Access Controller Software Guide

By: Brian Rhodes, Published on Dec 11, 2017

Properly configuring access controllers software is key to a professional access system.

These devices have fundamental settings that must be configured appropriately, including:

  • Unlock times / extended unlock times
  • Door Hold Open Alarms
  • Request to Exit Inputs
  • Card Formats
  • Reader / interface type
  • Input / output devices
  • Tamper switches

Inside this guide, we review all of those elements including examples of configuration with Axis, HID, Hikvision and Mercury controllers, a hands-on-video, and an explanation of the importance of each element.

******** ***************** *********** ******** ** *** ** a ************ ****** ******.

***** ******* **** *********** ******** that **** ** ********** appropriately, *********:

  • ****** ***** / ******** unlock *****
  • **** **** **** ******
  • ******* ** **** ******
  • **** *******
  • ****** / ********* ****
  • ***** / ****** *******
  • ****** ********

****** **** *****, ** ****** all ** ***** ******** including ******** ** ************* with ****, ***, ********* and ******* ***********, * hands-on-video, *** ** *********** of *** ********** ** each *******.

[***************]

Configuration ******* *******

*** ***** ******** **** must ** ********** ** every ******* *******:

****** ***** 

***** **** ******* ***** and ******** *** *********, and ***** **** *** need ** *********** *** variation, *** **** ******* used ** ****** *********** is *** **** * lock ** *******/********* ** unlocked. ******* ** ***** time ** ******** * credential *** **** **** to ** ****-******* ** opening, **** ******* ** central ** ****** **** the ******* ** **** unsecured **** ****** ** allow *** **** ** pass ******* ****** ******** relocked.

******** ****** **** 

**** ********* ** ***** unlock **** ** ********* given ** ******** ********** holders ***** ** ******* needs (**** ***********) ** job **************** (**** ******** people).  ***** ******* **** 'extended ******' ***** **** a ****** ****** ** keep ***** **** ****** they *** **-****** ** 'held ****' ****** *****.

**** **** **** ******

******* **** ***** *** not ******, ****** ******* generate '**** **** ****' alarms ** ****** ********* when ***** ****** **** for *** ****. ** not **********, *** ****** will *** ********** ****** operators ** ***** ** troubleshoot *********** ***** **********. 

********* **** *******

** *******, *********** **** specific ******* ** ********** to ******** ********* *********** from ******** *******. ***** controllers ****** ****** ************** ** ****, ******* *** ***** proprietary ***** *** ** available ** ****** ** specific ****** *******.

******* ** **** ********

**** ***** ** ***** (ie:********) *** **** ******** *********** ******* ** **** ******* **** ***** ***** to ******** **** ***** without ***** ***********. ******* these ******* **** **** to ********* *** **** temporarily, *** ******* **** to ****** ***** ********** are ********* ** *** controller *** *** *** lock ********.  *** ********** allows ** *** ****** to ******* ** ******, but *** ********** **** restores *** **** *** opening ** * ****** state ***** * ***** period *** *******.

****** ********

** ********, * ******* of ******** *** ****** detection ****** **** ** configured ****, ***, *** who ******** ************* **** they ******. ** *******, controllers *** ****** *** taking ****** ******* ******** or ******** *** ******* emails, ***, ** **** VMS ****** **** ******* is ********** ****** *********.

Configuration ****** ********

******* *** **** ******* of **** *********** **** by ****** *******, *** method ** *********** **** and **** *** *********** used ** ******** ******** is ********* *******. *** sections ***** **** **** common ********** ********:

  • *** **** ***
  • **** *****
  • ******* ******** (**-****)
  • ********* **** ***** 

***** ***** *** *** party ****** ******** ** our **** ** *** ** Mercury ****** *********** ****, *** ***** ******* independent ** **** *****, configure ******* *********** *********. In **** *****, *** underlying ********** ******** *** always ** **** ** configure ***** ********, ******** some *** ***** ** standalone ***** *** *** configure **** ******** ** hardware.

HID **** ***

*****, ***** **** ***'* ******** *** ******* under *** '**** **********' tab:

**** **** '******' *** 'Extended ******' ***** *** be ******** * ****** between * ****** ** to ** *******, *** a ***** *********** ** each ******* ** ****** beside **** *******. ** this **********, *** ******** connected ****** ****** *** keypad ** **** ********** in **** ******.

Axis *****

*** ***-**** **** ********** (**** ****** ****) ***** ***** ******** under *** '******** *************' screen:

**** *** **** ***** lock *** ******** ****** times *** ******, *** called '****** ****' *** 'Long ****** ****' ************. In ********, **** **** open (**** *** **** time) *** ******** (***-***** ****) ****** are **** ****** ** this ******. **** *** behavior ** ****** **** 'Lock *******' ** **** ******** ******** *** **** ** ********** here.

Hikvision ****** ***********

********* (***: ********* ****** ******* ******), *** ** ********* *** changing ********** ******** ** their ****-**** ********:

***** *** ***** ******** varies, *** ******** **** control *** *** **** as ***** *********. *** example, '**** **** ******** by **** *** ******** Person' ** *** **** as '******** ****** ****', and '**** **** ******* Alarm' ** '**** **** Open *****'.

Mercury ******** ***********

*** ******* ********, *** settings *********** ***** ********* are ******* ** *** partner ********** ******** ********* rather **** ** *** hardware ********** ** ***** itself:

 

*** *********** *** ***** number ** ******** ****** on *** ****** *** parent ******** *** ********** the ******** **********, *** in ******* ******* ******** all ******* **** ******** like **** '****** ****', extended ****** ********, *** common *****/****** ********** **** locks *** **** ******** switches.  

Practical ******* ************

** *** **** *****, these ******** *** **** a significant ****** ** *** well *** ****** ****** operates.

Unlock *****

**** ******* ******* ******** a ***** ** *****, typically ******* ** ************. The ******* ******* ****** widely ******* ******* ***** and **** ********** *****. Common ****** ********** ********, and *** ******* ****** times *******:

*****:*** '********' ******** ***** where *** ****** ** mounted *********** ******** ** or ** *** **** frame, *** ****** **** generally ** *** ******* 5 *** ** *******. This ****** ****** **** for ******* ** **** a ****, ****, *** pull **** * **** before ** *******, *** is ***** ****** ** secure *** **** ****** the **** *** ******* that **** ******** ** ****** **.

******* *****:*** ***** ** ***** needed ** ****** **** a **** *** ***** a ******* ******* **** depending ** *** **** of ******** *** ***** of ****. *******, *********** that ******** ********* *** be ** ** **** feet, *** ********** *** need ** ***** ***** contacts *** ** ******* or ****.

********:**** ***** *** ********* in ******, ** ******** to ***** *** **** in ********, * ********** (or ****** ** ***********) must ** ********** ** lock *** ****** ***** on *** ****** ** other *****. *** **** detail **********, *** *** ****. ******* * ********** door ***** ****** ** opened ***** *** ******** opening ** ******, *** "Unlock ****" *** ** 5 ******* ** ****.

Extended ****** ****

******** ** ******** *****:**** * ********** ******* uses ********, * **********, or *** * *** that ******** ******* ******* an ******* ******* ***** in * ***** ******, an "******** ******" **** is ***** ******** ** that ****, ** **** the **** ******** ****** than ******* *** ***********. For *******, * ******** person *** *** ** able ** ******** *** packages ******* * **** in * - ** seconds, *** * ****** of ** ** ** seconds *** ** **** enough ** **** ******* without ************ ********* *** opening.

Door **** **** ******

**** ***** ****** **** risks ***, *** ** alarms ***** ***** *********** durations, *** ****** ******* system *** ******* ** ignored ** * ********. For **** ********, **** Hold **** ****** ****** not ** ********** *** less **** ** *******, and *** **** **** 3 *******. 

*******, *** ***** ******** assigned ***** ***** ** be ********** ** ******** use.

Hardware ************* *******

** ******** ** ******** configuration, **** ********** ****** on ******** ********* ****. The ***** ******* *******:

  • ****** ** ************** *******:******* ** ****** **** is *** *********** ** credentials ****** ** **** a ****. *** *******, even ***** ****** ******* offer ** ****** ** card, ***, ** **** card & *** *********** to **** * ****. The ******** ** *** many ******* ** *** may ** ******* ** controller ******* ** ******* credential *****, *** *** require ******** ************* *** production ***. *** * deeper ****, *** ************** ************** ********.
  • *****/****** *******:*** '***********' ***** ** I/O ******* *** ****** may ** *******, *** the ******* ** *** relay ******** ******* *** controller **** * *** part ** *** **** are *********. *** ********** on*/* ***********, *** *** note. ** * ***** of ******* **** ********* voltages *** ********* *** to ** ******** ** the **********, *** *** need ** ** *******, terminated, ** ********* ** 'supervised' ******** ***** **** are ********.
  • ******* ****** ********:** **** *****, *********** a ***** ** ********* tamper ******* ** ****** for ******* ** ***** as ** ******. **** controllers ******* * ****** contact ** ****** *******, but ******* ** ** for *** ** ***** optional. ******** **************, ***** contact **************, ** ******** jumper ******** *** ****** steps ******** ** *** these ****** ********.

Controller *** ****** ****** *******

** *** ***** *****, we **** * ***** overview ** *** ***** common ************* **** **** on ******* - ******** connection ** ********** **** readers. **** *********** *** low ******* ******* ********** to ********** ******* ********** that *** ********** *** the ******** ********* *****.

** **** *****, *** settings ******** ***** *** not ** ******** ** recognized *** ************* ***** the ******** ********** *** wired ** *** **********. This ***** ***** *** wiring ** ********* ************ via ****** ***** ****-**** or **** ******* ***** coding:

[****: **** ******** *** originally ********* ** **** and ************* ******* ** 2017]

Comments (9)

Would be useful to add a section with multiple doors considerations

....read in / out,

....anti passback

and the plethora of functionalities that can be obtained with multiple card readers

You may find this article helpful: The Passback Problem

We will queue up an post on 'advanced access configurations' that address read in/out situations. Good idea!

PIR request to exits not programmed correctly resulting in nuisance forced door alarms and request to exits unlocking doors unnecessarily (e.g., when mag lock is not being used) are very common problems we encounter regularly at client sites.

Some codes state that an RTE has to be wired directly in line with the lock circuit, negating the use of the terminals for it on an access controller in those instances.

How would you negate a forced open in that case?  

 

Wire the door through the RTE as well?

Very helpful

It would be great if this article could be amended to include an iStar panel

Looks pretty straight forward

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Securing Access Control Installations Tutorial on Oct 17, 2019
The physical security of access control components is critical to ensuring that a facility is truly secure. Otherwise, the entire system can be...
Access Control Course Fall 2019 - Last Chance on Oct 17, 2019
Register Now - Fall 2019 Access Control Course. Thursday, October 17th is the last day to register. IPVM offers the most comprehensive access...
IPVM Camera Calculator User Manual / Guide on Oct 16, 2019
Learn how to use the IPVM Camera Calculator (updated for Version 3.1). The guide below includes instructions, images, gifs, and videos...
Pelco CEO Out, New CEO Found on Oct 15, 2019
Just 2 months after Pelco was sold, Pelco's CEO is out, with Pelco bringing in an outside President and searching for a new CEO from the industry,...
Camera Focusing Tutorial on Oct 14, 2019
Camera focus is fundamental to quality imaging. Mistakes can significantly reduce details, making cameras less effective. In this guide, we...
Last Chance - Register Now - October 2019 IP Networking Course on Oct 10, 2019
Last Chance - Register Now - Fall 2019 IP Networking Course. The course starts next week. This is the only networking course designed...
HID Fingerprint Reader Tested on Oct 09, 2019
HID has released their first access reader to use Lumidigm optical sensors, that touts it 'works with anyone, anytime, anywhere'. We bought and...
Camera Cable Whip Guide on Oct 02, 2019
Cable whips are one of integrator's least favorite camera features but seem to be unavoidable, now commonplace on dome, turret, and bullet cameras...
Fail Safe vs. Fail Secure Tutorial on Oct 02, 2019
Few terms carry greater importance in access control than 'fail safe' and 'fail secure'. Access control professionals must know how these...
Wide Dynamic Range (WDR) Guide on Oct 01, 2019
Understanding wide dynamic range (WDR) is critical to capturing high quality images in demanding conditions. However, with no real standards, any...

Most Recent Industry Reports

Government-Owned Hikvision Wants To Keep Politics Out Of Security on Oct 21, 2019
'Politics' made Hikvision the goliath it is today. It was PRC China 'politics' that created Hikvision, funded it, and blocked its foreign...
Integrated IR Camera Usage Statistics 2019 on Oct 21, 2019
Virtually every IP camera now comes with integrated IR but how many actually make use of IR or choose 'super' low light cameras without IR? In...
Alarm Veteran "Demands A Criminal Investigation" Of UL on Oct 18, 2019
The Interceptor's Project pressure against UL continues to rise. Following Keith Jentoft's allegation that "UL Has Blood On Their Hands", Jentoft...
Camect "Worlds Smartest Camera Hub" Tested on Oct 18, 2019
Camect is a Silicon Valley startup that claims the "Smartest AI Object Detection On The Market", detecting not only people and vehicles, but...
Hikvision Global News Reports Directory on Oct 17, 2019
Hikvision has received the most global news reporting of any video surveillance company, ever, ranging from the WSJ, the Financial Times, Reuters,...
Camera Calculator V3.1 Release Improves User Experience on Oct 17, 2019
IPVM has released a new version of our Camera Calculator, V3.1, with significant user experience improvements, a new development plan, and an...
Securing Access Control Installations Tutorial on Oct 17, 2019
The physical security of access control components is critical to ensuring that a facility is truly secure. Otherwise, the entire system can be...
Access Control Course Fall 2019 - Last Chance on Oct 17, 2019
Register Now - Fall 2019 Access Control Course. Thursday, October 17th is the last day to register. IPVM offers the most comprehensive access...
US DoD Comments on Huawei, Hikvision, Dahua Cyber Security Concerns on Oct 16, 2019
A senior DoD official said the US is "concerned" with the cybersecurity of Hikvision, Dahua, and Huawei due to "CCP" (China Communist Party)...
Pelco Sarix Pro3 Camera Tested on Oct 16, 2019
Pelco has released their Sarix Professional Series 3 cameras, claiming "more security detail in challenging scenes with excellent low light and...