANGE/EVENT/USERNAME/DEPARTMENT (Fig. 13.11).

Clicking Selected Day without specifying other information will provide you current day log.

Step 3) Successful search of Audit Log. (Fig. 13.12)

Copyright @ überGARD Page | 57


[Type here] Embedded Web User Manual

Fig 13.12

Step 4) Click on the Action Box to see the changes applied to the system by user.
(Fig.13.13 below)

Copyright @ überGARD Page | 58


[Type here] Embedded Web User Manual

13.7 BACK UP RECORD/AUDIT LOG/DATA

Step 1) Click on BACKUP (Fig.13.14) from the Left Navigation

Fig 13.14

Copyright @ überGARD Page | 59


[Type here] Embedded Web User Manual

Table 13.4

Item Description

Record Backup A support system wherein user can be able to save all of
specific Transaction Logs made on the site.

Audit Log Backup A support system wherein user can be able to save all or
specific Change Log made on the site

Data Backup A support system where the user can save all data submitted in
the system (User/Key/Key group/Multi Key
group/Schedule/Department/Designation)

13.7.1 BACKUP RECORD AND AUDIT LOG

Step 1
Step 2

Fig 13.12

Step 1) Select the DATE RANGE (Fig. 13.12) and export the file in EXCEL or PDF file
format

Step 2) Click on BACKUP. (Fig.13.12)

**
The Export File in EXCEL Format will automatically download to your download folder unless otherwise spec
ified.

***
The Export File in PDF will need to be save manually by the user.

Copyright @ überGARD Page | 60


[Type here] Embedded Web User Manual

13.7.1A BACKUP FILE AS PDF

Step 4

Step 5

Step 3

Fig 13.13

Step 3) Click on the SAVE icon (Fig. 13.13)

Step 4) Assign File name for the Audit Log in PDF format. (Fig 13.13)

Step 5) Click on SAVE. (Fig. 13.13)

13.7.1B BACKUP FILE AS EXCEL

Step 6) Select [EXCEL] on the Export File Format. Click BACKUP. (Fig. 13.12)

Step 7) Click SAVE file. (Fig. 13.14)

The EXCEL file will be saved to the directory (Downloads Folder)

Copyright @ überGARD Page | 61


[Type here] Embedded Web User Manual

Step 7

Fig 13.14

Step 8
Step 8) Click on Open to check/verify file. (Fig. 13.15)

Step 9) Upon Opening/Verifying the File, Click [Save As] to save file to your assigned folder.

Fig 13.15

Copyright @ überGARD Page | 62


[Type here] Embedded Web User Manual

13.7.2 BACKUP DATA

Step 1

Fig 13.16

Step 1) Select which DATA to backup (Refer to Table 13.5)

Table 13.5

Item Description

User All the User details

Key All the Key details

Key Group Key Group Information.

Multi Key Group All Multiple Key Group Information

Schedule All the Schedules added and submitted in the system

Department All the Departments added and submitted in the system

Designation All the Designation added and submitted in the system

Step 2) Files will automatically be in EXCEL format. SAVE the file to your preferences
folder.

Copyright @ überGARD Page | 63


[Type here] Embedded Web User Manual

14. USER

Fig 14.1 (Above) & Table 14.1 (Below)

Item Description

User All the User(s) of the Keybox

Department & Designation Add/Edit/Delete Department and Designation

Alarm User Group Group of Admin/User that are set to receive Alarm notification

Critical Key User Group Group of Admin/User that are set to receive Alarm notification on
all critical keys

Multi Access User A 2/3 way access to the Keybox wherein a Normal user along with
have the Key control user should enter both CID/UID to be
able to access the keys.

User Group To create a Normal group composed of Normal Users and a Key
Control Group composed of Key Control Users.

UID User Identification

Name Name of User

Contact Contact information of the user

Copyright @ überGARD Page | 64


[Type here] Embedded Web User Manual

Department Assigned department of the user

Level Can set the user to [Disable/User/Key Maintenance Staff/Backup


User/Report User]. Set to Disable means User have no
access rights

Action Edit or Delete user

Group Search options

Go/Search Search user function

Add User Add user Function

14.1 USER SETUP

14.1.1 ADD USER

Step 1) Click on ADD USER. (Fig. 14.2)

Fig 14.2

Copyright @ überGARD Page | 65


[Type here] Embedded Web User Manual

Step 2) Key in User information (Fig. 14.3)


Fig 14.3

Table 14.1

Item Description

UID User Identification

CID User Card Identification

NRIC User National Registration Identity Card

Password User’s Password (must contain at least 6 digits)

Copyright @ überGARD Page | 66


[Type here] Embedded Web User Manual

Confirm Re-enter password


Password

User Expiry Date [YYYY-MM-DD] Pre-defined time where the user can use his Access Rights

Name Name of the user

Designation User designation

Department User department

Contact User’s contact information

E-mail Address User’s email address

Level Select User level:

Disabled: User will not have access rights

Maintenance Staff: User can check the info details and do a key/s search only

Backup User: User have less access rights compared to main user.

Report User: User can check and generate report only

Key User Select User as:

Normal User: Can access keys as per normal operation and will be included in
the Normal User group.

Key Control User: Can access key as per normal operation and will be
included in the Key Control User Group

Box Access Mode Select the Type of Access Mode:

Disable Disable Admin/User Access Right

CID Access Keybox through Card ID

CID + PIN Access Keybox with User’s Card ID and PIN

UID + PIN (Default) Access Keybox with User’s UID and PIN

Copyright @ überGARD Page | 67


[Type here] Embedded Web User Manual

Max Key per Box Maximum number of key(s) that a User can take out from the Keybox

Duration Allowed Time duration for the User to access the key(s) from the Keybox

Withdraw Mode Select the type of key withdraw mode for user:

Standard (Default) - User can access key(s) as per normal operation

Withdraw/Return - User will have to choose to either Withdraw or Return Key

Select Key - User will have to enter the key number he want to access

Key Group ( ) User can be set to have a maximum of 5 groups

Key Group Assign User Key group

Schedule Assign User Schedule

Step 3) Click on SUBMIT. (Fig 14.3)

**
By default, the drop down menu is not available or disabled.

User should do the section on Add New Designation, Add New Department to add new Designations and
Department.

**
Level, Box Access Mode, Duration, Max Key, Schedule, and Key Group needsto be selected in order to access
the Keybox except for the user(s)/admin who have assigned for multi access user.

Without setting it, the screen will show unauthorized user.

**
CID needs to be filled up if the user is going to be assigned as a Multi Access User (Refer to Sec. 14.5).
Multi Access User are only allowed to flash card to access.

Copyright @ überGARD Page | 68


[Type here] Embedded Web User Manual

14.1.2 EDIT USER

Fig 14.3

Step 1) Click on EDIT (Fig. 14.4)

Fig 14.4

Step 2) Edit the necessary field for update (Fig. 14.2). You cannot edit UID.

Step 3) For change of password, key in the new password and confirm the new password

Copyright @ überGARD Page | 69


[Type here] Embedded Web User Manual

Step 4) Click SUBMIT.

**
It is not advised to re-use the UID when the existing user in no longer tight with it. It will have an effect with the
records. It is advisable to delete the UID and create a new UID.

14.1.3 DELETE USER

Fig 14.5

Step 1) Click DELETE (Fig. 14.5) to delete the User(s).

14.2 DEPARTMENT AND DESIGNATION

14.2.1 ADD DEPARTMENT

Step 1) Click on DEPARTMENT & DESIGNATION on the left navigation. (Fig. 14.6)

Step 2) Click on ADD DEPARTMENT. (Fig. 14.6)

Copyright @ überGARD Page | 70


[Type here] Embedded Web User Manual

Fig 14.6

Step 3) Key in the Name of the Department to be added (Fig. 14.7)

Copyright @ überGARD Page | 71


[Type here] Embedded Web User Manual

Step 4) Click SUBMIT (Fig. 14.7)


Fig 14.7

Fig 14.8

Step 5) Department added successful (Fig. 14.8)

14.2.2 ADD DESIGNATION

Step 1) Click on DEPARTMENT & DESIGNATION from left navigation (Fig. 14.6)

Step 2) Click on ADD DESIGNATION (Fig 14.9)

Fig 14.9

Step 3) Key in designation title (Fig. 14.10)

Step 4) Click on SUBMIT. (Fig. 14.10)

Fig 14.10

Copyright @ überGARD Page | 72


[Type here] Embedded Web User Manual

Step 5) Designation added successfully (Fig. 14.11)

Fig 14.11

14.2.3 EDIT DEPARTMENT/DESIGNATION

Step 1) Click on EDIT (Fig. 14.6)

Step 2) Edit the necessary field for update (Fig. 14.7)

Step 3) Click on SUBMIT (Fig. 14.7)

Step 4) Department/Designation successfully edited.

