Access Control Door Controllers Guide

By: Brian Rhodes, Published on Oct 22, 2019

Door controllers are at the center of physical access control systems connecting software, readers, and locks.

Despite being buried inside enclosures or hidden inside ceilings, they are a complex component that ties everything else together.

In this note, we examine controllers and their main features including:

  • The three typical forms of controllers
  • The primary function of coordinating access at the door
  • Hardware compatibility across access management software
  • Typical input devices for access, including readers
  • Common types of outputs, including locks
  • IP vs Serial Connected Panels
  • Traditional DC vs. PoE Power
  • Controller features within standalone locks

**** *********** *** ** the ****** ** ******** access ******* ******* ********** software, *******, *** *****.

******* ***** ****** ****** enclosures ** ****** ****** ceilings, **** *** * complex ********* **** **** everything **** ********.

** **** ****, ** examine *********** *** ***** main ******** *********:

  • *** ***** ******* ***** of ***********
  • *** ******* ******** ** coordinating ****** ** *** door
  • ******** ************* ****** ****** management ********
  • ******* ***** ******* *** access, ********* *******
  • ****** ***** ** *******, including *****
  • ** ** ****** ********* Panels
  • *********** ** **. *** Power
  • ********** ******** ****** ********** locks

[***************]

Controllers *** ********* *** ****** *******

*** ******* **** ** controllers ** ******* ***** access ********** **** ***** and ******* **** * system ******* *****, ******* it ** ****** * 'controller', '**** ******', ** 'access********'.***** ******, ******, *** lock **** ** **** into '*** ******' *** the ********** ** ***** that *******.

* ***** ** ***********

********* ** *** ******, the ********** ** ********* offered ** *** ** the ********* ****:

  • **********
  • **********/**********
  • ***** ***********

Enclosure ****

*** **** ****** ***** of *********** *** ******* circuit ***** ****** ** a ***** ********** ********** or '***'.

*** ********* ** ********* wall ******* ** * closet ** ******* ******* above * ****, *** all ****** ****** ******* knock-outs ** *** *** to ******** ****** ** the *****.

********** ** ********* *********** are **** ********* ** high-density ******** (** ** more *****) **** ******* multiple ******** **** * single ***, ****** ***** controller ***** **** ******* one ** *** *****. These ****-******* ************** *** often****** ** ******, *** **** ******, and *** **** ********* to ****** ******** ** locating * ********** ** each ****.

*** ******** ** ********** points ****** ***** ********** vary, *** ********* **** terminal ***** ** ***** individual ****** ********* ***** are ********* *** ****** usable ** *** ******:

Standalone **********

******* ****** ********** **** factor ** ** ** 'appliance', ** ****** ********* in *** *** *********.

***** ***** ********** *** not ********* ******* **** enclosure ****, ****** ********** are ********* ** *** same *** ** ********* controllers, *** **** * self-contained ***:

**** **** ****** ** common **** ***** ******* using ****** **** *********** and *****/****** ****** *******.

***** ****** *** ******* of ****** ***** *** enclosure, *********** ***** **** appliances *** ****** *********** amounts ** *****.

Combo ***********

********* *** **** ********** is ******* ********** **** readers, *******, ** ****** detectors ** * ****** device:

**** ********** **** ***** decreases ************ ***** ******* multiple ****** ********** *** installed ** *** **** in *** ******.

*******, **** **** ** architecture *** ** * security *********, **** *** vulnerable ********** ***** ******* along **** *** ****** on *** ********** **** of *** ****. ** noted ** ******** ****** / *********** Tutorial, ***** *********** *** safety ****** ********** ** protect **** ***** *** are *** ********* **** for ****-******** ********.

***** *** ******** ** 'combo *******' ** *** market **** ********* ******* Intrusion/Burg ***** ******* *** access *******. ***** *** strictly ***********, ***** ***** systems ***** **** *** same ********** ** ***** labor ** ******* ******** system ********** ** ****.

Which ********** ** * ****?

*** ****** ** ****** control ********** ******** ********* drives **** *********** *** be ********. **** ****** software ******* **** ******* a ******* ****** ** controller **** *******.

** * ******, ********** selection ******* *** ********* limited ** *** *****, but * ************ *** offer * ***** ** controller ******* ********* ***** based ** *** ****** of ***** ** ** designed ** *******.

Limited *** ***** ********** *******

****** ******* ******* ***** use *********** ** '******' controllers **** ******** **** with ******** ****** ********. Unlike ******* *** *** software, ****** *********** *** not ********* *****/******* ******* ********* *************.

***** ****** ******* ****** controllers ******* ** ***** limited, ***** *** * few ***-***** ********** ********* including ****, ***, ******, and ******* *****, ** we ***** ** ******* ****** ********** *****.

** **** *****, ** access ***** *** *** controllers ************ ** ******* company *** ********* ** their *** (*.*., ******* controllers ********** ** *****). While *** ******** *** be *********** ************* ******* access ********, **** *** often *** ****-********* *** unwarrantied ******* ******* (***:********* / ********* ****** Control ******* *****).

Controller ********* *********

********** ** **** ******, the ******** ** * controller *** *******.

** **** ****** *** common ********** ******** *** 'tie-in' ****** ******* ***** access ******* ********** *** the **** **********, ** the ***** *****:

*** ******* ******** *** common ************ ** * controller *******:

  • ********** ***********:*** **** *** ********** communicate **** *** ****** panel/server?
  • ******:***** ** ******* **** readers **** *********** ** the **********?
  • *******:***** *** ******* **** locks ********** ** *** controller?
  • *****:*** ** ***** ******* by *** **********, *** how *** ******** ******* powered?

Networking ***********

** **** *****, *********** have **** ***** ** they *** ** ********* to **** **** *** networked ******:

*** ********** ** *** and *** ******* *** of ******** ** ****** facilities **** **** ** door *********** *******.

*******, ****** ********* *********** are ******, ********** ** older *******.**** ****** *********, ************* between ******************** *** ********* ******* that ** ********** ******** to ******* ******. **************** ********* ******, *************** serial ** *********** **** that **** *** **** place ** ** ********.

Common ****** ******

*** ******* ** ********** '****' *********** **** the ****** ******. *** number *** ***** ** inputs ********* ** *** controller ****, *** *** controllers ****** *** ***** types ****** *****:

  • *******
  • **** ******** ********
  • *******-**-**** & ****** *******

** ******* **** **** in *** ********* ********:

*******

*** **** ******* *** vulnerable ****** ******* ***** component ** ********* *** credential ******.

*******, *** ****** ** mounted ** *** '*********' side ** *** *******, and *********** ******* ** bad *******, *********, *** is ********** ** ******. For **** ******, *** risk ** ***** ************* ****** ******* ****** ****** has ***** *** ** more ****** **.** *** and********** *******.

*** ****** ** ****** inputs * ********** ************* ****** ***** ** the ****** ** ***** it *** *******. **** designers *** ********** ****** 'one ****** *** *******', however, ****-******** ************ ***** require *** ******* - a '**** **/ *******' application **** ***** **** supports * ****** ******* schedule ** ***** ** access ******.

***** **** ******* *** controller ******, * ******** reader ** ************ ********* to *** **** ** credentials ***** ****, *** mounting *******, *** *** read *****. *** **** details, ***** ************ ****** ******* *******.

**** ******** ******** (***)

*** ** *** **** useful ****** *** ******* door ******* ********, ** order ** ********* ** a **** ** ****** or ******. **** *** are ****** ******* ******** that *** ****** ** open ******** ** ******** door ********.

*** **** ***** ** DPS *** *** **** types *****, ******** ** our**** ******** ******** (***) Tutorial:

********** *** ** *********** may *** *******-******* ******, or *** *** ************ labeled ***** ***** ****** 'Door *******' ** '***' inputs:

*******-**-**** & ****** *******

***** ***** ** ******** input ******* "***" ** 'Request-To-Exit" *******, *** ** override ***** ** ***** to *********** **** ******.

*** ******** ** ********** these ******* ** *** controller ****** **** ************** power ******** ******, ** we ******* ******** ******* ******* ** Exit (***) ********, *** *** *** major ***** ******* ***** 'Exit' ******* *** *** motion *******:

Fire ****** ***********

**** ***** ******* *** commonly ***** **** *********** so **** * **** alarm ********* **** ******** the ***** ** ** emergency.

Video ************ *** ******* **********

***** ***** ************ ** frequently ********** **** ****** control, ********* ***** **** be ********** **** *** access ******* ********** ********, rather **** ******* *** controller.

Common ****** *******

*********** ***** ******* *** outputs *********, **** **:

  • *****
  • *****/****** ******
  • ****** ********** ******* **** Visitor ********** *** ******* Machines

*****

*** **** ****** ****** example******* **** ** ******** strikes,********, *** ***** ***** of *********** ********.

*** ********** ** *** device **** ********** * valid **** *** ******* logic ** ****** *** door. ** ****** ******, or ***** ******** ******** power ** *** ****, interrupts *** '******' ***** of *** ********-***** ** a ********** ********** ****.

Sirens & ****** ******

*********** *** **** ** wired ** ***** ****** or ******** ******* ***** on ******. *********** *** be ***** ** ***** when * **** *****, or ****** *** ** wired ** ******** ** someone ****** ******* ** opening.

Other *******/*******

**** ***** ***********, ****** options *** *******, *** anything **** ******** *****, high-voltage *********, *** *** systems *** ** ********* and ********** ** ****** control *******.

****** ************ ***** ********** output ***** ******* ********** supplies ** * ******* machine (*.*.: ****** ********* like******** ********** *********) *** ***** ***** in * ******* *******, or **** ********* **** a******* ********** ******.

******* ****** ****** *********** is *** ********** ** a ************ ****** ** record ** ******* ***** time * ********** ** read.

Power ******* - ***-******* ** ***

*** **** ** ***** used ** *********** ** generally ****** ***-******* (**/** volt) ** ******* **** ******** (***). ** **** *****, extra ***** **** ***** sources ** ******-******* *** controller ** ***** ****** connected *******.

** ** ******* ***** ******* ****** ******* Tutorial, *******-******* ***** ** devices ** * ****** of ******* *************. *** all ******* *** ******** to ** ******* ** the **********, *** ** cases ************,*** ****** ***** **** the ********** *** *** be **********.

Controller ******

******** ********** **** ** typically ********** ** *** number ** ***** **** control.

****** ***** *** ******, double, ****, *** ***** door ******. ***** ****** supporting * ******* ****** of ***** *** *********, they *** *** ******.

Standalone/All-in-One *****

***** *** ******** **** controllers, ********** ********** ****** control ******** ***** ******* the **** ************ *** control ********* ** **** controllers *** **** **** a ******* **** ******** the ****, ******* *********, power ******, *** **** door ******** ********.

************, '******** *****' *** being ******** ** ****** companies ** *** ***** expensive *** ** ****** networked ****** ******* ** doors ********* ** ***** with ******** ***** ********.

***** *** **** ********** component *** ** ******* integrated **** *** ****, it *********** ** ***** there ********** *** **** functions (**** ******** **** the **** ********) ** discrete **** ********** *******.

Comments (5)

***** *******!

****** *** *** ************* write-up. *** ****** **** starting ***, **** ******* and *** *** ******* links ** * **** launch ***** **** *********** access ******* ******* *** the ******* **********.

***** **** ********* **** system ***********: *** **** alarm ***** ** ***** to *** ***** ****** rather **** *** ****** control *****.

**, * ** ******* for * ******* ** the **** ******* * and * **** *********** in ***** *******.

*** ** *******

*****!

** ***** ** ********** use, ******* ******** * and * **** *********** are **** ** ******* systems, ********* ** ***************************** ****** *** ********* in **+ *********.

***** '****' ********* *********** are ****** ***, ********* other *** *********** (***** or ****) *** ****. We ****** ***** *** in**** ****** ********** ***** (Axis, ***, ******, *******), **** ******** **** chart:

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Nortek Mobile Access Reader BluePass Examined on Feb 12, 2019
Nortek's Linear access control division claims to make mobile credentials "more secure and easier to use than ever before" with their BluePass...
Designing Access Control Guide on Jan 30, 2019
Designing an access control solution requires decisions on 8 fundamental questions. This in-depth guide helps you understand the options and...
Proxy Access Control Tested on May 09, 2019
Silicon Valley Access Startup Proxy raised $13.6 Million in May 2019, focusing on mobile physical access control. Beyond the fund raising, Proxy...
Nortek Blue Pass Mobile Access Reader Tested on Jul 11, 2019
Nortek claims BluePass mobile readers are a 'more secure and easy to use approach to access', but our testing uncovered security problems and...
ZK Teco Atlas Access Control Tested on Aug 20, 2019
Who needs access specialists? China-based ZKTeco claims its newest access panel 'makes it very easy for anyone to learn and install access control...
Mobile Access Control Guide on Aug 28, 2019
One of the biggest trends in access for the last few years has been the marriage of mobile phones and access cards. But how does this...
Fingerprints for Access Control Guide on Sep 09, 2019
Users can lose badges, but they never misplace a finger, right? The most common biometric used in access are fingerprints, and it has become one...
Access Control Mustering Guide on Sep 30, 2019
In emergencies, determining where employees are located can be critical for knowing whether they are in danger. Access systems can be used for...
Securing Access Control Installations Tutorial on Oct 17, 2019
The physical security of access control components is critical to ensuring that a facility is truly secure. Otherwise, the entire system can be...
Hotel Access Control Explained on Dec 23, 2019
Hotel access control does not work like typical commercial access control because doors in hotels are not typically directly connected to a central...

Most Recent Industry Reports

Hanwha Wisenet X Plus PTRZ Tested on Feb 14, 2020
Hanwha has released their PTRZ camera, the Wisenet X Plus XNV-6081Z, claiming the "modular design allows for easy installation". We bought and...
PRC Warns Against China Video Surveillance Hacks, Hikvision Targeted on Feb 14, 2020
Hackers are targeting China video surveillance manufacturers and systems, according to the PRC's main cyber threat monitoring body. The hackers...
IPVM Conference 2020 on Feb 13, 2020
IPVM is excited to announce our 2020 conference. This is the first and only industry event that will be 100% sponsor-free. Like IPVM online, the...
Bosch Dropping Dahua on Feb 13, 2020
Bosch has confirmed to IPVM that it is in the process of dropping Dahua, over the next year, as both IP camera contract manufacturer and recorder...
BluB0X Alleges Lenel, S2, Software House Are Dinosaurs on Feb 13, 2020
BluB0X is running an ad campaign labeling Lenel, S2, Software House, Honeywell, AMAG and more as dinosaurs: In a follow-up email to IPVM,...
London Live Police Face Recognition Visited on Feb 13, 2020
London police have officially begun using live facial recognition in select areas of the UK capital, sparking significant controversy. IPVM...
Converged vs Dedicated Networks For Surveillance Tutorial on Feb 12, 2020
Use the existing network or deploy a new one? This is a critical choice in designing video surveillance systems. Though 'convergence' was a big...
Monitoreal "Completely Autonomous" Home AI Tested on Feb 12, 2020
Monitoreal claims to allow users to "see the things you want (people, vehicles, animals) and ignore the things you don’t”, using AI to distinguish...
Cisco Video Surveillance Is Dead, Long Live Cisco Meraki Video Surveillance on Feb 11, 2020
A dozen years ago much of the industry thought that Cisco was destined to dominate video surveillance. They stumbled repeatedly, failing. Now it is...
BICSI For IP Video Surveillance Guide on Feb 11, 2020
Spend enough time around networks and eventually someone will mention BICSI, the oft-referenced but only vaguely known standards body prevalent in...