User’s Manual Version 6.3C Account Manager Software for Windows DoorKing, Inc. 120 Glasgow Avenue Inglewood, California 90301 U.S.A. Phone: 310-645-0023 Fax: 310-641-1586 www.doorking.com P/N 1835-066 REV N, 7/13 Copyright 2013 DoorKing, Inc. All rights reserved.
Page 2 1835-066-N-7-13
NOTICE DOORKING INC. reserves the right to make changes in the product described in this manual at any time and without notice or obligation of DoorKing Inc. to notify any persons of any such revisions or changes. Additionally, DoorKing Inc. makes no representations or warranties with respect to this manual. This manual is copyrighted, all rights reserved. No portion of this manual may be copied, reproduced, translated, or reduced to any electronic medium without prior written consent from DoorKing Inc.
TABLE OF CONTENTS Section 1 – Introduction 1.1 Installation Guidelines – All Systems........................................................................................................7 1.2 Getting Started 1.2.1 Windows 8, Windows 7, Windows Vista or Windows XP Install ..............................................8 1.2.2 File Information.........................................................................................................................9 1.2.3 Security Levels ...............
3.7 3.8 3.6.3 Re-Sync Operations .................................................................................................................33 3.6.4 Programming Anti-Pass Back ..................................................................................................34 Facility Codes and Device Association 3.7.1 Facility Codes...........................................................................................................................35 3.7.2 Device Association ...........
Page 6 1835-066-N-7-13
SECTION 1 - INTRODUCTION The DoorKing Remote Account Manager for Windows Version 6.3 is a powerful, flexible and easy to use computer program that allows you to manage access control in a variety of controlled access applications including apartment complexes, gated communities, apartment and condominium building's, college resident halls, office buildings, factories, industrial sites, etc.
1.1.1 Installing from the CD Stop all running programs. Insert the DKS CD in the CD drive. If the setup program does not start automatically, follow the steps below. 1. Select RUN. 2. Enter: E:DKSETUP (use the letter of your CD drive) in the command line and then click OK. 3. Follow the on screen instructions. 1.1.2 Download from Internet Site If you have downloaded the software from our internet site: 1. Double click DKSETUP.EXE (from your Downloaded Program Files Folder) 2.
1.1.4 Software Registration with an Existing DK Server Registration When you first open the Account Manager software, you will receive a prompt to register the software. Already Registered If you already have a registration from an earlier version of the Account Manager software, you do not need to create another. Use “Click here to associate this software with your existing registration” to continue. (If you have never registered any software on the DK Server, go to section 1.1.5.
1.1.5 New Registration To register the software, we highly recommend that your PC has an internet connection. This will greatly simplify the registration process. Internet Connection If the PC does have an internet connection (recommended), click the “Yes, register now” button to create a new registration. If the PC does not have an internet connection, you can click “this PC has no internet connection” to continue.
Once a user ID and password are created, your web browser will open to the DKS Software Registration page. Complete the form the to register software. Your user name and password you entered will already be filled in for you. Click the “Register” when button finished.
Select the option that best describes what you want to do, then click “Continue”. If you select either option 2 or 3, the registration of the software is complete. If you selected option 1(using the IM Server to program your entry system), you will then be directed to activate the entry system in the IM Server. See section 1.1.6.
1.1.6 Entry System Activation If you have chosen to use the DoorKing IM Server to program your entry system, then the system must be activated in the IM Server first. Enter the following information in the spaces provided on the left hand side of the system activation screen. Enter the 11-digit telephone number (1 + Area Code + Number) of the phone line connected to the entry system. This information is required. Enter the 4-digit entry system Master Code. This information is required.
The checkout screen shows the estimated annual cost of using the IM Server to program your entry system. Select the billing cycle and payment method. To finish, choose one of the checkout options. Checkout and Activate with Billing Information (credit card or eCheck) This choice completes the activation of your system. You will receive the first 30 days free and subsequent payments (either monthly or yearly) are automatic.
1.2 1.2.1 Getting Started Security (Permission) Levels Security (permission) levels allow you to set individual door/gate access times for residents using a wiegand device (Card, RFID, PIN, etc.). An example of this would be a gated apartment community that has a vehicular entry gate, a pedestrian access gate, a pool gate, a laundry room door, tennis court gate, office door, etc., where entry is controlled by a card reader.