14.2.4 DELETE DEPARTMENT/DESIGNATION

Step 1) Click on DELETE (Fig. 14.6) under action.

Fig 14.12

Step 2) Click OK (Fig. 14.12) to proceed.

Copyright @ überGARD Page | 73


[Type here] Embedded Web User Manual

14.3 ALARM USER GROUP

Fig 14.13

Tab 14.2

Item Description

Name Name of the group

Description Group description

Alarm User Group ( ) Admin to receive Alarm notifications

GSM Send notification through SMS

Email Send notification through email

Step 1) Click on ALARM USER GROUP (Fig. 14.13) on the left navigation.

Copyright @ überGARD Page | 74


[Type here] Embedded Web User Manual

Step 2) Edit ALARM USER GROUP (Refer to Section 14.3.1)

14.3.1 EDIT ALARM USER GROUP

Fig 14.14

Step 1) Edit/Select the necessary field to be updated.

Step 2) Click on SUBMIT (Fig 14.14)

**
Reminder message only functions if Super Admin has enabled the Site Alarm Group under the SITE SETUP.
Advise to use prepaid mobile line to send out reminder messages to user(s).

**
By default, the drop down menu of the group member is not available or disabled if Super Admin/Admin did not
add any Admin/User.

Copyright @ überGARD Page | 75


[Type here] Embedded Web User Manual

**
If you have hundreds of users created to the system, it will take longer time to show the members list from the
drop down menu.

**
The Alarm notifications are Power Down, Force Open Door, Force Open Gate, and Door Open Time Expire
through setup of the Alarm User Group (Section 14.3) and Critical User Group (Section 14.4) and User (Section
14).

14.4 CRITICAL KEY USER GROUP

Fig 14.15

Tab 14.3

Item Description

No Number of Critical Key User Group

Name Name of the Critical Key User Group

Description Description of the Critical Key User Group

Copyright @ überGARD Page | 76


[Type here] Embedded Web User Manual

Group Member Admins/Users included in the group

Action Edit or Delete the Group

Add Group Add new Critical Key User Group

14.4.1 ADD CRITICAL KEY USER GROUP

Step 1) Click on USER (Fig. 14.15)

Step 2) Click on CRITICAL KEY USER GROUP (Fig 14.15) at the left navigation

Step 3) Click on ADD GROUP (Fig. 14.15)

Fig 14.16

Copyright @ überGARD Page | 77


[Type here] Embedded Web User Manual

Step 4) Key in the NAME and DESCRIPTION

Step 5) Select the GROUP MEMBER (01-05) from the drop down list

Step 6) Click on SUBMIT

**
By default, the drop down menu of the group members is not available or disabled if Super Admin did not add any
Admin/User to the system..

**
If there are hundreds of users created to the system, it will take longer time to view the members list in the drop
down menu.

14.4.2 EDIT CRITICAL KEY USER GROUP

Step 1) Click on EDIT under the Action column. (Fig. 14.17)

Fig 14.17

Step 2) Edit the necessary fields for update.

Copyright @ überGARD Page | 78


[Type here] Embedded Web User Manual

Step 3) Click on SUBMIT. (Fig. 14.17)

14.14.3 DELETE CRITICAL KEY USER GROUP

Step 1) Click on DELETE (Fig. 14.18) under the Action column.

Fig 14.18

Fig 14.19

Step 2) Click OK to delete the selected Critical Key User Group. (Fig. 14.19)

**
The alarm notifications are Power Down, Force Open Door, Force Open Gate, and Door Open Time Expire
through email or SMS to a mobile phone.

Copyright @ überGARD Page | 79


[Type here] Embedded Web User Manual

14.5 MULTI ACCESS USER

Fig 14.20

**
Multi Access User can access the system by flashing his Card ID (CID)

Table 14.4

Item Description

User Add new User

Department & Designation Add New Department & Designation

Alarm User Group Alarm user group setup

Critical Key User Group Critical key user group setup

Multi Access User Multi access user setup

No Number of multi access user

Name Name of the multi access user

Copyright @ überGARD Page | 80


[Type here] Embedded Web User Manual

Description Description of the multi access user

Group Member Group member of the multi access user

Action Edit/Delete the multi access user

14.5.1 ADD MULTI ACCESS USER

Fig. 14.21

Step 1) Click on USER (Fig. 14.21)

Step 2) Click on MULTI ACCESS USER (Fig. 14.21) at the left navigation

Step 3) Click on ADD MULTI USER (Fig. 14.21)

Copyright @ überGARD Page | 81


[Type here] Embedded Web User Manual

Fig. 14.22

Table 14.5

Item Description

Name Name of Multi Access User

Description Description of Multi Access User

Multiple Group Select Multiple pre-assigned Multi Group

Number of User Select number of Users (2 ~ 3) with 2 as minimum required

Key Control User Group Select pre-assigned Key Control User group

Normal User Group Select pre-assigned Normal User group

Step 4) Key in the Name and Description (Fig. 14.22)

Copyright @ überGARD Page | 82


[Type here] Embedded Web User Manual

Step 5) Select MULTIPLE GROUP (Fig. 14.22).

