Access Control Door Controllers Guide

By: Brian Rhodes, Published on Oct 22, 2019

Door controllers are at the center of physical access control systems connecting software, readers, and locks.

Despite being buried inside enclosures or hidden inside ceilings, they are a complex component that ties everything else together.

In this note, we examine controllers and their main features including:

  • The three typical forms of controllers
  • The primary function of coordinating access at the door
  • Hardware compatibility across access management software
  • Typical input devices for access, including readers
  • Common types of outputs, including locks
  • IP vs Serial Connected Panels
  • Traditional DC vs. PoE Power
  • Controller features within standalone locks

**** *********** *** ** the ****** ** ******** access ******* ******* ********** software, *******, *** *****.

******* ***** ****** ****** enclosures ** ****** ****** ceilings, **** *** * complex ********* **** **** everything **** ********.

** **** ****, ** examine *********** *** ***** main ******** *********:

  • *** ***** ******* ***** of ***********
  • *** ******* ******** ** coordinating ****** ** *** door
  • ******** ************* ****** ****** management ********
  • ******* ***** ******* *** access, ********* *******
  • ****** ***** ** *******, including *****
  • ** ** ****** ********* Panels
  • *********** ** **. *** Power
  • ********** ******** ****** ********** locks

[***************]

Controllers *** ********* *** ****** *******

*** ******* **** ** controllers ** ******* ***** access ********** **** ***** and ******* **** * system ******* *****, ******* it ** ****** * 'controller', '**** ******', ** 'access********'.***** ******, ******, *** lock **** ** **** into '*** ******' *** the ********** ** ***** that *******.

* ***** ** ***********

********* ** *** ******, the ********** ** ********* offered ** *** ** the ********* ****:

  • **********
  • **********/**********
  • ***** ***********

Enclosure ****

*** **** ****** ***** of *********** *** ******* circuit ***** ****** ** a ***** ********** ********** or '***'.

*** ********* ** ********* wall ******* ** * closet ** ******* ******* above * ****, *** all ****** ****** ******* knock-outs ** *** *** to ******** ****** ** the *****.

********** ** ********* *********** are **** ********* ** high-density ******** (** ** more *****) **** ******* multiple ******** **** * single ***, ****** ***** controller ***** **** ******* one ** *** *****. These ****-******* ************** *** often****** ** ******, *** **** ******, and *** **** ********* to ****** ******** ** locating * ********** ** each ****.

*** ******** ** ********** points ****** ***** ********** vary, *** ********* **** terminal ***** ** ***** individual ****** ********* ***** are ********* *** ****** usable ** *** ******:

Standalone **********

******* ****** ********** **** factor ** ** ** 'appliance', ** ****** ********* in *** *** *********.

***** ***** ********** *** not ********* ******* **** enclosure ****, ****** ********** are ********* ** *** same *** ** ********* controllers, *** **** * self-contained ***:

**** **** ****** ** common **** ***** ******* using ****** **** *********** and *****/****** ****** *******.

***** ****** *** ******* of ****** ***** *** enclosure, *********** ***** **** appliances *** ****** *********** amounts ** *****.

Combo ***********

********* *** **** ********** is ******* ********** **** readers, *******, ** ****** detectors ** * ****** device:

**** ********** **** ***** decreases ************ ***** ******* multiple ****** ********** *** installed ** *** **** in *** ******.

*******, **** **** ** architecture *** ** * security *********, **** *** vulnerable ********** ***** ******* along **** *** ****** on *** ********** **** of *** ****. ** noted ** ******** ****** / *********** Tutorial, ***** *********** *** safety ****** ********** ** protect **** ***** *** are *** ********* **** for ****-******** ********.

***** *** ******** ** 'combo *******' ** *** market **** ********* ******* Intrusion/Burg ***** ******* *** access *******. ***** *** strictly ***********, ***** ***** systems ***** **** *** same ********** ** ***** labor ** ******* ******** system ********** ** ****.

Which ********** ** * ****?

*** ****** ** ****** control ********** ******** ********* drives **** *********** *** be ********. **** ****** software ******* **** ******* a ******* ****** ** controller **** *******.

** * ******, ********** selection ******* *** ********* limited ** *** *****, but * ************ *** offer * ***** ** controller ******* ********* ***** based ** *** ****** of ***** ** ** designed ** *******.

Limited *** ***** ********** *******

****** ******* ******* ***** use *********** ** '******' controllers **** ******** **** with ******** ****** ********. Unlike ******* *** *** software, ****** *********** *** not ********* *****/******* ******* ********* *************.

***** ****** ******* ****** controllers ******* ** ***** limited, ***** *** * few ***-***** ********** ********* including ****, ***, ******, and ******* *****, ** we ***** ** ******* ****** ********** *****.

** **** *****, ** access ***** *** *** controllers ************ ** ******* company *** ********* ** their *** (*.*., ******* controllers ********** ** *****). While *** ******** *** be *********** ************* ******* access ********, **** *** often *** ****-********* *** unwarrantied ******* ******* (***:********* / ********* ****** Control ******* *****).

Controller ********* *********

********** ** **** ******, the ******** ** * controller *** *******.

** **** ****** *** common ********** ******** *** 'tie-in' ****** ******* ***** access ******* ********** *** the **** **********, ** the ***** *****:

*** ******* ******** *** common ************ ** * controller *******:

  • ********** ***********:*** **** *** ********** communicate **** *** ****** panel/server?
  • ******:***** ** ******* **** readers **** *********** ** the **********?
  • *******:***** *** ******* **** locks ********** ** *** controller?
  • *****:*** ** ***** ******* by *** **********, *** how *** ******** ******* powered?

Networking ***********

** **** *****, *********** have **** ***** ** they *** ** ********* to **** **** *** networked ******:

*** ********** ** *** and *** ******* *** of ******** ** ****** facilities **** **** ** door *********** *******.

*******, ****** ********* *********** are ******, ********** ** older *******.**** ****** *********, ************* between ******************** *** ********* ******* that ** ********** ******** to ******* ******. **************** ********* ******, *************** serial ** *********** **** that **** *** **** place ** ** ********.

Common ****** ******

*** ******* ** ********** '****' *********** **** the ****** ******. *** number *** ***** ** inputs ********* ** *** controller ****, *** *** controllers ****** *** ***** types ****** *****:

  • *******
  • **** ******** ********
  • *******-**-**** & ****** *******

** ******* **** **** in *** ********* ********:

*******

*** **** ******* *** vulnerable ****** ******* ***** component ** ********* *** credential ******.

*******, *** ****** ** mounted ** *** '*********' side ** *** *******, and *********** ******* ** bad *******, *********, *** is ********** ** ******. For **** ******, *** risk ** ***** ************* ****** ******* ****** ****** has ***** *** ** more ****** **.** *** and********** *******.

*** ****** ** ****** inputs * ********** ************* ****** ***** ** the ****** ** ***** it *** *******. **** designers *** ********** ****** 'one ****** *** *******', however, ****-******** ************ ***** require *** ******* - a '**** **/ *******' application **** ***** **** supports * ****** ******* schedule ** ***** ** access ******.

***** **** ******* *** controller ******, * ******** reader ** ************ ********* to *** **** ** credentials ***** ****, *** mounting *******, *** *** read *****. *** **** details, ***** ************ ****** ******* *******.

**** ******** ******** (***)

*** ** *** **** useful ****** *** ******* door ******* ********, ** order ** ********* ** a **** ** ****** or ******. **** *** are ****** ******* ******** that *** ****** ** open ******** ** ******** door ********.

*** **** ***** ** DPS *** *** **** types *****, ******** ** our**** ******** ******** (***) Tutorial:

********** *** ** *********** may *** *******-******* ******, or *** *** ************ labeled ***** ***** ****** 'Door *******' ** '***' inputs:

*******-**-**** & ****** *******

***** ***** ** ******** input ******* "***" ** 'Request-To-Exit" *******, *** ** override ***** ** ***** to *********** **** ******.

*** ******** ** ********** these ******* ** *** controller ****** **** ************** power ******** ******, ** we ******* ******** ******* ******* ** Exit (***) ********, *** *** *** major ***** ******* ***** 'Exit' ******* *** *** motion *******:

Fire ****** ***********

**** ***** ******* *** commonly ***** **** *********** so **** * **** alarm ********* **** ******** the ***** ** ** emergency.

Video ************ *** ******* **********

***** ***** ************ ** frequently ********** **** ****** control, ********* ***** **** be ********** **** *** access ******* ********** ********, rather **** ******* *** controller.

Common ****** *******

*********** ***** ******* *** outputs *********, **** **:

  • *****
  • *****/****** ******
  • ****** ********** ******* **** Visitor ********** *** ******* Machines

*****

*** **** ****** ****** example******* **** ** ******** strikes,********, *** ***** ***** of *********** ********.

*** ********** ** *** device **** ********** * valid **** *** ******* logic ** ****** *** door. ** ****** ******, or ***** ******** ******** power ** *** ****, interrupts *** '******' ***** of *** ********-***** ** a ********** ********** ****.

Sirens & ****** ******

*********** *** **** ** wired ** ***** ****** or ******** ******* ***** on ******. *********** *** be ***** ** ***** when * **** *****, or ****** *** ** wired ** ******** ** someone ****** ******* ** opening.

Other *******/*******

**** ***** ***********, ****** options *** *******, *** anything **** ******** *****, high-voltage *********, *** *** systems *** ** ********* and ********** ** ****** control *******.

****** ************ ***** ********** output ***** ******* ********** supplies ** * ******* machine (*.*.: ****** ********* like******** ********** *********) *** ***** ***** in * ******* *******, or **** ********* **** a******* ********** ******.

******* ****** ****** *********** is *** ********** ** a ************ ****** ** record ** ******* ***** time * ********** ** read.

Power ******* - ***-******* ** ***

*** **** ** ***** used ** *********** ** generally ****** ***-******* (**/** volt) ** ******* **** ******** (***). ** **** *****, extra ***** **** ***** sources ** ******-******* *** controller ** ***** ****** connected *******.

** ** ******* ***** ******* ****** ******* Tutorial, *******-******* ***** ** devices ** * ****** of ******* *************. *** all ******* *** ******** to ** ******* ** the **********, *** ** cases ************,*** ****** ***** **** the ********** *** *** be **********.

Controller ******

******** ********** **** ** typically ********** ** *** number ** ***** **** control.

****** ***** *** ******, double, ****, *** ***** door ******. ***** ****** supporting * ******* ****** of ***** *** *********, they *** *** ******.

Standalone/All-in-One *****

***** *** ******** **** controllers, ********** ********** ****** control ******** ***** ******* the **** ************ *** control ********* ** **** controllers *** **** **** a ******* **** ******** the ****, ******* *********, power ******, *** **** door ******** ********.

************, '******** *****' *** being ******** ** ****** companies ** *** ***** expensive *** ** ****** networked ****** ******* ** doors ********* ** ***** with ******** ***** ********.

***** *** **** ********** component *** ** ******* integrated **** *** ****, it *********** ** ***** there ********** *** **** functions (**** ******** **** the **** ********) ** discrete **** ********** *******.

Comments (3)

***** *******!

****** *** *** ************* write-up. *** ****** **** starting ***, **** ******* and *** *** ******* links ** * **** launch ***** **** *********** access ******* ******* *** the ******* **********.

