Access Control for. Part 2 of 4. Brought to You by. Presented by Video Security Consultants

Size: px
Start display at page:

Download "Access Control for. Part 2 of 4. Brought to You by. Presented by Video Security Consultants"

Transcription

1 2008 Video Security Consultants Brought to You by Presented by Part 2 of 4 A1

2 Part 2 of 4 Hardware Choices MADE EASY Security contractors have layers of technology to consider when designing an electronic access control system. Depending on end user needs and budget constraints, solutions will involve entry point controls, multitechnology credentials, system configuration concerns and more. BY STEVEN O. GIBBS W elcome to the latest of Security Sales & Integration s acclaimed D.U.M.I.E.S. series: Access Control for D.U.M.I.E.S. Brought to you by Pelco, this four-part series has been designed to educate readers about electronic access control system (EACS) design and implementation. D.U.M.I.E.S. stands for dealers, users, managers, installers, engineers and salespeople. In Part 1 of this year s series (see Rudiments of System Design in the March issue), we covered the goals of system design, the process of preparing an accurate site survey, considerations for system communications, along with some discussion of final design end-product documents. The second installment of this series will explore the hardware components of an EACS, including system controllers, credential readers and entry point locking devices. Our discussion will center on the fictional small facility floor plan ( American Products, Pomona Facility ) introduced in Part 1. It would be beneficial to visit SSI s Web site ( and download the site survey describing this facility from the D.U.M.I.E.S. series section in the Special Reports link. A2

3 Small Facility Floor Plan Employee entrance Shipping/receiving storeroom Production Servers Sales Conference Administration Main (visitor) Entrance Depicted is a layout and operations within a modest-sized facility. When devising an electronic access control system (EACS), systems integrators should always account for the likelihood the end user will one day request the solution be expanded. Problems occur when the EACS can only support a limited number of access points. KEEP SYSTEM EXPANSION IN MIND Before selecting any EACS hardware, the systems integrator should consider system expansion. It is not uncommon for an EACS to grow from a four- or 16-door system to a 50- or 100-door system within a very short time frame. In fact, many systems continue to grow beyond the 500-reader mark. Even the American Products, Pomona Facility example application has demonstrated expansion opportunities. And what happens if American Products purchases another firm or adds more production facilities around the country? Expansion is normally a good thing for the systems integrator as the end user will be returning again and again asking for additions, usually in small increments, to the system. The problem occurs when the systems integrator implements an EACS hardware (or software) solution that can only support 32, 64, or 128 access points. Try explaining to the end user that in order to add one more card reader all of the existing intelligent control panels will need to be replaced. Ideally, the systems integrator will select a hardware platform that is not restricted in the physical number of devices supported on one system. This has the added benefit of becoming proficient with a single type of system suitable for the smallest to the largest project reducing training and support expenses within the systems integrator s firm. Software platforms are also sensitive to expansion, so we ll discuss this again in Part 3 of this series. THE BASICS OF SYSTEM CONFIGURATION In its simplest form, an EACS can consist of a single credential reader designed to be programmed with a user PIN, credential number or biometric template, and operate independently of any other device. If several standalone devices are placed throughout the facility, the system manager will need to take a programming device to each unit in order to update the database of authorized credential holders. Additional feature sets can be added to the standalone credential reader to allow the unit to store transactions associated with the granting or denying of access to the entry point. In very basic systems, the system manager must visit each entry point to upload transactions to the programmer or memory card that can later be connected to a PC for review and storage. In more advanced standalone devices, a printer output can be connected to a remotely located transaction logging printer. Very recently, entry control devices have become available with a Web server application built into the controller. Utilizing TCP/IP and either a control panel network or the corporate enterprise network, these controllers can be administered with any PC connected to that same network and running any popular Web browser application. Bear in mind, even if several standalone controllers were placed on the same network, they would still be considered operating in standalone mode since each device would have to be administered independently. For instance, a new credential number would need to be added by establishing a connection to each device, one at a time. However, when entry control devices are connected together, and programmed with some form of software solution capable of administering a global database and downloading appropriate data to each controller, the result is a configuration known as host system with distributed processing. How does this explanation of system configuration, and our previous discussion about system expansion, apply to the example facility in the Small Facility Floor Plan diagram above? Assume as a systems integrator you are approached by the future system manager at American Products to provide a very basic EACS. The end user wants to apply entry control to the employee entrance and storeroom door. As a seasoned integrator you recognize several other entry control points that would benefit from a larger EACS application, however, the end user s budget is limited and they are only interested in T o view the fictional small facility floor plan American Products, Pomona Facility, visit Security Sales & Integration s Web site ( and download it from the D.U.M.I.E.S. series section in the Special Reports link. A3

4 two doors. Here it becomes very important to select and implement a system that can be easily expanded. You recommend a solution consisting of two standalone readers with a handheld programmer. The system manager programs the employee entrance to accept all employees during regular business hours and a limited number 24/7. The storeroom door is programmed to allow access to limited employees only. Very shortly after the system is installed and operational, the facility manager thinks it would be a great idea to add a gate operator and card reader in the parking lot to create an executive parking area. Suddenly money becomes available and you are called back to expand the system. Now the system manager goes out to the gate to program the card numbers of the six or eight managers and supervisors working at American Products. Soon the production manager sees how effective controlling access to the production area can im- prove management of this vital area and contacts you to add another reader. Then the sales manager makes a request for another reader, and so on. Is the picture becoming clear? Along about here the system manager is complaining about having to go to each door to make programming changes, let alone the time it takes to upload transactions in order to audit who went where and when. The systems integrator is called back in, this time to develop a comprehensive plan. Since the system selected and installed can be networked, it becomes fairly easy and inexpensive to move this system from several standalone readers to a host-based system with distributed processing. RIDING THE ICP WORKHORSES The real workhorses in any standalone or host system with distributed processing are the intelligent control panels (ICPs). During the past two decades when system data, transaction 2-Reader/Door Intelligent Control Panel 4-wire comm. loop ROM (firmware) RAM (database) 4-wire comm. loop Intelligent control panels (ICPs) make local decisions on access requests and can store or upload transaction records back to a programming device or host computer. At one time the most popular configuration for an ICP was the two-reader/door panel. decision-making, and transaction processing first moved from host mini computers out to the field devices (distributed processing), ICP configurations and processing power have evolved to result in several general formats. Since each of the major configurations are still produced and operational (and many out of production are still operating in legacy systems), we will discuss them all. In the earliest form, the ICP contained a central processing unit (), operating system loaded in firmware (ROM), and random access memory (RAM) storage allowing EACS configuration data such as time zones, holidays, scheduled events and credential numbers to be downloaded in the ICP memory. With this information the ICP can make local decisions on access requests and store or upload the transaction record back to the programming device or host computer. Until about 10 years ago the most popular configuration for an ICP was the two-reader/door panel. The readers could either be in/out devices on a single entry control point or two, nearby entry control points (see 2-Reader/ Door Intelligent Control Panel, left). Keeping the ICP relatively close (under 500 feet) from the entry control point is important because of the number of conductors (usually in separate ) needed between the ICP and the entry control point in order to operate the lock, monitor door status, and with the credential reader. ICPs communicate with the host computer using a two- or four-wire control panel network (CPN) such as RS485 or 20ma current loop. In recent years, ICPs have sprouted Ethernet ports in order to connect to the corporate LAN/WAN. Further discussion of this trend will take place in Part 4 of this series. As systems expanded to include greater numbers of entry points clustered closer together, ICPs controlling eight, 16 or 32 entry points from a central location became available. Since multiple from this central box A4

5 ICP With Reader/Door Interface Panels Ethernet LAN/WAN 2-or-4-Wire RS485 panel network ROM (firmware) RAM (database) and programming with the EACS host computer connected to the same network. Edge devices also incorporate power over the Ethernet (PoE) capabilities to eliminate the need for a power supply at the entry control point. So which configuration is right for the American Products commercial setting (see Small Facility Floor Plan on page A3)? In order to make that determination, the systems integrator must take the following factors into consideration: Component costs Wiring/cabling costs support Ease of expansion The systems integrator must become familiar with how each of the possible configurations of ICPs will impact the above factors, then make a system selection based on the best solution for the project. Door 1 Door 2 to each entry point can be expensive, the next logical form of ICP configuration places an ICP that can process transactions from up to 64 entry control points in a central location and communicates on an EACS subnetwork with less intelligent reader/door panels located near each entry control point (see ICP With Reader/Door Interface Panels, above). This reduces cabling requirements and allows for easy expansion. In most cases, a single panel will support one or two readers and doors. Additional panels contain input points for monitoring other devices or relay outputs for controlling auxiliary functions. Door (up to 64) As systems expanded to include greater numbers of entry points, ICPs controlling eight, 16 or 32 entry points from a central location became available. Up to 64 entry control points became possible with the deployment of subnetwork s. The latest evolution of the ICP comes to us in the form of the edge device. This term (borrowed from the IT world) simply means that the processing work of the ICP has been pushed out right to the edge of the EACS. Edge-style ICPs contain much (but not all) of the processing power of a typical ICP along with the credential reader and door lock relay to control a single entry point (see Edge Devices on page A6). Edge devices are equipped with an Ethernet port and TCP/IP communication capability so they can be connected directly to an existing local or wide area enterprise network (LAN/ WAN) allowing remote administration CREDENTIAL READERS TO CONSIDER So far, we have not yet discussed where the rubber meets the road in the EACS: credential readers. Volumes have been, and are yet to be, written about the virtues of both existing and evolving personal credential technologies. The discussion that follows should be considered only an introduction to the subject, using generalities rather than specifics. First, understand that the choice of card and reader technology is mostly irrelevant to the aspects of system configuration and hardware technology explained so far. This is in large part due to the popularity of one of the first card formats developed specifically for the then emerging access control industry more than 30 years ago Wiegand. In the early days of access control it was not uncommon for a manufacturer to offer only one type of card technology with their product, which would communicate in a proprietary way only with their ICP. However, Wiegand technology and readers, licensed for use and A5

6 manufactured by a third party, became a very popular choice for both EACS manufacturers to include with their systems and end users to implement. It only made sense that developers of new readers and card technologies, including biometric readers, would incorporate the Wiegand into their products. Simply put, a device using a Wiegand or format will present its data to the ICP or reader/door panel in a form that looks like a card read from a Wiegand reader and card. This not only allows retrofitting of new credential reader technologies to an existing EACS, but also allows new EACS hardware to utilize an ever-growing selection of credential readers (even those not yet imagined) and provides the systems integrator a way to better match system configuration and credential technology to the end user s needs. Following is a more detailed look at credential technologies: Magnetic stripe Although considered by some to be unsecure, advancements in the past 15 years have made magnetic stripe (magstripe) technology popular due to its ability to provide reliable, end-user encoded photo Edge Devices switch ID access cards at reasonable cost to large cardholder systems. However, as a contact technology the magnetic stripe will eventually wear out and require replacement. Wiegand Wiegand cards and readers are popular due to a balance between encoding security and cost. Although this is a swipe technology, the Wiegand module of twisted and tuned wires is embedded between the card laminates resulting in a pseudo contactless read process for much longer card life. Unfortunately, early encoding implementations resulted in a limited number of unique customer/facility codes and unique card numbers within each of those codes. This problem has been resolved in newer cards and readers by increasing the number of bits available for encoding data. Proximity In recent years the popularity of proximity or RFID (radio frequency identification) card technology has grown tremendously, and a wealth of new products and formats have been introduced to meet demand. Although proximity readers almost exclusively use the Wiegand to connect to ICPs, the Ethernet network backbone Edge-style intelligent control panels (ICPs) contain the majority of the processing power of a typical ICP, plus the credential reader and door lock relay to control a single entry point. Ethernet ports allow for connection to an existing LAN or WAN. Database Database Database wide variation in operating characteristics makes it necessary to describe this technology in only the most general terms. Proximity cards use a very highly secure encoding method that improves security, although they are generally more expensive than magnetic stripe or Wiegand cards. Smart Card New smart card products seem to appear on the market every day. Again, in general terms, a smart card contains a computer chip allowing some degree of onboard processing. In one example, the smart card will determine if the device trying to access its embedded information is actually a secure device on an authorized EACS. If not, it will refuse to provide data to the reader. This data might even include the cardholder s biometric template. Smart cards are available with either a contact or contactless and many times both s are available on the same card to work with multiple applications. Biometric Readers Even more has been written about the very technical aspects of biometric readers. However, this discussion will focus on application rather than technical operation. Systems integrators, in general, should apply biometric readers to entry control points where the true identity of the individual (rather than just the name of the person assigned to the credential) must be verified. Due to the decreasing cost of some biometric technologies, it may be tempting to install biometrics at every entry control point. Nevertheless, biometric readers still have a lower throughput rate than most card-only technologies. This relegates the devices impractical for high throughput points such as parking gates, employee entrance turnstiles and busy department doors. The fact that most biometric readers use the Wiegand is good news for systems integrators. Both card and biometric readers can be used on the same hardware platforms, A6

7 allowing placement of the more secure biometric device on entry control points where a security compromise can not be tolerated. MERGING CREDENTIAL TECHNOLOGIES In most cases, a single credential technology is used throughout the entire EACS. But this is not always true. It is becoming common for a systems integrator to merge two (or more) technologies onto a single credential. One example: An end user wishing to upgrade to another card technology but unable to replace all of the existing card readers and cards in a single budget cycle. New readers are installed while new, multitechnology cards are issued to all new cardholders and reissued to those needing access to the specific entry control points using the new technology. This allows for a planned crossover to a new technology, while all new readers and existing legacy readers are gradually replaced over time. Another example: Company A has a large EACS using proximity cards. Company B has a smaller EACS using magnetic stripe cards. Company A acquires Company B. The systems integrator provides a dual technology card to be issued to employees of the new, joint operation who need to travel between the two facilities, eliminating the need for them to carry two cards until the two systems are fully integrated. INTEGRATING EACS, PHYSICAL DEVICES Although electronic access control is the generic term for the technology discussed so far, almost without exception the EACS will need to control mechanical devices such as locks, doors, gates and turnstiles. Normally the majority of the entry control points will be doors and they will be controlled with some type of locking device that can be controlled with the application or removal of power. Although magnetic locks are relatively easy to install and are especially useful on pairs of doors with no center mullion, they do fall under the access controlled egress doors requirement. Therefore, additional functionality must be specified to meet basic lifesafety code requirements. Magnetic locks are considered fail-safe so they will release and allow access to controlled areas during a power failure. In most cases, this would be serious breach of security. If an electric strike will work, use it. No additional features will be required and the reliability of a good quality strike will provide years of service. Two important factors must be remembered: First, if the door is fire-rated, then the strike must carry a similar rating; second, to avoid problems with other codes the strike must be fail secure to ensure the door will stay latched (not necessarily locked) during a fire. When a door is part of an opening in a smoke or fire partition (wall), the door must remain closed and latched (again not necessarily locked) at all times. When an electric strike is used and the door is unlocked for extended periods by the EACS, the door is, in fact, not latched. Electric latch sets and knob sets operate by releasing the knob or handle on the locked side of the door to allow access by retracting the latch. Because of this operation, any time the door is closed it is latched whether it is locked or not. These devices are normally the only proper way to control a stairwell door. TURNSTILES ARE STILL EFFECTIVE Turnstiles have been used for almost 100 years to control crowds. Their primary purpose is to prevent traffic from flowing in two directions. In other words, when a door is opened for someone to exit, another person may enter just as easily. A turnstile prevents this two-way effect from occurring. Hip-high turnstiles (above) allow large volumes of traffic to move quickly through an access point. When coupled with an entry control device, many turnstiles can be lined up in a row and control access with very little Hip-high turnstiles allow large volumes of traffic to move quickly through an access point. Coupled with an entry control device, many turnstiles can be lined up in a row and control access with little supervision. supervision. However, some supervision is, of course, necessary to prevent unauthorized persons from simply hopping over the turnstile. Full height turnstiles provide excellent protection at remote entry points to parking areas and building perimeters. They should not be mistaken for an anti-tailgating device since several persons may move through the turnstile at the same time. START PUTTING IT INTO EFFECT As a practical exercise, review what has been discussed in Parts 1 and 2 of this series. Use the fictitious American Products, Pomona Facility site survey and floor plan and begin to expand on it by specifying in more detail of the EACS hardware and entry point controls required to meet the end user s needs. Don t be surprised if you decide on a different ICP configuration. Part 3 of this series will explore the various software solutions available to develop a complete EACS for this example application. Steven Gibbs has more than 30 years experience in access control systems, performing installation, system design, project management and training functions. He can be contacted at (248) or steve@dvdrvtravel.com. A7

Unique access control box. Usage scenarios

Unique access control box. Usage scenarios 2N Access Unit Unique access control box Usage scenarios Document: Příklady použití 2N Access Unit Page 1 of 8 Date of last revision: 2016-05-13 Content 1. Access Unit usage scenarios (premises entry only)...

More information

Product Overview. Revision 1.3

Product Overview. Revision 1.3 Product Overview Revision 1.3 Revision History Revision 1.0 Initial release. Revision 1.1 HS changed to CP - page 7& 8 Revision 1.2 CP changed to Secure Changed Drawing on page 8 Revision 1.3 Added Off-Line

More information

2010 Product Line Catalog

2010 Product Line Catalog 2010 Product Line Catalog emerge Embedded Software Systems w Part of Access SySTEM From enterprise-wide security management to small and mid-size access control, Linear s IEI brand has a choice of, giving

More information

GETTING STARTED. Installing the System 2000 Hardware. Configuring Your System 2000 Hardware. Troubleshooting. Configuring Your System 2000 Network

GETTING STARTED. Installing the System 2000 Hardware. Configuring Your System 2000 Hardware. Troubleshooting. Configuring Your System 2000 Network SYSTEM 2000 GETTING STARTED Installing the System 2000 Hardware Whether you are upgrade an existing System 2, or this is a brand new installation, there will be some hardware installation involved. We

More information

Advanced Biometric Access Control Training Course # :

Advanced Biometric Access Control Training Course # : Advanced Biometric Access Control Training Course # : 14-4156 Content A. Objectives 5 mins B. History of EAC- 10 mins C. Electronic Access Control in Todays World 20 mins D. Essential Components of Electronic

More information

PRO3200 Professional Modular Access Control Hardware

PRO3200 Professional Modular Access Control Hardware PRO3200 Access Control Hardware As a part of the WIN-PAK software controlled hardware family the PRO3200 professional modular access control hardware is an advanced access control panel capable of providing

More information

PW6000 Modular Access Control System PW6000 Intelligent Controllers and Modules

PW6000 Modular Access Control System PW6000 Intelligent Controllers and Modules Modular Access Control System The next generation of the PW-Series family improves on the existing PW technology to offer superior features and benefits. The PW-Series Modular Control System is an advanced

More information

Visit us on the World-Wide Web at Programming Guide. Controller Boards

Visit us on the World-Wide Web at   Programming Guide. Controller Boards Visit us on the World-Wide Web at www.chamberlain.com PRO Systems Programming Guide Controller Boards -106 & -107 PROKey PROCard TABLE OF CONTENTS INTRODUCTION About the PRO System................................3

More information

Securefast SPECIFICATION MANUAL. Entra Access Control. Part of the Securefast Group SECUREFAST DEEDLOCK PINSON TATE COLSON. securefast.co.uk.

Securefast SPECIFICATION MANUAL. Entra Access Control. Part of the Securefast Group SECUREFAST DEEDLOCK PINSON TATE COLSON. securefast.co.uk. CI/SfB (68.5) Securefast Entra Access Control securefast.co.uk SPECIFICATION MANUAL SECUREFAST Part of the Securefast Group DEEDLOCK PINSON TATE COLSON 2 Entra access control - Controllers Introduction

More information

TECHNOLOGY SOLUTIONS BRIEF

TECHNOLOGY SOLUTIONS BRIEF TECHNOLOGY SOLUTIONS BRIEF Sponsored by How a Credential is Read In this Paper Knowing more about access technologies work can help you evaluate your choices in this area Learn to better understand how

More information

IN A FAST MOVING WORLD YOU CAN RELY ON AC2000; A POWERFUL ACCESS CONTROL AND SECURITY MANAGEMENT SYSTEM AC2000

IN A FAST MOVING WORLD YOU CAN RELY ON AC2000; A POWERFUL ACCESS CONTROL AND SECURITY MANAGEMENT SYSTEM AC2000 IN A FAST MOVING WORLD YOU CAN RELY ON ; A POWERFUL ACCESS CONTROL AND SECURITY MANAGEMENT SYSTEM WHAT CAN OFFER YOU? CEM MANUFACTURES BOTH THE HARDWARE AND SOFTWARE, OFFERING ONE OF THE MOST COMPREHENSIVE,

More information

System 6000 Delivering Tomorrow s Security Solutions Today

System 6000 Delivering Tomorrow s Security Solutions Today System 6000 Delivering Tomorrow s Security Solutions Today Network Compatible Software The SAFLOK System 6000 software installs on a Windows PC. SAFLOK does not provide separate client/server software.

More information

Browser Managed Security With No Software Installation

Browser Managed Security With No Software Installation Browser Managed Security With No Software Installation Sonitrol eaccess is an Integrated Security Management System with embedded software. It combines powerful systems integration with an easy-to-use

More information

770 and 790 Electronic Locks Access Control Solutions for the Lodging Industry

770 and 790 Electronic Locks Access Control Solutions for the Lodging Industry 770 and 790 Electronic Locks Access Control Solutions for the Lodging Industry 770 and 790 Electronic Locks The perfect synergy between: The security needs of guests, hotel managers, and staff Security,

More information

PRO2200 Professional Modular Access Control Hardware

PRO2200 Professional Modular Access Control Hardware PRO2200 Access Control Hardware As a part of the WIN-PAK software controlled hardware family the PRO2200 professional modular access control hardware is an advanced access control panel capable of providing

More information

Streamlining Access Control Systems

Streamlining Access Control Systems Streamlining Access Control Systems Strategies for networking serial-based peripheral devices for access control applications Quatech 5675 Hudson Industrial Parkway Hudson, OH 44236-5012 Tel: (800) 553-1170

More information

2000 Series e/em Style Keypad Installation and Programming Manual

2000 Series e/em Style Keypad Installation and Programming Manual 2000 Series e/em Style Keypad Installation and Programming Manual Document Number: 6054022 Revision: 0 Date: 12/21/06 Table of Contents Table of Contents Section 1: Introduction... 6 1 Product Description...6

More information

This is Cansec s 25th anniversary. Many of

This is Cansec s 25th anniversary. Many of This is Cansec s 25th anniversary. Many of their employees have been there for the entire ride. Something more interesting is that some of their products have been in the field working for the full 25

More information

Portals 14 What is a portal? 14 Hardware 15 RS232 to RS USB to RS TCP/IP to RS Add a Serial Portal 16 Add a Network portal 16

Portals 14 What is a portal? 14 Hardware 15 RS232 to RS USB to RS TCP/IP to RS Add a Serial Portal 16 Add a Network portal 16 PROS LITE User Manual Version 2.0.0 www.visual-plus.com Table of Contents Getting Started 5 Starting PROS Lite 5 Create a Portal 5 Adding a control panel 6 Adding a user 7 Upload users to a controller

More information

Choosing the Right Credentials Is Easier than You Think

Choosing the Right Credentials Is Easier than You Think Choosing the Right Credentials Is Easier than You Think Jennifer Toscano, Ingersoll Rand Security Technologies, Portfolio Marketing Manager, Credentials, Readers, Software, and Controls Security is complicated.

More information

790 Contactless Electronic Lock Access Control Solutions for the Lodging Industry

790 Contactless Electronic Lock Access Control Solutions for the Lodging Industry 790 Contactless Electronic Lock Access Control Solutions for the Lodging Industry 790 Contactless Electronic Lock Designed with both the needs of guests and hoteliers in mind, the 790 lock adapts to your

More information

Access control panel U-Prox IC E (Elevator control)

Access control panel U-Prox IC E (Elevator control) 1.003 Access control panel U-Prox IC E (Elevator control) Installation and programming manual About this document http://u-prox.com This manual covers installation, adjustment and use of U-Prox IC E (hereinafter

More information

Pegasus Equipments Export Limited. Local Contact:

Pegasus Equipments Export Limited. Local Contact: Pegasus Equipments Export Limited Add: #31G, Haiyige, Scienway Palace Science & Technology Industrial Park Shenzhen, China. Tel: +86 755 2658 3464 +86 755 2658 3596 Fax: +86 755 8611 0167 web: www.pegasusexport.com

More information

E-Plex Enterprise Access Control System. (Version 3) with Wireless Option

E-Plex Enterprise Access Control System. (Version 3) with Wireless Option Enterprise Access Control System (Version 3) with Wireless Option CityCenter Las Vegas, NV 2 Engineered for Flexibility Modular Solution The Enterprise Access Control System is a modular solution for managing

More information

T h e re is an upgrade route to larger configurations. O v e rv i e w

T h e re is an upgrade route to larger configurations. O v e rv i e w AMAG 625 Lite Overview AMAG 625 Lite Softwar e AMAG 625 Lite Software is very user friendly and incorporates best of breed functionality including: Comprehensive on-line help Dynamic Maps Flexible card

More information

multinode M2150 INTELLIGENT CONTROLLERS

multinode M2150 INTELLIGENT CONTROLLERS multinode M2150 INTELLIGENT CONTROLLERS SYSTEMS ACCESS CONTROL KEY FEATURES: - Modular mix and match configuration - Connects to Symmetry management software via LAN, WAN, RS232 or Modem - Each M2150 can

More information

DIGITUS BIOMETRICS PRODUCT GUIDE 2013

DIGITUS BIOMETRICS PRODUCT GUIDE 2013 DIGITUS BIOMETRICS PRODUCT GUIDE 2013 When it comes time to requesting a quote or design assistance, you can submit your request by email to sales@digitus-biometrics.com or call us direct at 912.231.8175.

More information

White Paper How IP is impacting Physical Access Control

White Paper How IP is impacting Physical Access Control White Paper How IP is impacting Physical Access Control +Background Installers and end users of security systems have never seen as many exciting product developments as they have in recent years as more

More information

Delivering Tomorrow s Security Solutions Today

Delivering Tomorrow s Security Solutions Today Delivering Tomorrow s Security Solutions Today Only one solution provides the security of an access audit system, the ultimate in key management flexibility, and superior control throughout your property

More information

Smart HUB - HUB to expand one Master Controller s RS-485 port to 8 RS-485 ports - Use 12VDC power

Smart HUB - HUB to expand one Master Controller s RS-485 port to 8 RS-485 ports - Use 12VDC power Hardware Overview - SmartKey Master Controller - Smart HUB - - RFID Readers Master Controller HUB Features: RFID Readers SmartKey Master Controller - 1MB internal memory (2MB optional), can hold up to

More information

NetAXS-123: One door, compact (plastic) enclosure. NetAXS-123: One door, standard (metal) enclosure with tamper switch and terminal block

NetAXS-123: One door, compact (plastic) enclosure. NetAXS-123: One door, standard (metal) enclosure with tamper switch and terminal block Honeywell s web-based access control offering now provides solutions for installations of any size. NetAXS enables users to manage their system anywhere there s an Internet connection with no dedicated

More information

L85 Integrated Locksets

L85 Integrated Locksets DSX Access Systems, Inc. L85 Integrated Locksets The L85 software provides a method to integrate wired and wireless locksets into a DSX Access Control System. The L85 software leverages its Virtual Hardware

More information

Digitus Biometrics Product Guide

Digitus Biometrics Product Guide Digitus Biometrics Product Guide 2014 When it comes time to requesting a quote or design assistance, you can submit your request by email to sales@digitus-biometrics.com or call us direct at 912.231.8175.sales@digitus-biometrics.com

More information

6222 Two Door Module Technical Operations Manual

6222 Two Door Module Technical Operations Manual 6222 Two Door Module Technical Operations Manual TABLE OF CONTENTS Specifications...3 Overview...4 Operations...5 Custom Access Mode...5 Standard Access Mode...5 Offline Access Mode...5 Offline Memory...5

More information

First Access Express OPERATOR GUIDE

First Access Express OPERATOR GUIDE First Access Express OPERATOR GUIDE October 2016 Cutting edge simplicity Table of Contents Introduction... 4 PC Requirements... 5 Step 1. Software Installation... 5 Complete Installation Server and Client...

More information

SYMMETRY MULTINODE M2150 INTELLIGENT CONTROLLER

SYMMETRY MULTINODE M2150 INTELLIGENT CONTROLLER MULTINODE M2150 MULTINODE M2150 INTELLIGENT CONTROLLER The multinode M2150 range of controllers provides distributed intelligence for your access control system and ensures complete system security, resilience

More information

Digitus Biometrics Product Catalogue. Request a quote or design assistance by ing or calling

Digitus Biometrics Product Catalogue. Request a quote or design assistance by  ing or calling Digitus Biometrics 2015 Product Catalogue Request a quote or design assistance by emailing sales@digitus-biometrics.com or calling 912.231.8175. Table of Contents Access Control Solutions db ServerRack

More information

MaCaPS International Ltd

MaCaPS International Ltd MaCaPS Company Profile November 2004 MaCaPS International Ltd Address: Unit 2109-2111, 21/F., Paul Y Centre, 51 Hung To Road, Kwun Tong, Hong Kong Tel: No.: (852) 3527 3257 Fax No.: (852) 3527 3098 E-mail:

More information

U-FLASH Setup Guide U-FLASH.

U-FLASH Setup Guide U-FLASH. U-FLASH Setup Guide Thank you for purchasing the U-FLASH. This guide will assist you in the setup of the system. You can call for FREE technical support to get help anytime at 757-258-0910. Please note,

More information

SMARTair Proximity access control

SMARTair Proximity access control SMARTair Proximity access control We take the worry out of protecting what s valuable to you. Lockwood: no worries www. What is SMARTair Security, simplicity, convenience SMARTair is a powerful access

More information

Access Control Unit User s Guide

Access Control Unit User s Guide NetAXS Access Control Unit User s Guide The configurations described in this document have not been reviewed by Underwriters Laboratories Inc. June 2007 2007 Honeywell. All rights reserved. 800-00233,

More information

IS2000. Administrative Operator s Guide

IS2000. Administrative Operator s Guide IS2000 Administrative Operator s Guide Table of Contents Logging Off... 7 Event Manager... 7 HARDWARE MANAGER... 8 Maneuvering the Hardware Tree... 8 Unlocking the Module... 8 Viewing the Hardware Tree...

More information

Access Easy Control System. Reference Guide

Access Easy Control System. Reference Guide Access Easy Control System Reference Guide Content 3 1. AEC System Overview 4 2. AEC Main Components 6 3. AEC Configuration 7 4. AEC Benefits 8 5. AEC Easy Ordering 10 6. AEMC More than 16 readers? 12

More information

Access Easy Control System From anywhere just a click away!

Access Easy Control System From anywhere just a click away! Access Easy Control System From anywhere just a click away! 2 Easily Deployed, Easily Managed, Easily Scalable Like in most small and midsized enterprises, it s crucial for you to be able to control access

More information

Delivering Tomorrow's Security Solutions Today

Delivering Tomorrow's Security Solutions Today Delivering Tomorrow's Security Solutions Today Only one solution provides the security of an access audit system, the ultimate in key management flexibility, and superior control throughout your property

More information

Symmetry M2100 Controller

Symmetry M2100 Controller System Overview The Symmetry M2100 is a key feature of an access control system. It provides distributed intelligence, resilience in the event of netwk failure, and fast response to access requests. The

More information

Access Control Solutions: Sports and Entertainment

Access Control Solutions: Sports and Entertainment Access Control Solutions: Sports and Entertainment Sports and Entertainment The guest experience starts at the gate. Access Control Solutions Long before guests could enter an arena or stadium using a

More information

L-1 Fingerprint Reader Solutions. V-Flex 4G

L-1 Fingerprint Reader Solutions. V-Flex 4G L- Fingerprint Reader Solutions V-Flex 4G 4G Biometric Performance Redefined with a Flexible and Powerful Device to Secure any Size Premises Advanced Features Large Template Storage Capacity (0,000 in

More information

SAFLOK System Delivering Tomorrow s Security Solutions Today. Features and Benefits. System Requirements

SAFLOK System Delivering Tomorrow s Security Solutions Today. Features and Benefits. System Requirements SAFLOK System 6000 Delivering Tomorrow s Security Solutions Today Only one solution provides the security of an access audit system, the ultimate in key management flexibility, and superior control throughout

More information

QUICK START GUIDE FOR ACCESS CONTROL BOARDS. DX Series One Door TCP/IP Web Server Controller. Model: ACP-DXEL1 to ExitPushAccessAccessBoard PWR-

QUICK START GUIDE FOR ACCESS CONTROL BOARDS. DX Series One Door TCP/IP Web Server Controller. Model: ACP-DXEL1 to ExitPushAccessAccessBoard PWR- QUICK START GUIDE FOR ACCESS CONTROL BOARDS DX Series One Door TCP/IP Web Server Controller Model: ACP-DXEL1 to ExitPushAccessAccessBoard PWR- Table of Contents 3 01- Introduction 4 02 - Overview 4 02.1

More information

Cornerstone Access Control

Cornerstone Access Control Cornerstone Access Control Improve site and information security with biometrically-enabled access control Access Control improves identification and authorisation processes across a wide range of business

More information

Control Panel Solutions

Control Panel Solutions HONEYWELL ACCESS SYSTEMS Control Panel Solutions Honeywell s control panel solutions have been the reliable choice of dealers for many years. Our controllers are the benchmark of the industry and offer

More information

VICON ACCESS CONTROL CONTROLLERS

VICON ACCESS CONTROL CONTROLLERS VICON ACCESS CONTROL CONTROLLERS Also available in white Over-the-Door Controller Master Controller Multi-Door Kit Elevator/IO Controller Product at a Glance The Vicon Access Control (VAX) system consists

More information

Compass RTU Guide. Version 3.x

Compass RTU Guide. Version 3.x Compass RTU Guide Version 3.x Compass RTU Guide Ver 3.x OSSI W228 N727 Westmound Dr Waukesha WI 53186 USA TEL: 262-522-1870 FAX: 262-522-1872 Ossi-usa.com Intelli-Site Security Management Software Compass

More information

Two Door Controller GEN-045

Two Door Controller GEN-045 Australian Owned, Designed and Manufactured Two Door Controller GEN-045 Genesis Electronics Australia Pty Ltd www.genesiselectronics.com.au Distributed by: Genesis reserves the right to change or modify

More information

Student ID card and campus security solutions. Colleges and universities

Student ID card and campus security solutions. Colleges and universities Student ID card and campus security solutions Colleges and universities Student ID card and campus security solutions for colleges and universities College students today expect convenience. They want

More information

L85 Integrated Locksets

L85 Integrated Locksets Access Systems, Inc. Integrated s The software provides a method to integrate wired and wireless locksets into a Access Control System. The software leverages its Virtual Hardware capabilities to accommodate

More information

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according

More information

The Future of Proximity Access Control

The Future of Proximity Access Control The Future of Proximity Access Control The PXL-250 Tiger Controller cuts the cost of proximity access control in half, not just the equipment cost, but the total installed cost due to some great installer

More information

Click Save to return to the main Setup screen.

Click Save to return to the main Setup screen. ON-SITE Setup Guide Thank you for purchasing the ON-SITE. This guide will assist you in the setup of the system. You can call for FREE technical support to get help anytime at 757-258-0910. Please note,

More information

New Product Announcement

New Product Announcement New Product Announcement C CURE Go Reader Tyco Security Products is pleased to announced the release of C CURE Go Reader mobile app extending the reach of a C CURE 9000 system more powerfully than ever

More information

ACCESS CONTROL SYSTEM

ACCESS CONTROL SYSTEM ACCESS CONTROL SYSTEM System versions Standalone controllers series based on integrated models KZ-400, 500, 600, 700, KZC-300,800, 900 KaDe Lite system based on integrated controllers KZ-1000 KaDe Premium

More information

Smart Access Control System Software. User Manual. Version 1.0

Smart Access Control System Software. User Manual. Version 1.0 Smart Access Control System Software User Manual Version 1.0 Copyright MaCaPS International Ltd. 2002 This manual was produced by MaCaPS International Ltd. MaCaPS International Ltd. http://www.macaps.com.hk

More information

Smartair. Proximity access control. ASSA ABLOY, the global leader in door opening solutions

Smartair. Proximity access control. ASSA ABLOY, the global leader in door opening solutions Smartair Proximity access control ASSA ABLOY, the global leader in door opening solutions Simple and modern access control A good security system should be as invisible as the air to its users. The freedom

More information

MICROTRAK EVOLUTION.NET USER GUIDE

MICROTRAK EVOLUTION.NET USER GUIDE MAN047-08 AUGUST 2016 GETTING STARTED Microtrak Evolution.NET consists of easy to use, intuitive modules. They cover the main areas of operation - User Management, Personnel Management, Facility Management,

More information

ACCESS CONTROL SOFTWARE V3.1 REFERENCE MANUAL

ACCESS CONTROL SOFTWARE V3.1 REFERENCE MANUAL ACCESS CONTROL SOFTWARE V3.1 REFERENCE MANUAL 01/2004 Centaur is a registered trademark of Position Technology INC. Pro-Report, Tracker, FrontGuard and FrontView are trademarks of Position Technology Inc.

More information

Access Control Technology Ltd. reserve the right to change the contents of this manual and the system it applies to without prior notice.

Access Control Technology Ltd. reserve the right to change the contents of this manual and the system it applies to without prior notice. Installation Manual Operating & Installation Instructions This manual refers to the ACTpro elock Hub, a TCP/IP based control unit supporting up to 32 elock doors. Access Control Technology Ltd. reserve

More information

Installation Instructions

Installation Instructions Alliance Arming Station AL-1111, AL-1116 1048520C September 2006 Copyright 2006, GE Security Inc. Introduction This is the GE Alliance Arming Station for models AL-1111 (four-line LCD) and AL-1116 (four-line

More information

Readers and credentials

Readers and credentials Readers and Simplifying the security industry like never before. Allegion s aptiq and XceedID readers and not only feature cutting-edge security technology, but are transforming basic access control products

More information

Alarm Lock A Division of the Napco Security Group 333 Bayview Avenue Amityville, New York Phone (631) Fax (631)

Alarm Lock A Division of the Napco Security Group 333 Bayview Avenue Amityville, New York Phone (631) Fax (631) Alarm Lock Trilogy Networx Series Lockset Specification Alarm Lock A Division of the Napco Security Group 333 Bayview Avenue Amityville, New York 11701 Phone (631) 842-9400 Fax (631) 789-3383 http://www.alarmlock.com

More information

Links New Access 2.0 Overview Links Access Services and Client Tools Links Access Service Links Access Client Service...

Links New Access 2.0 Overview Links Access Services and Client Tools Links Access Service Links Access Client Service... Table of Contents Links New Access 2.0 Overview... 2 Links Access Services and Client Tools... 3 Links Access Service... 3 Links Access Client Service... 3 Links Access Client Tools... 3 Services Installation...

More information

Configuring Areas and Doors

Configuring Areas and Doors Configuring Areas and Doors 18 Configuring Continuum for Security and Access Control This chapter provides an overview of Continuum security and access control components and describes how they work together.

More information

Smart & secure access solutions. We make access in life smart and secure.

Smart & secure access solutions. We make access in life smart and secure. Smart & secure access solutions We make access in life smart and secure. Trust dormakaba for solutions and innovative technologies that define security and convenience. We make access in life smart and

More information

GLOSSARY. See also: Access point

GLOSSARY. See also: Access point GLOSSARY A Access level A set of access points, each with a corresponding time schedule, that determine where and when a badge holder has permission to pass through an access point. See also: Access point

More information

using optional EMX 190 expansion modules), and makes access decisions based on its own distributed

using optional EMX 190 expansion modules), and makes access decisions based on its own distributed Infinity ACX 700 Access Control Unit The Infinity ACX 700 is a programmable, stand-alone access controller that is a basic building block of the Infinity Security Management System. Each ACX 700 controls

More information

Keyscan CA150 PoE Single Door Controller

Keyscan CA150 PoE Single Door Controller Keyscan CA150 PoE Single Door Controller Keyscan has always offered access control solutions that optimize system designs and maximize installation flexibility. At the heart of our organization is a vibrant

More information

Access Control Database User Manual

Access Control Database User Manual Access Control Database User Manual P/N 270961 Rev 1.0 25OCT01 DEVELOPED BY COPYRIGHT NOTICE TRADEMARKS CREDITS Edwards Systems Technology 6411 Parkland Drive Sarasota, FL 34243 (941) 739-4300 Copyright

More information

OTS TRANSPONDER SYSTEM

OTS TRANSPONDER SYSTEM OTS TRANSPONDER SYSTEM OTS TRANSPONDER SYSTEM LOCKING SOLUTIONS FOR LOCKERS Stand alone or as part of an access control system, the OTS transponder is a secure choice. Users can open or close lockers by

More information

IQ Series Architect/Engineer Guide Specification P/N Revision 5.0

IQ Series Architect/Engineer Guide Specification P/N Revision 5.0 IQ Series Architect/Engineer Guide Specification P/N 37-20002-001 Revision 5.0 PCSC 3541 Challenger St. Torrance, California 90503 Phone/Fax: (310) 303-3600 Web Site: http://www.1pcsc.com E-Mail: Sales@1PCSC.COM

More information

Training Courses 2016

Training Courses 2016 Training Courses 2016 Learn More - Win More Business ADI training courses are the perfect way to increase your knowledge, uncover new opportunities and keep up to date with the very latest technology -

More information

760, 770 and 790 Electronic Locks Access Control Solutions for the Lodging Industry

760, 770 and 790 Electronic Locks Access Control Solutions for the Lodging Industry 760, 770 and 790 Electronic Locks Access Control Solutions for the Lodging Industry Total Access You want your guests to feel as comfortable staying with you as they do in their own home. You offer them

More information

Access Control Solutions: Sports and Entertainment

Access Control Solutions: Sports and Entertainment Access Control Solutions: Sports and Entertainment 1 The guest experience starts at the gate. Sports and Entertainment Access Control Solutions Long before guests could enter an arena or stadium using

More information

F18. Fingerprint capacity 3,000 Transaction capacity 100,000 Hardware Platform ZK 6001, 400Mhz 64M Flash, 32MSDRAM. Identification speed

F18. Fingerprint capacity 3,000 Transaction capacity 100,000 Hardware Platform ZK 6001, 400Mhz 64M Flash, 32MSDRAM. Identification speed F18 Features: 1. 2.4 TFT LCD color screen 2. Standard Wiegand Input and Output interfaces are compatible with most all 3 rd party 26 bit Wiegand readers and access control panels. 3. USB HOST port makes

More information

New Product Announcement

New Product Announcement New Product Announcement EntraPass v7.30 Software Tyco Security Products is pleased to announce version 7.30 of Kantech s flagship EntraPass security management system software. We continue to build upon

More information

Building Technologies. Access Control SiPass networked - simple & networkable for everyday use

Building Technologies. Access Control SiPass networked - simple & networkable for everyday use Building Technologies Access Control SiPass networked - simple & networkable for everyday use SiPass networked Innovative access control SiPass networked is part of the SiPass product range for use in

More information

FACIAL RECOGNITION TERMINAL SYSTEM

FACIAL RECOGNITION TERMINAL SYSTEM StoneLock is a global leader in designing and manufacturing secure access control solutions. We are proud to build and design the most secure, reliable and user-friendly access control products for both

More information

Leveraging RFID: The Evolution of Security and Access Control April 30, 2013

Leveraging RFID: The Evolution of Security and Access Control April 30, 2013 1 Leveraging RFID: The Evolution of Security and Access Control April 30, 2013 Michael Liard VP, AutoID & Data Capture 2 Levels of Security What You Know Passwords What You Have Magstripe cards RFID cards/tags/key

More information

NetAXS. Hosted Video Services. Cloud Hosted Access Control. Retail Professional Services Convenience

NetAXS. Hosted Video Services. Cloud Hosted Access Control. Retail Professional Services Convenience Hosted Video Services NetAXS Cloud Hosted Access Control NetAXS is now integrated with MAXPRO Cloud. MAXPRO Cloud is a fully integrated Access Control and Video Security as a service platform. Ideal for

More information

TS1000: Special Functions SPECIAL FUNCTIONS 1

TS1000: Special Functions SPECIAL FUNCTIONS 1 TS1000: Special Functions SPECIAL FUNCTIONS 1 Use PMS Interface The TS1000 management software give us the possibility to integrate the software in a Property Management System (PMS). In this field we

More information

Gallagher Airport Security Solutions. aviation sites around the world trust security management solutions from gallagher

Gallagher Airport Security Solutions. aviation sites around the world trust security management solutions from gallagher Gallagher Airport Security Solutions aviation sites around the world trust security management solutions from gallagher www.gallaghersms.com 2 Airport Security and Access Management Solutions Single management

More information

Quick Start Installation Guide

Quick Start Installation Guide apc/l Quick Start Installation Guide Version A2 Document Part Number UM-201 May 2010 OVERVIEW The apc/l is an intelligent access control and alarm monitoring control panel which serves as a basic building

More information

NetAXS. Cloud-Hosted Services. Cloud Hosted Access Control. Retail Property Management Franchises

NetAXS. Cloud-Hosted Services. Cloud Hosted Access Control. Retail Property Management Franchises Cloud-Hosted Services NetAXS Cloud Hosted Access Control NetAXS is now integrated with MAXPRO Cloud. MAXPRO Cloud is a fully integrated Access Control and Video Security as a service platform. Ideal for

More information

Keso F1 Strengthens Key Control

Keso F1 Strengthens Key Control A Technical and Informational Newsletter From Dugmore & Duncan Fall 2005 Vol. VI - Issue IV Keso F1 Strengthens Key Control The new SARGENT Keso F1 Security System offers the building owner full control

More information

Wiring Instructions v4

Wiring Instructions v4 Wiring Instructions v4 GateKeeper h4.2 Technical Support support@gymmastersoftware.com USA: 415 678 1270 Australia: 03 9111 0323 : 03 974 9169 Copyright 2018 Treshna Enterprises. All rights reserved. 15

More information

Network+ Guide to Networks 5 th Edition. Chapter 1 An Introduction to Networking

Network+ Guide to Networks 5 th Edition. Chapter 1 An Introduction to Networking Network+ Guide to Networks 5 th Edition Chapter 1 An Introduction to Networking Goals of This Chapter List the advantages of networked computing relative to standalone computing Distinguish between client/server

More information

EXECUTIVE BRIEF. The Evolution of Cards and Credentials in Physical Access. In this Paper

EXECUTIVE BRIEF. The Evolution of Cards and Credentials in Physical Access. In this Paper Sponsored by The Evolution of Cards and Credentials EXECUTIVE BRIEF In this Paper Despite effective, newer options, many organizations are still using outdated and vulnerable access control technology.

More information

INTELLIGENT ACCESS CONTROL AND INTRUDER ALARM SYSTEMS

INTELLIGENT ACCESS CONTROL AND INTRUDER ALARM SYSTEMS INTELLIGENT ACCESS CONTROL AND INTRUDER ALARM SYSTEMS Integrations Hardmeier OÜ has manufactured FoxSec access control and security systems since 1994. Today we have more than 20,000 installed systems

More information

AD-300 AD-301. Networked hardwired lock user guide Instructions for adaptable series networked hardwired locks

AD-300 AD-301. Networked hardwired lock user guide Instructions for adaptable series networked hardwired locks *P516-128* P516-128 AD-300 AD-301 Networked hardwired lock user guide Instructions for adaptable series networked hardwired locks Para el idioma español, navegue hacia www.allegion.com/us. Pour la portion

More information

AXP-400. Enterprise. Access Solution

AXP-400. Enterprise. Access Solution Enterprise Access Solution The Enterprise Solution The scalable Amano AXP-400 facility management solution offers control of up to 4,000 doors and 160,000 tagholders per site (supporting multiple sites

More information

TDSi EXpert type door controllers offer a fully featured door controller with up to 48,000 card memory.

TDSi EXpert type door controllers offer a fully featured door controller with up to 48,000 card memory. 1 EXpert Based Access Control System - Overview TDSi EXpert type door controllers offer a fully featured door controller with up to 48,000 card memory. EXpert2 is capable of controlling 2 doors with the

More information