Access Controller User Manual
Access Controller User Manual Legal Information User Manual ©2019 Hangzhou Hikvision Digital Technology Co., Ltd. About this Manual This Manual is subject to domestic and international copyright protection. Hangzhou Hikvision Digital Technology Co., Ltd. ("Hikvision") reserves all rights to this manual. This manual cannot be reproduced, changed, translated, or distributed, partially or wholly, by any means, without the prior written permission of Hikvision.
Access Controller User Manual device with facial recognition features, biometrics data is stored in your device with encryption method; for fingerprint device, only fingerprint template will be saved, which is impossible to reconstruct a fingerprint image.
Access Controller User Manual Available Model Product Name Access Controller Model DS-K2601 Series Access Controller DS-K2602 Series Access Controller DS-K2604 Series Access Controller iii
Access Controller User Manual Regulatory Information FCC Information Please take attention that changes or modification not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment. FCC compliance: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Access Controller User Manual under the EMC Directive 2014/30/EU, RE Directive 2014/53/EU,the RoHS Directive 2011/65/EU 2012/19/EU (WEEE directive): Products marked with this symbol cannot be disposed of as unsorted municipal waste in the European Union. For proper recycling, return this product to your local supplier upon the purchase of equivalent new equipment, or dispose of it at designated collection points. For more information see: www.recyclethis.
Access Controller User Manual Safety Instruction These instructions are intended to ensure that user can use the product correctly to avoid danger or property loss. The precaution measure is divided into Dangers and Cautions: Dangers: Neglecting any of the warnings may cause serious injury or death. Cautions: Neglecting any of the cautions may cause injury or equipment damage. Dangers: Follow these safeguards to prevent serious injury or death.
Access Controller User Manual • The device cover for indoor use shall be kept from rain and moisture. • Exposing the equipment to direct sun light, low ventilation or heat source such as heater or radiator is forbidden (ignorance can cause fire danger). • Do not aim the device at the sun or extra bright places. A blooming or smear may occur otherwise (which is not a malfunction however), and affecting the endurance of sensor at the same time.
Access Controller User Manual Contents Chapter 1 Preventive and Cautionary Tips .................................................................................. 1 Chapter 2 Product Description .................................................................................................... 2 Chapter 3 Main Board Description .............................................................................................. 3 3.1 Single-Door Access Controller Main Board Description ..........................
Access Controller User Manual 5.10.2 NC Wiring of Arming Region Input ............................................................................ 32 5.11 Fire Alarm Module Wiring .................................................................................................. 33 Chapter 6 Settings .................................................................................................................... 35 6.1 Initialization (Option 1) .............................................................
Access Controller User Manual 8.2.2 Network Parameters Settings ................................................................................... 103 8.2.3 Report Strategy Settings ............................................................................................ 104 8.2.4 Network Center Parameters Settings ........................................................................ 104 8.2.5 Change Device Password .....................................................................................
Access Controller User Manual Chapter 1 Preventive and Cautionary Tips Before connecting and operating your device, please be advised of the following tips: • Ensure unit is installed in a well-ventilated, dust-free environment. • Keep all liquids away from the device. • Ensure environmental conditions meet factory specifications. • Ensure unit is properly secured to a rack or shelf. Major shocks or jolts to the unit as a result of dropping it may cause damage to the sensitive electronics within the unit.
Access Controller User Manual Chapter 2 Product Description • 32-bit high-speed processor • Supports TCP/IP communication, EHome 5.0 accessing, ISAPI protocol, and OSDP protocol. The communication data is specially encrypted to relieve the concern of privacy leak • Supports recognition and storage of card No.
Access Controller User Manual Chapter 3 Main Board Description 3.
Access Controller User Manual 3.
Access Controller User Manual 3.3 Four-Door Access Controller Main Board Description Figure 3-3 Four-Door Access Controller Main Board 3.4 Component Description You can view the device's components and their descriptions. Take four-door access controller as an example, the component diagram is shown below.
Access Controller User Manual Figure 3-4 Four-Door Access Controller Component Diagram Table 3-1 Four-Door Access Controller Component Description No.
Access Controller User Manual Example: If the DIP address is 24, switch Bit 4 and Bit 5 to ON. Note • The settings will be valid after the device reboot. • For details about the DIP settings, see Appendix A DIP Switch Description.
Access Controller User Manual Chapter 4 Terminal Description 4.1 Single-Door Access Controller Terminal Description You can view the single-door access controller's terminal description. Figure 4-1 Single-Door Access Controller Main Board Table 4-1 Single-Door Access Controller Terminal Description No.
Access Controller User Manual No.
Access Controller User Manual No.
Access Controller User Manual No. C17 Single-Door Access Controller Alarm Output NO/NC1 C18 COM1 C19 NO/NC2 C20 COM2 D1 Event Input Alarm Relay 1 Output (Dry Contact) Alarm Relay 2 Output (Dry Contact) C2 Event Alarm Input 2 D2 GND Grounding D3 C1 Event Alarm Input 1 Note • The Alarm input hardware interface is normally open by default. Only the normally open signal is allowed.
Access Controller User Manual Figure 4-2 Two-Door Access Controller Main Board Table 4-2 Two-Door Access Controller Terminal Description No.
Access Controller User Manual No.
Access Controller User Manual No.
Access Controller User Manual No.
Access Controller User Manual No. D1 Two-Door Access Controller Event Input C4 Event Alarm Input 4 D2 GND Grounding D3 C3 Event Alarm Input 3 D4 C2 Event Alarm Input 2 D5 GND Grounding D6 C1 Event Alarm Input 1 Note • The alarm input hardware interface is normally open by default. So only the normally open signal is allowed. It can be linked to the buzzer of the card reader and access controller, the alarm relay output, and door relay open and close.
Access Controller User Manual Figure 4-3 Four-Door Access Controller Main Board Table 4-3 Four-Door Access Controller Terminal Description No.
Access Controller User Manual No.
Access Controller User Manual No.
Access Controller User Manual No.
Access Controller User Manual No.
Access Controller User Manual Note • The Alarm input hardware interface is normally open by default. So only the normally open signal is allowed. It can be linked to the buzzer of the card reader and access controller, and the alarm relay output and door relay open and close. • Arming region alarm input linkage is only for the alarm relay output linkage. • RS-485 card ID should be set as 1to 8. Door No.
Access Controller User Manual Chapter 5 Terminal Wiring Warning The high voltage cable should be threaded through the Hole 1 and Hole 2. The Hole 1 and Hole 2 should be installed with rubber ring to avoid the sharp edge cutting the cable and avoid electric shock. 5.1 External Terminal 5.1.1 Single-Door Access Controller Terminal Description You can view the single-door access controller's terminals diagram. Figure 5-1 Single-Door Access Controller Terminals 5.1.
Access Controller User Manual Figure 5-2 Two-Door Access Controller Terminals 5.1.3 Four-Door Access Controller Terminal Description You can view the four-door access controller's terminals diagram. Figure 5-3 Four-Door Access Controller Terminal 5.2 Wiegand Card Reader Wiring You can view the Wiegand card reader wiring diagram.
Access Controller User Manual Figure 5-4 Wiegand Card Reader Wiring Diagram Note You must connect the OK/ERR/BZ, if using access controller to control the LED and buzzer of the Wiegand card reader. 5.3 RS-485 Card Reader Wiring You can view the RS-485 card reader wiring diagram.
Access Controller User Manual Figure 5-5 RS-485 Card Reader Wiring Diagram Note If the card reader is installed too far away from the access controller, you can use an external power supply. 5.4 Cathode Lock Wiring You can view the cathode lock wiring diagram.
Access Controller User Manual Figure 5-6 Wiring Diagram of Cathode Lock 5.5 Anode Lock Wiring You can view the anode lock wiring diagram.
Access Controller User Manual Figure 5-7 Wiring Diagram of Anode Lock 5.6 External Alarm Device Wiring You can view the external alarm device wiring diagram.
Access Controller User Manual Figure 5-8 External Alarm Device Wiring 5.
Access Controller User Manual Figure 5-9 Exit Button Wiring 5.8 Door Contact Wiring You can view the door contact wiring diagram. Figure 5-10 Door Contact Wiring 5.9 Power Supply Wiring You can view the power supply wiring diagram.
Access Controller User Manual Figure 5-11 Power Supply Wiring 5.10 Arming Region Input Wiring 5.10.1 NO Wiring of Arming Region Input You can view the arming region input of NO wiring.
Access Controller User Manual Figure 5-12 NO Wiring 5.10.2 NC Wiring of Arming Region Input You can view the arming region input of NC wiring.
Access Controller User Manual Figure 5-13 Normally Closed Wiring 5.11 Fire Alarm Module Wiring You can view the fire alarm module wiring diagram.
Access Controller User Manual Figure 5-14 Fire Alarm Module Wiring 34
Access Controller User Manual Chapter 6 Settings 6.1 Initialization (Option 1) You can initialize the device with the jumper cap. Steps 1. Remove the jumper cap from the Normal terminal. 2. Cut off the power and restart the access controller. The controller buzzer buzzes a long beep. 3. When the beep stopped, plug the jumper cap back to Normal. 4. Cut off the power and restart the access controller.
Access Controller User Manual Figure 6-2 Initialization Jumper Note The device initialization will restore all the parameters to the default settings and all the device event logs will be deleted. 6.3 Relay Output NO/NC Settings 6.3.1 Lock Relay Output Settings You can view the NO/NC status of the lock relay.
Access Controller User Manual Lock Relay NC Status Figure 6-4 NC Status 6.3.2 Alarm Relay Output Settings You can view the NO/NC status of the alarm relay.
Access Controller User Manual Chapter 7 Activation You should activate the device before the first login. After powering on the device, the system will switch to Device Activation page. Activation via the device, SADP tool and the client software are supported. The default values of the device are as follows: • The default IP address: 192.0.0.64 • The default port No.: 8000 • The default user name: admin 7.
Access Controller User Manual Status of the device becomes Active after successful activation. 5. Modify IP address of the device. 1) Select the device. 2) Change the device IP address to the same subnet as your computer by either modifying the IP address manually or checking Enable DHCP. 3) Input the admin password and click Modify to activate your IP address modification. 7.
Access Controller User Manual Caution The password strength of the device can be automatically checked. We highly recommend you change the password of your own choosing (using a minimum of 8 characters, including at least three kinds of following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
Access Controller User Manual Chapter 8 Client Software Configuration 8.1 Operation on Client Software The Access Control module provides multiple functionalities, including person and card management, permission configuration, and other advanced functions. Note For the user with access control module permissions, the user can enter the Access Control module and configure the access control settings.
Access Controller User Manual 2. Click Device tab and select Hikvision Device as the device type to display the Online Device area. Figure 8-1 Online Device 3. Select an online device from the Online Device area. Note For the inactive device, you need to create the password for it before you can add the device properly. For detailed steps, refer to Activation . 4. Click Add to Client to open the device adding window. 5. Input the required information. Address Input the device's IP address.
Access Controller User Manual Note You can import all the channels of the device to the corresponding group by default. 8. Optional: Add the offline devices. 1) Check Add Offline Device. 2) Input the required information, including the device channel number and alarm input number. 3) Click Add. When the offline device comes online, the software will connect it automatically. 9. Click Add to add the device. Add Multiple Online Devices You can add multiple online devices to the client software.
Access Controller User Manual Proper configuration of all passwords and other security settings is the responsibility of the installer and/or end-user. 6. Optional: Check Synchronize Device Time to synchronize the time of the devices with the PC running the client after adding the devices to the client. 7. Optional: Check Export to Group to create a group by the device name. Note You can import all the channels of the device to the corresponding group by default. 8. Click Add to add the devices.
Access Controller User Manual 5. Optional: Check Synchronize Device Time to synchronize the time of the devices with the PC running the client after adding the devices to the client. 6. Optional: Check Export to Group to create a group by the device name. Note You can import all the channels of the device to the corresponding group by default. 7. Click Add to add the devices. Add Device by IP Address or Domain Name You can add device by IP address or domain name.
Access Controller User Manual 6. Optional: Check Synchronize Device Time to synchronize the device time with the PC running the client after adding the device to the client. 7. Optional: Check Export to Group to create a group by the device name. Note You can import all the channels of the device to the corresponding group by default. 8. Optional: Add the offline devices. 1) Check Add Offline Device. 2) Input the required information, including the device channel number and alarm input number. 3) Click Add.
Access Controller User Manual Caution The password strength of the device can be automatically checked. We highly recommend you change the password of your own choosing (using a minimum of 8 characters, including at least three kinds of following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
Access Controller User Manual 7. Optional: Check Export to Group to create a group by the device name. 8. Optional: Add the offline devices. 1) Check Add Offline Device. 2) Input the required information, including the device channel number and alarm input number. 3) Click Add. Note When the offline device comes online, the software will connect it automatically. 9. Click Add to add the device.
Access Controller User Manual If you set 0 as the adding mode, this field is not required; if you set 2 as the adding mode, input the device ID registered on the IP Server; if you set 3 as the adding mode, input the device domain name registered on HiDDNS server; if you set 4 as the adding mode, input the EHome account; if you set 6 as the adding mode, input the device serial No. User Name Input the device user name. By default, the user name is admin. Password Input the device password.
Access Controller User Manual If you set 5 as the adding mode, input the DIP address of the access control device. Cloud P2P Account If you set 6 as the adding mode, input the Cloud P2P account. Cloud P2P Password If you set 6 as the adding mode, input the Cloud P2P account password. 6. Click and select the template file. 7. Click Add to import the devices. 8.1.
Access Controller User Manual Note If you select Residence mode, you cannot configure person's attendance rule when adding person. 3. Click OK. 8.1.3 Configure Other Parameters After adding the access control device, you can set its parameters such as network parameters, capture parameters, RS-485 parameters, Wiegand parameters, etc. Set Network Parameters After adding the access control device, you can set the device log uploading mode, and create EHome account via wired or wireless network.
Access Controller User Manual Create EHome Account in Wire Communication Mode You can set the account for EHome protocol in wire communication mode. Then you can add devices via EHome protocol. Perform this task when you need to create EHome account in wire communication mode for access control device. Steps Note This function should be supported by the device 1. 2. 3. 4. 5. 6. 7. Click Access Control → Device Management to enter the Device Management page.
Access Controller User Manual 1. Click Access Control → Device Management to enter the Device Management page. 2. Select the device in the device list and click Modify. 3. Click Network Settings → Wireless Communication Center to enter the Wireless Communication Center page. 4. Select the center group from the drop-down list. 5. Input the IP address and port number. Note • By default, the port number for EHome is 7660.
Access Controller User Manual 8.1.4 Manage Organization You can manage the organization as desired, such as adding, editing, or deleting the organization. Perform this task when you need to manage organization. Steps 1. Click Access Control → Person and Card to enter the person and card management page. 2. Click Add to pop up Add Organization window. 3. Create a name for the organization. 4. Click OK. Note Up to 10 levels of organizations can be added. 5.
Access Controller User Manual Configure Person's Basic Information You can add person to the client software one by one and configure the person's basic information such as name, gender, phone number, etc. Perform this task when you need to configure the person's basic information when adding person. Steps 1. Enter Access Control → Person and Card . 2. Select an organization in the organization list to add the person. 3. Click Add to open the adding person window. The Person No.
Access Controller User Manual Perform this task when you need to configure the person's detailed information. Steps 1. Enter Access Control → Person and Card . 2. Select an organization in the organization list to add the person and click Add. Note Input the person's basic iformation first. For details about configuring person's basic information, refer to Configure Person's Basic Information . 3. Click Details tab. 4. Input the detailed information of the person, including person's ID type, ID No.
Access Controller User Manual 6. In the Permission(s) to Select list, check the permission(s) checkbox(es) and click > to add to the Selected Permission(s) list. 7. Confirm to add the person. - Click OK to add the person and close the Add Person window. - Click Save and Continue to add the person and continue to add other persons . Issue a General Card to Person When adding person, you can issue a general card with a unique card number to the person.
Access Controller User Manual 2. Click Read to get the card number. - Card Enrollment Station 1. Connect the card enrollment station with the PC running the client. 2. Click Set Card Enrollment Station to set the card enrollment station's parameters. 3. Select the Card Enrollment Station type. Note Currently, the supported card reader types include DS-K1F100-D8, DS-K1F100-M, DS-K1F100D8E, and DS-K1F180-D8E. 4.
Access Controller User Manual Note Input the person's basic information first. For details about configuring person's basic information, refer to Configure Person's Basic Information. 3. Click Credential → Fingerprint tab to enter the card credential settings page. 4. Select the collection mode as Local Collection. 5. Connect the fingerprint recorder to the PC and set its parameters. 1) Click Set Fingerprint Machine to open the setting fingerprint machine window. 2) Select the device type.
Access Controller User Manual Collect Person's Fingerprint Remotely When adding person, you can collect the person's fingerprint information via the remote access control device's fingerprint module. Perform this task when you need to collect the person's fingerprint via the fingerprint module of the access control device. Steps 1. Enter Access Control → Person and Card . 2. Select an organization in the organization list to add the person and click Add. Note Input the person's basic information first.
Access Controller User Manual 2. Select an organization in the organization list to add the person and click Add. 3. Enter person's basic information. Note For details about configuring person's basic information, refer to Configure Person's Basic Information . 4. Click Attendance Rule tab. Note This tab page will display when you select Non-Residence mode as the application scene when running the software for the first time. For details, refer to Select Application Scenario . 5.
Access Controller User Manual f1 to f10 The person's fingerprint data. f1card to f10card The fingerprint's linked card number. If it links to no card, leave it empty. Note If the person has multiple cards, separate the card No. with semicolon. 5. Enter Access Control → Person and Card , click Import Person and select the Excel file with person information. 6. Click OK to start importing. Note If the person No.
Access Controller User Manual Steps Note • This function is only supported by the device the connection mothod of which is TCP/IP when adding the device. • If the person name stored in the device is empty, the person name will be filled with the issued card No. after importing to the client. • The gender of the persons will be Male by default. 1. Enter Access Control → Person and Card . 2. Select an organization to import the persons. 3. Click Get Person to open the selecting device window.
Access Controller User Manual Example If the card quantity is 3, you can read or enter three card numbers for each person. 4) Set the effective time and expiry time of the card. 4. In the Person(s) with No Card Issued list on the left, select the person to issue cards. 5. Select the reading card mode and input the card number. Access Controller Reader Place the card on the reader of the Access Controller and click Read to get the card No.
Access Controller User Manual Note Before reading by card enrollment station, you need to connect the card enrollment station with the PC running the client first. You can click Read → Set Card Enrollment Station to set its parameters. For details, refer to Issue a General Card to Person . 3. Click Search. The search results will display in the person list.
Access Controller User Manual Report Card Loss If the person lost his/her card, you can report the card loss so that the related access control permission will be deleted. Perform this task if you need to report the card loss for the person who lost his/her card. Steps 1. Enter Access Control → Person and Card module. 2. Optional: Search the person you want to report card loss for. Note For searching the person, refer to Search Person Information . 3.
Access Controller User Manual This field is only available when the model is DS-K1F100-D8E or DS-K1F180-D8E. Select the card type as EM card or IC card according to the actual card type. If the card contains both EM and IC chips, you can also select All to read the numbers of both EM and IC chips. Serial Port No. and Baud Rate These two fields are only available when the model is DS-K1F100-M. Select the COM the card enrollment station connects to and set the baud rate.
Access Controller User Manual Note There are two default week schedules: Whole Week Schedule and Blank Schedule, and they cannot be edited or deleted. Whole Week Schedule Card swiping is valid on each day of the week. Blank Schedule Card swiping is invalid on each day of the week. 2. Add a week schedule. 1) Click Add Week Schedule to open the Add Week Schedule dialog. 2) Input a desired name in the Week Schedule Name field. 3) Click OK to add the week schedule. 3.
Access Controller User Manual 2. Add a holiday group. 1) Click Add Holiday Group on the left to open the adding holiday group window. 2) Create a name for the holiday group. 3) Click OK. 3. Add a holiday period to the holiday group and configure the holiday duration. Note Up to 16 holiday periods can be added to one holiday group. 1) Click Add Holiday. 2) Drag to draw the period, which means in that period of time, the configured permission is activated.
Access Controller User Manual 3. Click the added template in the left list to show its property on the right. 4. Add a week schedule to apply to the template. 1) Click Week Schedule tab on the right. 2) In the Week Schedule field, select a configured week schedule. 3) Optional: Click Add Week Schedule to add a new week schedule. Note For details about adding a week schedule, refer to Add Week Schedule . 5. Add a holiday group schedule to apply to the template.
Access Controller User Manual 1. 2. 3. 4. Click Access Control → Permission to enter the Permission Management interface. Click Add to open the adding permission window. In the Permission Name text field, create a name for the permission as you want. Select a schedule template for the permission. Note You should configure the template before permission settings. You can click Add Template to add the template. Refer to Configure Schedule and Template for details. 5.
Access Controller User Manual Note The person name is case sensitive. Card No. Input the keyword of the card number. Permission Name The permission name is case sensitive. 4. Click Search. The search results will display below. 5. Click Reset to clear the search conditions. 8.1.
Access Controller User Manual Note The displayed parameters may vary for different access control devices. RS-485 Card Reader Communication Redundancy You should check the checkbox if you wire the RS-485 card reader to the access control device redundantly. Press Key to Input Card No. If you check the checkbox, you can input the card No. by pressing the key. 4. Click Save. 5. Optional: Click Copy to and select the access control device to copy the parameters to other devices.
Access Controller User Manual Super Password The specific person can open the door by inputting the super password. Dismiss Code Create a dismiss code which can be used to stop the buzzer of the card reader (by entering the dismiss code on the keypad). Note • The duress code, super code, and dismiss code should be different. • The duress code, super password, and the dismiss code should be different from the authentication password.
Access Controller User Manual Configure Card Reader Parameters After adding the access control device, you can configure its card reader parameters. Perform this task when you want to configure card reader parameters for the access control device. Steps 1. Click Access Control → Advanced Function → Access Control Parameters to enter Parameter Settings page. 2. Select an access controller and click to show the card readers of the selected access controller. 3.
Access Controller User Manual When the access control device cannot connect with the card reader for longer than the set time, the card reader will turn offline automatically. Buzzing Time Set the card reader buzzing time. The available time ranges from 0 to 5,999s. 0 represents continuous buzzing. Card Reader Type/Card Reader Description Get card reader type and description. They are read-only. Fingerprint Recognition Level Select the fingerprint recognition level in the drop-down list.
Access Controller User Manual Trigger Alarm Output Select the alarm output(s) to be triggered. 4. Click Save. 5. Optional: Click the switch on the upper-right corner to arm or disarm the alarm input. Configure Alarm Output Parameters After adding the access control device, if the device links to alarm outputs, you can configure the parameters. Perform this task if you need to set the alarm input parameters of the access control device. Steps 1.
Access Controller User Manual 6. Optional: If applying individual authentication mode failed, click Failed Application to view details. Select an applying status from the list and click Apply Again to apply the person's authentication mode again to the device. Configure Card Reader Authentication Mode and Schedule You can set the passing rules for the card reader of the access control device according to your actual needs.
Access Controller User Manual Before You Start Set the card permission and apply the permission settings to the access control device. For details, refer to Assign Permission to Person . Perform this task when you want to set authentications for multiple cards of one access control point (door). Steps 1. Click Access Control → Advanced Function → Multiple Authentication to enter the Multiple Authentication page. 2. Select an access control device in the list of Controller List panel. 3.
Access Controller User Manual Note You can check Offline Authentication to enable the super password authentication when the access control device is disconnected with the client. Local Authentication and Super Password Authentication by the access control device and by the super password. 4) Select the added card group in the left list below and click to add the selected card group to the right list as the authentication group. 5) Optional: Click or to set the card swiping order.
Access Controller User Manual 3. Select the first card mode as Remain Open with First Card, Disable Remain Open with First Card, or First Card Authorization from the drop-down list for each access control point of the selected device. Remain Open with First Card The door remains open for the configured time duration after the first card swiping until the remain open duration ends. If you select this mode, you should set the remain open duration.
Access Controller User Manual Steps Note Either the anti-passing back or multi-door interlocking function can be configured for an access control device at the same time. For the configuration of multi-door interlocking, refer to Configure Multi-door Interlocking . 1. Click Access Control → Advanced Function → Anti-Passback to enter the anti-passing back configuration page. 2. Select an access control device in the list. 3. Select a card reader as the beginning of the path in the First Card Reader field. 4.
Access Controller User Manual Configure Route Anti-passing Back Based on Card The route anti-passing back depends on the card swiping route. You should set the first card reader and the card readers afterwards. It will judge the anti-passing back according to the entrance and exit records on the card. Perform this task if you need to configure route anti-passing back and judge the anti-passing back according to the entrance and exit records on the card.
Access Controller User Manual Note • Up to 16 card readers afterward can be added for each card reader. • The displayed card readers in the card reader afterward input field should be in authentication order. 3) Check the checkbox in the Enable Anti-passing Back column to enable the anti-passing back function. 8. Click Save. Configure Route Anti-passing Back Based on Network The route anti-passing back depends on the card swiping route. You should set the first card reader and the card readers afterwards.
Access Controller User Manual Figure 8-5 Select First Card The icon will turn to . 2) Click the card reader afterward input field to select the card readers afterward in the pop-up window. Note • Up to 16 card readers afterward can be added for each card reader. • The displayed card readers in the card reader afterward input field should be in authentication order. 3) Check the checkbox in the Enable Anti-passing Back column to enable the anti-passing back function. 8. Click Save.
Access Controller User Manual Note Up to 64 devices with anti-passing back function can be added. 7. In the Card Reader area, check the checkboxes in the Enable Anti-passing Back column to select the entrance card reader and the exit card reader. Note Up to one entrance carder and one exit card reader should be checked. 8. Click Save.
Access Controller User Manual Configure Multi-door Interlocking You can set the multi-door interlocking between multiple doors of the same access control device. To open one of the doors, other doors must keep closed. That means in the interlocking combined door group, up to one door can be opened at the same time. Perform this task when you want to realize interlocking between multiple doors.
Access Controller User Manual Note • The authentication password function should be supported by the access control device. • Up to 500 cards with authentication password can be added to one access control device. The password should be unique and cannot be same with each other. Steps 1. Click Access Control → Advanced Function → Authentication Password to enter the authentication password configuration page. 2. Select an access control device in the list of Controller List panel.
Access Controller User Manual 2. Select a custom Wiegand on the left. 3. Check Enable to enable the custom Wiegand. 4. Create a Wiegand name. Note Up to 32 characters are allowed in the custom Wiegand name. 5. Click Select Device to select the access control device for setting the custom wiegand. 6. Set the parity according to the property of the third party card reader. Note • Up to 80 bits are allowed in the total length.
Access Controller User Manual Search Access Control Events Stored in Local Client You can search the history access records and events from the database of the current client and export the records to local PC. Steps Note You can search the access control events within three months. 1. Click Access Control → Search → Access Control Event to enter the searching access control event page. 2. Select the event source as Local Event. 3.
Access Controller User Manual The matched access control events will display. 5. Optional: Click Export to export the search results to the local PC in CSV file. 8.1.10 Configure Access Control Alarm Linkage For the added access control device, you can configure the linkage actions such as client linkage, device linkage, or cross-device linkage. Configure Client Actions for Access Event You can assign client linkage actions to the event by setting up a rule.
Access Controller User Manual Configure Device Linkage for Access Control Alarm You can set the access control device's linkage actions for the access control device's triggered alarm. When the alarm is triggered, it can trigger the alarm output, host buzzer, and other actions on the same device. Perform this task when you need to configure the access control device linkage for the device's access control alarm. Steps Note It should be supported by the device. 1. 2. 3. 4. 5. 6.
Access Controller User Manual Note • The door status of open, close, remain open, and remain close cannot be triggered at the same time. • The target door and the source door cannot be the same one. Audio Play The audio prompt will be triggered. And the select audio index related audio content will be played according to the configured play mode. 7. Click Save. 8.
Access Controller User Manual The recording will be triggered. Note The device should support recording. Card Reader Buzzer The audible warning of card reader will be triggered. Alarm Output The alarm output will be triggered for notification. Zone Arm or disarm the zone. Note The device should support zone function. Access Control Point The door status of open, close, remain open, and remain close will be triggered.
Access Controller User Manual Steps 1. Click Event Management → Event Card Linkage to enter the Event Card Linkage page. 2. Select an access control device from the list on the left. 3. Click Add to add a new linkage. 4. Select the event source as Employee ID Linkage. 5. Select an employee ID from the drop-down list. 6. In the Linkage Target panel, set the property switch to On to enable the linkage action. Host Buzzer The audible warning of access control device will be triggered.
Access Controller User Manual Configure Cross-Device Linkage for Access Control Event When the access control event is triggered and detected, it can trigger linkage actions of other access control device, such as alarm output, opening door, etc. The event can be divided into four types: device event, alarm input, door event, and card reader event. Perform this task when you need to configure other access control device's linkage actions for access control event.
Access Controller User Manual 6. Click Save. Configure Cross-Device Linkage for Card Swiping When person swipes the specified card on the specified card reader, it can trigger linkage actions of other access control device, such as alarm output, opening door, etc. Perform this task when you need to configure other access control device's linkage actions for card swiping. Steps 1. Click Event Management → Cross-Device Linkage to enter the cross-device linkage configuration interface. 2.
Access Controller User Manual 3. Select the linkage type as Employee ID Linkage. 4. Set the employee ID. 1) Select the access control device as event source device. 2) Select the card reader for triggering. 5. Set the target access control device as linkage target. 1) Select the access control device from the dropdown list as the linkage target. 2) Set the switch to on to enable the linkage action. Alarm Output The alarm output pf the target device will be triggered for notification.
Access Controller User Manual 4) Click OK. 3. Import the access control points to the group. 1) Click Import. 2) Click Access Control Point tab. 3) Select the access control points in the list. 4) Select a group from the group list. 5) Click Import to import the selected access control points to the group. Control Door Status You can control the status for a single access control point (door), including opening door, closing door, remaining open, and remaining closed.
Access Controller User Manual Check Real-time Access Records The access records of all access control devices will display in real time, including card swiping records, face recognitions records, fingerprint comparison records, etc. Steps 1. Click Status Monitor and you can view the real-time access records. The logs of access records will display in real time. You can view the details of the records, including card No., person name, organization, event time, etc. 2.
Access Controller User Manual 2) Check the checkbox(es) to select the alarm(s), including device exception alarm, door event alarm, card reader alarm, and alarm input. 3) Click OK to save the settings. 8.1.12 Control Door during Live View During live view, you can control the camera's linked access control point (door) such as opening door, closing door, etc. Perform this task when you need to control the camera's linked door to open or close during live view. Steps 1.
Access Controller User Manual Steps Note • For Video Access Control Terminal, you can also add its camera to the E-map to view the live view of the camera. • For detailed operations of E-map, refer to . 1. 2. 3. 4. 5. Enter E-map module. Click Edit on the E-map toolbar to enter the map editing mode. Click on the toolbar to open the Add Hot Spot window. Select the access control point to be added as hot spot.
Access Controller User Manual 8.2.1 Time Management Manage device's time zone, time synchronization, and DST parameters. Time Zone and Time Synchronization On the Device for Management page, select a device and click Remote Configuration → System → Time to enter the Time tab. You can select a time zone, set NTP parameters, or manually synchronize time. Time Zone Select a time zone from the drop-down list. NTP The device will synchronize time with NTP automatically.
Access Controller User Manual HTTP Set the HTTP port, DNS1 server address, and DNS2 server address. 8.2.3 Report Strategy Settings You can set the center group for uploading the log via the EHome protocol. On the Device for Management page, click Remote Configuration → Network → Report Strategy to enter the Report Strategy Settings tab. You can set the center group and the system will transfer logs via EHome protocol. Click Save to save the settings.
Access Controller User Manual 8.2.5 Change Device Password You can change the device password. Before You Start Make sure the device is activated. For details, see Activation. Steps 1. On the Device for Management page, click Remote Configuration → System → User to enter the User tab. 2. Select a user and click Edit to enter the Edit page. 3. Input the old password, create a new password, and confirm the new password. Caution The password strength of the device can be automatically checked.
Access Controller User Manual 8.2.7 Optimize Event Name The system will upload the optimized event name to the client software after enabling the function. On the Device for Management page, click Remote Configuration → Settings → Event → Optimize Event Name . Enable Optimize Event Name, and click Save. The system can upload the optimized event name to the client software. 8.2.8 Set Event Mode According to the employee ID length, you can set different event mode.
Access Controller User Manual Restore All All device parameters will be restored to the default ones. The device should be activated after restoring. Upgrade On the Device for Management page, click Remote Configuration → System → System Maintenance to enter the System Maintenance tab. Select a device type from the drop-down list, click Browse and select an upgrade file from the local computer, and click Upgrade. Note • If you select Card reader as the device type, you should also select a card reader No.
Access Controller User Manual 3. Click Add to enter Add Time Period page. 4. Set the time period related parameters. Attend at Least Set the minimum attendance time. Note If you have configured the different card readers as start-work and end-work check points, you can check Absence time is not included in effective work hours to exclude the absence time from the work hours. Check-in / Check-out Required Check the checkboxes and set the valid period for check-in or check-out.
Access Controller User Manual Set Department Schedule You can set the shift schedule for one department, and all the persons in the department will be assigned with the shift schedule. Before You Start In Time and Attendance module, the department list is the same with the organization in Access Control module. You should add departments and persons in Access Control module first. See Manage Organization and Manage Person Information for details. Perform this task when you need to set department schedule.
Access Controller User Manual Set Person Schedule You can assign the shift schedule to one person. You can also view and export the person schedule details. Before You Start Add department and person in Access Control module. See Manage Organization and Manage Person Information for details. Perform this task when you need to set person schedule. Steps 1. Enter Time and Attendance module. 2. Click Shift Schedule Management to enter the Shift Schedule Management page. 3.
Access Controller User Manual Perform this task when you need to set temporary schedule. Steps Note The temporary schedule has higher priority than department schedule and person schedule. 1. 2. 3. 4. 5. 6. 7. 8. Enter Time and Attendance module. Click Shift Schedule Management tab to enter the Shift Schedule Management page. Select the department and select one person. Click Temporary Schedule to pop up Temporary Schedule window. Click to set the shift date. Select the time period.
Access Controller User Manual 8.3.2 Manually Correct Check-in/out Record If the attendance status is not correct, you can manually correct the check-in or check out record. You can also edit, delete, search, or export the check-in or check-out record. Before You Start • You should add organizations and persons in Access Control module. For details, refer to Manage Organization and Manage Person Information . • The person's attendance status is incorrect.
Access Controller User Manual Steps 1. Enter Time and Attendance module. 2. Click Attendance Handling → Leave and Business Trip to enter the Leave and Business Trip page. 3. Click Add to open the Add Leave and Business Trip Application window. 4. Select the leave and business trip type from the drop-down list. Note You can set the leave type in Advanced Settings. For details, refer to Configure Leave Type . 5. Click and set the time period for your leave or business trip. 6.
Access Controller User Manual Steps Note It will calculate the attendance data till the previous day. 1. Enter the Time and Attendance module. 2. Click Attendance Handling → Attendance Calculation to enter the attendance record calculation page. 3. In the Auto-Calculate Attendance panel, set the time that you want the client to calculate the data every day. 4. Click Save. Manually Calculate Attendance Data You can calculate the attendance data manually by setting the data range.
Access Controller User Manual 2. Click Advanced Settings → Basic Settings to enter the Basic Settings page. 3. Set the start day of each week and the start date of each month from the drop-down list. 4. Set the non-work day settings. Set as Non-Work Day Check the checkboxes to set the dates as non-work days. Set Non-Work Day's Color in Report Select the color from the Select Color window. The non-work days in the report will mark as the configured color.
Access Controller User Manual Perform the following steps to set the card reader of the access control point as the attendance check point. Steps Note By default, all card readers of the added access control devices are set as attendance checkpoint. 1. Enter the Time and Attendance module. 2. Click Advanced Settings → Attendance Check Point Settings to enter the Attendance Check Point Settings page. 3. Optional: Uncheck Set All Card Readers as Check Points.
Access Controller User Manual Perform this task if you want to configure a holiday with fixed date. Steps 1. Enter the Time and Attendance module. 2. Click Advanced Settings → Holiday Settings to enter the Holiday Settings page. 3. Click to pop up the Add Holiday window. 4. Click Fixed Date tab. Figure 8-8 Add Holiday with Fixed Date 5. 6. 7. 8. Customize a name for the holiday. Set the start date as the first day of the holiday. Set the number of days in the holiday.
Access Controller User Manual Figure 8-9 Add Regular Holiday 5. Set the holiday parameters. Start Date The first day of the holiday. Effective Period The years during which the holiday's start date will take effect. For example, if the holiday's effective period is set as 2018 to 2019, and the start date is set as December 31st, and the numbers of days is 3, then the holiday will be 2018/12/31 to 2019/01/02, 2019/12/31 to 2020/01/02. 6. Click OK. 7.
Access Controller User Manual Figure 8-10 Add Irregular Holiday 5. Set the holiday parameters. Start Date The first day of the holiday. Effective Period The years during which the holiday's start date will take effect. For example, if the holiday's effective period is set as 2018 to 2019, and the start date is set as December 31st, and the numbers of days is 3, then the holiday will be 2018/12/31 to 2019/01/02, 2019/12/31 to 2020/01/02. Note If one holiday crosses two years and the effective period 6.
Access Controller User Manual 5. Click to add a minor leave type on the right panel. 6. Optional: Perform one of the following operations for major leave type. Edit the minor leave type. Delete the minor leave type. 8.3.6 View Attendance Report After calculating attendance data, you can check the attendance summary, attendance details, abnormal attendance, overtime, card swiping logs and reports based on the calculated attendance data.
Access Controller User Manual Report Generate the attendance report. Export Export the results to the local PC. Search Employees' Detailed Attendance Data You can search the employee's every attendance data with details, including the attendance date, the person belonged shift, time period, start-work status, end-work status, check-in time, checkout time, late period, early leave period, attendance period, absence period, leave period, and overwork period.
Access Controller User Manual Search Employees' Abnormal Attendance Data You can search and get the statistics of the employee's abnormal attendance data, including No., name and department of the employees, abnormal type, start/end time and date of attendance. Before You Start • You should add organizations and persons in Access Control module and the persons has swiped card. For details, refer to Manage Organization and Manage Person Information • Calculate the attendance data.
Access Controller User Manual Before You Start • You should add organizations and persons in Access Control module and the persons has swiped card. For details, refer to Manage Organization and Manage Person Information . • Calculate the attendance data. Note • The client will automatically calculate the previous day's attendance data at 1:00 am on the next day. • Keep the client running at 1:00 am or it cannot calculate the previous day's attendance data automatically.
Access Controller User Manual Note • The client will automatically calculate the previous day's attendance data at 1:00 am on the next day. • Keep the client running at 1:00 am or it cannot calculate the previous day's attendance data automatically. If not calculated automatically, you can calculate the attendance data manually. For details, refer to Manually Calculate Attendance Data . Perform the following steps to searching and the view card swiping log. Steps 1. Enter the Time and attendance module. 2.
Access Controller User Manual Steps 1. Enter the Time and Attendance module. 2. Click Attendance Statistics → Report to enter the Report page. 3. In the Instant Report panel, select a report type from the drop-down list. 4. Select a person or department. 5. Set the time period during which the attendance data will be displayed in the report. 6. Click Generate.
Access Controller User Manual Note You can click to add a new email address. Up to 5 email addresses are allowed. 6. Click Save. 7. Optional: After adding the scheduled report, you can do one or more of the followings: Modify Report Select one added report and click Modify to edit its settings. Delete Report Select one added report and click Remove to delete it. Generate Report Select one added report and click Generate to generate the report instantly and you can view the report details.
Access Controller User Manual Appendix A. Tips for Scanning Fingerprint Recommended Finger Forefinger, middle finger or the third finger. Correct Scanning The figure displayed below is the correct way to scan your finger: You should press your finger on the scanner horizontally. The center of your scanned finger should align with the scanner center.
Access Controller User Manual Others If your fingerprint is shallow, or it is hard to scan your fingerprint, we recommend you to use other authentication methods. If you have injuries on the scanned finger, the scanner may not recognize. You can change another finger and try again.
Access Controller User Manual Appendix B. DIP Switch Description No.1 to No 8 is from the low bit to the high bit. When the switch is towards ON, it means the switch is enabled, otherwise, the switch is off. If you set the DIP switch like the figure displayed below, its binary value is 00001100, and its decimal value is 12.
Access Controller User Manual Appendix C.
Access Controller User Manual Even Parity Start Bit, and Length If you select Even Parity, these items are available. If the even parity start bit is 12, and the length is 12, then the system will start even parity calculation from bit 12. It will calculate 12 bits. The result will be in the last bit. XOR Parity Start Bit, Length per Group, and Total Length If you select XOR Parity, these items are available.
UD05678B-C