Step 6) Select NUMBER OF USER (Fig. 14.22). You can set at least 2 users and maximum
of 3 users

Step 7) Select KEY CONTROL USER GROUP (Fig. 14.22).

Step 8) Select NORMAL USER GROUP (Fig. 14.22).

**
If Admin have not set multi group in the GROUP tab, the drop downmenu for this feature will be disabled (see
Section 15 for the ADD MULTI ACCESS KEY GROUP).

**
If Admin have not set Key Control group in the User Group, the drop down menu for this feature will be disabled
(see Section 14.6 for the ADD KEY CONTROL GROUP).

**
If Admin have not set Normal group in the User Group, the drop down menu for this feature will be disabled (see
Section 14.6 for the ADD NORMAL GROUP).

**
If you have hundreds of users created to the system, it will take longer time to showhet member list from drop down
menu.

Copyright @ überGARD Page | 83


[Type here] Embedded Web User Manual

14.5.2 EDIT MULTI ACCESS USER

Fig. 14.23

Step 1) Click on EDIT (Fig. 14.22) under action.

Step 2) Edit the necessary field for update.

Step 3) Click on SUBMIT.

Copyright @ überGARD Page | 84


[Type here] Embedded Web User Manual

14.5.3 DELETE MULTI ACCESS USER

Fig. 14.24

Step 1) Click on DELETE (Fig. 14.24) under action.

Step 2) Click OK to delete the multi user(s) selected.

Copyright @ überGARD Page | 85


[Type here] Embedded Web User Manual

14. 6 USER GROUP

Fig. 14.25

Table 14.6

Item Description

User Group Admin to set Normal User and Key Control User

Add Normal Group Normal User can either be a User or an Admin.

They operate as Normal users but cannot acquire key without the Key
Control Group Access

Add Key Control Group Key Control group can either be a User or an Admin.

They set the restrictions of the Normal User group.

Step 1) Click on USER GROUP (Fig. 14.25) at the left navigation.

Copyright @ überGARD Page | 86


[Type here] Embedded Web User Manual

14.6.1 ADD NORMAL GROUP

Step 2) Select ADD NORMAL GROUP (Fig. 14.25)

Fig. 14.26

Step 3) Key in NAME and DESCRIPTION (Fig. 14.26).

Step 4) Select GROUP MEMBERS (Fig. 14.26).

Step 5) Click SUBMIT.

**
The Admin group will automatically set toNO if the group is under NORMAL GROUP. It will automatically set to
YES for the KEY CONTROL GROUP.

Copyright @ überGARD Page | 87


[Type here] Embedded Web User Manual

14.6.2 ADD KEY CONTROL GROUP

Fig. 14.27

Step 6) Click ADD KEY CONTROL GROUP (Fig. 14.25)

Step 7) Key in NAME and DESCRIPTION of group (Fig. 14.27)

Step 8) Select GROUP MEMBERS (Fig. 14.27)

Step 9) Click SUBMIT.

Copyright @ überGARD Page | 88


[Type here] Embedded Web User Manual

14.6.3 EDIT USER GROUP

Fig. 14.28

Step 1) Click on EDIT (Fig. 14.28) under action.

Step 2) Edit the necessary fields for update.

Step 3) Click on SUBMIT (Fig. 14.27).

14.6.4 DELETE USER GROUP

Step 1) Click DELETE (Fig. 14.28) under action.

Step 2) Click OK.

Copyright @ überGARD Page | 89


[Type here] Embedded Web User Manual

15. GROUP

Fig. 15.1

Table 15.1

Item Description

Group Assign key(s) in groups

Multi Access Key Assign key(s) in groups which can only be accessed by multi access user(s)
Group

Add Group Add new key group

No The number of key group

Name Name of the key group

Description Description of the key group

Action [Edit / Delete] the selected key group

Delete All Delete all key group

Copyright @ überGARD Page | 90


[Type here] Embedded Web User Manual

15.1 GROUP SETUP

15.1.1 ADD NEW GROUP

Fig. 15.2

Step 1) Click on GROUP (Fig. 15.1)

Step 2) Click on ADD GROUP (Fig. 15.1)

Step 3) Key in the NAME and DESCRIPTION of the group (Fig. 15.2).

