Access Controller Software Guide

By Brian Rhodes, Published Dec 11, 2017, 10:28am EST (Info+)

Properly configuring access controllers software is key to a professional access system.

These devices have fundamental settings that must be configured appropriately, including:

  • Unlock times / extended unlock times
  • Door Hold Open Alarms
  • Request to Exit Inputs
  • Card Formats
  • Reader / interface type
  • Input / output devices
  • Tamper switches

Inside this guide, we review all of those elements including examples of configuration with Axis, HID, Hikvision and Mercury controllers, a hands-on-video, and an explanation of the importance of each element.

Configuration ******* *******

*** ***** ******** **** **** ** customized ** ***** ******* *******:

****** *****

***** **** ******* ***** *** ******** are *********, *** ***** **** *** need ** *********** *** *********, *** main ******* **** ** ****** *********** is *** **** * **** ** powered/unpowered ** ********. ******* ** ***** time ** ******** * ********** *** then **** ** ** ****-******* ** opening, **** ******* ** ******* ** making **** *** ******* ** **** unsecured **** ****** ** ***** *** user ** **** ******* ****** ******** relocked.

******** ****** ****

**** ********* ** ***** ****** **** is ********* ***** ** ******** ********** holders ***** ** ******* ***** (**** wheelchairs) ** *** **************** (**** ******** people). ***** ******* **** '******** ******' times **** * ****** ****** ** keep ***** **** ****** **** *** re-locked ** '**** ****' ****** *****.

**** **** **** ******

******* **** ***** *** *** ******, access ******* ******** '**** **** ****' alarms ** ****** ********* **** ***** remain **** *** *** ****. ** not **********, *** ****** **** *** physically ****** ********* ** ***** ** troubleshoot *********** ***** **********.

********* **** *******

** *******, *********** **** ******** ******* or ********** ** ******** ********* *********** from ******** *******. ***** *********** ****** always ************** ** ****, ******* *** ***** *********** ***** may ** ********* ** ****** ** specific ****** *******.

******* ** **** ********

**** ***** ** ***** (**: ********) and **** ******** ****************** ** *********** **** ***** ***** ** ******** door ***** ******* ***** ***********. ******* these ******* **** **** ** ********* the **** ***********, *** ******* **** to ****** ***** ********** *** ********* to *** ********** *** *** *** lock ********. *** ********** ****** ** RTE ****** ** ******* ** ******, but *** ********** **** ******** *** lock *** ******* ** * ****** state ***** * ***** ****** *** expired.

****** ********

** ********, * ******* ** ******** and ****** ********* ****** **** ** configured ****, ***, *** *** ******** notifications **** **** ******. ** *******, controllers *** ****** *** ****** ****** contact ******** ** ******** *** ******* emails, ***, ** **** *** ****** when ******* ** ********** ****** *********.

Configuration ****** ********

******* *** **** ******* ** **** controllers **** ** ****** *******, *** method ** *********** **** *** **** the *********** **** ** ******** ******** is ********* *******. *** ******** ***** show **** ****** ********** ********:

  • *** **** ***
  • **** *****
  • ******* ******** (**-****)
  • ********* **** *****

***** ***** *** *** ***** ****** detailed ** ******* ****** ********** ***** (****, ***, Isonas, ***********, *** ***** ******* *********** ** each *****, ********* ******* *********** *********. In **** *****, *** ********** ********** platform *** ****** ** **** ** configure ***** ********, ******** **** ***-***** or ********** ***** *** *** ********* them ******** ** ********.

HID **** ***

*****, ***** **** ***'* ******** *** ******* ***** *** 'Door **********' ***:

IPVM Image

**** **** '******' *** '******** ******' times *** ** ******** * ****** between * ****** ** ** ** minutes, *** * ***** *********** ** each ******* ** ****** ****** **** control. ** **** **********, *** ******** connected ****** ****** *** ****** ** also ********** ** **** ******.

Axis *****

*** ***-**** **** ********** (**** ****** ****) ***** ***** ******** ***** *** 'Hardware *************' ******:

IPVM Image

**** *** **** ***** **** *** extended ****** ***** *** ******, *** called '****** ****' *** '**** ****** time' ************. ** ********, **** **** open (**** *** **** ****) *** nuisance (***-***** ****) ****** *** **** listed ** **** ******. **** *** behavior ** ****** **** '**** *******' or**** ******** *********** **** ** ********** ****.

Hikvision ****** ***********

********* (***:********* ****** ******* ******), *** ** ********* *** ******** controller ******** ** ***** ****-**** ********:

IPVM Image

***** *** ***** ******** ******, *** features **** ******* *** *** **** as ***** *********. *** *******, '**** Open ******** ** **** *** ******** Person' ** *** **** ** '******** Unlock ****', *** '**** **** ******* Alarm' ** '**** **** **** *****'.

Mercury ******** ***********

*** ******* ********, *** ******** *********** these ********* *** ******* ** *** partner ********** ******** ********* ****** **** on *** ******** ********** ** ***** itself:

IPVM Image

*** *********** *** ***** ****** ** controls ****** ** *** ****** *** parent ******** *** ********** *** ******** controller, *** ** ******* ******* ********, all ******* **** ******** **** **** 'Access ****', ******** ****** ********, *** common *****/****** ********** **** ***** *** door ******** ********.

Practical ******* ************

** *** **** *****, ***** ******** can **** * *********** ****** ** how **** *** ****** ****** ********.

Unlock *****

**** ******* ******* ******** * ***** of *****, ********* ******* ** ************. The ******* ******* ****** ****** ******* opening ***** *** **** ********** *****. Common ******-********** ******** *** *** ******* unlock ***** *******:

*****:*** '********' ******** ***** ***** *** reader ** ******* *********** ******** ** or ** *** **** *****, *** unlock **** ********* ** *** ******* 5 *** ** *******. **** ****** enough **** *** ******* ** **** a ****, ****, *** **** **** a **** ****** ** *******, *** is ***** ****** ** ****** *** door ****** *** **** *** ******* that **** ********** ****** **.

IPVM Image

******* *****:*** ***** ** ***** ****** ** safely **** * **** *** ***** a ******* ******* **** ********* ** the **** ** ******** *** ***** of ****. *******, *********** **** ******** distances *** ** ** ** **** feet, *** ********** *** **** ** close ***** ******** *** ** ******* or ****.

IPVM Image

********:**** ***** *** ********* ** ******, or ******** ** ***** *** **** in ********, * ********** (** ****** of ***********) **** ** ********** ** lock *** ****** ***** ** *** status ** ***** *****. *** **** detail **********, *** *** ****. ******* * *** ******* **** often ****** ** ****** ***** *** previous ******* ** ******, *** "****** Time" ***** * ******* ** ****.

Extended ****** ****

******** ** ******** *****:**** * ********** ******* **** ********, a **********, ** *** * *** that ******** ******* ******* ** ******* several ***** ** * ***** ******, an "******** ******" **** ** ***** assigned ** **** ****, ** **** the **** ******** ****** **** ******* for ***********. *** *******, * ******** person *** *** ** **** ** transfer *** ******** ******* * **** in * - ** *******, *** a ****** ** ** ** ** seconds *** ** **** ****** ** pass ******* ******* ************ ********* *** opening.

IPVM Image

Door **** **** ******

**** ***** ****** **** ***** ***, but ** ****** ***** ***** *********** durations, *** ****** ******* ****** *** quickly ** ******* ** * ********. For **** ********, **** **** **** alarms ****** *** ** ********** *** less **** ** *******, *** *** more **** * *******.

IPVM Image

*******, *** ***** ******** ******** ***** needs ** ** ********** ** ******** use.

Hardware ************* *******

** ******** ** ******** *************, **** attributes ****** ** ******** ********* ****. The ***** ******* *******:

  • ****** ** ************** *******:******* ** ****** **** ** *** combination ** *********** ****** ** **** a ****. *** *******, **** ***** access ******* ***** ** ****** ** card, ***, ** **** **** & PIN *********** ** **** * ****. The ******** ** *** **** ******* to *** *** ** ******* ** controller ******* ** ******* ********** ***** and *** ******* ******** ************* *** production ***. *** * ****** ****, see ************** ************** ********.
  • *****/****** *******:*** '***********' ***** ** */* ******* for ****** *** ** *******, *** the ******* ** *** ***** ******** onboard *** ********** **** * *** part ** *** **** *** *********. For **********, *** *********/******* *****.** * ***** ** ******* **** different ******** *** ********* *** ** be ******** ** *** **********, *** may **** ** ** *******, **********, or ********* ** '**********' ******** ***** they *** ********.
  • ******* ****** ********:** **** *****, *********** * ***** or ********* ****** ******* ** ****** for ******* ** ***** ** ** occurs. **** *********** ******* * ****** contact ** ****** *******, *** ******* it ** *** *** ** ***** optional. ******** **************, ***** ******* **************, or ******** ****** ******** *** ****** steps ******** ** *** ***** ****** switches.

Controller *** ****** ****** *******

** *** ***** *****, ** **** a ***** ******** ** *** ***** common ************* **** **** ** ******* - ******** ********** ** ********** **** readers. **** *********** *** *** ******* phoenix ********** ** ********** ******* ********** that *** ********** *** *** ******** described *****.

** **** *****, *** ******** ******** above *** *** ** ******** ** recognized *** ************* ***** *** ******** components *** ***** ** *** **********. This ***** ***** *** ****** ** typically ************ *** ****** ***** ****-**** or **** ******* ***** ******:

[****: **** ******** *** ********** ********* in **** *** ************* ******* ** 2017]

Comments (14)

Would be useful to add a section with multiple doors considerations

....read in / out,

....anti passback

and the plethora of functionalities that can be obtained with multiple card readers

Agree
Disagree
Informative
Unhelpful
Funny

You may find this article helpful: The Passback Problem

We will queue up an post on 'advanced access configurations' that address read in/out situations. Good idea!

Agree
Disagree
Informative
Unhelpful
Funny

PIR request to exits not programmed correctly resulting in nuisance forced door alarms and request to exits unlocking doors unnecessarily (e.g., when mag lock is not being used) are very common problems we encounter regularly at client sites.

Agree: 3
Disagree
Informative: 1
Unhelpful
Funny

Some codes state that an RTE has to be wired directly in line with the lock circuit, negating the use of the terminals for it on an access controller in those instances.

Agree
Disagree
Informative
Unhelpful
Funny

How would you negate a forced open in that case?  

 

Agree
Disagree
Informative
Unhelpful
Funny

Wire the door through the RTE as well?

Agree
Disagree
Informative
Unhelpful
Funny

I have never seen that as a requirement for a door unless it had a maglock.

Agree
Disagree
Informative
Unhelpful
Funny

Very helpful

Agree
Disagree
Informative
Unhelpful
Funny

It would be great if this article could be amended to include an iStar panel

Agree
Disagree
Informative
Unhelpful
Funny

Looks pretty straight forward

Agree
Disagree
Informative
Unhelpful
Funny: 1

Brian

Please be informed that alot of referable links are not working. Ex : I/O connections, see our note & Multifactor Authentication tutorial.

If you can rectify it, it will be helpful.

Agree
Disagree
Informative
Unhelpful
Funny

Thanks for this. All links have been checked/fixed/updated.

Agree
Disagree
Informative
Unhelpful
Funny

Under extended unlock times it states that this is used for delivery drivers or someone that may be handicapped that would require an extended unlock time at the door to access it. When applying an extended unlock time, are you applying it to the door controller itself or can it be applied to individual cards or credentials? In my experience, I've seen adding/removing access after certain dates/times or times the credential is used. But I don't recall the individual credential to have an extended unlock time.

Agree
Disagree
Informative
Unhelpful
Funny

In my experience, I've seen adding/removing access after certain dates/times or times the credential is used. But I don't recall the individual credential to have an extended unlock time.

In many cases, the credential is flagged as 'extended open' valid, but the duration of how long that extended open lasts is a controller value.

In part, this is because openings vary in distance between reader and door, or door swing mechanics, or similar and specific openings may need to be unlocked for different times than a general credential-level value may offer.

Good question!

Agree
Disagree
Informative: 1
Unhelpful
Funny
Login to read this IPVM report.
Why do I need to log in?
IPVM conducts reporting, tutorials and software funded by subscriber's payments enabling us to offer the most independent, accurate and in-depth information.
Loading Related Reports