Access Controller Software Guide

By: Brian Rhodes, Published on Dec 11, 2017

Properly configuring access controllers software is key to a professional access system.

These devices have fundamental settings that must be configured appropriately, including:

  • Unlock times / extended unlock times
  • Door Hold Open Alarms
  • Request to Exit Inputs
  • Card Formats
  • Reader / interface type
  • Input / output devices
  • Tamper switches

Inside this guide, we review all of those elements including examples of configuration with Axis, HID, Hikvision and Mercury controllers, a hands-on-video, and an explanation of the importance of each element.

******** ***************** ******************* ** *** ** a ************ ****** ******.

***** ******* **** *********** settings **** **** ** configured *************, *********:

  • ****** ***** / ******** unlock *****
  • **** **** **** ******
  • ******* ** **** ******
  • **** *******
  • ****** / ********* ****
  • ***** / ****** *******
  • ****** ********

****** **** *****, ** review *** ** ***** elements ********* ******** ** configuration **** ****, ***, Hikvision *** ******* ***********, a *****-**-*****, *** ** explanation ** *** ********** of **** *******.

[***************]

Configuration ******* *******

*** ***** ******** **** must ** ********** ** every ******* *******:

****** *****

***** **** ******* ***** and ******** *** *********, and ***** **** *** need ** *********** *** variation, *** **** ******* used ** ****** *********** is *** **** * lock ** *******/********* ** unlocked. ******* ** ***** time ** ******** * credential *** **** **** to ** ****-******* ** opening, **** ******* ** central ** ****** **** the ******* ** **** unsecured **** ****** ** allow *** **** ** pass ******* ****** ******** relocked.

******** ****** ****

**** ********* ** ***** unlock **** ** ********* given ** ******** ********** holders ***** ** ******* needs (**** ***********) ** job **************** (**** ******** people). ***** ******* **** 'extended ******' ***** **** a ****** ****** ** keep ***** **** ****** they *** **-****** ** 'held ****' ****** *****.

**** **** **** ******

******* **** ***** *** not ******, ****** ******* generate '**** **** ****' alarms ** ****** ********* when ***** ****** **** for *** ****. ** not **********, *** ****** will *** ********** ****** operators ** ***** ** troubleshoot *********** ***** **********.

********* **** *******

** *******, *********** **** specific ******* ** ********** to ******** ********* *********** from ******** *******. ***** controllers ****** ****** ************** ** ****, ******* *** ***** proprietary ***** *** ** available ** ****** ** specific ****** *******.

******* ** **** ********

**** ***** ** ***** (ie:********) *** **** ******** incorporate******* ** *********** **** ***** ***** to ******** **** ***** without ***** ***********. ******* these ******* **** **** to ********* *** **** temporarily, *** ******* **** to ****** ***** ********** are ********* ** *** controller *** *** *** lock ********. *** ********** allows ** *** ****** to ******* ** ******, but *** ********** **** restores *** **** *** opening ** * ****** state ***** * ***** period *** *******.

****** ********

** ********, * ******* of ******** *** ****** detection ****** **** ** configured ****, ***, *** who ******** ************* **** they ******. ** *******, controllers *** ****** *** taking ****** ******* ******** or ******** *** ******* emails, ***, ** **** VMS ****** **** ******* is ********** ****** *********.

Configuration ****** ********

******* *** **** ******* of **** *********** **** by ****** *******, *** method ** *********** **** and **** *** *********** used ** ******** ******** is ********* *******. *** sections ***** **** **** common ********** ********:

  • *** **** ***
  • **** *****
  • ******* ******** (**-****)
  • ********* **** *****

***** ***** *** *** party ****** ******** ** our**** ** *** ** Mercury ****** ***************, *** ***** ******* independent ** **** *****, configure ******* *********** *********. In **** *****, *** underlying ********** ******** *** always ** **** ** configure ***** ********, ******** some *** ***** ** standalone ***** *** *** configure **** ******** ** hardware.

HID **** ***

*****, ***** **** ***'* ******** *** ******* under *** '**** **********' tab:

**** **** '******' *** 'Extended ******' ***** *** be ******** * ****** between * ****** ** to ** *******, *** a ***** *********** ** each ******* ** ****** beside **** *******. ** this **********, *** ******** connected ****** ****** *** keypad ** **** ********** in **** ******.

Axis *****

*** ***-**** **** ********** (**** ****** ****) ***** ***** ******** under *** '******** *************' screen:

**** *** **** ***** lock *** ******** ****** times *** ******, *** called '****** ****' *** 'Long ****** ****' ************. In ********, **** **** open (**** *** **** time) *** ******** (***-***** time) ****** *** **** listed ** **** ******. Note *** ******** ** inputs **** '**** *******' or**** ******** *********** **** ** ********** here.

Hikvision ****** ***********

********* (***:********* ****** ******* ******), *** ** ********* for ******** ********** ******** in ***** ****-**** ********:

***** *** ***** ******** varies, *** ******** **** control *** *** **** as ***** *********. *** example, '**** **** ******** by **** *** ******** Person' ** *** **** as '******** ****** ****', and '**** **** ******* Alarm' ** '**** **** Open *****'.

Mercury ******** ***********

*** ******* ********, *** settings *********** ***** ********* are ******* ** *** partner ********** ******** ********* rather **** ** *** hardware ********** ** ***** itself:

*** *********** *** ***** number ** ******** ****** on *** ****** *** parent ******** *** ********** the ******** **********, *** in ******* ******* ******** all ******* **** ******** like **** '****** ****', extended ****** ********, *** common *****/****** ********** **** locks *** **** ******** switches.

Practical ******* ************

** *** **** *****, these ******** *** **** a *********** ****** ** how **** *** ****** system ********.

Unlock *****

**** ******* ******* ******** a ***** ** *****, typically ******* ** ************. The ******* ******* ****** widely ******* ******* ***** and **** ********** *****. Common ****** ********** ********, and *** ******* ****** times *******:

*****:*** '********' ******** ***** where *** ****** ** mounted *********** ******** ** or ** *** **** frame, *** ****** **** generally ** *** ******* 5 *** ** *******. This ****** ****** **** for ******* ** **** a ****, ****, *** pull **** * **** before ** *******, *** is ***** ****** ** secure *** **** ****** the **** *** ******* that **** ********** ****** **.

******* *****:*** ***** ** ***** needed ** ****** **** a **** *** ***** a ******* ******* **** depending ** *** **** of ******** *** ***** of ****. *******, *********** that ******** ********* *** be ** ** **** feet, *** ********** *** need ** ***** ***** contacts *** ** ******* or ****.

********:**** ***** *** ********* in ******, ** ******** to ***** *** **** in ********, * ********** (or ****** ** ***********) must ** ********** ** lock *** ****** ***** on *** ****** ** other *****. *** **** detail **********, *** *** ****. ******* * ********** door ***** ****** ** opened ***** *** ******** opening ** ******, *** "Unlock ****" *** ** 5 ******* ** ****.

Extended ****** ****

******** ** ******** *****:**** * ********** ******* uses ********, * **********, or *** * *** that ******** ******* ******* an ******* ******* ***** in * ***** ******, an "******** ******" **** is ***** ******** ** that ****, ** **** the **** ******** ****** than ******* *** ***********. For *******, * ******** person *** *** ** able ** ******** *** packages ******* * **** in * - ** seconds, *** * ****** of ** ** ** seconds *** ** **** enough ** **** ******* without ************ ********* *** opening.

Door **** **** ******

**** ***** ****** **** risks ***, *** ** alarms ***** ***** *********** durations, *** ****** ******* system *** ******* ** ignored ** * ********. For **** ********, **** Hold **** ****** ****** not ** ********** *** less **** ** *******, and *** **** **** 3 *******.

*******, *** ***** ******** assigned ***** ***** ** be ********** ** ******** use.

Hardware ************* *******

** ******** ** ******** configuration, **** ********** ****** on ******** ********* ****. The ***** ******* *******:

  • ****** ** ************** *******:******* ** ****** **** is *** *********** ** credentials ****** ** **** a ****. *** *******, even ***** ****** ******* offer ** ****** ** card, ***, ** **** card & *** *********** to **** * ****. The ******** ** *** many ******* ** *** may ** ******* ** controller ******* ** ******* credential *****, *** *** require ******** ************* *** production ***. *** * deeper ****, *** ************** ************** ********.
  • *****/****** *******:*** '***********' ***** ** I/O ******* *** ****** may ** *******, *** the ******* ** *** relay ******** ******* *** controller **** * *** part ** *** **** are *********. *** ********** on*/* ***********, *** *** note. ** * ***** of ******* **** ********* voltages *** ********* *** to ** ******** ** the **********, *** *** need ** ** *******, terminated, ** ********* ** 'supervised' ******** ***** **** are ********.
  • ******* ****** ********:** **** *****, *********** a ***** ** ********* tamper ******* ** ****** for ******* ** ***** as ** ******. **** controllers ******* * ****** contact ** ****** *******, but ******* ** ** for *** ** ***** optional. ******** **************, ***** contact **************, ** ******** jumper ******** *** ****** steps ******** ** *** these ****** ********.

Controller *** ****** ****** *******

** *** ***** *****, we **** * ***** overview ** *** ***** common ************* **** **** on ******* - ******** connection ** ********** **** readers. **** *********** *** low ******* ******* ********** to ********** ******* ********** that *** ********** *** the ******** ********* *****.

