Architectural and Engineering Specification. Brivo ACS 5000 Control Panels and ACS Service
|
|
- Terence Chase
- 5 years ago
- Views:
Transcription
1 Architectural and Engineering Specification Brivo ACS 5000 Control Panels and ACS Service Document Number: MKT-DOC-006 November 22, 2005
2 Architectural and Engineering Specification Page 1 Table of Contents Table of Contents INTRODUCTION...2 System Description...2 Related Documentation SYSTEM ARCHITECTURE...4 Managed Service Provider...4 Web Hosted...4 Internet Browser Accessible...4 Encryption & Authentication...4 Wide Area Network...5 Central Data Storage...5 Redundancy ACS APPLICATION...6 Maintain Custom Schedules...7 Manage Sites...7 Employ Tiered Administration...8 Track Administrator Actions...9 Maintain Credential Database...9 Manage Users and Groups...9 Maintain Activity Log...10 Generate Notifications and Daily Summaries CONTROL PANELS...12 Supported Readers...12 Power Requirements...12 Control Boards...12 Access Control Functions BRIVO ACS5000 PRODUCT SPECIFICATIONS...14 General Features...14 Hardware Components...14 Recommended Readers...14 Online Service for Account Administration...15 Service & Support BRIVO ACS 5000 TECHNICAL SPECIFICATIONS...16
3 Architectural and Engineering Specification Page 2 1 Introduction The purpose of this document is to specify the Architectural/Engineering and Bid criteria for a Wide Area Network (WAN) based Access Control System (ACS) using such technologies as the Internet, private corporate networks, or wireless IP-based cellular networks. System Description The WAN-based ACS allows a company to network a single access control system for all its facilities, whether they are spread across town or across the world, and manage the entire system via a Webbased interface. In this architecture, the Managed Service Provider (MSP) is responsible for all required network connections. This eliminates the time, cost and complexity of custom cabling or internal IT setup as well as the provisioning of telecom networks to the remote facilities. It also removes the need to set up and maintain local networks and dedicated PCs or servers. The WAN-based ACS control panels installed at the customer s sites are networked with a secure central data facility, where the ACS application is hosted. The application is made available via the Web to the customer for administration and management of all aspects of facility access control. The core component of the ACS service platform is the Network Operations Center (NOC), a secure hosting facility where the application and database servers reside. These ACS applications integrate WAN technology such as the Internet with Web-based application services to provide specific products within vertical markets. A reference diagram for the system is provided below. Web-based User Interface User User User User Network Operations Center Internet Firewalls Web Servers ACS Application Servers Database Servers Network (e.g., Wireless, Internet) Remotely Managed Assets WAN-Based Access Control System
4 Architectural and Engineering Specification Page 3 Related Documentation Portions of the following documentation are incorporated into this specification and may be referred to for additional information: Brivo Administrator s Manual (#ENG-DOC-015) Administrator s Addendum ACS3000/4000 (#ENG-DOC-017) Brivo ACS3000 Installation Manual (#ENG-DOC-001) Brivo ACS4000 Installation Manual (#ENG-DOC-002) Brivo ACS5000 Installation Manual (#ENG-DOC-003) Tiered Administration Scenarios and Worksheet (#ENG-DOC-004). Brivo ACS Information Security (#MKT-DOC-010)
5 Architectural and Engineering Specification Page 4 2 System Architecture The following subsections provide an overview of the specifications for the ACS application system architecture, as well as its related services. Managed Service Provider Managed Service Providers (MSP) offer software and system functionality on a centralized, hosted basis, rather than as an installed application that resides at a customer site. The ACS service shall be provided under this MSP model and display all of the characteristics listed below. 1. The MSP shall host the ACS applications in a secure data facility. 2. The secure data facility shall have 24x7x365 staffing, including security and operational personnel. 3. The NOC shall have redundant main AC power supplies, including diesel generator backup. 4. The MSP shall perform all system and application maintenance on behalf of the customer. 5. The MSP facility shall provide secure archival data storage, including periodic offline tape backups. 6. The MSP shall provide automatic software upgrades. When changes are made to the central server software, those updates will be available to the customer upon the next login to the system. 7. The MSP shall provide on-call customer support services for the application and all associated control panels. Web Hosted 1. The ACS application shall be hosted on Web servers which are accessible via the Internet. 2. The ACS application shall be interoperable with common firewall and proxy server settings. Internet Browser Accessible 1. The ACS application shall be accessible via a standard Web browser over the Internet. 2. The ACS application shall not follow a client/server framework, and therefore shall not require any special client hardware or software other than a standard Web browser. 3. All customer control over the application shall be possible via a standard Web browser.. 4. The ACS application shall not require the customer to install any server software whatsoever. Encryption & Authentication 1. Sessions between the customer s browser and the Web-based ACS application shall be encrypted using 128-bit Secure Sockets Layer (SSL) encryption. 2. Communications between the control panel and the ACS application servers shall be encrypted using 128-bit Secure Sockets Layer (SSL) encryption. 3. The MSP servers shall validated the identity of any control panel attempting to communicate with the servers through the use of X509 digital certificates.
6 Architectural and Engineering Specification Page 5 4. When attempting to communicate with the MSP, the control panel shall validate the identity of the MSP servers via the use of X509 digital certificates. Wide Area Network 1. Control panels shall communicate with the central ACS application servers via either the Internet or a wide area wireless network, including wireless cellular systems. 2. The wide area network (WAN) connectivity shall be provided by the MSP as integral to the ACS service. 3. In the case of wide area wireless connectivity, the ACS system shall not require the customer to install any serial communications or network wiring to connect to the customer s LAN/WAN infrastructure. 4. In the case of Internet connectivity, the ACS system shall provide an integral RJ45 connector for Category 5 Ethernet cabling to connect to the customer s LAN/WAN infrastructure. Central Data Storage 1. All customer and system data shall be centrally stored at the MSP s hosting facility. 2. All data stored at the MSP facility shall be backed up to a secondary site or to off-site storage. Redundancy 1. All servers that are essential to providing the ACS service shall be redundant. 2. All communications channels between the MSP and the WAN shall be redundant. 3. The MSP shall have a secondary set of servers that can provide the ACS service in the event of a catastrophic disruption at the primary facility.
7 Architectural and Engineering Specification Page 6 3 ACS Application The Web-based ACS application resides at a centrally hosted facility and is accessed via any standard Internet browser. A list of system functionality is presented below, followed by more detailed descriptions of key operations. 1. Provide storage of all data in a centrally hosted database, maintained by the Managed Service Provider (MSP). 2. Provide a means for the MSP to backup and restore archival data. 3. Time stamp all access and system events. 4. Allow individual account administrators to set personal time zone preferences. 5. Provide the ability for the customer to make ACS configuration changes necessary for ensuring data integrity and facility security. 6. Provide the ability for the customer to define custom schedules for the purpose of managing facility access and operating auxiliary devices. (See details in the Maintain Custom Schedules section below.) 7. Provide a robust communications protocol to the control panels so that all commands and updates to the panels are verified and will be retried if communications fail. 8. Enable account administrators to define and manage sites as well as all their access points. (See details in the Manage Sites section below.) 9. Support Tiered Administration, enabling an account to have one Master Administrator and multiple senior and/or assistant administrators. (See details in the Employ Tiered Administration section below. 10. Validate administrators access to the application and track all actions. (See details in the Track Administrator Actions section below.) 11. Maintain a database of all credentials associated with the account and the user to whom each is assigned. (See details in the Maintain Credential Database section below.) 12. Manage users who have access to the sites associated with an account, and assign those users to groups that define their access privileges. (See details in the Manage Users and Groups section below.) 13. Provide integrated, Web-based biometric support such that users can be registered to the system at the same time their biometric data is captured. 14. Maintain an Activity Log that tracks all attempts to access the sites associated with an account, including both successful and failed attempts. (See details in the Maintain Activity Log section below.) 15. Provide a Lockdown functionality that enables administrators to temporarily but instantly revoke access privileges for one or more user groups in an emergency situation. 16. Dispatch notifications to select administrators when predetermined events occur, and send daily summary reports of events to select recipients. (See details in the Generate Notifications and Daily Summaries below.) 17. Provide detailed activity reports of failed access events.
8 Architectural and Engineering Specification Page 7 Maintain Custom Schedules The ACS application shall provide the ability to define specific schedules that are editable, reusable time templates that can be used to control such things as when a door is accessible or when a device is activated. The application shall also enable the creation of holidays, periods of time during which the regular schedule is overridden. The operations associated with schedules and holidays include: Create and edit a schedule Associate a schedule with groups, floors, doors, and/or devices View a list of all groups, floors, doors and devices associated with a schedule Terminate a schedule s associations with one or more groups, floors, doors or devices Delete a schedule Create and edit a Holiday Associate a holiday with one or more schedules Associate a holiday with one or more doors Edit a Holiday s start and end date and time Delete a Holiday Manage Sites The ACS application shall enable account administrators to define and manage sites, as well as their associated control panels, doors, devices, elevators and floors. The operations associated with managing sites include: Define and manage control panels for the account Define and manage control boards Create and manage sites Add doors to a site and associate them with control panels Enable/disable the Door Ajar feature, and control the Door Ajar Threshold Define and edit an Invalid PINs Threshold and define an associated Shutdown period Define and edit a Pass-through Period Manage Request-to-Exit motion sensors Enable and disable In/Out tracking, which logs when individual users enter and/or exit specific doors Enable and disable Alarm Shunts and define Alarm Shunt Delay time Delete doors from a site Add devices to a site and associate them with control panels Define each device as a Switch, Timer, Valid Credential, or Event Track. Manage a device s output behavior Determine if and how a device should be tracked in the Activity Log Delete devices from a site
9 Architectural and Engineering Specification Page 8 Add elevators and associate them with control panels Associate each elevator with one or more sites Associate each elevator with a card reader Delete elevators Add floors to a site Define and edit an Unlock Schedule for each floor Delete floors Employ Tiered Administration The ACS application shall support Tiered Administration to enable the Master Administrator for the account to create subordinate administrators. Each administrator will have a unique logon ID that identifies that individual s permissions for viewing and editing account data. With Tiered Administration: 1. Each account shall have one and only one Master Administrator. The Master Administrator can operate on all account data, as well as view, create, edit and delete Senior and Assistant Administrators. The Master Administrator may perform all actions performed by Super, Senior and Assistant Administrators, as described below. 2. An account may have multiple Senior Administrators. Senior Administrator permissions are granted by the Master Administrator or a Super Administrator. (See definition of Super Administrator below.) Senior Administrators can operate on all account data, but cannot manage other Administrators. 3. An account may have multiple Super Administrators. Super Administrator permissions are granted by the Master Administrator or another Super Administrator. A Super Administrator is actually a Senior Administrator with super permissions. Super Administrators are Senior Administrators who can view, create, edit and delete all Administrators except the Master Administrator. 4. An account may have multiple Assistant Administrators. Assistant Administrator permissions are granted by the Master Administrator or a Super Administrator. Assistant Administrators have access to only a subset of the account data. Depending on their permissions, they may be able to view and/or manage some site and group data, but they cannot view or manage other Administrators. 5. For all Administrators, the following data shall be maintained: First Name Last Name Address Phone Time Zone Status Administrator ID Password Secret Question Secret Answer
10 Architectural and Engineering Specification Page 9 Track Administrator Actions For security reasons, the ACS application shall validate access to the application by account administrators and shall track their actions. To this extent, the application shall: Require users to supply a logon ID and a password in order to gain access to an account and its associated control panels and databases Support multiple administrators per account, each with a unique logon ID and password. Generate and display a non-editable, printable journal of all administrative actions performed on the account for the purpose of maintaining an unalterable audit trail. Maintain Credential Database The ACS application shall support the maintenance of a credential database to track all cards, PINs and fingerprint credentials associated with the account, including the user to whom each is assigned. Operations to be performed by the ACS application include: Validate that card numbers are unique, alpha-numeric, and no greater then 16 characters long. Allow multiple credentials per user. Support the creation of PIN credentials that are unique, 4 to 8 digits long, and either randomly generated by the system or selected by the user. Provide 10 user definable fields associated with user in the user database. Automatically send updated credential information to the appropriate access control panels with no other user intervention Operations performed by account administrators include: Add cards of various Bit lengths to a Card Bank (26, 34, 35, 37 with FC, 37 without FC, 40) Make and revoke card assignments Remove cards from the Card Bank Manage Users and Groups The ACS application shall provide the ability to define individual users who have access to one or more sites associated with an account, and to assign each user to a group that defines his or her access privileges. Operations that support this function include: Define a user group Edit access privileges for a group of users Grant and revoke Keypad Unlock-Hold Privileges Delete a user group Create a new user Assign a unique 4- to 8-digit PIN to a user Change a user s PIN Delete a user s PIN
11 Architectural and Engineering Specification Page 10 Assign a unique card number to a user Change user s card number Revoke a user s card number Define a user s Start Date Define a user s Termination Date Change a user s Termination Date Delete a user s Termination Date Associate and disassociate a set of fingerprints with a user s credentials using Bioscrypt Biometrics Assign a user to one or more groups Remove a user from one or more groups Delete a user Maintain Activity Log The ACS application shall track all attempts to access the sites associated with an account and maintain this information in an Activity Log that can be accessed by administrators of the account. Activity Log functionality includes: Display the Activity Log unfiltered, so that all activities are listed Display the Activity Log filtered by user, so that only those actions performed by a specific user are displayed Display the Activity Log filtered by site, so that only those actions performed at a specific site are listed Display the Activity Log filtered by door or device, so that only those actions performed on a specific door or device are listed Allow administrators to view the Activity Log by 20, 30 or 40 events per page Allow administrators to search the Activity Log Report for exception events, user events, control panel events and device events, searching by absolute date or relative days Allow administrators to search the Activity Log Report for events related to a specific door or device at a specific site Allow administrators to search the Activity Log Report for actions performed by a specific user on a specific door at a specific site. Generate Notifications and Daily Summaries The ACS application shall provide the ability to send notifications to standard accounts, pagers, and cell phones in response to various system events as described below. In addition, the application shall provide for a daily summary of the same events to be sent to select recipients. Door Ajar/Door Ajar Cleared Door Forced Open Too Many Invalid PINs Unlock Schedule Restored/Door Locked by keypad
12 Architectural and Engineering Specification Page 11 Unlock Schedule Overridden by Keypad/Door Unlocked by Keypad Door Locked by Timer Door Unlocked by Timer Failed Access by Unknown Person Failed Access by Known Person Failed access by a user within a group Successful access by a user within a group Successful access by a specific user Device Engaged/Disengaged Control Panel/Control Board Unit Opened/Closed AC Power Loss/Restoral and Battery Status Control Panel Communication Failure Account administrators shall have the ability to manage notifications and daily summaries according to functionality listed below. Create and edit notification rules specifying which administrators should receive notification of which system events Associate a schedule with each notification rule Specify the language to be used in notification s Delete notification rules Create and edit a list of administrators to receive daily summaries of system events, sorted by site, user and time of occurrence
13 Architectural and Engineering Specification Page 12 4 Control Panels The following subsections specify required control panel characteristics. Supported Readers Control panels shall support multiple card reader technologies via standard Weigand interfaces, including: Weigand effect readers Proximity readers Biometric readers Keypads (PIN) Power Requirements 1. The control panel shall be powered from a standard 120VAC, 60Hz. Outlet. 2. The control panel shall be supplied with internal battery backup, and include the following functionality related to power source. The control panel shall indicate whether it is on main or battery backup power; The control panel shall send an alarm to the central ACS application when it switches between main and battery power; 3. The control panel shall provide a notification to the central ACS application upon Power Up / Start-up / Reboot. Control Boards 1. The control panel shall support up to 14 expansion control boards, including any combination of Door Boards and Input/Output (I/O) Boards. 2. Each Door Board shall support the following inputs: Reader Interface (2) Door Closure Sensor Input (2) Request to Exit (2) Door Switch (2) Auxiliary Switch Input (2) 3. Each Door Board shall support the following output relays: Door Lock (2) Alarm Shunt relay (2) Auxiliary Relay (2) 4. Door Boards may be used to control or single door or multiple I/O devices. 5. Each I/O Board shall support up to eight input devices and eight output devices.
14 Architectural and Engineering Specification Page The Reader interface shall support the following (Weigand) lines: Circuit Wiegand DATA 0 Wiegand DATA1 RED Led Control Output 12VDC Ground Shield GREEN Led Control Output BEEPER Output Control Access Control Functions Each control panel shall: Support a Request to Exit input which energizes an associated relay in order to open a door Support an Auxiliary input which energizes an associated relay Perform local credential-based user authentication against a local database stored in FLASH memory Provide for door latch activation / deactivation via a relay output Provide Door Ajar notification with a configurable timer to define the length of time before a door is considered to be ajar Provide Door Open notification to the central ACS application via a contact closure input Provide Door Close notification to the central ACS application via a contact closure input Provide Auto Unlock notification to the central ACS application Provide for local buffering and replay of events in case of a communications failure between the control panel and the central ACS application Provide a centrally configurable Door Unlock by Schedule feature Provide a centrally configurable Holiday override feature Provide centrally configurable Door Unlock by Keypad feature Send device status to the central ACS application at least once per hour Send a notification to the ACS of unauthorized door opening
15 Architectural and Engineering Specification Page 14 5 Brivo ACS5000 Product Specifications General Features The ACS5000 is designed for multi-door installations. It supports up to 15 control boards per control panel, and an account may have multiple control panels. Other general characteristics of the ACS5000 include: Centralized control and management of all access privileges via any PC, Mac or Webenabled device Wiegand reader compatible Automatic event buffer Up-to-the-minute online updates of event transactions User-specified event notifications to , pager and cell phone contacts Up to 1,000 users/credentials per control panel Hardware Components The following hardware components are shipped with the ACS5000: Brivo ACS Control and Communications Panel, containing one Master Control Board and up to fourteen additional Door and/or I/O Boards Power supply AC Transformer 7 Ah Battery Antenna kit (wireless version only). Recommended Readers The following readers and keypads are supported for use with the ACS5000: Essex ThinLine 2x6 Stainless Steel Keypad Essex 12 Pad 3x4 Stainless Steel HID ThinLine II Switch Plate Proximity Reader. HID Prox-Point Plus Proximity Reader HID Mini-Prox Proximity Reader HID Prox-Pro Proximity Reader with Integrated Keypad HID Prox-Pro Proximity Reader BioScrypt V-Smart Biometric Reader Additional Readers Supported on Custom Basis
16 Architectural and Engineering Specification Page 15 Online Service for Account Administration There are numerous features to assist account administrators in managing access to their facilities, including: Web-based user interface, including an online Activity Log that tracks all access events Multiple administrative account passwords, and a Journal of all administrators actions on the system Immediate notification of events to specified , pager, or cell phone contacts Templates and customized time schedules, time zones and group management. Cards and PINs supported, including card bank management features. Archive history online. Service & Support To enable customers to take full advantage of the ACS5000, Brivo offers support in a variety of formats: User documentation, including a Quick Start Guide, an Administrators Manual, an Installation Manual, and a Networking Guide, all available online. Online help 24/7 unlimited use of Brivo s ACS service Toll-free telephone and customer support. One Year Warranty
17 Architectural and Engineering Specification Page 16 6 Brivo ACS 5000 Technical Specifications Control panel limit per account: Control board limit per control panel: Number of readers: Secure wireless network connection: Wiegand Reader compatibility: Wiegand Keypad compatibility: Bioscrypt Biometrics capability: Real-time reporting at Archived data: notifications & activity reports: Inputs: Relay outputs: Alarm shunting: Control panel power requirements: Battery backup: Enclosure: Dimensions: Panel to-panel wiring distance: Unlimited 14 in addition to Master Board Up to 30 per control panel, with multiple control panels per account Yes 64-bit, 37-bit, HID Corporate 1000, 26-bit, 33-bit 8-bit (Word), 4-bit (Nibble) 26-bit Yes Yes Yes Open/Closed Common, NO, NC Yes 16.5 Volt, 40 VA 12 Volt DC 7 Ah NEMA Type 1, tamper switch, key locks 6.25 (d) x (h) x (w) Unlimited due to long-range wireless networking. Not applicable for Ethernet version of panel Temperature & humidity range: Operating temperature: F (2-43 C) Humidity: Maximum 85% non-condensing Reader limit per account: Unlimited Card memory: 8,000 users/credentials per panel Antenna included (wireless only): Yes, with 16 ft. of coaxial cable & mounting bracket Warranty: One year, parts Smart cards supported: Yes, HID 1430 & 1431 contactless Smart Cards
NetGen Hardware Installation Guide. for NetGen Ethernet Door Controllers
NetGen Hardware Installation Guide for NetGen Ethernet Door Controllers 0613 Table of Contents BLUEWAVE SYSTEM OVERVIEW...2 THE WI-FI LOCK AND SECURITY COMPANY...2 NETGEN DOOR CONTROLLERS...2 INSTALLATION
More informationCreate New user - Jumps to New User page. Find a User - Jumps to User Directory. Find a Card - Jumps to card bank
1 2 3 4 Create New user - Jumps to New User page Find a User - Jumps to User Directory Find a Card - Jumps to card bank View Eagle Eye - If added to account, will jump to Eagle Eye while logged in. Change
More informationAdministrator s Manual
Administrator s Manual Legal Disclaimers Canada-Underwriters Laboratories (C-UL) Compliancy For C-UL Listed applications, the unit shall be installed in accordance with Part 1 of the Canadian Electrical
More informationAdministrator s Manual
Administrator s Manual Legal Disclaimers Canada-Underwriters Laboratories (C-UL) Compliancy For C-UL Listed applications, the unit shall be installed in accordance with Part 1 of the Canadian Electrical
More informationAdministrator s Manual
Administrator s Manual Legal Disclaimers Canada-Underwriters Laboratories (C-UL) Compliancy For C-UL Listed applications, the unit shall be installed in accordance with Part 1 of the Canadian Electrical
More informationREQUIREMENTS FOR WIRELESS, WEB-BASED MONITORING EQUIPMENT AND SERVICES FOR PUMP STATION APPLICAITONS
REQUIREMENTS FOR WIRELESS, WEB-BASED MONITORING EQUIPMENT AND SERVICES FOR PUMP STATION APPLICAITONS MANUFACTURER REQUIREMENTS The Manufacturer of the equipment and provider of related services shall provide
More informationADMINISTRATOR S MANUAL 02/27/2019
ADMINISTRATOR S MANUAL 02/27/2019 Legal Disclaimers Canada-Underwriters Laboratories (C-UL) Compliancy For C-UL Listed applications, the unit shall be installed in accordance with Part 1 of the Canadian
More informationPW6000 Modular Access Control System PW6000 Intelligent Controllers and Modules
Modular Access Control System The next generation of the PW-Series family improves on the existing PW technology to offer superior features and benefits. The PW-Series Modular Control System is an advanced
More informationACTPRO ACCESS CONTROL. Specification Guide
ACTPRO ACCESS CONTROL Specification Guide Table of Contents Glossary of Terms... 2 General System Specification Overview... 3 Hardware Requirements... 4 Four Door IP Controller... 4 Two Door IP Controller...
More informationProximity Card and Pin Reader Installation Manual
Multi Prox Proximity Card and Pin Reader Installation Manual PUBLICATION INFORMATION 60A9 - Draft Release Version 0.1.2 71D0 - Version 1.0.5 CONTENTS Introduction... 1 Legend... 2 Terminology... 2 Mounting...
More informationPRO3200 Professional Modular Access Control Hardware
PRO3200 Access Control Hardware As a part of the WIN-PAK software controlled hardware family the PRO3200 professional modular access control hardware is an advanced access control panel capable of providing
More informationFirst Access Express OPERATOR GUIDE
First Access Express OPERATOR GUIDE October 2016 Cutting edge simplicity Table of Contents Introduction... 4 PC Requirements... 5 Step 1. Software Installation... 5 Complete Installation Server and Client...
More informationBRIVO ONSITE QUICK START GUIDE 09/14/17
BRIVO ONSITE QUICK START GUIDE 09/14/17 Welcome to the The intent of this document is to get the Brivo Onsite system up and running as quickly as possible. Please consult the Administrator s Manual for
More informationPRO2200 Professional Modular Access Control Hardware
PRO2200 Access Control Hardware As a part of the WIN-PAK software controlled hardware family the PRO2200 professional modular access control hardware is an advanced access control panel capable of providing
More informationINSTALLATION INSTRUCTIONS 921P EntryCheck TM
80 Avenida Acaso, Camarillo, Ca. 90 (805) 494-06 www.sdcsecurity.com E-mail: service@sdcsecurity.com INSTALLATION INSTRUCTIONS 9P EntryCheck TM The EntryCheck 9P Indoor/Outdoor Keypad is a surface mount
More informationFACIAL RECOGNITION TERMINAL SYSTEM
StoneLock is a global leader in designing and manufacturing secure access control solutions. We are proud to build and design the most secure, reliable and user-friendly access control products for both
More informationKeyWatcher Illuminated Specifications
I N C O R P O R A T E D HARDWARE: System sizes, available to handle up to 15 cabinets. Standard cabinet sizes: Large Cabinet: (up to 96 keys) Small Cabinet: (up to 48 keys) (27 ½ w x 29 ½ h x 9 ¾ d) (20
More informationto that area and whether or not the Cardax FT GBUS URI (Standard or person holds these competencies. Wiegand variant)
The Cardax FT Controller 6000 is a powerful modular, intelligent field controller for processing, storing and communicating large amounts of data in real time, independently of the Cardax FT Command Centre
More informationACX Series. Access Controller for Ethernet
Access Controller for Ethernet The controllers are the industry s most powerful all-in-one access controllers designed for both critical government and private sector security applications. 0 Features
More informationT h e re is an upgrade route to larger configurations. O v e rv i e w
AMAG 625 Lite Overview AMAG 625 Lite Softwar e AMAG 625 Lite Software is very user friendly and incorporates best of breed functionality including: Comprehensive on-line help Dynamic Maps Flexible card
More informationLiteKeeper 4. Stand Alone Lighting Control Panel Technical Specifications PART 1. GENERAL 1.01 INTRODUCTION 1.02 DESCRIPTION OF WORK
LiteKeeper 4 Stand Alone Lighting Control Panel Technical Specifications PART 1. GENERAL 1.01 INTRODUCTION The work covered in this section is subject to all of the requirements in the General Conditions
More informationController Cardax FT Controller The CardaxFT Controller 5000 is the intelligent field controller in the CardaxFT security system.
The features described in this data sheet are being progressively added to the CardaxFT Controller (5000 Series) during 2002/2003. Please contact Cardax for further information. Cardax FT Controller 5000
More informationWRI400 WIRELESS READER INTERFACE
WRI400 WIRELESS READER INTERFACE Technical Services Training for the WRI400 Launched April 2011 March 12 Technical Services Engineering Support 1 Training Overview WRI400 Description Information Installation
More informationINSTALLATION INSTRUCTIONS 920P EntryCheck TM
801 Avenida Acaso, Camarillo, Ca. 93012 (805) 494-0622 www.sdcsecurity.com E-mail: service@sdcsecurity.com INSTALLATION INSTRUCTIONS 920P EntryCheck TM The EntryCheck 920P Indoor/Outdoor Keypad is a surface-mount
More informationController 3000, dependent on reader technology and site configuration. All I/O functionality is provided on the Controller 3000.
The features described in this data sheet are being progressively added to the CardaxFT Controller during 2002/2003. Please contact Cardax f further infmation. Cardax FT Controller 3000 Cardax FT Controller
More information2010 Product Line Catalog
2010 Product Line Catalog emerge Embedded Software Systems w Part of Access SySTEM From enterprise-wide security management to small and mid-size access control, Linear s IEI brand has a choice of, giving
More informationBuilding Technologies. Access Control SiPass networked - simple & networkable for everyday use
Building Technologies Access Control SiPass networked - simple & networkable for everyday use SiPass networked Innovative access control SiPass networked is part of the SiPass product range for use in
More informationBrowser Managed Security With No Software Installation
Browser Managed Security With No Software Installation Sonitrol eaccess is an Integrated Security Management System with embedded software. It combines powerful systems integration with an easy-to-use
More informationBRIVO ONAIR RELEASE NOTES
BRIVO ONAIR RELEASE NOTES Brivo Onair 11.40.1 04/03/2019 This release of Brivo Onair addresses a minor bug fix. Corrected a browser incompatibility issue. Brivo Onair 11.40 03/26/2019 This release of Brivo
More informationNetAXS. Hosted Video Services. Cloud Hosted Access Control. Retail Professional Services Convenience
Hosted Video Services NetAXS Cloud Hosted Access Control NetAXS is now integrated with MAXPRO Cloud. MAXPRO Cloud is a fully integrated Access Control and Video Security as a service platform. Ideal for
More informationAccess Easy Controller V 1.0
Systems Access Easy Controller V 1.0 Access Easy Controller V 1.0 Supports access readers compliant with industrial Wieg format 4 access readers expable to 16 access readers Card Capacity up to 20,480
More information6222 Two Door Module Technical Operations Manual
6222 Two Door Module Technical Operations Manual TABLE OF CONTENTS Specifications...3 Overview...4 Operations...5 Custom Access Mode...5 Standard Access Mode...5 Offline Access Mode...5 Offline Memory...5
More informationAccess Easy Control System. Reference Guide
Access Easy Control System Reference Guide Content 3 1. AEC System Overview 4 2. AEC Main Components 6 3. AEC Configuration 7 4. AEC Benefits 8 5. AEC Easy Ordering 10 6. AEMC More than 16 readers? 12
More informationInstallation & User Manual
Contents Installation Instructions 3 Installation Diagrams 4 System Overview 6 Wiring Diagrams 8 Network Diagrams 9 Operation Instructions Fingerprint Enrollment 12 21 Wi-Enterprise Controller www.transmittersolutionssmart.com
More informationNetAXS. Cloud-Hosted Services. Cloud Hosted Access Control. Retail Property Management Franchises
Cloud-Hosted Services NetAXS Cloud Hosted Access Control NetAXS is now integrated with MAXPRO Cloud. MAXPRO Cloud is a fully integrated Access Control and Video Security as a service platform. Ideal for
More informationEdge Device with Brivo ACS Plug-in for WebServices and OnSite SE. Quick Start Guide
Edge Device with Brivo ACS Plug-in for WebServices and OnSite SE Quick Start Guide Document Number: ENG-DOC-110 May 1, 2008 Legal Disclaimers Canada-Underwriters Laboratories (C-UL) Compliancy For C-UL
More informationmultinode M2150 INTELLIGENT CONTROLLERS
multinode M2150 INTELLIGENT CONTROLLERS SYSTEMS ACCESS CONTROL KEY FEATURES: - Modular mix and match configuration - Connects to Symmetry management software via LAN, WAN, RS232 or Modem - Each M2150 can
More informationPortals 14 What is a portal? 14 Hardware 15 RS232 to RS USB to RS TCP/IP to RS Add a Serial Portal 16 Add a Network portal 16
PROS LITE User Manual Version 2.0.0 www.visual-plus.com Table of Contents Getting Started 5 Starting PROS Lite 5 Create a Portal 5 Adding a control panel 6 Adding a user 7 Upload users to a controller
More informationDelivered the Way Yo u Want
SENSAPHONE IMS-4000 Infrastructure Monitoring System Mo nito r What Yo u Want Delivered the Way Yo u Want THE SENSAPHONE IMS-4000 MONITORS AND REPORTS THE INFORMATION THAT YOU NEED TO KNOW: Get critical
More informationNetAXS-123: One door, compact (plastic) enclosure. NetAXS-123: One door, standard (metal) enclosure with tamper switch and terminal block
Honeywell s web-based access control offering now provides solutions for installations of any size. NetAXS enables users to manage their system anywhere there s an Internet connection with no dedicated
More informationThis is Cansec s 25th anniversary. Many of
This is Cansec s 25th anniversary. Many of their employees have been there for the entire ride. Something more interesting is that some of their products have been in the field working for the full 25
More informationArchitecture & Engineering Specifications
Architecture & Engineering Specifications Page 2 Legal Disclaimers Canada-Underwriters Laboratories (C-UL) Compliancy For C-UL Listed applications, the unit shall be installed in accordance with Part 1
More informationAccess Easy Controller 2.1
Systems Access Easy Controller 2.1 Access Easy Controller 2.1 4 access Wiegand readers expandable to 16 Capacity up to 20,480 card holders and 100,000 transactions Classify cardholders based on 254 access
More informationU-FLASH Setup Guide U-FLASH.
U-FLASH Setup Guide Thank you for purchasing the U-FLASH. This guide will assist you in the setup of the system. You can call for FREE technical support to get help anytime at 757-258-0910. Please note,
More informationCA-A480-A Elevator Controller. Reference & Installation Manual
CA-A480-A Elevator Controller Reference & Installation Manual TABLE OF CONTENTS INTRODUCTION.................................................................. 4 Introduction.............................................................................................
More informationCardax FT Series 3 Command Centre
SERIES 3 Series 3 Command Centre Command Centre Series 3 Command Centre is the system software, supporting up to 64 doors, for Series 3 - an effective access control and alarms management security system.
More informationDIGITUS BIOMETRICS PRODUCT GUIDE 2013
DIGITUS BIOMETRICS PRODUCT GUIDE 2013 When it comes time to requesting a quote or design assistance, you can submit your request by email to sales@digitus-biometrics.com or call us direct at 912.231.8175.
More informationInstallation & User Manual V2.08
YOUR SECURITY IS OUR PRIORITY Other products from GSD Contents Installation Instructions Installation Diagrams System Overview Wiring Diagrams Network Diagrams Operation Instructions Fingerprint Enrollment
More informationISC GB-XX ISC GB-XX ISC GB-XX ISC GB-XX
ISC910-1-0-GB-XX ISC911-5-0-GB-XX ISC920-0-0-GB-XX ISC921-5-0-GB-XX The ImproX IXP20 is a fully featured, stand-alone Access Control System supporting up to 1 000 Tagholders and 5 000 transactions. Designed
More informationFinger Vein Access Control device Quick Start Guide Version: 1.0 Date: June USB slot. USB slot
Overview Fingerprint & Finger Vein Device Front Left Side: Finger Vein Device Touch screen Card reader Fingerprint reader Finger vein reader Finger vein sensor: During registration, after finger touches
More informationApril 2015 PRICE SCHEDULE A 2.0 Stand-Alone Access Control
Section A6 This Price Schedule is effective April 1, 2015. Date Page Comment 4-1-15 All April, 2015 Price Schedule update. 5-8-15 3 Removed model 1503. Added models 1509 / 1515 (Pg 15) to the TOC. 8-10-15
More informationGV-AS200 Controller. Hardware Installation Guide
GV-AS200 Controller Hardware Installation Guide Before attempting to connect or operate this product, please read these instructions carefully and save this manual for future use. 2008 GeoVision, Inc.
More informationConnecting a Cisco Output Module
CHAPTER 5 Overview The optional Cisco Output Module (Figure 5-1) is attached to a Cisco Physical Access Gateway or Cisco Reader Module to provide additional connections for up to 8 outputs, each of which
More informationAccess control panel U-Prox IC E (Elevator control)
1.003 Access control panel U-Prox IC E (Elevator control) Installation and programming manual About this document http://u-prox.com This manual covers installation, adjustment and use of U-Prox IC E (hereinafter
More informationTDSi EXpert type door controllers offer a fully featured door controller with up to 48,000 card memory.
1 EXpert Based Access Control System - Overview TDSi EXpert type door controllers offer a fully featured door controller with up to 48,000 card memory. EXpert2 is capable of controlling 2 doors with the
More informationSynergis Master Controller 2.2 Integration Guide for Axis Interface Modules
Synergis Master Controller 2.2 Integration Guide for Axis Interface Modules This guide supplements the Synergis Master Controller Configuration Guide and explains how to configure Axis interface modules
More informationSTANLEY MANUFACTURED ACCESS CONTROL ACCESS STARTER KIT EASY-TO-USE AND HIGHLY RELIABLE ACCESS CONTROL
STANLEY MANUFACTURED ACCESS CONTROL ACCESS STARTER KIT EASY-TO-USE AND HIGHLY RELIABLE ACCESS CONTROL 1 Access Control Starter Kit in-a-box 3 2 5 SIMPLE... EVERYTHING YOU NEED FOR A COMPLETE SYSTEM SCALABLE...
More informationConnecting a Cisco Input Module
CHAPTER 4 Overview The optional Cisco Input Module (Figure 4-1) is attached to a Cisco Physical Access Gateway or Cisco Reader Module to provide additional connections for up to ten input devices. Each
More informationElectrical Demand Specification (Reference SOP: )
Project: Equipment Description: Location: Equipment No.: Project No: Protocol No.: Content Index 1. GENERAL...3 Design Standards...3 1.1. Standards...3 2. DESIGN...3 2.1. Safety...3 2.2. Circuit protection...3
More informationIPassan Installation guide
IPassan Installation guide 1 Content 1 Overview... 3 1.1 Features... 3 1.2 Hardware... 3 1.2.1 s... 3 1.2.2 Extra modules... 5 1.3 IPassan manager... 7 2 Installation... 7 2.1... 8 2.1.1 Power supply...
More informationDigitus Biometrics Product Guide
Digitus Biometrics Product Guide 2014 When it comes time to requesting a quote or design assistance, you can submit your request by email to sales@digitus-biometrics.com or call us direct at 912.231.8175.sales@digitus-biometrics.com
More informationINSTALLATION INSTRUCTIONS
LIGHTING CONTROL PANELS 16 AND 24 RELAYS INSTALLATION INSTRUCTIONS INSTALLATION OVERVIEW The installation instructions contained in this document are provided as a guide for proper and reliable installation.
More informationVTC. 200/300 Series. VTC elock controller. VTC elock Instructions. Network VTC elock has three components:
200/300 Series VTC elock Instructions VTC Thank you for purchasing the VTC elock. The information contained in these instructions is intended to serve as a guide so as to allow the elock to be quickly
More informationACTpro Single Door IP Controller. Operating & Installation Instructions
ACTpro 1500 Single Door IP Controller Operating & Installation Instructions 18-00079 Issue 1 This manual refers to the ACTpro 1500 a TCP/IP based control unit supporting up to 32 doors. Access Control
More informationNX21 USER MANUAL. Telemetry Unit. Version 1.5
USER MANUAL Version 1.5 Nortech Management Ltd, United Kingdom NOV 2016 www.nortechonline.co.uk Doc Ref D_000344 Publication Notice Copyright Nortech Management Limited (NML). All rights reserved. No part
More informationSYMMETRY MULTINODE M2150 INTELLIGENT CONTROLLER
MULTINODE M2150 MULTINODE M2150 INTELLIGENT CONTROLLER The multinode M2150 range of controllers provides distributed intelligence for your access control system and ensures complete system security, resilience
More informationUC-2000 Installation Manual Unicorn Computers Technology Limited
UC2000 Installation Manual Copyright 2003. All rights reserved. Table of Contents Specifications 2 Enclosure for the UC2000 Controller 3 Unicorn Access Control System Configuration 4 UC2000 Controller
More information4 balanced inputs 1 relay output
Cardax FT Controller 5000GL provides flexible system architecture with options of GBUS and LOCAL BUS communications to field devices, to meet a wide range of site requirements. Cardax FT Controller 5000GL
More informationEntryphone. PinNet 4. Product manual. October 2010 R Granville Road, London SW18 5SD
Entryphone PinNet 4 Product manual October 2010 R4.9 www.entryphone.co.uk 23 Granville Road, London SW18 5SD This document covers the installation and use of the Entryphone on-line PinNet door control
More informationThe Cardax FT Controller 6000 can support up to 16 GBUS devices.
The Cardax FT Controller 6000 is a powerful modular, intelligent field controller for processing, storing and communicating large amounts of data in real time, independently of the Cardax FT Command Centre
More informationEC-11 Ethernet Converter
EC-11 Ethernet Converter PSTN Contact ID to TCP Converter Installation and Operations Manual Version 8.H3.MID 1 Table of Contents About EC-11 Ethernet Converter... 3 Circuit Board Layout and Wiring Diagram...
More informationFirst Access OPERATOR GUIDE
First Access OPERATOR GUIDE June 2018 Cutting edge simplicity Table of Contents Introduction...4 PC Requirements...5 Step 1. Software Installation...5 Step 2. Host Server Definition...9 Step 3. Panel and
More informationControl Panel Solutions
HONEYWELL ACCESS SYSTEMS Control Panel Solutions Honeywell s control panel solutions have been the reliable choice of dealers for many years. Our controllers are the benchmark of the industry and offer
More informationA-1300 Biometric Access Control System USER'S MANUAL
A-1300 Biometric Access Control System USER'S MANUAL Table of Contents 1. General Information... 1 1.0 Notification... 2 1.1 System Overview... 2 1.2 Main Features... 2 1.3 Equipment... 3 2. Basic Concepts...
More informationTECHNOLOGY SOLUTIONS BRIEF
TECHNOLOGY SOLUTIONS BRIEF Sponsored by How a Credential is Read In this Paper Knowing more about access technologies work can help you evaluate your choices in this area Learn to better understand how
More informationPRT-RDS2 Standard 2 Reader Expander
PRT-RDS2 Standard 2 Reader Expander Installation Manual CONTENTS Protégé System... Introduction... Reader Expander... Features... Reader Expander Specifications... Protégé System Management Suite... Protégé
More informationGLOSSARY. See also: Access point
GLOSSARY A Access level A set of access points, each with a corresponding time schedule, that determine where and when a badge holder has permission to pass through an access point. See also: Access point
More informationTAC I/NETTM 1284, 1280, Security Control Unit
TAC I/NETTM The SCU () family of modular, stand-alone controllers are basic building blocks of the I/NET Seven Security Management System, and provide a flexible mix of door control and alarm monitoring
More informationINSTALLATION INSTRUCTIONS 920 EntryCheck TM
801 Avenida Acaso, Camarillo, Ca. 93012 (805) 494-0622 www.sdcsecurity.com E-mail: service@sdcsecurity.com INSTALLATION INSTRUCTIONS 920 EntryCheck TM The EntryCheck 920 Indoor/Outdoor Keypad is a surface-mount
More informationSNAP, CLICK, DONE. Getting Started Guide
SNAP, CLICK, DONE. Getting Started Guide Introducing Sateon Advance Sateon Advance offers a flexible new approach to access control, with a new range of hardware and software products. The hardware is
More informationCLIQ Remote - System description and requirements
CLIQ Remote - System description and requirements 1. Introduction CLIQ Remote - Access at a distance CLIQ Remote is an electromechanical lock system with an additional level of security and flexibility,
More informationQuick Start Installation Guide
apc/l Quick Start Installation Guide Version A2 Document Part Number UM-201 May 2010 OVERVIEW The apc/l is an intelligent access control and alarm monitoring control panel which serves as a basic building
More information2000 Series e/em Style Keypad Installation and Programming Manual
2000 Series e/em Style Keypad Installation and Programming Manual Document Number: 6054022 Revision: 0 Date: 12/21/06 Table of Contents Table of Contents Section 1: Introduction... 6 1 Product Description...6
More informationACTpro 1500 Single Door IP Controller
ACTpro 1500 Single Door IP Controller ACTpro 1520 Single Door IP Controller with 12 V DC 2 amp power supply. Operating & Installation Instructions 18-00085 Issue 2 This manual refers to the ACTpro 1500
More informationIPS125T. TimeIPS Network Clock and Keypad. Installation Guide
IPS125T Network Clock and Keypad Installation Guide including instructions for IPS125T-B Touch and IPS125T-O Optical Biometric Fingerprint Reader Options FCC Declaration of Conformity (DoC) Compliance
More information1. General Description
ipio-2, ipio-8, ipio-16 Monitor and Control of Digital I/O 1. General Description The ipio is a network attached, web enabled digital input and output device. The ipio can be controlled and monitored with
More informationRitenergy Pro. Access Control Systems. Manual Programming Guide. (Firmware Version 3.XX) 1 Introduction Programming Guide ritelock.
Ritenergy Pro Access Control Systems (Firmware Version 3.XX) Manual Programming Guide 2010 Ritenergy International, LLC All Rights Reserved 1 Introduction Programming Guide ritelock.com INTRODUCTION The
More informationACCESS CONTROL SYSTEM
ACCESS CONTROL SYSTEM System versions Standalone controllers series based on integrated models KZ-400, 500, 600, 700, KZC-300,800, 900 KaDe Lite system based on integrated controllers KZ-1000 KaDe Premium
More informationInstallation Instructions (KF-2000)
VERSION 2005. 10 Installation Instructions (KF-2000) Keico Hightech, Inc. Installation Instructions KF-2000 Keico Hightech Ace Twin Tower I 12 th FL 212-1, Guro-Dong, Guro-Gu Phone +82-2-853-9000 Fax +82-2-830-7809
More informationPage 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES
002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission
More informationAC-115 Compact Networked Single-Door Controller Hardware Installation and Programming
AC-115 Compact Networked Single- Controller Hardware Installation and Programming Copyright 2013 by Rosslare. All rights reserved. This manual and the information contained herein are proprietary to REL,
More informationDFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017
DFARS 252.204-7012 Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017 As with most government documents, one often leads to another. And that s the case with DFARS 252.204-7012.
More informationWeb-based Access Control System. Lower Cost of Ownership
Web-based Access Control System NetAXS-123 Hybrid Access Control Panel Honeywell s web-based NetAXS controller provides solutions for installations of any size. NetAXS-123 enables users to securely manage
More informationSecured Series: Hub Plus Kit Single Door Controller Package Installation Manual
Secured Series: Hub Plus Kit Single Door Controller Package Installation Manual This package is designed to simplify the connections to our Secured Series Hub Plus Controller. This will translate into
More informationPRT-PX16 16 PGM Output Expander
PRT-PX16 16 PGM Output Expander Installation Manual CONTENTS Protégé System Introduction... PGM Expander... Features... PGM Expander Specifications... Protégé System Management Suite... Protégé Modules...
More informationA&E Specifications RoadRunner Video Surveillance Systems for Public Transit and Rail Applications
RoadRunner Video Surveillance Systems for Public Transit and Rail Applications Version 1.7 A. Digital Video Recorder (DVR) System: 1. The system shall be provided in compatible and interchangeable formats
More informationPartizan PAB-FC2. Fingerprint scan time Fingerprint identification time. <0.5 s < % <0.0198% Ingress protection rating
1. Features & Technical Parameters 1.1 Features: Partizan PAB-FC2 Metal vandalproof housing Secure and reliable biometric fingerprint recognition Simple for using, wiring can be done by a user without
More informationLinear emerge E3-Series Access Control
Linear emerge E3-Series Access Control Market Leading - Embedded Browser Access Control Platform emerge Essential & Elite 1 to 200 Doors Access Control Made Easy Affordable, Scalable, Browser-Based Access
More informationOperation manual For NG BIOSINGLE Version 1.1
Operation manual For NG BIOSINGLE Version 1.1 SMART-I ELECTRONICS SYSTEMS PVT. LTD.(An ISO 9001:2008 certified company) R&D, Training & Customer Support Center: First Floor, Arihant Plaza Phase II, Village-Ovala,
More informationVICON ACCESS CONTROL CONTROLLERS
VICON ACCESS CONTROL CONTROLLERS Also available in white Over-the-Door Controller Master Controller Multi-Door Kit Elevator/IO Controller Product at a Glance The Vicon Access Control (VAX) system consists
More information