ZKTeco G5 Multi Biometric Access Control Terminal User Guide

June 13, 2024
ZKTECO

ZKTeco G5 Multi Biometric Access Control Terminal User Guide
ZKTeco G5 Multi Biometric Access Control Terminal

Safety Precautions

Before installation, please read the following precautions carefully to prevent the risks of danger to the users of this product or those nearby and damaging the device.

  • Do not expose to direct sunlight, water, dust and soot.
  • Do not place any magnetic objects near the product. Magnetic objects such as magnets, CRT, TV, monitors or speakers may damage the device.
  • Do not place the device next to heating equipment.
  • Prevent water, drinks or chemicals leaking into the device.
  • Safety Warnings This product is not intended for use by children unless they are supervised.
  • Safety WarningsDo not drop or damage the device.
  • Safety WarningsDo not disassemble, repair or modify the device.
  • Safety WarningsDo not use the device for any purpose other than those specified.
  • Safety WarningsRemove dusts or dirts regularly. While cleaning, wipe dust off with a smooth cloth or towel instead of water.

Contact your supplier in case of any problem!

Device Overview

Device Overview
Device Overview

Terminal Block

Terminal Block

Product Installation

The recommended distance

Recommended Distance

For users whose height is between 55.118″ to 70.866″ (1.4m to 1.8m), the recommended height of the equipment is 61.024″ (1.55m), and the distance from the personnel to the equipment is 19.685″ (0.5m). Users not in the range can adjust the position by moving back and forth according to the actual situation.

Installation on the wall
  1. First passing the wires through the wiring hole in the back plate.
    Installation on the wall

  2. Drill holes at suitable locations on the wall, then fix the back plate to the wall with mounting screws, the recommended distance from the camera to the ground is 61.024 inches (1.55m).
    Installation on the wall

  3. Then attach the device to the back plate from top to bottom.
    Installation on the wall

  4. Fasten the device to the back plate with a security screw.
    Installation on the wall

Power & Ethernet Connection

Power Connection

Power Connection

Recommended power supply

  • Recommended AC adapter: 12V, 3A
  • To share the power with other devices, use an AC adapter with higher current ratings.
Ethernet Connection

Ethernet Connection

Access Control & Reader Connection

Access Control Connection

Access Control Connection

Reader Connection

Reader Connection

Lock Relay Connection

The system supports both Normally Opened Lock and Normally Closed Lock. The NO Lock (Normally Opened when powered) is connected with ‘NO’ and ‘COM’ terminals, and the NC Lock (Normally Closed when powered) is connected with ‘NC’ and ‘COM’ terminals. The power can be shared with the lock or can be used separately for the lock, as shown in the example with NC Lock below:

Device not sharing power with the lock is shown below:

Lock Relay Connection

Device sharing power with the lock is shown below:

Lock Relay Connection

Connecting Other Devices

Bell Connection

Bell Connection

Smoke Detector, Door Sensor, Exit Button & Alarm Connection

Smoke Detector, Door Sensor, Exit Button & Alarm
Connection

Standalone Installation

Standalone Installation

Enroll New User

Enroll New User

When there is no Super Administrator set in the device, click  to enter the menu. Add a new user and set the User Role to Super Admin, then the system will request for Administrator’s verification before entering the menu. It is recommended to register a Super Administrator initially for security purposes.

Click > User Management > > New User to register a new user. The procedure includes entering the User ID and Name, choosing User Role, registering Fingerprint, enroll Card Number, setting Password and setting Access Control Role.

Access Settings

Access Settings

Click > Access Control > Access Control Options to enter the setting interface.

Network Settings

Click > System Settings > Network settings to set the network parameters. If the TCP/IP communication of the device is successful, the icon will be displayed in the top right corner of the standby interface.

Attendance Search

Attendance Search

View records in the device:

Click > Attendance Search > Access  Logs (records of all users will be displayed) > select Time Range > press OK, the corresponding attendance logs will be displayed.

View records on computer:

Click > USB Management > Download to   USB. Insert the USB disk correctly and download the data to the USB drive, then copy this data from the USB drive to your PC. The downloaded data filename will be ”Device Serial Number.dat”, you can open and view it.

Date and Time Settings

Click > System Settings > Date and Time, to enter Date and Time setting interface.

Troubleshooting

  1. Fingerprint can’t be detected or it takes too long.
    • Check whether the finger or fingerprint sensor is stained with sweat, water, or dust.
    • Retry after wiping the finger and fingerprint sensor with dry paper tissue or a mildly wet cloth.
    • If the fingerprint is too dry, blow onto the fingertip and retry.
  2. Failed to gain access after successful verification.
    • Check with administrator whether the enrolled fingerprint has been deleted from the device or not.
  3. Door doesn’t open after successful verification.
    • Check if the lock open duration parameter is set appropriately.

Specifications

Model G5
CPU 64bit Eight Core Customized Computer Vision CPU
Operation System Android 9.0
Storage 2GB LPDDR3 16GB eMMC
SDK Android LCDP, PUSH SDK
WLAN 2.4GHz/5.0GHz Dual Frequency; IEEE 802.11 a/b/g/n/ac
Display 8 inch TFT LCDColor Screen
Screen Type Capacitive Touch Screen
Resolution 800*1280
Camera 2MP Binocular Camera
Card Type 125kHz ID card & 13.56MHz IC card

Multi-tech Card Module (optional)
ISO14443A/B & ISO15693 & HID Prox
QR Code (optional)| Dynamic QR codes on the ZKBioSecurity mobile application
QR code, PDF417, Data Matrix, MicroPDF417,
Aztec scanning in third-party development projects
User Capacity| 100,000
Face Templates Capacity| 100,000
Fingerprint Capacity (optional)| 30,000
Card Capacity| 100,000
Record Capacity| 5,000,000
Firmware Functions| Push, Schedule Bell, Automatic Status Switch, Record Query, Access Levels, Groups, Holidays, DST, Duress Mode (Password & Fingerprint), Anti-Passback, Customization of Wallpaper & Screen Saver, Tamper Alarm
Language| English, Korean, Latin American, Indonesian, Vietnamese, Traditional Chinese, Portuguese, Spanish, Farsi, Japanese, Russian and Thai
Software| BioTime 8.0 , ZKBioSecurity,ZKBioCV Security

Green Label Logo

ZKTeco Industrial Park, No. 32, Industrial Road,
Tangxia Town, Dongguan, China.
Phone : +86 769 – 82109991
Fax : +86 755 – 89602394
www.zkteco.com
Copyright©2023ZKTECOCO., LTD.All Rights Reserved.

qr code

References

Read User Manual Online (PDF format)

Read User Manual Online (PDF format)  >>

Download This Manual (PDF format)

Download this manual  >>

Related Manuals