Access Controller Software Guide

By: Brian Rhodes, Published on Dec 11, 2017

Properly configuring access controllers software is key to a professional access system.

These devices have fundamental settings that must be configured appropriately, including:

  • Unlock times / extended unlock times
  • Door Hold Open Alarms
  • Request to Exit Inputs
  • Card Formats
  • Reader / interface type
  • Input / output devices
  • Tamper switches

Inside this guide, we review all of those elements including examples of configuration with Axis, HID, Hikvision and Mercury controllers, a hands-on-video, and an explanation of the importance of each element.

******** ***************** *********** ******** ** *** ** a ************ ****** ******.

***** ******* **** *********** ******** that **** ** ********** appropriately, *********:

  • ****** ***** / ******** unlock *****
  • **** **** **** ******
  • ******* ** **** ******
  • **** *******
  • ****** / ********* ****
  • ***** / ****** *******
  • ****** ********

****** **** *****, ** ****** all ** ***** ******** including ******** ** ************* with ****, ***, ********* and ******* ***********, * hands-on-video, *** ** *********** of *** ********** ** each *******.

[***************]

Configuration ******* *******

*** ***** ******** **** must ** ********** ** every ******* *******:

****** ***** 

***** **** ******* ***** and ******** *** *********, and ***** **** *** need ** *********** *** variation, *** **** ******* used ** ****** *********** is *** **** * lock ** *******/********* ** unlocked. ******* ** ***** time ** ******** * credential *** **** **** to ** ****-******* ** opening, **** ******* ** central ** ****** **** the ******* ** **** unsecured **** ****** ** allow *** **** ** pass ******* ****** ******** relocked.

******** ****** **** 

**** ********* ** ***** unlock **** ** ********* given ** ******** ********** holders ***** ** ******* needs (**** ***********) ** job **************** (**** ******** people).  ***** ******* **** 'extended ******' ***** **** a ****** ****** ** keep ***** **** ****** they *** **-****** ** 'held ****' ****** *****.

**** **** **** ******

******* **** ***** *** not ******, ****** ******* generate '**** **** ****' alarms ** ****** ********* when ***** ****** **** for *** ****. ** not **********, *** ****** will *** ********** ****** operators ** ***** ** troubleshoot *********** ***** **********. 

********* **** *******

** *******, *********** **** specific ******* ** ********** to ******** ********* *********** from ******** *******. ***** controllers ****** ****** ************** ** ****, ******* *** ***** proprietary ***** *** ** available ** ****** ** specific ****** *******.

******* ** **** ********

**** ***** ** ***** (ie:********) *** **** ******** *********** ******* ** **** ******* **** ***** ***** to ******** **** ***** without ***** ***********. ******* these ******* **** **** to ********* *** **** temporarily, *** ******* **** to ****** ***** ********** are ********* ** *** controller *** *** *** lock ********.  *** ********** allows ** *** ****** to ******* ** ******, but *** ********** **** restores *** **** *** opening ** * ****** state ***** * ***** period *** *******.

****** ********

** ********, * ******* of ******** *** ****** detection ****** **** ** configured ****, ***, *** who ******** ************* **** they ******. ** *******, controllers *** ****** *** taking ****** ******* ******** or ******** *** ******* emails, ***, ** **** VMS ****** **** ******* is ********** ****** *********.

Configuration ****** ********

******* *** **** ******* of **** *********** **** by ****** *******, *** method ** *********** **** and **** *** *********** used ** ******** ******** is ********* *******. *** sections ***** **** **** common ********** ********:

  • *** **** ***
  • **** *****
  • ******* ******** (**-****)
  • ********* **** ***** 

***** ***** *** *** party ****** ******** ** our **** ** *** ** Mercury ****** *********** ****, *** ***** ******* independent ** **** *****, configure ******* *********** *********. In **** *****, *** underlying ********** ******** *** always ** **** ** configure ***** ********, ******** some *** ***** ** standalone ***** *** *** configure **** ******** ** hardware.

HID **** ***

*****, ***** **** ***'* ******** *** ******* under *** '**** **********' tab:

**** **** '******' *** 'Extended ******' ***** *** be ******** * ****** between * ****** ** to ** *******, *** a ***** *********** ** each ******* ** ****** beside **** *******. ** this **********, *** ******** connected ****** ****** *** keypad ** **** ********** in **** ******.

Axis *****

*** ***-**** **** ********** (**** ****** ****) ***** ***** ******** under *** '******** *************' screen:

**** *** **** ***** lock *** ******** ****** times *** ******, *** called '****** ****' *** 'Long ****** ****' ************. In ********, **** **** open (**** *** **** time) *** ******** (***-***** ****) ****** are **** ****** ** this ******. **** *** behavior ** ****** **** 'Lock *******' ** **** ******** ******** *** **** ** ********** here.

Hikvision ****** ***********

********* (***: ********* ****** ******* ******), *** ** ********* *** changing ********** ******** ** their ****-**** ********:

***** *** ***** ******** varies, *** ******** **** control *** *** **** as ***** *********. *** example, '**** **** ******** by **** *** ******** Person' ** *** **** as '******** ****** ****', and '**** **** ******* Alarm' ** '**** **** Open *****'.

Mercury ******** ***********

*** ******* ********, *** settings *********** ***** ********* are ******* ** *** partner ********** ******** ********* rather **** ** *** hardware ********** ** ***** itself:

 

*** *********** *** ***** number ** ******** ****** on *** ****** *** parent ******** *** ********** the ******** **********, *** in ******* ******* ******** all ******* **** ******** like **** '****** ****', extended ****** ********, *** common *****/****** ********** **** locks *** **** ******** switches.  

Practical ******* ************

** *** **** *****, these ******** *** **** a significant ****** ** *** well *** ****** ****** operates.

Unlock *****

**** ******* ******* ******** a ***** ** *****, typically ******* ** ************. The ******* ******* ****** widely ******* ******* ***** and **** ********** *****. Common ****** ********** ********, and *** ******* ****** times *******:

*****:*** '********' ******** ***** where *** ****** ** mounted *********** ******** ** or ** *** **** frame, *** ****** **** generally ** *** ******* 5 *** ** *******. This ****** ****** **** for ******* ** **** a ****, ****, *** pull **** * **** before ** *******, *** is ***** ****** ** secure *** **** ****** the **** *** ******* that **** ******** ** ****** **.

******* *****:*** ***** ** ***** needed ** ****** **** a **** *** ***** a ******* ******* **** depending ** *** **** of ******** *** ***** of ****. *******, *********** that ******** ********* *** be ** ** **** feet, *** ********** *** need ** ***** ***** contacts *** ** ******* or ****.

********:**** ***** *** ********* in ******, ** ******** to ***** *** **** in ********, * ********** (or ****** ** ***********) must ** ********** ** lock *** ****** ***** on *** ****** ** other *****. *** **** detail **********, *** *** ****. ******* * ********** door ***** ****** ** opened ***** *** ******** opening ** ******, *** "Unlock ****" *** ** 5 ******* ** ****.

Extended ****** ****

******** ** ******** *****:**** * ********** ******* uses ********, * **********, or *** * *** that ******** ******* ******* an ******* ******* ***** in * ***** ******, an "******** ******" **** is ***** ******** ** that ****, ** **** the **** ******** ****** than ******* *** ***********. For *******, * ******** person *** *** ** able ** ******** *** packages ******* * **** in * - ** seconds, *** * ****** of ** ** ** seconds *** ** **** enough ** **** ******* without ************ ********* *** opening.

Door **** **** ******

**** ***** ****** **** risks ***, *** ** alarms ***** ***** *********** durations, *** ****** ******* system *** ******* ** ignored ** * ********. For **** ********, **** Hold **** ****** ****** not ** ********** *** less **** ** *******, and *** **** **** 3 *******. 

*******, *** ***** ******** assigned ***** ***** ** be ********** ** ******** use.

Hardware ************* *******

** ******** ** ******** configuration, **** ********** ****** on ******** ********* ****. The ***** ******* *******:

  • ****** ** ************** *******:******* ** ****** **** is *** *********** ** credentials ****** ** **** a ****. *** *******, even ***** ****** ******* offer ** ****** ** card, ***, ** **** card & *** *********** to **** * ****. The ******** ** *** many ******* ** *** may ** ******* ** controller ******* ** ******* credential *****, *** *** require ******** ************* *** production ***. *** * deeper ****, *** ************** ************** ********.
  • *****/****** *******:*** '***********' ***** ** I/O ******* *** ****** may ** *******, *** the ******* ** *** relay ******** ******* *** controller **** * *** part ** *** **** are *********. *** ********** on*/* ***********, *** *** note. ** * ***** of ******* **** ********* voltages *** ********* *** to ** ******** ** the **********, *** *** need ** ** *******, terminated, ** ********* ** 'supervised' ******** ***** **** are ********.
  • ******* ****** ********:** **** *****, *********** a ***** ** ********* tamper ******* ** ****** for ******* ** ***** as ** ******. **** controllers ******* * ****** contact ** ****** *******, but ******* ** ** for *** ** ***** optional. ******** **************, ***** contact **************, ** ******** jumper ******** *** ****** steps ******** ** *** these ****** ********.

Controller *** ****** ****** *******

** *** ***** *****, we **** * ***** overview ** *** ***** common ************* **** **** on ******* - ******** connection ** ********** **** readers. **** *********** *** low ******* ******* ********** to ********** ******* ********** that *** ********** *** the ******** ********* *****.

** **** *****, *** settings ******** ***** *** not ** ******** ** recognized *** ************* ***** the ******** ********** *** wired ** *** **********. This ***** ***** *** wiring ** ********* ************ via ****** ***** ****-**** or **** ******* ***** coding:

[****: **** ******** *** originally ********* ** **** and ************* ******* ** 2017]

Comments (9)

Would be useful to add a section with multiple doors considerations

....read in / out,

....anti passback

and the plethora of functionalities that can be obtained with multiple card readers

You may find this article helpful: The Passback Problem

We will queue up an post on 'advanced access configurations' that address read in/out situations. Good idea!

PIR request to exits not programmed correctly resulting in nuisance forced door alarms and request to exits unlocking doors unnecessarily (e.g., when mag lock is not being used) are very common problems we encounter regularly at client sites.

Some codes state that an RTE has to be wired directly in line with the lock circuit, negating the use of the terminals for it on an access controller in those instances.

How would you negate a forced open in that case?

Wire the door through the RTE as well?

Very helpful

It would be great if this article could be amended to include an iStar panel

Looks pretty straight forward

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Installation Course - Register Now on Aug 15, 2019
Register Now for the September 2019 Video Surveillance Install Course. This is a unique installation course in a market where little practical...
Biometrics Usage Statistics 2019 on Aug 13, 2019
Biometrics are commonly used in phones, but how frequently are they used for access? 150+ integrators told us how often they use biometrics,...
Milestone "GDPR-ready" Certification Claim Critiqued on Aug 12, 2019
Milestone is touting that its latest XProtect VMS is "GDPR-ready" with a 'European Privacy Seal'. However, our investigation raises significant...
ProdataKey (PDK) Access Company Profile on Aug 09, 2019
 Utah based ProdataKey touts low cost cloud access, wireless controllers, and no dealer required national distribution availability.  But how does...
Axis Door Station A8207-VE Tested on Aug 07, 2019
Axis newest door station, the A8207-VE, claims to deliver "video surveillance, two-way communication, and access control" in a single device. But...
Mobile Access Control Shootout - Farpointe, HID, Openpath, Nortek, Proxy on Jul 29, 2019
One of the biggest rising trends in access control is using phones as credentials but which offering is best? IPVM has tested five of the...
Responsibility Split Selecting Locks - Statistics on Jul 22, 2019
A heated access debate surrounds who should pick and install the locks. While responsible for selecting the control systems, integrators often...
History of Video Surveillance on Jul 19, 2019
The video surveillance market has changed significantly since 2000, going from VCRs to ab emerging AI cloud era.  The goal of this history is to...
Mobile Access Usage Statistics 2019 on Jul 18, 2019
The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new...
New GDPR Guidelines for Video Surveillance Examined on Jul 18, 2019
The highest-level EU data protection authority has issued a new series of provisional video surveillance guidelines. While GDPR has been in...

Most Recent Industry Reports

Verkada People And Face Analytics Tested on Aug 16, 2019
This week, Verkada released "People Analytics", including face analytics that they describe is a "game-changing feature" that "pushes the...
Dahua OEM Directory 2019 on Aug 16, 2019
US Government banned Dahua OEMs for dozens of companies. The following directory includes 40+ of those companies with a graphic and links to...
Installation Course - Register Now on Aug 15, 2019
Register Now for the September 2019 Video Surveillance Install Course. This is a unique installation course in a market where little practical...
Axis Suffers Outage, Provides Postmortem on Aug 15, 2019
This week, Axis suffered an outage impacting their website and cloud services. Inside this note, we examined what happened, what was impacted...
Hikvision Scrutinized In The Netherlands on Aug 15, 2019
Hikvision is facing unprecedented scrutiny in the Netherlands, at the same time the US government ban has taken effect. This week, a Dutch...
Axis 4K Camera Shootout 2019 on Aug 14, 2019
Axis' 4K Q3518-LVE claims the "best video quality possible", with Lightfinder super low light performance, Axis' high end Forensic WDR, and...
CheckMySystems Company Profile on Aug 14, 2019
CheckMySystems says that too many users respond, "I get an email when something is wrong" when talking about their video system maintenance plan,...
Hikvision OEM Directory on Aug 13, 2019
The Chinese government-owned and US-government banned Hikvision has become the world's largest video surveillance manufacturer and generally hidden...
Biometrics Usage Statistics 2019 on Aug 13, 2019
Biometrics are commonly used in phones, but how frequently are they used for access? 150+ integrators told us how often they use biometrics,...
US Government Ban of Dahua, Hikvision, Huawei Takes Effect Now on Aug 13, 2019
The 'prohibition on use or procurement' of Dahua, Hikvision and Huawei products and 'essential components' take effect today, August 13, 2019, one...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact