Access Controller Software Guide

Author: Brian Rhodes, Published on Dec 11, 2017

Properly configuring access controllers software is key to a professional access system.

These devices have fundamental settings that must be configured appropriately, including:

  • Unlock times / extended unlock times
  • Door Hold Open Alarms
  • Request to Exit Inputs
  • Card Formats
  • Reader / interface type
  • Input / output devices
  • Tamper switches

Inside this guide, we review all of those elements including examples of configuration with Axis, HID, Hikvision and Mercury controllers, a hands-on-video, and an explanation of the importance of each element.

******** ***************** ******************* ** *** ** * ************ ****** ******.

***** ******* **** *********** ******** **** **** ** ********** *************, including:

  • ****** ***** / ******** ****** *****
  • **** **** **** ******
  • ******* ** **** ******
  • **** *******
  • ****** / ********* ****
  • ***** / ****** *******
  • ****** ********

****** **** *****, ** ****** *** ** ***** ******** ********* examples ** ************* **** ****, ***, ********* *** ******* ***********, a *****-**-*****, *** ** *********** ** *** ********** ** **** element.

[***************]

Configuration ******* *******

*** ***** ******** **** **** ** ********** ** ***** ******* include:

****** *****

***** **** ******* ***** *** ******** *** *********, *** ***** they *** **** ** *********** *** *********, *** **** ******* used ** ****** *********** ** *** **** * **** ** powered/unpowered ** ********. ******* ** ***** **** ** ******** * credential *** **** **** ** ** ****-******* ** *******, **** setting ** ******* ** ****** **** *** ******* ** **** unsecured **** ****** ** ***** *** **** ** **** ******* before ******** ********.

******** ****** ****

**** ********* ** ***** ****** **** ** ********* ***** ** specific ********** ******* ***** ** ******* ***** (**** ***********) ** job **************** (**** ******** ******). ***** ******* **** '******** ******' times **** * ****** ****** ** **** ***** **** ****** they *** **-****** ** '**** ****' ****** *****.

**** **** **** ******

******* **** ***** *** *** ******, ****** ******* ******** '**** hold ****' ****** ** ****** ********* **** ***** ****** **** for *** ****. ** *** **********, *** ****** **** *** physically ****** ********* ** ***** ** ************ *********** ***** **********.

********* **** *******

** *******, *********** **** ******** ******* ** ********** ** ******** interpret *********** **** ******** *******. ***** *********** ****** ****** ************** ** ****, ******* *** ***** *********** ***** *** ** ********* ** needed ** ******** ****** *******.

******* ** **** ********

**** ***** ** ***** (**:********) *** **** ******** ****************** ** *********** **** ***** ***** ** ******** **** ***** ******* ***** credentials. ******* ***** ******* **** **** ** ********* *** **** temporarily, *** ******* **** ** ****** ***** ********** *** ********* to *** ********** *** *** *** **** ********. *** ********** allows ** *** ****** ** ******* ** ******, *** *** controller **** ******** *** **** *** ******* ** * ****** state ***** * ***** ****** *** *******.

****** ********

** ********, * ******* ** ******** *** ****** ********* ****** must ** ********** ****, ***, *** *** ******** ************* **** they ******. ** *******, *********** *** ****** *** ****** ****** contact ******** ** ******** *** ******* ******, ***, ** **** VMS ****** **** ******* ** ********** ****** *********.

Configuration ****** ********

******* *** **** ******* ** **** *********** **** ** ****** systems, *** ****** ** *********** **** *** **** *** *********** used ** ******** ******** ** ********* *******. *** ******** ***** show **** ****** ********** ********:

  • *** **** ***
  • **** *****
  • ******* ******** (**-****)
  • ********* **** *****

***** ***** *** *** ***** ****** ******** ** ******* ** *** ** ******* ****** ***************, *** ***** ******* *********** ** **** *****, ********* ******* fundamental *********. ** **** *****, *** ********** ********** ******** *** always ** **** ** ********* ***** ********, ******** **** *** based ** ********** ***** *** *** ********* **** ******** ** hardware.

HID **** ***

*****, ***** **** ***'* ******** *** ******* ***** *** '**** **********' ***:

**** **** '******' *** '******** ******' ***** *** ** ******** a ****** ******* * ****** ** ** ** *******, *** a ***** *********** ** **** ******* ** ****** ****** **** control. ** **** **********, *** ******** ********* ****** ****** *** keypad ** **** ********** ** **** ******.

Axis *****

*** ***-**** **** ********** (**** ****** ****) ***** ***** ******** ***** *** '******** *************' ******:

**** *** **** ***** **** *** ******** ****** ***** *** listed, *** ****** '****** ****' *** '**** ****** ****' ************. In ********, **** **** **** (**** *** **** ****) *** nuisance (***-***** ****) ****** *** **** ****** ** **** ******. Note *** ******** ** ****** **** '**** *******' ****** ******** *********** **** ** ********** ****.

Hikvision ****** ***********

********* (***:********* ****** ******* ******), *** ** ********* *** ******** ********** ******** ** ***** iVMS-4200 ********:

***** *** ***** ******** ******, *** ******** **** ******* *** the **** ** ***** *********. *** *******, '**** **** ******** by **** *** ******** ******' ** *** **** ** '******** Unlock ****', *** '**** **** ******* *****' ** '**** **** Open *****'.

Mercury ******** ***********

*** ******* ********, *** ******** *********** ***** ********* *** ******* in *** ******* ********** ******** ********* ****** **** ** *** hardware ********** ** ***** ******:

*** *********** *** ***** ****** ** ******** ****** ** *** deeply *** ****** ******** *** ********** *** ******** **********, *** in ******* ******* ******** *** ******* **** ******** **** **** 'Access ****', ******** ****** ********, *** ****** *****/****** ********** **** locks *** **** ******** ********.

Practical ******* ************

** *** **** *****, ***** ******** *** **** * *********** impact ** *** **** *** ****** ****** ********.

Unlock *****

**** ******* ******* ******** * ***** ** *****, ********* ******* or ************. *** ******* ******* ****** ****** ******* ******* ***** and **** ********** *****. ****** ****** ********** ********, *** *** typical ****** ***** *******:

*****:*** '********' ******** ***** ***** *** ****** ** ******* *********** adjacent ** ** ** *** **** *****, *** ****** **** generally ** *** ******* * *** ** *******. **** ****** enough **** *** ******* ** **** * ****, ****, *** pull **** * **** ****** ** *******, *** ** ***** enough ** ****** *** **** ****** *** **** *** ******* that **** ********** ****** **.

******* *****:*** ***** ** ***** ****** ** ****** **** * **** and ***** * ******* ******* **** ********* ** *** **** of ******** *** ***** ** ****. *******, *********** **** ******** distances *** ** ** ** **** ****, *** ********** *** need ** ***** ***** ******** *** ** ******* ** ****.

********:**** ***** *** ********* ** ******, ** ******** ** ***** and **** ** ********, * ********** (** ****** ** ***********) must ** ********** ** **** *** ****** ***** ** *** status ** ***** *****. *** **** ****** **********, *** *** ****. ******* * ********** **** ***** ****** ** ****** ***** the ******** ******* ** ******, *** "****** ****" *** ** 5 ******* ** ****.

Extended ****** ****

******** ** ******** *****:**** * ********** ******* **** ********, * **********, ** *** a *** **** ******** ******* ******* ** ******* ******* ***** in * ***** ******, ** "******** ******" **** ** ***** assigned ** **** ****, ** **** *** **** ******** ****** than ******* *** ***********. *** *******, * ******** ****** *** not ** **** ** ******** *** ******** ******* * **** in * - ** *******, *** * ****** ** ** to ** ******* *** ** **** ****** ** **** ******* without ************ ********* *** *******.

Door **** **** ******

**** ***** ****** **** ***** ***, *** ** ****** ***** after *********** *********, *** ****** ******* ****** *** ******* ** ignored ** * ********. *** **** ********, **** **** **** alarms ****** *** ** ********** *** **** **** ** *******, and *** **** **** * *******.

*******, *** ***** ******** ******** ***** ***** ** ** ********** by ******** ***.

Hardware ************* *******

** ******** ** ******** *************, **** ********** ****** ** ******** selection ****. *** ***** ******* *******:

  • ****** ** ************** *******:******* ** ****** **** ** *** *********** ** *********** ****** to **** * ****. *** *******, **** ***** ****** ******* offer ** ****** ** ****, ***, ** **** **** & PIN *********** ** **** * ****. *** ******** ** *** many ******* ** *** *** ** ******* ** ********** ******* of ******* ********** *****, *** *** ******* ******** ************* *** production ***. *** * ****** ****, *** ************** ************** ********.
  • *****/****** *******:*** '***********' ***** ** */* ******* *** ****** *** ** endless, *** *** ******* ** *** ***** ******** ******* *** controller **** * *** **** ** *** **** *** *********. For ********** ***/* ***********, *** *** ****. ** * ***** ** ******* **** ********* ******** *** amperages *** ** ** ******** ** *** **********, *** *** need ** ** *******, **********, ** ********* ** '**********' ******** where **** *** ********.
  • ******* ****** ********:** **** *****, *********** * ***** ** ********* ****** ******* is ****** *** ******* ** ***** ** ** ******. **** controllers ******* * ****** ******* ** ****** *******, *** ******* it ** *** *** ** ***** ********. ******** **************, ***** contact **************, ** ******** ****** ******** *** ****** ***** ******** to *** ***** ****** ********.

Controller *** ****** ****** *******

** *** ***** *****, ** **** * ***** ******** ** the ***** ****** ************* **** **** ** ******* - ******** connection ** ********** **** *******. **** *********** *** *** ******* phoenix ********** ** ********** ******* ********** **** *** ********** *** the ******** ********* *****.

** **** *****, *** ******** ******** ***** *** *** ** detected ** ********** *** ************* ***** *** ******** ********** *** wired ** *** **********. **** ***** ***** *** ****** ** typically ************ *** ****** ***** ****-**** ** **** ******* ***** coding:

[****: **** ******** *** ********** ********* ** **** *** ************* revised ** ****]

Comments (8)

Would be useful to add a section with multiple doors considerations

....read in / out,

....anti passback

and the plethora of functionalities that can be obtained with multiple card readers

You may find this article helpful: The Passback Problem

We will queue up an post on 'advanced access configurations' that address read in/out situations. Good idea!

PIR request to exits not programmed correctly resulting in nuisance forced door alarms and request to exits unlocking doors unnecessarily (e.g., when mag lock is not being used) are very common problems we encounter regularly at client sites.

Some codes state that an RTE has to be wired directly in line with the lock circuit, negating the use of the terminals for it on an access controller in those instances.

How would you negate a forced open in that case?

Wire the door through the RTE as well?

Very helpful

It would be great if this article could be amended to include an iStar panel

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

ACRE Acquires RS2, Explains Acquisition Strategy on Apr 19, 2019
ACRE continues to buy, now acquiring RS2, just 5 months after buying Open Options. One is a small access control manufacturer from Texas, the...
Access Control Course Spring 2019 - Last Chance on Apr 19, 2019
Register for the Spring Access Control Course. IPVM offers the most comprehensive access control course in the industry. Unlike manufacturer...
Door Operators Access Control Tutorial on Apr 17, 2019
Doors equipped with door operators, specialty devices that automate opening and closing, tend to be quite complex. The mechanisms needed to...
Alarm.com Favorability Results 2019 on Apr 15, 2019
The once dot com startup has evolved to become a core provider for home security and is now expanding into commercial. In their first entry in...
ISC West 2019 Report on Apr 12, 2019
The IPVM team has finished at the Sands looking at what companies are offering and how they are changing their positioning. See below for 50+...
Pole Mount Camera Installation Guide on Apr 11, 2019
Poles are a popular but challenging choice for deploying surveillance cameras outdoors. Poles are indispensable for putting cameras at the right...
Spring 2019 50+ New Products Directory on Apr 08, 2019
We are compiling a list of new products for Spring 2019 and have over 50 already. Contrast to Fall 2018 New Products Directory and Spring 2018...
Spring 2019 IP Networking Course- Register Now on Apr 04, 2019
Register now for the Spring 2019 IP Networking course here. Just $299 for the course. This is the only networking course designed specifically...
Startup GateKeeper Aims For Unified Physical / Logical Access Token on Apr 04, 2019
This startup's product claims to 'Kill the Password' you use to keep your computers safe.  They have already released their Gatekeeper Halberd...
Airship VMS Profile on Apr 03, 2019
Airship has been developing VMS software for over 10 years, however, with no outside investment, and minimal marketing, the company is not well...

Most Recent Industry Reports

H.265 Usage Statistics on Apr 19, 2019
H.265 has been available in IP cameras for more than 5 years and, in the past few years, the number of manufacturers supporting this codec has...
ACRE Acquires RS2, Explains Acquisition Strategy on Apr 19, 2019
ACRE continues to buy, now acquiring RS2, just 5 months after buying Open Options. One is a small access control manufacturer from Texas, the...
Access Control Course Spring 2019 - Last Chance on Apr 19, 2019
Register for the Spring Access Control Course. IPVM offers the most comprehensive access control course in the industry. Unlike manufacturer...
Riser vs Plenum Cabling Explained on Apr 18, 2019
You could be spending twice as much for cable as you need. The difference between 'plenum' rated cable and 'riser' rated cable is subtle, but the...
Verint Victimized By Ransomware on Apr 18, 2019
Verint, which is best known in the physical security industry for video surveillance but has built a sizeable cybersecurity business as well, was...
Milestone Drops IFSEC on Apr 18, 2019
Milestone has dropped out of Europe's largest annual security trade show (IFSEC 2019), telling IPVM that they "have found that IFSEC in EMEA no...
The Fastest Growing Video Surveillance Sales Organization Ever - Verkada on Apr 17, 2019
Verkada has the fastest growing video surveillance sales organization ever. In less than 2 years, they already have more salespeople in the US...
Door Operators Access Control Tutorial on Apr 17, 2019
Doors equipped with door operators, specialty devices that automate opening and closing, tend to be quite complex. The mechanisms needed to...
Securadyne CEO: IPVM 'Entertaining For An Ignorant Few' on Apr 16, 2019
Securadyne's CEO Carey Boethel is unhappy with IPVM's report - Failed Integrator Rollup, Securadyne Sells to Guard Giant Allied. Indeed, he...
Dahua Repositionable IR Multi-Imager Camera Tested on Apr 16, 2019
Dahua has released their first repositionable multi-imager camera, the Multi-Flex 4x2MP, claiming integrated IR, true WDR, and flexible...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact