Special Options For Devices: Deds (Data Entry Devices) - Chamberlain IPAC Administrator's Manual

Table of Contents

Advertisement

IPAC Server Administrator's Manual

Special Options for Devices: DEDs (Data Entry Devices)

The DED (Data Entry Device) feature allows administrators to assign and configure
touchscreens or keypads to interact with the users of an elevator system attached to the
IPAC Server.
NOTE :
DED (Data Entry Device) functionality requires a license key.
Without the license key, DED functionality will be disabled.
To create a Data Entry Device:
1. Scroll over the Configuration link. The sub-navigation menu displays.
2. From the sub-navigation menu, click Devices from the dropdown list. The Device
List page displays.
3. Click Create New Device.
4. From the dropdown menu, select DED Device and click Next.
5. Enter the Name of the DED device.
6. If available, select the Account Owner from the dropdown list.
7. If available, select the Device Profile from the dropdown list.
8. Select the Control Panel from the dropdown list.
9. Select the Input from the dropdown list.
10. Enter the Group Number in the field provided (values from1-255).
11. Enter the Landing Number in the field provided (values from 1-255).
12. Enter the Object Number in the field provided (unique DED identifier).
13. Select Which Side (Front or Rear).
14. If you wish to require the display of two credentials in order to permit access,
enable a two-factor credential schedule from the dropdown list. If you do not
wish to require two-factor credentials, choose "none."
15. Enter (in seconds) the amount of time allowed before the option to display two
credentials expires.
16. If you wish to require a card to be presented for entry, enable a card required
schedule from the dropdown list. If you do not wish to require a card to be
presented, choose "none".
17. If you wish to enable alarm console settings, check the "include failed access as
alarms" checkbox. You may also combine alarms, provide instruction text, set
alarm priority, schedule when the alarm will function, and whether or not an
elevator will function during certain threat levels.
18. You may have the Data Entry Device ignore Threat Levels or select under what
Threat Level conditions the Data Entry Device will operate and if the Data Entry
Device will require two factor credentialing.
101
Page 101 of 334

Advertisement

Table of Contents
loading

Table of Contents