Access lists - G2 protocols

Locking devices with ZK function log the accesses in an access list:

  • Date
  • Time
  • ID of the identification medium
  • Name of the user

You can read and display the access list with the LSM software. The number of entries in the access list depends on the locking device and the configuration.

 

Standard

Gateway

Cylinder

Up to 3000

SmartHandle

Up to 3000

SmartRelay

Up to 3600

Up to 200

You can also automate the read-out in a networked locking system (see Read locking device).