Step 4) Select [Enable/Disable] of INTERLOCKING feature (Fig. 15.2)

Copyright @ überGARD Page | 91


[Type here] Embedded Web User Manual

Step 5) Select the KEYS (Fig. 15.2) that will allow the group to draw out from the Keybox.

Step 6) Click on SUBMIT (Fig. 15.2)

**
If Admin ENABLE the INTERLOCKINGfeature, groups cannot access the same keys. Setting a group wilhALL
KEYS will automatically disable this feature.

15.1.2 EDIT GROUP

Fig. 15.3

Step 1) Click on EDIT (Fig. 15.3) under action.

Step 2) Key in necessary fields to update. SELECT/DESELECT the keys which need to be
changed.

Step 3) Click on SUBMIT.

Copyright @ überGARD Page | 92


[Type here] Embedded Web User Manual

15.1.3 DELETE GROUP

Step 1) Click on DELETE (Fig. 15.3) under action

Step 2) Click OK to proceed.

15.2 MULTI ACCESS KEY GROUP

15.2.1 ADD MULTI GROUP

Fig. 15.4

Step 1) Click on ADD MULTI GROUP (Fig. 15.4)

Copyright @ überGARD Page | 93


[Type here] Embedded Web User Manual

Step 2) Key in groups NAME and DESCRIPTION (Fig. 15.5)

Fig. 15.5

Step 3) Select the KEYS (Fig. 15.5) to be set for Multi Access User.

Step 4) Click on SUBMIT (Fig. 15.5)

**
Only those keys that have not been selected / assigned in a Group can be selected in MULTI
a USER GROUP.

Copyright @ überGARD Page | 94


[Type here] Embedded Web User Manual

15.2.2 EDIT MULTI ACCESS KEY GROUP

Fig. 15.6

Step 1) Click on EDIT (Fig. 15.6) under action.

Step 2) Edit all necessary fields. Select/Deselect the keys which needs to be changed. (Fig.
15.5)

Step 3) Click on SUBMIT. (Fig. 15.5)

15.2.3 DELETE MULTI ACCESS KEY GROUP

Step 4) Click on DELETE (Fig. 15.6) under action or DELETE ALL to delete all groups.

Step 5) Click OK and proceed.

Copyright @ überGARD Page | 95


[Type here] Embedded Web User Manual

16. SCHEDULE

16.1 NORMAL SCHEDULE

Fig. 16.1 (Above) & Table 16.1 (Below)

Item Description

Add Normal Create new normal schedule

No Number of schedule

Name Name of the schedule

Description Description of the schedule

Action Edit/Delete a schedule

Delete All Delete all schedule created

Copyright @ überGARD Page | 96


[Type here] Embedded Web User Manual

16.1.1 ADD NORMAL SCHEDULE

Fig. 16.2

Step 1) Click on ADD NORMAL (Fig. 16.1)

Step 2) Key in the schedule NAME and DESCRIPTION (Fig. 16.2)

Step 3) Select TIME START and TIME END under segment 1, 2, and 3 (Table 16.2).

Step 4) Click on SUBMIT (Fig. 16.2)

Copyright @ überGARD Page | 97


[Type here] Embedded Web User Manual

Table 16.2

Item Description

Name Name of the Schedule

Description Description of the schedule

Day Schedule day (Monday – Sunday)

Start Start Time

End End Time

Segment 1 / 2 / 3 Periods in a day

16.1.2 EDIT NORMAL SCHEDULE

Fig. 16.3

Step 1) Click on EDIT (Fig. 16.3) under action.

Copyright @ überGARD Page | 98


[Type here] Embedded Web User Manual

Step 2) Edit the necessary fields for update (Fig. 16.3)

Step 3) Click on SUBMIT (Fig. 16.3) to database.

16.1.3 DELETE NORMAL SCHEDULE

Step 4) Click on DELETE (Fig. 16.3) under action column or DELETE ALL to delete all
submitted schedules (Fig. 16.3)

Step 5) Click OK to proceed.

Copyright @ überGARD Page | 99


[Type here] Embedded Web User Manual

17. SYSTEMS

17.1 UPLOAD DATA TO PC

Fig. 17.1 (Above) and Table 17.1 (Below)

Item Description

Upload Data to PC Transfer data from the Keybox MCU to the PC

Download Data from PC Transfer data from PC to the Keybox MCU

Upload Data to VMS Transfer data to VMS (Visitor Management System)

Upload Data through CSV Transfer data through .csv file format

Step 1) Click on SYSTEM (Fig. 17.1)

Step 2) Click UPLOAD DATA TO PC (Fig. 17.1) from the left navigation

Step 3) Click UPLOAD to transfer data from the Keybox to your PC.

Copyright @ überGARD Page | 100


[Type here] Embedded Web User Manual

Fig. 17.2

Step 4) Click OK (Fig. 17.2) to proceed.

Fig. 17.3

Step 5) Click on SAVE (Fig. 17.3).

Step 6) Save the file to your preference folder in your PC.

17.2 DOWNLOAD DATA FROM PC

Fig. 17.4

Step 1) Click on DOWNLOAD DATA FROM PC (Fig. 17.4) from the left navigation.

Step 2) Click on Browse (Fig. 17.4)

Copyright @ überGARD Page | 101


[Type here] Embedded Web User Manual

Step 3) Select the .db file (Fig. 17.5) in your PC directory and click OPEN (Fig. 17.5)

Fig. 17.5

Step 4) Click on DOWNLOAD (Fig. 17.6)

Step 5) Click OK as the .db file has been downloaded successfully.

17.3 UPLOAD DATA TO VMS Fig. 17.6

Copyright @ überGARD Page | 102


[Type here] Embedded Web User Manual

Step 1) Click on the UPLOAD DATA TO VMS (Fig. 17.6)

Step 2) Key in the VMS IP Address (Fig. 17.6)

Fig. 17.7

Step 3) Select on UPLOAD USER DATA / UPLOAD KEY LIST to VMS (Fig. 17.7)

Step 4) Click OK to proceed.

17.4 UPLOAD DATA THROUGH CSV

Fig. 17.8

Step 1) Click on UPLOAD DATA THROUGH CSV (Fig. 17.8) on the left navigation.

Copyright @ überGARD Page | 103


[Type here] Embedded Web User Manual

Step 2) Click on Browse… (Fig. 17.8) to select data from PC.

Fig. 17.9

Step 3) Select the .csv file from the PC directory and click Open to upload file. (Fig. 17.9)

Fig. 17.10

Step 4) Click UPLOAD (Fig. 17.10) under the action column.

Step 5) Click OK to proceed.

Copyright @ überGARD Page | 104


[Type here] Embedded Web User Manual

Tags Registration

Copyright @ überGARD Page | 105


[Type here] Embedded Web User Manual

18. RFID TAGS REGISTRATION

18.1 RF TAGS REGISTRATION LOGIN

Step 1) Enter USER ID and PASSWORD (Fig. 18.1)

Fig. 18.1

Step 2) Enter the SITE PASSWORD (Fig. 18.2)

Fig. 18.2

Copyright @ überGARD Page | 106


[Type here] Embedded Web User Manual

Step 3) Click on REGISTRATION SETUP (Fig. 18.3).

Fig. 18.3

Step 4) Click on the Key box ( ) number to select which Keybox to register the RF Tags.

Step 5) Enter the RF Tag ID into the field (Fig. 18.3)

**
By default, the Tag ID registration column will have 0000000001 value. Delete and Enter the new RF Tag ID.

Step 6) Select SUBMIT upon accomplishing the RF tag ID (Fig. 18.4)

Fig. 18.4

Copyright @ überGARD Page | 107


[Type here] Embedded Web User Manual

Step 7) RF Tag ID registration SUCCESSFUL (Fig. 18.5)

Fig. 18.5

Step 8) Click LOGOUT to exit (Fig. 18.3)

Copyright @ überGARD Page | 108


[Type here] Embedded Web User Manual

NOTICE TO USERS

The iKLAS development team will constantly upgrade/improved our iKLAS system to maintain
High Security Standards. We welcome feedbacks from our customers on any improvements that
can be made to our system. Therefore changes will be made to the manual as we continue to
improve our IKLAS system to better serve our customers and maint ain High Security Standards.
The IKLAS development team will inform our highly valued customers of any changes to our
manual.

Copyright @ überGARD Page | 109


[Type here] Embedded Web User Manual

- END –

Copyright @ überGARD Page | 110