Access Controller Software Guide

Author: Brian Rhodes, Published on Dec 11, 2017

Properly configuring access controllers software is key to a professional access system.

These devices have fundamental settings that must be configured appropriately, including:

  • Unlock times / extended unlock times
  • Door Hold Open Alarms
  • Request to Exit Inputs
  • Card Formats
  • Reader / interface type
  • Input / output devices
  • Tamper switches

Inside this guide, we review all of those elements including examples of configuration with Axis, HID, Hikvision and Mercury controllers, a hands-on-video, and an explanation of the importance of each element.

******** ***************** ******************* ** *** ** * ************ ****** ******.

***** ******* **** *********** ******** **** **** ** ********** *************, including:

  • ****** ***** / ******** ****** *****
  • **** **** **** ******
  • ******* ** **** ******
  • **** *******
  • ****** / ********* ****
  • ***** / ****** *******
  • ****** ********

****** **** *****, ** ****** *** ** ***** ******** ********* examples ** ************* **** ****, ***, ********* *** ******* ***********, a *****-**-*****, *** ** *********** ** *** ********** ** **** element.

[***************]

Configuration ******* *******

*** ***** ******** **** **** ** ********** ** ***** ******* include:

****** *****

***** **** ******* ***** *** ******** *** *********, *** ***** they *** **** ** *********** *** *********, *** **** ******* used ** ****** *********** ** *** **** * **** ** powered/unpowered ** ********. ******* ** ***** **** ** ******** * credential *** **** **** ** ** ****-******* ** *******, **** setting ** ******* ** ****** **** *** ******* ** **** unsecured **** ****** ** ***** *** **** ** **** ******* before ******** ********.

******** ****** ****

**** ********* ** ***** ****** **** ** ********* ***** ** specific ********** ******* ***** ** ******* ***** (**** ***********) ** job **************** (**** ******** ******). ***** ******* **** '******** ******' times **** * ****** ****** ** **** ***** **** ****** they *** **-****** ** '**** ****' ****** *****.

**** **** **** ******

******* **** ***** *** *** ******, ****** ******* ******** '**** hold ****' ****** ** ****** ********* **** ***** ****** **** for *** ****. ** *** **********, *** ****** **** *** physically ****** ********* ** ***** ** ************ *********** ***** **********.

********* **** *******

** *******, *********** **** ******** ******* ** ********** ** ******** interpret *********** **** ******** *******. ***** *********** ****** ****** ************** ** ****, ******* *** ***** *********** ***** *** ** ********* ** needed ** ******** ****** *******.

******* ** **** ********

**** ***** ** ***** (**:********) *** **** ******** ****************** ** *********** **** ***** ***** ** ******** **** ***** ******* ***** credentials. ******* ***** ******* **** **** ** ********* *** **** temporarily, *** ******* **** ** ****** ***** ********** *** ********* to *** ********** *** *** *** **** ********. *** ********** allows ** *** ****** ** ******* ** ******, *** *** controller **** ******** *** **** *** ******* ** * ****** state ***** * ***** ****** *** *******.

****** ********

** ********, * ******* ** ******** *** ****** ********* ****** must ** ********** ****, ***, *** *** ******** ************* **** they ******. ** *******, *********** *** ****** *** ****** ****** contact ******** ** ******** *** ******* ******, ***, ** **** VMS ****** **** ******* ** ********** ****** *********.

Configuration ****** ********

******* *** **** ******* ** **** *********** **** ** ****** systems, *** ****** ** *********** **** *** **** *** *********** used ** ******** ******** ** ********* *******. *** ******** ***** show **** ****** ********** ********:

  • *** **** ***
  • **** *****
  • ******* ******** (**-****)
  • ********* **** *****

***** ***** *** *** ***** ****** ******** ** ******* ** *** ** ******* ****** ***************, *** ***** ******* *********** ** **** *****, ********* ******* fundamental *********. ** **** *****, *** ********** ********** ******** *** always ** **** ** ********* ***** ********, ******** **** *** based ** ********** ***** *** *** ********* **** ******** ** hardware.

HID **** ***

*****, ***** **** ***'* ******** *** ******* ***** *** '**** **********' ***:

**** **** '******' *** '******** ******' ***** *** ** ******** a ****** ******* * ****** ** ** ** *******, *** a ***** *********** ** **** ******* ** ****** ****** **** control. ** **** **********, *** ******** ********* ****** ****** *** keypad ** **** ********** ** **** ******.

Axis *****

*** ***-**** **** ********** (**** ****** ****) ***** ***** ******** ***** *** '******** *************' ******:

**** *** **** ***** **** *** ******** ****** ***** *** listed, *** ****** '****** ****' *** '**** ****** ****' ************. In ********, **** **** **** (**** *** **** ****) *** nuisance (***-***** ****) ****** *** **** ****** ** **** ******. Note *** ******** ** ****** **** '**** *******' ****** ******** *********** **** ** ********** ****.

Hikvision ****** ***********

********* (***:********* ****** ******* ******), *** ** ********* *** ******** ********** ******** ** ***** iVMS-4200 ********:

***** *** ***** ******** ******, *** ******** **** ******* *** the **** ** ***** *********. *** *******, '**** **** ******** by **** *** ******** ******' ** *** **** ** '******** Unlock ****', *** '**** **** ******* *****' ** '**** **** Open *****'.

Mercury ******** ***********

*** ******* ********, *** ******** *********** ***** ********* *** ******* in *** ******* ********** ******** ********* ****** **** ** *** hardware ********** ** ***** ******:

*** *********** *** ***** ****** ** ******** ****** ** *** deeply *** ****** ******** *** ********** *** ******** **********, *** in ******* ******* ******** *** ******* **** ******** **** **** 'Access ****', ******** ****** ********, *** ****** *****/****** ********** **** locks *** **** ******** ********.

Practical ******* ************

** *** **** *****, ***** ******** *** **** * *********** impact ** *** **** *** ****** ****** ********.

Unlock *****

**** ******* ******* ******** * ***** ** *****, ********* ******* or ************. *** ******* ******* ****** ****** ******* ******* ***** and **** ********** *****. ****** ****** ********** ********, *** *** typical ****** ***** *******:

*****:*** '********' ******** ***** ***** *** ****** ** ******* *********** adjacent ** ** ** *** **** *****, *** ****** **** generally ** *** ******* * *** ** *******. **** ****** enough **** *** ******* ** **** * ****, ****, *** pull **** * **** ****** ** *******, *** ** ***** enough ** ****** *** **** ****** *** **** *** ******* that **** ********** ****** **.

******* *****:*** ***** ** ***** ****** ** ****** **** * **** and ***** * ******* ******* **** ********* ** *** **** of ******** *** ***** ** ****. *******, *********** **** ******** distances *** ** ** ** **** ****, *** ********** *** need ** ***** ***** ******** *** ** ******* ** ****.

********:**** ***** *** ********* ** ******, ** ******** ** ***** and **** ** ********, * ********** (** ****** ** ***********) must ** ********** ** **** *** ****** ***** ** *** status ** ***** *****. *** **** ****** **********, *** *** ****. ******* * ********** **** ***** ****** ** ****** ***** the ******** ******* ** ******, *** "****** ****" *** ** 5 ******* ** ****.

Extended ****** ****

******** ** ******** *****:**** * ********** ******* **** ********, * **********, ** *** a *** **** ******** ******* ******* ** ******* ******* ***** in * ***** ******, ** "******** ******" **** ** ***** assigned ** **** ****, ** **** *** **** ******** ****** than ******* *** ***********. *** *******, * ******** ****** *** not ** **** ** ******** *** ******** ******* * **** in * - ** *******, *** * ****** ** ** to ** ******* *** ** **** ****** ** **** ******* without ************ ********* *** *******.

Door **** **** ******

**** ***** ****** **** ***** ***, *** ** ****** ***** after *********** *********, *** ****** ******* ****** *** ******* ** ignored ** * ********. *** **** ********, **** **** **** alarms ****** *** ** ********** *** **** **** ** *******, and *** **** **** * *******.

*******, *** ***** ******** ******** ***** ***** ** ** ********** by ******** ***.

Hardware ************* *******

** ******** ** ******** *************, **** ********** ****** ** ******** selection ****. *** ***** ******* *******:

  • ****** ** ************** *******:******* ** ****** **** ** *** *********** ** *********** ****** to **** * ****. *** *******, **** ***** ****** ******* offer ** ****** ** ****, ***, ** **** **** & PIN *********** ** **** * ****. *** ******** ** *** many ******* ** *** *** ** ******* ** ********** ******* of ******* ********** *****, *** *** ******* ******** ************* *** production ***. *** * ****** ****, *** ************** ************** ********.
  • *****/****** *******:*** '***********' ***** ** */* ******* *** ****** *** ** endless, *** *** ******* ** *** ***** ******** ******* *** controller **** * *** **** ** *** **** *** *********. For ********** ***/* ***********, *** *** ****. ** * ***** ** ******* **** ********* ******** *** amperages *** ** ** ******** ** *** **********, *** *** need ** ** *******, **********, ** ********* ** '**********' ******** where **** *** ********.
  • ******* ****** ********:** **** *****, *********** * ***** ** ********* ****** ******* is ****** *** ******* ** ***** ** ** ******. **** controllers ******* * ****** ******* ** ****** *******, *** ******* it ** *** *** ** ***** ********. ******** **************, ***** contact **************, ** ******** ****** ******** *** ****** ***** ******** to *** ***** ****** ********.

Controller *** ****** ****** *******

** *** ***** *****, ** **** * ***** ******** ** the ***** ****** ************* **** **** ** ******* - ******** connection ** ********** **** *******. **** *********** *** *** ******* phoenix ********** ** ********** ******* ********** **** *** ********** *** the ******** ********* *****.

** **** *****, *** ******** ******** ***** *** *** ** detected ** ********** *** ************* ***** *** ******** ********** *** wired ** *** **********. **** ***** ***** *** ****** ** typically ************ *** ****** ***** ****-**** ** **** ******* ***** coding:

[****: **** ******** *** ********** ********* ** **** *** ************* revised ** ****]

Comments (5)

Would be useful to add a section with multiple doors considerations

....read in / out,

....anti passback

and the plethora of functionalities that can be obtained with multiple card readers

You may find this article helpful: The Passback Problem

We will queue up an post on 'advanced access configurations' that address read in/out situations. Good idea!

PIR request to exits not programmed correctly resulting in nuisance forced door alarms and request to exits unlocking doors unnecessarily (e.g., when mag lock is not being used) are very common problems we encounter regularly at client sites.

Some codes state that an RTE has to be wired directly in line with the lock circuit, negating the use of the terminals for it on an access controller in those instances.

Very helpful

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Video Analytics Integration Guide on Aug 16, 2018
Video analytics is hot again (at least conceptually) but integrating video analytics with VMSes can be challenging. This is especially significant...
ISS VMS / Video Analytics Company Profile on Aug 16, 2018
Who is ISS? In the past few months, they had one of the craziest ISC West promo items in years. Then, they hired industry veteran and ex-Dahua...
Backboxes for Video Surveillance Tutorial on Aug 15, 2018
Backboxes are a necessity in surveillance, whether for managing cable whips, recessing cameras, adding wireless radios. But it can be confusing to...
Camera Focusing Tutorial on Aug 09, 2018
A camera's focus is fundamental to quality imaging. Mistakes can cause important problems. In this guide, we explain focus issues and proper...
Hikvision PanoVu Mini Tested (Multi-imager + PTZ For ~$500) on Aug 07, 2018
Hikvision has released their first PanoVu Mini multi imager, the PanoVu DS-2PT3326IZ-DE3, with four 1080p imagers, including a PTZ and integrated...
RealNetworks Free School Facial Recognition on Aug 03, 2018
The company that created RealPlayer is moving beyond media delivery and into the security space with a new facial recognition platform they have...
Camera Cable Whip Guide on Aug 03, 2018
Cable whips are one of integrator's least favorite camera features but seem to be unavoidable, now commonplace on dome, turret, and bullet cameras...
Installing Surveillance Cameras Into Synthetic Stucco (EIFS) Tutorial on Jul 30, 2018
Mounting cameras into synthetic stucco, commonly known as EIFS finishes, can be problematic If not properly planned, EIFS/stucco can be downright...
Door Swing Tutorial on Jul 24, 2018
The direction a door swings might seem minor, but it can greatly impact door hardware selection. There are four basic ways a door can swing, and...
$25 Million US COPS SVPP School Security Funding Examined on Jul 24, 2018
The US Congress has authorized the School Violence Prevention Program (SVPP) to fund various security measures and training to mitigate active...

Most Recent Industry Reports

2Gig Gun Lock / Motion Detector Tested on Aug 17, 2018
Safer guns for families and an opportunity for security dealers to sell more services? That is the aim of Nortek's 2GIG 'Gun Motion Detector'...
Video Analytics Integration Guide on Aug 16, 2018
Video analytics is hot again (at least conceptually) but integrating video analytics with VMSes can be challenging. This is especially significant...
Hikvision IP Camera Critical Vulnerability 2018 Disclosed on Aug 16, 2018
The same day that the US government passed a prohibition on Hikvision cameras, Hikvision disclosed a critical vulnerability for its IP...
ISS VMS / Video Analytics Company Profile on Aug 16, 2018
Who is ISS? In the past few months, they had one of the craziest ISC West promo items in years. Then, they hired industry veteran and ex-Dahua...
Chinese OEM Avycon Gets ADI Push on Aug 15, 2018
Who is Avycon? An American company? A Korean company? A couple of guys relabelling Chinese products? The latter is the best explanation. While...
Backboxes for Video Surveillance Tutorial on Aug 15, 2018
Backboxes are a necessity in surveillance, whether for managing cable whips, recessing cameras, adding wireless radios. But it can be confusing to...
Genetec Stratocast / Comcast 'Motion Insights' Examined on Aug 15, 2018
Comcast recently announced "SmartOffice Motion Insights", an extension to their Genetec OEMed cloud video service (covered by IPVM here). This...
SimpliSafe Violating California, Florida, and Texas Licensing Laws on Aug 14, 2018
IPVM has verified that DIY security system provider SimpliSafe, founded in 2006 and acquired in June of 2018 at a billion dollar valuation, is...
Ban of Dahua and Hikvision Is Now US Gov Law on Aug 13, 2018
The US President has signed the 2019 NDAA into law, banning the use of Dahua and Hikvision (and their OEMs) for the US government, for US...
Cut Milestone Licensing Costs 80% By Using Hikvision and Dahua NVRs (Tested) on Aug 13, 2018
Enterprise VMS licensing can be quite expensive, with $200 or more per channel common, meaning a 100 camera system can cost $20,000 in VMS...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact