Access Controller Software Guide

Published Dec 11, 2017 15:28 PM

Properly configuring access controllers software is key to a professional access system.

These devices have fundamental settings that must be configured appropriately, including:

  • Unlock times / extended unlock times
  • Door Hold Open Alarms
  • Request to Exit Inputs
  • Card Formats
  • Reader / interface type
  • Input / output devices
  • Tamper switches

Inside this guide, we review all of those elements including examples of configuration with Axis, HID, Hikvision and Mercury controllers, a hands-on-video, and an explanation of the importance of each element.

Configuration ******* *******

*** ***** ******** **** **** ** customized ** ***** ******* *******:

****** *****

***** **** ******* ***** *** ******** are *********, *** ***** **** *** need ** *********** *** *********, *** main ******* **** ** ****** *********** is *** **** * **** ** powered/unpowered ** ********. ******* ** ***** time ** ******** * ********** *** then **** ** ** ****-******* ** opening, **** ******* ** ******* ** making **** *** ******* ** **** unsecured **** ****** ** ***** *** user ** **** ******* ****** ******** relocked.

******** ****** ****

**** ********* ** ***** ****** **** is ********* ***** ** ******** ********** holders ***** ** ******* ***** (**** wheelchairs) ** *** **************** (**** ******** people). ***** ******* **** '******** ******' times **** * ****** ****** ** keep ***** **** ****** **** *** re-locked ** '**** ****' ****** *****.

**** **** **** ******

******* **** ***** *** *** ******, access ******* ******** '**** **** ****' alarms ** ****** ********* **** ***** remain **** *** *** ****. ** not **********, *** ****** **** *** physically ****** ********* ** ***** ** troubleshoot *********** ***** **********.

********* **** *******

** *******, *********** **** ******** ******* or ********** ** ******** ********* *********** from ******** *******. ***** *********** ****** always ************** ** ****, ******* *** ***** *********** ***** may ** ********* ** ****** ** specific ****** *******.

******* ** **** ********

**** ***** ** ***** (**: ********) and **** ******** ****************** ** *********** **** ***** ***** ** ******** door ***** ******* ***** ***********. ******* these ******* **** **** ** ********* the **** ***********, *** ******* **** to ****** ***** ********** *** ********* to *** ********** *** *** *** lock ********. *** ********** ****** ** RTE ****** ** ******* ** ******, but *** ********** **** ******** *** lock *** ******* ** * ****** state ***** * ***** ****** *** expired.

****** ********

** ********, * ******* ** ******** and ****** ********* ****** **** ** configured ****, ***, *** *** ******** notifications **** **** ******. ** *******, controllers *** ****** *** ****** ****** contact ******** ** ******** *** ******* emails, ***, ** **** *** ****** when ******* ** ********** ****** *********.

Configuration ****** ********

******* *** **** ******* ** **** controllers **** ** ****** *******, *** method ** *********** **** *** **** the *********** **** ** ******** ******** is ********* *******. *** ******** ***** show **** ****** ********** ********:

  • *** **** ***
  • **** *****
  • ******* ******** (**-****)
  • ********* **** *****

***** ***** *** *** ***** ****** detailed ** ******* ****** ********** ***** (****, ***, Isonas, ***********, *** ***** ******* *********** ** each *****, ********* ******* *********** *********. In **** *****, *** ********** ********** platform *** ****** ** **** ** configure ***** ********, ******** **** ***-***** or ********** ***** *** *** ********* them ******** ** ********.

HID **** ***

*****, ***** **** ***'* ******** *** ******* ***** *** 'Door **********' ***:

IPVM Image

**** **** '******' *** '******** ******' times *** ** ******** * ****** between * ****** ** ** ** minutes, *** * ***** *********** ** each ******* ** ****** ****** **** control. ** **** **********, *** ******** connected ****** ****** *** ****** ** also ********** ** **** ******.

Axis *****

*** ***-**** **** ********** (**** ****** ****) ***** ***** ******** ***** *** 'Hardware *************' ******:

IPVM Image

**** *** **** ***** **** *** extended ****** ***** *** ******, *** called '****** ****' *** '**** ****** time' ************. ** ********, **** **** open (**** *** **** ****) *** nuisance (***-***** ****) ****** *** **** listed ** **** ******. **** *** behavior ** ****** **** '**** *******' or**** ******** *********** **** ** ********** ****.

Hikvision ****** ***********

********* (***:********* ****** ******* ******), *** ** ********* *** ******** controller ******** ** ***** ****-**** ********:

IPVM Image

***** *** ***** ******** ******, *** features **** ******* *** *** **** as ***** *********. *** *******, '**** Open ******** ** **** *** ******** Person' ** *** **** ** '******** Unlock ****', *** '**** **** ******* Alarm' ** '**** **** **** *****'.

Mercury ******** ***********

*** ******* ********, *** ******** *********** these ********* *** ******* ** *** partner ********** ******** ********* ****** **** on *** ******** ********** ** ***** itself:

IPVM Image

*** *********** *** ***** ****** ** controls ****** ** *** ****** *** parent ******** *** ********** *** ******** controller, *** ** ******* ******* ********, all ******* **** ******** **** **** 'Access ****', ******** ****** ********, *** common *****/****** ********** **** ***** *** door ******** ********.

Practical ******* ************

** *** **** *****, ***** ******** can **** * *********** ****** ** how **** *** ****** ****** ********.

Unlock *****

**** ******* ******* ******** * ***** of *****, ********* ******* ** ************. The ******* ******* ****** ****** ******* opening ***** *** **** ********** *****. Common ******-********** ******** *** *** ******* unlock ***** *******:

*****:*** '********' ******** ***** ***** *** reader ** ******* *********** ******** ** or ** *** **** *****, *** unlock **** ********* ** *** ******* 5 *** ** *******. **** ****** enough **** *** ******* ** **** a ****, ****, *** **** **** a **** ****** ** *******, *** is ***** ****** ** ****** *** door ****** *** **** *** ******* that **** ********** ****** **.

IPVM Image

******* *****:*** ***** ** ***** ****** ** safely **** * **** *** ***** a ******* ******* **** ********* ** the **** ** ******** *** ***** of ****. *******, *********** **** ******** distances *** ** ** ** **** feet, *** ********** *** **** ** close ***** ******** *** ** ******* or ****.

IPVM Image

********:**** ***** *** ********* ** ******, or ******** ** ***** *** **** in ********, * ********** (** ****** of ***********) **** ** ********** ** lock *** ****** ***** ** *** status ** ***** *****. *** **** detail **********, *** *** ****. ******* * *** ******* **** often ****** ** ****** ***** *** previous ******* ** ******, *** "****** Time" ***** * ******* ** ****.

Extended ****** ****

******** ** ******** *****:**** * ********** ******* **** ********, a **********, ** *** * *** that ******** ******* ******* ** ******* several ***** ** * ***** ******, an "******** ******" **** ** ***** assigned ** **** ****, ** **** the **** ******** ****** **** ******* for ***********. *** *******, * ******** person *** *** ** **** ** transfer *** ******** ******* * **** in * - ** *******, *** a ****** ** ** ** ** seconds *** ** **** ****** ** pass ******* ******* ************ ********* *** opening.

IPVM Image

Door **** **** ******

**** ***** ****** **** ***** ***, but ** ****** ***** ***** *********** durations, *** ****** ******* ****** *** quickly ** ******* ** * ********. For **** ********, **** **** **** alarms ****** *** ** ********** *** less **** ** *******, *** *** more **** * *******.

IPVM Image

*******, *** ***** ******** ******** ***** needs ** ** ********** ** ******** use.

Hardware ************* *******

** ******** ** ******** *************, **** attributes ****** ** ******** ********* ****. The ***** ******* *******:

  • ****** ** ************** *******:******* ** ****** **** ** *** combination ** *********** ****** ** **** a ****. *** *******, **** ***** access ******* ***** ** ****** ** card, ***, ** **** **** & PIN *********** ** **** * ****. The ******** ** *** **** ******* to *** *** ** ******* ** controller ******* ** ******* ********** ***** and *** ******* ******** ************* *** production ***. *** * ****** ****, see ************** ************** ********.
  • *****/****** *******:*** '***********' ***** ** */* ******* for ****** *** ** *******, *** the ******* ** *** ***** ******** onboard *** ********** **** * *** part ** *** **** *** *********. For **********, *** *********/******* *****.** * ***** ** ******* **** different ******** *** ********* *** ** be ******** ** *** **********, *** may **** ** ** *******, **********, or ********* ** '**********' ******** ***** they *** ********.
  • ******* ****** ********:** **** *****, *********** * ***** or ********* ****** ******* ** ****** for ******* ** ***** ** ** occurs. **** *********** ******* * ****** contact ** ****** *******, *** ******* it ** *** *** ** ***** optional. ******** **************, ***** ******* **************, or ******** ****** ******** *** ****** steps ******** ** *** ***** ****** switches.

Controller *** ****** ****** *******

** *** ***** *****, ** **** a ***** ******** ** *** ***** common ************* **** **** ** ******* - ******** ********** ** ********** **** readers. **** *********** *** *** ******* phoenix ********** ** ********** ******* ********** that *** ********** *** *** ******** described *****.

** **** *****, *** ******** ******** above *** *** ** ******** ** recognized *** ************* ***** *** ******** components *** ***** ** *** **********. This ***** ***** *** ****** ** typically ************ *** ****** ***** ****-**** or **** ******* ***** ******:

[****: **** ******** *** ********** ********* in **** *** ************* ******* ** 2017]

Comments (16)
dw
dean woodyatt
Sep 28, 2016

Would be useful to add a section with multiple doors considerations

....read in / out,

....anti passback

and the plethora of functionalities that can be obtained with multiple card readers

Avatar
Brian Rhodes
Sep 28, 2016
IPVMU Certified

You may find this article helpful: The Passback Problem

We will queue up an post on 'advanced access configurations' that address read in/out situations. Good idea!

Avatar
Frank Pisciotta
Sep 28, 2016
IPVMU Certified

PIR request to exits not programmed correctly resulting in nuisance forced door alarms and request to exits unlocking doors unnecessarily (e.g., when mag lock is not being used) are very common problems we encounter regularly at client sites.

(3)
(1)
UI
Undisclosed Integrator #1
Sep 28, 2016

Some codes state that an RTE has to be wired directly in line with the lock circuit, negating the use of the terminals for it on an access controller in those instances.

MO
Matt Oullette
Oct 17, 2018
IPVMU Certified

How would you negate a forced open in that case?  

 

Avatar
Daniel S-T
Oct 17, 2018

Wire the door through the RTE as well?

UI
Undisclosed Integrator #2
Nov 18, 2019

I have never seen that as a requirement for a door unless it had a maglock.

Avatar
Eric Rasmussen
Oct 26, 2016
IPVMU Certified

Very helpful

Avatar
Frank Pisciotta
Oct 17, 2018
IPVMU Certified

It would be great if this article could be amended to include an iStar panel

RE
Ray Evin
May 05, 2019
IPVMU Certified

Looks pretty straight forward

(1)
AA
Abdulwahab Al-Ibrahim
Nov 18, 2019
IPVMU Certified

Brian

Please be informed that alot of referable links are not working. Ex : I/O connections, see our note & Multifactor Authentication tutorial.

If you can rectify it, it will be helpful.

Avatar
Brian Rhodes
Nov 18, 2019
IPVMU Certified

Thanks for this. All links have been checked/fixed/updated.

DR
David Rasmussen
Mar 17, 2022
IPVMU Certified

Under extended unlock times it states that this is used for delivery drivers or someone that may be handicapped that would require an extended unlock time at the door to access it. When applying an extended unlock time, are you applying it to the door controller itself or can it be applied to individual cards or credentials? In my experience, I've seen adding/removing access after certain dates/times or times the credential is used. But I don't recall the individual credential to have an extended unlock time.

Avatar
Brian Rhodes
Mar 17, 2022
IPVMU Certified

In my experience, I've seen adding/removing access after certain dates/times or times the credential is used. But I don't recall the individual credential to have an extended unlock time.

In many cases, the credential is flagged as 'extended open' valid, but the duration of how long that extended open lasts is a controller value.

In part, this is because openings vary in distance between reader and door, or door swing mechanics, or similar and specific openings may need to be unlocked for different times than a general credential-level value may offer.

Good question!

(1)
Avatar
Isaiah Calvo
Jan 30, 2023
IPVMU Certified

The advances in access door controllers technology have led to a trend towards increased security and convenience in modern buildings. The integration of new features such as biometrics, real-time monitoring, and mobile compatibility have revolutionized the way buildings manage and control access, making it easier to secure the premises while providing easy and quick access to authorized individuals.

UE
Undisclosed End User #3
Jan 30, 2023

Sorry Brian!!