1.2.4 Holiday Schedule 32 different “Holidays” can be set up in the software program. Whenever a holiday is present, the software will look first at the HOL schedules in the Hold Open Time Zones and the Security Levels. For example, if a holiday is created for Christmas Day, the software will revert to the HOL hold-open time zone on December 25th. 1.2.5 Transactions Transactions are automatically saved each time that they are received from the 1833, 1834, 1835, 1837, or 1838.
1.2.11 Clock Setting Each time contact is made with the entry system from the computer, the clock / calendar in the entry system is automatically updated to match the clock information from your PC. Be sure that your computers clock / calendar is set to the correct time and date. 1.2.12 Prior to Programming The DoorKing Remote Account Manager can manage up to 10,000 separate accounts.
SECTION 2 – ACCOUNT MANAGEMENT To begin using the DoorKing Remote Account Manager to program your 1833, 1834, 1835, 1837, or 1838 systems, you must first create an ACCOUNT under which all the relevant account information (resident user data, transaction files, etc.) will be stored. By definition, an ACCOUNT must be created for every 1833, 1834, 1835, 1837 or 1838 system that will be programmed with the Remote Account Manager software (up to 10,000 accounts can be managed with this software).
2.1.1 Creating User Types There are two types of users that can be created in the program; Administrators and Data Entry. Administrators have access to all levels and features of the program while Data Entry users are limited to daily tasks such as adding or removing resident names and sending updated information to the access system. When creating user types, the first one MUST be an Administrator. Up to 20 Administrators and 20 Data Entry user types can be entered in the program. 1. 2. 3. 4. 5.
2.1.2 1. 2. 3. 4. 5. Creating a New Account With the ACCOUNT screen displayed, place the cursor in the empty name field (below example) or click the ADD button in the tool bar. Enter the new account name and press the TAB or ENTER key. The CONTROL BOARD SELECTION window will appear. You must select the type of control board installed in the system that you are going to program. Click “30 Series” to program 1833, 1834, 1835, 1837 or 1838 systems. After selecting the control board series, click OK.
2.1.3 1. Editing Account Information Click on the account that you want to edit and make the necessary changes. NOTE: Editing an account here changes only the account name and contact information. It does nothing to change any of the resident, system, time zone, security level, etc. information associated with the account. Figure 4 2.1.4 1. 2. 3. 4. Deleting Accounts Click on the account that you want to delete. Click the DELETE icon from the tool bar or click FILE then DELETE.
2.2 Share Information Feature The SHARE INFO feature allows more than one "account" to share its database with other accounts. The share info feature is useful in applications where there is more than one entry point and the entry points will all have identical user data.
2.3 Communication Port Configuration If you are using a modem, the Port Config tab in the Program Configuration window is provided if you need to enter any special modem setup strings that may be applicable to your modem (refer to the manual that came with your modem). If you are using a DK IM Server for programming, there is a Test DK IM Server Connection button that will verify that your computer will connect to the DoorKing server.
SECTION 3 – SYSTEM MANAGEMENT Once an account(s) has been created, the access control system information must be programmed. This information includes setting the entry system parameters, labeling the system relays for each entry point, using or ignoring card (access device) facility codes, mass enabling device (card, transmitter, etc.
3.1.1 1. 2. 3. 4. 5. 3.1.2 Entry Panel Setup (Fig 10) Enter the four-digit MASTER CODE in the field provided. The master code entered here must match the four-digit master code that has been programmed into the entry panel. Select the SYSTEM MEMORY. The system memory must match the memory size of the chips installed in the entry panel. Set the system TALK TIME. Set the DIRECTORY CODE DIGITS. Figure 10 Check ANTI-PASS BACK for 1833, 1835, 1837 and 1838 (APB is standard in these systems).
1833, 1835, 1837 ENTRY PANELS If Tracker™ expansion boards are used with the 1833, 1835 or 1837 entry panels, set the tone open number(s), postal switch and rotary dial 9 inputs to activate RELAY 0. Relay 1 and Relay 2 are used as Tracker™ board command relays in this configuration. 1838 ENTRY PANELS Generally, tone open numbers do not need to be set when using the 1838 entry panel because this panel is not designed for any voice communication requirements.
3.1.5 1. 2. 3. 4. 5. 6. 7. 8. Miscellaneous Setup Items (Fig 13) Click the TRANSACTIONS button if transactions are to be stored in the entry system panel. The panel can store a maximum of 8000 events in the transaction buffer. Click the INTERFACE WITH 1816/1820 button only if the entry panel is connected to a DoorKing Model 1816 or 1820 Telephone Intercom System. Click the TRACKER button if Tracker™ expansion boards are connected to the entry panel wiegand input(s).
3.2 Relay Numbering and Control The model 1833, 1835 and 1837 telephone entry systems each have three relays (Relay 0, 1, and 2) on the control board while the 1834 and 1838 systems each have two (Relay 1, 2) relays. When Tracker™ boards are added to the system, the output relay on the Tracker™ boards are listed in the software sequentially, beginning with relay 3 (Relays 0, 1 and 2 are on the main control board). Tracker boards cannot be added to the 1834 system.
3.2.1 Labeling Relays with Tracker Disabled Click the RELAYS button on the tool bar to bring up the relays screen. The relay screen is where the output relays of the telephone entry system can be labeled, where you will set the relay strike time for the relays, and where you can enable the "Hold Open During Modeming" command. NOTE: The "Hold Open During Modeming" command is not active if RS-232 communication is being used.
3.2.2 Labeling Relays with Tracker Enabled Click the RELAYS button on the tool bar to bring up the relays screen. The relay screen is where the output relays of the telephone entry system can be labeled, where you will set the relay strike time for the command relays, and where you can enable the "Hold Open During Modeming" command. NOTE: The "Hold Open During Modeming" command is not active if RS-232 communication is being used.
3.3 Relay Hold Open Time Zone Programming Up to seven (7) relay hold time zones can be created in the software. The eighth time zone is labeled HOL and is used with the Holiday Schedule. After the time zones have been created, they can then be applied as needed to the system relay(s) that you chose. NOTE: The time zones applied to the Tracker™ board relays (system relays 3-18) are only accurate to 5 minutes. 3.3.
3.3.2 Applying Relay Hold Time Zones Once the required time zones are created, you can then apply them to the system relay(s) that you want to operate under the time zone. 1. 2. 3. 4. 5. Click the relay(s) next to the time zone that you want to apply the time zone to. A check will appear in the box (Fig 21). Use the scroll button under the relay number table to access system relays 11-18. Click OK to save the time zones and return to the System Info screen.
3.4 Holiday Schedules You can create up to 32 holidays in the HOLIDAY SCHEDULE window. When a holiday date is not present, the holiday hold open times are not in effect. When a holiday date is present, the holiday hold open times are in effect. You can apply the holiday schedule to Security Levels by checking the HOLIDAYS FOR SECURITY LEVELS button in the Holiday Schedule window. Doing this establishes Time Zone 4 (TZ4) in security levels 2 through 31 as a Holiday (HOL) time zone.
3.5 Security Levels Security Levels (SL) allow you to control individual access through the controlled entry points by persons using a wiegand device (card, transmitter, PIN, etc.). As an example of this, a plant manager may have 24 hour, seven day a week access into the plant, but individual workers will only be granted access depending on which shift that they work. It is also possible to allow a person 24 hour a day access at one entry point, but limit their access at another entry point.
3.5.1 Planning Security Levels Refer to figures 25 – 31 Successful use of security levels (SL) begins with determining who the system users are going to be and what access control restrictions will be placed on them. Keep in mind that only one security level can be assigned to an individual user of the system, therefore the security level created for them must address all of the users access needs.
3.5.2 Creating Security Levels Using security levels requires two basic programming steps. The first step is to plan and create the individual security level(s) required and then apply them to the individual entry points (relays). Refer to the Security Level Planning Chart in the back of this manual to see how Security Level 02 was first planned. The second step is to assign the security level to the individual users of the system. This second step is accomplished in Section 4 Data Base Management.
PROGRAMMING LEVELS 9. 10. 11. 12. 13. 14. ADDITIONAL SECURITY Click the Security Level pull down menu down arrow button to select the next security level you want to create. Enter the begin and end times for TZ1, select the days of the week for this time zone and select the relays that this time zone will be applied to. Click TZ2 and enter the begin and end times for TZ2, select the days of the week for this time zone and select the relays that this time zone will be applied to.
3.6 Anti-pass Back Anti-Pass Back (APB) is a feature that addresses the problem of a user handing his card (or other access device) to someone else to use. This is accomplished by recording an ‘APB VIOLATION’ when a card is used at the same reader twice in a row without being used at a different reader in between. For example, lets assume you have a secured area with both an ‘IN’ card reader and an ‘OUT’ card reader.
3.6.4 1. 2. 3. 4. 5. 6. 7. 8. Programming Anti-pass Back Click Anti-Pass under the System Information folder in the sidebar or click the Anti-Pass button in the tool bar. The Anti-Pass Back window will appear. Select PASSIVE, ACTIVE or TRAP anti-pass back mode from the pull-down menu. If the counter is going to be used, select the time interval from the pull-down menu, otherwise leave the selection to OFF. Select which relays are to be designated as IN, and which relays are to be designated as OUT.
3.7 Facility Codes and Device Association The software allows for the option of using or not using device facility codes. When the facility code function is enabled, the device facility code must match with a facility code entered in the program, otherwise access will be denied. If you do not want to use facility codes, leave the facility code enable button unchecked. 3.7.1 1. 2. 3. 4. 5. 6. Facility Codes Click the FACILITY CODE button on the tool bar. The Facility Code window will appear (fig 33).
3.7.2 Device Association The DEVICE ASSOCIATION function allows you to associate the names of a card, transmitter, or other 26-bit wiegand devices connected to the system with certain code numbers restricted to that device. For example, if an entry system is using a combination of card readers and RF transmitters, this feature allows you to name a range of codes associated with each device. This function will also allow you to "mass enable" (turn on) a specified range of codes at one time.
3.7.3 Mass Enable The MASS ENABLE function allows you to activate (turn on) a range of device codes at one time. This allows resident managers or access system administrators to activate a group of cards (or transmitters or PINs) prior to the devices being issued or any users being entered in the database. Once the user(s) is entered in the database, the manager can select the card (or transmitter, or PIN) and assign it to the user. See section 4.
3.8 Elevator Control The elevator control feature is typically used in high-rise apartment buildings or office buildings and is designed to limit which elevator(s) and which floor(s) a person is allowed access to. This control can be applied to building residents and to visitors that have been granted access by a resident.
IDENTIFY THE SYSTEM RELAYS The first step is to identify the system relays that will be used and to name them (refer to 3.2.2). System relay 1 will be used to control the main entry door and is labeled "Main Entry." System relay 2 becomes the command relay for the Tracker™ expansion boards used in this application and is labeled Cmd 3-10. System relay 3 is the card reader on the rear entry and is labeled "Rear Entry.
3.8.3 Programming Security Levels with Elevator Control The first step is to identify the different security levels required to control access as described in our hypothetical building, and then to program these levels into the software program. Refer to Section 3.5 for more information on programming security levels.
SL04 This security level will be assigned to the employees who work at the businesses located on floors 2, 3 and 4. Access is limited to the main entry only (relay 1) Monday through Saturday, 6:00 AM to 8:00 PM. This security level allows the use of elevators 1 and 2 only, and restricts access to floors 2, 3 and 4 only (Fig 43). Figure 43 SL05 SL05 allows business managers access to their offices 24 hours a day, seven days a week through the main entry only.
VISITOR FLOOR CONTROL The next access control criteria to meet in this application is to restrict access for visitors. When a visitor is granted access to the building, they will be allowed access only to the floor that the person they are visiting resides on. Further restrictions can limit the visitor as to which elevator(s) they may use. For example, assume Mr. Smith is visiting Mr. Jones who lives on the 10th floor of our building. When Mr. Jones grants access to Mr.
SL02 Assigned to residents with exercise room privileges. SL04 Assigned to private business employees. TZ1 in this security level provides access 24 hours a day, 7 days a week through the main and rear entry doors, and allows them to use any of the four elevators to access floors 5 through 19. TZ1 in this security level provides access Monday through Saturday, 6:00 AM to 8:00 PM through the main entry door only, and restricts them to elevators 1 and 2 to access floors 2, 3 and 4 only.
1835-066-N-7-13 Page 49
SECTION 4 – DATABASE MANAGMENT Once the account(s) has been created (chapter 2) and the system operating parameters have been set (chapter 3), the access control system user database must be programmed.
4.1.1 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. Adding Database Information Enter the resident (user) name in the name field. Click the H (Hide) button if this name is NOT to be displayed on the electronic directory. (Not applicable if programming is for the 1833 or 1838 system). Enter a 3-digit Alternate Area Code (AAC) if 10-digit dialing is necessary, or enter a 4-digit AAC (1+area code) for any long distance dialing requirements.
Figure 47 Page 52 1835-066-N-7-13
4.2 Assigning Device Codes To use the Assign feature, device codes must be Mass Enabled (3.7.3). 1. 2. 3. 4. 5. 6. 7. Click the user (resident or vendor) that you are going to assign a device (card, transmitter, PIN) code to. An arrow appears next to the user name. Click the ASSIGN button. The Assign Device Number window will appear (Fig 48). Select a device number by clicking on it.
4.3 Elevator Reference The Elevator Reference table is part of the elevator control feature that is typically used in high rise apartments or office buildings and is designed to limit which elevator(s) and to which floor a visitor is allowed access to after being admitted by a resident. To use the elevator control for visitor access, the resident must have their floor number entered in the FLOOR (FL) field on the Resident Info screen.
4.3.2 Assigning Elevator Reference to Residents After the Elevator Reference Table is complete, an elevator reference number must be assigned to each resident using the elevator control feature. This is set on the Resident Information Screen. 1. 2. 3. On the Resident Information Screen, click the resident that you are going to set an Elevator Reference (ER) number for. Enter the Elevator Reference number and press ENTER.
CHAPTER 5 - DATA TRANSFER / REPORTS When transferring data to or from the 1833, 1834, 1835, 1837, or 1838 entry system using the DoorKing Remote Account Manager for Windows, you can choose to transfer the data immediately (Immediate Transfer) or you can set up a schedule to transfer the data at a programmed time (Scheduled Transfer). When performing data transfers (immediate or scheduled), the account name will be highlighted and the Session Status window will appear showing “In Progress or Waiting.
5.1 Immediate Transfer There are three choices of immediate data transfer: Send Data Now; Receive Data Now and Receive Transactions Now. Data transfer times can vary from a few minutes up to 12 minutes depending on the size of the file that you are sending and the method by which you are sending. The send all data function is normally used during the initial programming of the entry system to load the entire database. 5.1.1 1. 2. 3. Send Data Now Click the SEND DATA NOW button in the tool bar.
5.1.2 Receive Data Now The receive data feature is basically the opposite of the send all data feature. Instead of the computer sending data to the entry system, the entry system sends the data to the computer to update the computer files. This feature is useful for auditing or trouble shooting purposes. Caution should be used when using this feature because your resident files will be updated with the information stored in the entry system.
5.1.3 Receiving Transactions The 1833, 1834, 1835, 1837, or 1838 entry systems store all activity in a history buffer which is then down loaded to the PC for auditing, analysis, and record keeping. The history buffer in these units will store up to 8000 events which include the date, time, resident name, if access was by telephone entry, entry code, postal, or card / transmitter and which code number was used. The system will also report if access was granted or denied.
5.2 Scheduled Transfers With the DoorKing Remote Account Manager software, you can set up sophisticated schedules to send data or receive transactions. 5.2.1 1. 2. Scheduling Transfers Click SCHEDULED TRANSFERS in the side bar. The scheduled transfer window appears (Fig 55). Create your transfer schedule(s). When complete, click ACCOUNTS in the side bar. Figure 55 There are 4 schedules you can set up, A, B, C and D.
5.3 Viewing / Reporting Transactions After you have received the transactions from the entry system, you can then view the transaction file on your computer, export the transaction file, print the transaction file, or create a report with specific information. 5.3.1 Viewing Transactions and Reports Figure 56 1. 2. 3. 4. Click on the account that you want to view transactions for in the side bar, then click TRANSACTIONS.
5. To view other transaction files, click the VIEW FILE button. The Open file window (Fig 58) will appear on the transaction screen. Select the transaction file that you want to view by clicking the file then clicking OK. The transactions for the file that you selected will appear on your screen. Transaction files have a .TRA extension. NOTE: If you want to view all transactions files, click the GENERATE REPORT button.
5.3.2 Viewing Live Transactions LIVE TRANSACTIONS can be viewed directly on your computer screen if the access control system is connected to your computer directly via an RS-232 connection, or if you are connected to the access control system via a DKS Server Internet connection or a LAN connection. 1. 2. 3. On the pull down menu, click VIEW and then LIVE TRANSACTIONS. From the Setup Live Transactions window, select the account you want to view, then click OK (Fig 60).
5.3.3 Creating Transaction Reports Once you have received transactions from the entry system and have opened a specific transaction file, the report writer feature lets you set certain parameters to generate specific transaction file reports. For example, you can create a report for a specific date only, or between certain times only, or for a particular resident only. 1. 2. 3. 4. 5. 6. After the transaction file is opened and displayed on your screen, click the REPORT button in the tool bar.
5.4 Live Streaming LIVE TRANSACTIONS can be streamed to a Com Port, a Disk File or an IP/Port Address if the access control system is connected to your computer directly via an RS-232 connection, or if you are connected to the access control system via a DKS Server Internet connection or a LAN connection using the 1830-175 TCP/IP kit. Streaming Live Transactions can be used for other products or software applications to capture transaction data. 1. 2. 3.
5.4.2 Output Format The output format can be either XML or RAW TEXT. This is selected from the drop down box. RAW TEXT If Raw Text is chosen, the output is a stream of 158 ASCII characters, beginning and ending with a Carriage Return (CR) and Line Feed (LF). There are no column headers – just the Raw Text.
5.5 Log Files Log files are time stamped records of activity performed by the software program. To view the log files, click VIEW LOG FILES on the pull down menu under FILE, then select which file you want to view. To clear the log files, click CLEAR LOG FILES under the FILE menu and select which log file to clear. 5.5.1 Events Log The events log provides a detailed report of activity such as data base imports and exports, sends and receives, transaction uploads, automatic activity, etc.
5.6 Exporting / Importing Database Files DoorKing’s Remote Account Manager software has import / export functions that can be used to get resident data into and out of the DoorKing database. Transactions can also be exported with this feature. The Export function exports the database in the popular CVS (comma separated values) file format. This file format is easily read by many common spreadsheet programs, such as Microsoft Excel. The import function recognizes two file formats.
5.6.2 Importing Data in CSV Format (Microsoft Excel) The import process allows the user to import the resident data from a comma separated value (CSV) text file rather than keying in individual residents in the DoorKing Remote Account Manager program. The import file may contain more than one account. The import file is generated from a program such as Microsoft Excel that is capable of saving a file in .CSV format.
Below (Fig 70) is the Lakeside.csv file opened with Microsoft Excel. This is the file we imported into the DoorKing Remote Account Manager program. Note the column headings here. You need to use these column headings so the DoorKing import program can recognize the data. Notice that it’s not necessary to have a ‘T’ or type column since the type of device is determined by the Device Enable screen on the System Info screen.
Important .CSV information In the Excel file example on the previous page, you can see that all the columns of DoorKing data were present and were being maintained in Excel. If other columns of data were in the Excel spread sheet that did not pertain to the DoorKing database, they would have been ignored. If you’re maintaining all columns of data from Excel or some other program and always importing all the data and all the columns, that makes this import process fairly simply.
1. Set up an ACCOUNT in the Remote Account Manager program that you want to import data to. Be sure the required fields are set correctly as described in the above paragraph. 2. From the FILE pull down menu, select IMPORT and then choose IMPORT NOW or SCHEDULED IMPORT. The selected import window will appear (Fig 71). 3. Type in a path name or use the BROWSE button to locate the file you want to import (this is the file you have created in a single comma delimited text file format). 3a.
Below is the WestCon.txt file from the above example opened with Notepad. Note that the non-printable carriage return and line feed characters are present at the end of each line. You must put these characters in your import file. During the import process, the import program will check for errors just as if you were entering the data manually at the screen. If the import process encounters errors, a message is displayed informing you that error details can be found in the summary or events.
CHAPTER 6 – APPENDIX The resident data base files created for a “40 series enhanced” type account can be shared with accounts using a “30 series” circuit board. This allows you to share the resident data files from existing telephone entry systems using 40 series enhanced boards with newer systems installed on the same property using 30 series circuit boards.
6.2 Trouble Shooting If you experience problems with the DoorKing Remote Account Manager for Windows, a problem may exist in your modem, at the telephone entry system, or with the phone line. Before calling your DoorKing dealer or DoorKing directly for assistance, check the following items and be sure to complete the information sheet so that we can properly assist you. 6.2.1 1. 2. 3. 4. 5. 6. 6.2.2 1. 2. 3. 6.2.3 1. 6.2.4 1. Modem Be sure that your modem is working correctly.
6.2.5 Computer / System Information If you need to contact your installing dealer or DoorKing for assistance with the DoorKing Remote Account Manager software, you must have all of the following information available so that we can assist you.
6.2.6 Error Messages These are some of the most common error messages that you may receive when attempting to send (or receive) data and the remedy to fix the errors. There are other error messages that you can receive when entering data in the different screens, many of which are self-explanatory. For example, DUPLICATE CARDS or DUPLICATE DIR CODES error messages alert you to the fact that you have duplicate entries in these respective fields. You can correct these errors as you enter the data.
6.3 Glossary ACCOUNT - When using the DoorKing Remote Account Manager Software for Windows, an account is any single entry system (1833, 1834, 1835, 1837, 1838) installed in the field. Each installed system should be given its own unique name to differentiate it from other systems. ACCOUNT SCREEN - The screen where accounts are created and maintained. The account screen is the primary screen from which most of the functions of the program are carried out.
PIN CODES - Personal Identification Number that is assigned to a system user. A five-digit code entered on a digital keypad that outputs the code to the access system in wiegand format. PIN codes are treated by the system in the same way as card and transmitter codes are processed and treated. RAM - Random Access Memory. Memory that will lose information stored in it if power is removed. RE-SYNC – Used with anti-pass back.
Security Level Planning Guide The sample below was used to create security level 02 as described in Section 3.5.2. Use the guides on the following pages to simplify planning and organizing your different security levels before starting to program the different levels in the software. 1. Name ALL relays that the system will control. Remember that the software program will only allow you to enter 12 characters in the relay name field, so you may have to abbreviate in some cases.
Label each relay in the system. If relay 1 or relay 2 is used to control Tracker expansion boards, we suggest that you label these relays “Tracker Command.” This can be abbreviated in the software as Tracker Cmd. If both relay 1 and relay 2 are used as Tracker Command relays, then relay 0 becomes the controlling relay for visitor entry, otherwise relay 0 is typically not used.
SECURITY LEVEL Time Zone Start Time - Stop Time DAYS S M T S M T W RELAYS T F S 0 1 2 3 4 5 6 7 8 T F S 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 1 2 3 4 SECURITY LEVEL Time Zone Start Time - Stop Time DAYS W RELAYS 9 10 11 12 13 14 15 16 17 18 1 2 3 4 SECURITY LEVEL Time Zone Start Time - Stop Time DAYS S M T W RELAYS T F S 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 1 2 3 4 SECURITY LEVEL Time Zone Start Time - Stop Time DAYS S M T
SECURITY LEVEL Time Zone Start Time - Stop Time DAYS S M T S M T W RELAYS T F S 0 1 2 3 4 5 6 7 8 T F S 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 1 2 3 4 SECURITY LEVEL Time Zone Start Time - Stop Time DAYS W RELAYS 9 10 11 12 13 14 15 16 17 18 1 2 3 4 SECURITY LEVEL Time Zone Start Time - Stop Time DAYS S M T W RELAYS T F S 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 1 2 3 4 SECURITY LEVEL Time Zone Start Time - Stop Time DAYS S M T
SECURITY LEVEL Time Zone Start Time - Stop Time DAYS S M T S M T W RELAYS T F S 0 1 2 3 4 5 6 7 8 T F S 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 1 2 3 4 SECURITY LEVEL Time Zone Start Time - Stop Time DAYS W RELAYS 9 10 11 12 13 14 15 16 17 18 1 2 3 4 SECURITY LEVEL Time Zone Start Time - Stop Time DAYS S M T W RELAYS T F S 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 1 2 3 4 SECURITY LEVEL Time Zone Start Time - Stop Time DAYS S M T