***** **** ********* **** system ***********: *** **** alarm ***** ** ***** to *** ***** ****** rather **** *** ****** control *****.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Glass Doors and Access Control Tutorial on Nov 21, 2019
One of the biggest access challenges are locking and securing glass doors. Unlike wood or steel doors that can be modified to work with...
ISC East 2019 Show Report Day 2 on Nov 21, 2019
IPVM has finished in New York City covering both days of the ISC East 2019 show. Inside this report, we cover: Day 2 Traffic Centaur...
Avigilon H4 Intercom Tested on Nov 20, 2019
Avigilon is well-known for video surveillance and access, but how well does the company's intercom work? We purchased and tested Avigilon's H4...
Top Manufacturers Gaining and Losing 2019 on Nov 18, 2019
2019 has been an explosive year for video surveillance, with the world's two largest manufacturers, Dahua and Hikvision, being sanctioned for human...
Camera Field of View (FoV) Guide on Nov 13, 2019
Field of View (FoV) and Angle of View (AoV), are deceptively complex. At their most basic, they simply describe what the camera can "see" and seem...
Wireless / WiFi Access Lock Guide on Nov 12, 2019
For some access openings, running wires can add thousands in cost, and wireless alternatives that avoid it becomes appealing. But using wireless...
Open vs End-to-End Systems: Integrator Statistics 2019 on Nov 11, 2019
Preference for open systems is on the decline, according to new IPVM statistics. We asked integrators: For video surveillance systems, do you...
Biggest Low Light Problems 2019 on Nov 08, 2019
Over 150 integrators responded to our survey question: "What are the biggest problems you face getting good low-light images?" Inside, we share...
The Access Control Codes Guide: IBC, NFPA 72, 80 & 101 on Nov 07, 2019
For access, there is one basic maxim: Life safety above all else. But how do you know if all applicable codes are being followed? While the...
Rhombus Cameras, VMS and Analytics Tested on Nov 06, 2019
Rhombus boasts they have created "the new standard in Enterprise, cloud-managed video security" and told IPVM in January 2019 they offer twice the...

Most Recent Industry Reports

Axis "Best Of The Best" 4K Camera Tested (Q1798-LE) on Nov 21, 2019
Axis has released their "best of the best" Q1798-LE bullet camera, touting "4K without compromise" with a large Micro 4/3" image sensor, custom...
Glass Doors and Access Control Tutorial on Nov 21, 2019
One of the biggest access challenges are locking and securing glass doors. Unlike wood or steel doors that can be modified to work with...
Avigilon H4 Intercom Tested on Nov 20, 2019
Avigilon is well-known for video surveillance and access, but how well does the company's intercom work? We purchased and tested Avigilon's H4...
The Cowardly, Greedy "Leaders" of Video Surveillance - SIA on Nov 19, 2019
The video surveillance industry suffers from cowardly, greedy 'leaders' focused on maximizing easy money while undermining public trust. The...
Hikvision Dual Lens Face Recognition Camera Tested on Nov 19, 2019
Hikvision's Dual Lens Facial Recognition camera, claims that it "adopts advanced deep learning algorithm and powerful GPU to realize instant face...
Top Manufacturers Gaining and Losing 2019 on Nov 18, 2019
2019 has been an explosive year for video surveillance, with the world's two largest manufacturers, Dahua and Hikvision, being sanctioned for human...
Hidden Camera Detectors Tested on Nov 18, 2019
Hidden cameras are a growing problem as cameras become smaller, cheaper and easier to access. However, some companies claim to be able to detect...
Wyze Fires Back at JCI - Your Patents Are Invalid, Pay All Of Our Costs on Nov 18, 2019
Goliath JCI targeted startup Wyze this summer alleging the fast-growing consumer startup was violating a slew of JCI's patents. Now, Wyze has...
ADT Stock Surges - "Leading The Commercial Space" on Nov 15, 2019
Don't call it comeback... but maybe call it a commercial provider. ADT, whose stock dropped by as much as 2/3rds since IPOing in 2018, has now...