** **** *****, *** settings ******** ***** *** not ** ******** ** recognized *** ************* ***** the ******** ********** *** wired ** *** **********. This ***** ***** *** wiring ** ********* ************ via ****** ***** ****-**** or **** ******* ***** coding:

[****: **** ******** *** originally ********* ** **** and ************* ******* ** 2017]

Comments (9)

Would be useful to add a section with multiple doors considerations

....read in / out,

....anti passback

and the plethora of functionalities that can be obtained with multiple card readers

You may find this article helpful: The Passback Problem

We will queue up an post on 'advanced access configurations' that address read in/out situations. Good idea!

PIR request to exits not programmed correctly resulting in nuisance forced door alarms and request to exits unlocking doors unnecessarily (e.g., when mag lock is not being used) are very common problems we encounter regularly at client sites.

Some codes state that an RTE has to be wired directly in line with the lock circuit, negating the use of the terminals for it on an access controller in those instances.

How would you negate a forced open in that case?

Wire the door through the RTE as well?

Very helpful

It would be great if this article could be amended to include an iStar panel

Looks pretty straight forward

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
Manufacturer Favorability Guide 2019 on Jun 12, 2019
The 259 page PDF guide may be downloaded inside by all IPVM members. It includes our manufacturer favorability rankings and individual...
Dumber Techs, Bad Box Movers, Says Australian Distributor on Jun 10, 2019
Techs today are "dumber" than they used to be, despite better education and training and that makes a typical day "frustrating" for one...
OSDP Access Control Guide on Jun 04, 2019
Access control readers and controllers need to communicate. While Wiegand has been the de facto standard for decades, OSDP aims to solve major...
Vidsys New President Interviewed on May 31, 2019
A decade ago, PSIM was hot with projections then of a billion dollar market by now. This has not come close to happening. However, Vidsys, one of...
China Jaywalking Facial Recognition Guide on May 27, 2019
News reports touting the PRC's AI prowess often showcase facial recognition cameras being used to automatically catch and fine jaywalkers.  In...
Average Frame Rate Video Surveillance 2019 on May 23, 2019
What is the average frame rated used in video surveillance systems? In IPVM's 2011 statistics, the average was 6-8fps increasing to ~10fps in...
Access Control Job Walk Guide on May 22, 2019
Significant money can be saved and problems avoided with an access control job walk if you know what to look for and what to ask. By inviting...
Facial Recognition Systems Fail Simple Liveness Detection Test on May 17, 2019
Facial recognition is being widely promoted as a solution to physical access control but we were able to simply spoof 3 systems because they had no...
Maglock Selection Guide on May 16, 2019
One of the most misunderstood yet valuable pieces of electrified hardware is the maglock. Few locks are stronger, but myths and confusion surround...

Most Recent Industry Reports

Sighthound Transforms Into Enterprise AI Provider on Jun 14, 2019
Sighthound is now rapidly expanding its R&D team, building an enterprise AI service. This may come as a surprise given their origins 6 years...
ADT Eliminating Acquired Brands, Unifying Under 'Commercial' Brand on Jun 14, 2019
ADT is eliminating the brands of the many integrators it has acquired over the past few years, including Red Hawk, Aronson Security Group (ASG),...
NSA Director Keynoting Dahua and Hikvision Sponsored Cybersecurity Conference on Jun 13, 2019
The technical director for the NSA’s Cybersecurity Threat Operations Center will be keynoting a physical security cybersecurity conference that is...
Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
Embattled $400 Million China Funded Philippines Surveillance System Proceeds on Jun 13, 2019
An embattled 12,000 camera surveillance system project that will cost ~$400 million will proceed.  The project contract was awarded, had its...
False Verkada 'Unrivaled' Low Light Performance Claim Removed on Jun 12, 2019
Verkada falsely claimed that it delivered 'UNRIVALED LOW LIGHT PERFORMANCE' until IPVM questioned. In fact, Verkada's low light performance is...
Manufacturer Favorability Guide 2019 on Jun 12, 2019
The 259 page PDF guide may be downloaded inside by all IPVM members. It includes our manufacturer favorability rankings and individual...
Camera Course Summer 2019 - Register Now on Jun 12, 2019
Register for the Summer 2019 Camera Course.  This is the only independent surveillance camera course, based on in-depth product and technology...
Favorite Wireless Manufacturers 2019 on Jun 12, 2019
Many wireless options exist for video surveillance but how are integrator's overall favorites? 170 integrators answered the question: What is...
Carnegie Mellon AI Startup Zensors Profile on Jun 11, 2019
Zensors is a startup formed by Carnegie Mellon graduates from a Carnegie Mellon research project, offering customized models per camera that they...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact