Access Controller Software Guide

Author: Brian Rhodes, Published on Dec 11, 2017

Properly configuring access controllers software is key to a professional access system.

These devices have fundamental settings that must be configured appropriately, including:

  • Unlock times / extended unlock times
  • Door Hold Open Alarms
  • Request to Exit Inputs
  • Card Formats
  • Reader / interface type
  • Input / output devices
  • Tamper switches

Inside this guide, we review all of those elements including examples of configuration with Axis, HID, Hikvision and Mercury controllers, a hands-on-video, and an explanation of the importance of each element.

******** ***************** ******************* ** *** ** * ************ ****** ******.

***** ******* **** *********** ******** **** **** ** ********** *************, including:

  • ****** ***** / ******** ****** *****
  • **** **** **** ******
  • ******* ** **** ******
  • **** *******
  • ****** / ********* ****
  • ***** / ****** *******
  • ****** ********

****** **** *****, ** ****** *** ** ***** ******** ********* examples ** ************* **** ****, ***, ********* *** ******* ***********, a *****-**-*****, *** ** *********** ** *** ********** ** **** element.

[***************]

Configuration ******* *******

*** ***** ******** **** **** ** ********** ** ***** ******* include:

****** *****

***** **** ******* ***** *** ******** *** *********, *** ***** they *** **** ** *********** *** *********, *** **** ******* used ** ****** *********** ** *** **** * **** ** powered/unpowered ** ********. ******* ** ***** **** ** ******** * credential *** **** **** ** ** ****-******* ** *******, **** setting ** ******* ** ****** **** *** ******* ** **** unsecured **** ****** ** ***** *** **** ** **** ******* before ******** ********.

******** ****** ****

**** ********* ** ***** ****** **** ** ********* ***** ** specific ********** ******* ***** ** ******* ***** (**** ***********) ** job **************** (**** ******** ******). ***** ******* **** '******** ******' times **** * ****** ****** ** **** ***** **** ****** they *** **-****** ** '**** ****' ****** *****.

**** **** **** ******

******* **** ***** *** *** ******, ****** ******* ******** '**** hold ****' ****** ** ****** ********* **** ***** ****** **** for *** ****. ** *** **********, *** ****** **** *** physically ****** ********* ** ***** ** ************ *********** ***** **********.

********* **** *******

** *******, *********** **** ******** ******* ** ********** ** ******** interpret *********** **** ******** *******. ***** *********** ****** ****** ************** ** ****, ******* *** ***** *********** ***** *** ** ********* ** needed ** ******** ****** *******.

******* ** **** ********

**** ***** ** ***** (**:********) *** **** ******** ****************** ** *********** **** ***** ***** ** ******** **** ***** ******* ***** credentials. ******* ***** ******* **** **** ** ********* *** **** temporarily, *** ******* **** ** ****** ***** ********** *** ********* to *** ********** *** *** *** **** ********. *** ********** allows ** *** ****** ** ******* ** ******, *** *** controller **** ******** *** **** *** ******* ** * ****** state ***** * ***** ****** *** *******.

****** ********

** ********, * ******* ** ******** *** ****** ********* ****** must ** ********** ****, ***, *** *** ******** ************* **** they ******. ** *******, *********** *** ****** *** ****** ****** contact ******** ** ******** *** ******* ******, ***, ** **** VMS ****** **** ******* ** ********** ****** *********.

Configuration ****** ********

******* *** **** ******* ** **** *********** **** ** ****** systems, *** ****** ** *********** **** *** **** *** *********** used ** ******** ******** ** ********* *******. *** ******** ***** show **** ****** ********** ********:

  • *** **** ***
  • **** *****
  • ******* ******** (**-****)
  • ********* **** *****

***** ***** *** *** ***** ****** ******** ** ******* ** *** ** ******* ****** ***************, *** ***** ******* *********** ** **** *****, ********* ******* fundamental *********. ** **** *****, *** ********** ********** ******** *** always ** **** ** ********* ***** ********, ******** **** *** based ** ********** ***** *** *** ********* **** ******** ** hardware.

HID **** ***

*****, ***** **** ***'* ******** *** ******* ***** *** '**** **********' ***:

**** **** '******' *** '******** ******' ***** *** ** ******** a ****** ******* * ****** ** ** ** *******, *** a ***** *********** ** **** ******* ** ****** ****** **** control. ** **** **********, *** ******** ********* ****** ****** *** keypad ** **** ********** ** **** ******.

Axis *****

*** ***-**** **** ********** (**** ****** ****) ***** ***** ******** ***** *** '******** *************' ******:

**** *** **** ***** **** *** ******** ****** ***** *** listed, *** ****** '****** ****' *** '**** ****** ****' ************. In ********, **** **** **** (**** *** **** ****) *** nuisance (***-***** ****) ****** *** **** ****** ** **** ******. Note *** ******** ** ****** **** '**** *******' ****** ******** *********** **** ** ********** ****.

Hikvision ****** ***********

********* (***:********* ****** ******* ******), *** ** ********* *** ******** ********** ******** ** ***** iVMS-4200 ********:

***** *** ***** ******** ******, *** ******** **** ******* *** the **** ** ***** *********. *** *******, '**** **** ******** by **** *** ******** ******' ** *** **** ** '******** Unlock ****', *** '**** **** ******* *****' ** '**** **** Open *****'.

Mercury ******** ***********

*** ******* ********, *** ******** *********** ***** ********* *** ******* in *** ******* ********** ******** ********* ****** **** ** *** hardware ********** ** ***** ******:

*** *********** *** ***** ****** ** ******** ****** ** *** deeply *** ****** ******** *** ********** *** ******** **********, *** in ******* ******* ******** *** ******* **** ******** **** **** 'Access ****', ******** ****** ********, *** ****** *****/****** ********** **** locks *** **** ******** ********.

Practical ******* ************

** *** **** *****, ***** ******** *** **** * *********** impact ** *** **** *** ****** ****** ********.

Unlock *****

**** ******* ******* ******** * ***** ** *****, ********* ******* or ************. *** ******* ******* ****** ****** ******* ******* ***** and **** ********** *****. ****** ****** ********** ********, *** *** typical ****** ***** *******:

*****:*** '********' ******** ***** ***** *** ****** ** ******* *********** adjacent ** ** ** *** **** *****, *** ****** **** generally ** *** ******* * *** ** *******. **** ****** enough **** *** ******* ** **** * ****, ****, *** pull **** * **** ****** ** *******, *** ** ***** enough ** ****** *** **** ****** *** **** *** ******* that **** ********** ****** **.

******* *****:*** ***** ** ***** ****** ** ****** **** * **** and ***** * ******* ******* **** ********* ** *** **** of ******** *** ***** ** ****. *******, *********** **** ******** distances *** ** ** ** **** ****, *** ********** *** need ** ***** ***** ******** *** ** ******* ** ****.

********:**** ***** *** ********* ** ******, ** ******** ** ***** and **** ** ********, * ********** (** ****** ** ***********) must ** ********** ** **** *** ****** ***** ** *** status ** ***** *****. *** **** ****** **********, *** *** ****. ******* * ********** **** ***** ****** ** ****** ***** the ******** ******* ** ******, *** "****** ****" *** ** 5 ******* ** ****.

Extended ****** ****

******** ** ******** *****:**** * ********** ******* **** ********, * **********, ** *** a *** **** ******** ******* ******* ** ******* ******* ***** in * ***** ******, ** "******** ******" **** ** ***** assigned ** **** ****, ** **** *** **** ******** ****** than ******* *** ***********. *** *******, * ******** ****** *** not ** **** ** ******** *** ******** ******* * **** in * - ** *******, *** * ****** ** ** to ** ******* *** ** **** ****** ** **** ******* without ************ ********* *** *******.

Door **** **** ******

**** ***** ****** **** ***** ***, *** ** ****** ***** after *********** *********, *** ****** ******* ****** *** ******* ** ignored ** * ********. *** **** ********, **** **** **** alarms ****** *** ** ********** *** **** **** ** *******, and *** **** **** * *******.

*******, *** ***** ******** ******** ***** ***** ** ** ********** by ******** ***.

Hardware ************* *******

** ******** ** ******** *************, **** ********** ****** ** ******** selection ****. *** ***** ******* *******:

  • ****** ** ************** *******:******* ** ****** **** ** *** *********** ** *********** ****** to **** * ****. *** *******, **** ***** ****** ******* offer ** ****** ** ****, ***, ** **** **** & PIN *********** ** **** * ****. *** ******** ** *** many ******* ** *** *** ** ******* ** ********** ******* of ******* ********** *****, *** *** ******* ******** ************* *** production ***. *** * ****** ****, *** ************** ************** ********.
  • *****/****** *******:*** '***********' ***** ** */* ******* *** ****** *** ** endless, *** *** ******* ** *** ***** ******** ******* *** controller **** * *** **** ** *** **** *** *********. For ********** ***/* ***********, *** *** ****. ** * ***** ** ******* **** ********* ******** *** amperages *** ** ** ******** ** *** **********, *** *** need ** ** *******, **********, ** ********* ** '**********' ******** where **** *** ********.
  • ******* ****** ********:** **** *****, *********** * ***** ** ********* ****** ******* is ****** *** ******* ** ***** ** ** ******. **** controllers ******* * ****** ******* ** ****** *******, *** ******* it ** *** *** ** ***** ********. ******** **************, ***** contact **************, ** ******** ****** ******** *** ****** ***** ******** to *** ***** ****** ********.

Controller *** ****** ****** *******

** *** ***** *****, ** **** * ***** ******** ** the ***** ****** ************* **** **** ** ******* - ******** connection ** ********** **** *******. **** *********** *** *** ******* phoenix ********** ** ********** ******* ********** **** *** ********** *** the ******** ********* *****.

** **** *****, *** ******** ******** ***** *** *** ** detected ** ********** *** ************* ***** *** ******** ********** *** wired ** *** **********. **** ***** ***** *** ****** ** typically ************ *** ****** ***** ****-**** ** **** ******* ***** coding:

[****: **** ******** *** ********** ********* ** **** *** ************* revised ** ****]

Comments (8)

Would be useful to add a section with multiple doors considerations

....read in / out,

....anti passback

and the plethora of functionalities that can be obtained with multiple card readers

You may find this article helpful: The Passback Problem

We will queue up an post on 'advanced access configurations' that address read in/out situations. Good idea!

PIR request to exits not programmed correctly resulting in nuisance forced door alarms and request to exits unlocking doors unnecessarily (e.g., when mag lock is not being used) are very common problems we encounter regularly at client sites.

Some codes state that an RTE has to be wired directly in line with the lock circuit, negating the use of the terminals for it on an access controller in those instances.

How would you negate a forced open in that case?

Wire the door through the RTE as well?

Very helpful

It would be great if this article could be amended to include an iStar panel

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Security Installation Tools Guide - 22 Tools Listed on Feb 19, 2019
In this guide, we cover 22 tools that security installers frequently use. This is one part of our upcoming Video Surveillance...
Nortek Mobile Access Reader BluePass Examined on Feb 12, 2019
Nortek's Linear access control division claims to make mobile credentials "more secure and easier to use than ever before" with their BluePass...
Bandwidth vs Low Light Shootout - Avigilon, Axis, Bosch, Dahua, Geovision, Hanwha, Hikvision, Uniview, Vivotek on Feb 08, 2019
Nighttime bandwidth spikes are a major concern in video surveillance, but do all manufacturers' cameras perform the same? Are some more consistent...
HID Launches Origo To Fix Mobile Credential Problems on Feb 05, 2019
HID is releasing Origo, an overhaul of its mobile credential platform, this time drastically restructuring the way it is priced and packaged. HID's...
Designing Access Control Guide on Jan 30, 2019
Designing an access control solution requires decisions on 8 fundamental questions. This in-depth guide helps you understand the options and...
ONVIF Video Surveillance Tutorial on Jan 29, 2019
ONVIF is well known within the surveillance industry as an interface to connect IP cameras and VMS systems. However, new users may find it...
Access Control Turnstiles Guide on Jan 28, 2019
Turnstiles control pedestrian access to secured areas, essentially becoming moving portions of fences, walls, or barricades for physically stop...
Genetec Favorability Report 2019 on Jan 25, 2019
Genetec's favorability moderately strengthed, in new IPVM integrator statistics over their results from 2017, with 2019 results showing solid, but...
Testing Bandwidth vs. Frame Rate on Jan 23, 2019
Selecting frame rate has a major impact on surveillance bandwidth and storage consumption. But with smart codecs now common and cameras more...
Cable Trenching for Surveillance on Jan 21, 2019
Trenching cable for surveillance is surprisingly complex. While using shovels, picks, and hoes is not advanced technology, the proper planning,...

Most Recent Industry Reports

Security Installation Tools Guide - 22 Tools Listed on Feb 19, 2019
In this guide, we cover 22 tools that security installers frequently use. This is one part of our upcoming Video Surveillance...
Sales Cuts At Rasilient on Feb 19, 2019
Over the past 2 years, video surveillance storage specialist Rasilient has expanded its workforce significantly, aiming to build its own branded...
Exacq Raises VMS Software Pricing Twice in Less Than a Year on Feb 18, 2019
Most VMSes regularly release new features, but rarely increase their prices. For the 3rd time in 4 years, and 2nd time in 8 months, since being...
Axis IR Multi Imager Camera Tested (P3717-PLE) on Feb 18, 2019
Axis has released their first IR multi imager, the P3717-PLE, a repositionable model listing 360° IR illumination and flexible positioning,...
Ubiquiti Favorability Results 2019 on Feb 18, 2019
Ubiquiti has quietly grown into a $1+ billion annual revenue company, with offerings across wireless, wireline network and video surveillance (see...
Casino Surveillance Pro Interview: James Lathrop on Feb 15, 2019
James Lathrop has been working in casinos for almost 25 years. During that time, he says he has held "just about every job you can do in the...
Hikvision 2018 Revenue Tops $7 Billion USD But Growth Slows To Low on Feb 15, 2019
Hikvision's annual revenue topped $7 billion for the first time in 2018, although growth slowed sharply. In this post, we analyze the latest...
Hanwha Smaller Multi Imager Tested (PNM-9000VQ) on Feb 14, 2019
Hanwha's first repositionable multi imager PNM-9081VQ tested well, but was huge, over 12" wide and weighing in at over 10 pounds. Now, they have...
ADT And 'The Defenders' Silent About Massive Complaints on Feb 14, 2019
ADT's largest dealer, "The Defenders" has been the subject of a massive number of complaints over many years and many forums, most recently a CBS...
Hikvision Chairman Praises United Front on Feb 14, 2019
Hikvision’s controlling shareholder held a meeting last month praising the United Front, a Communist Party organization known for its secretive...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact