Visionis VS-AXESS-1ETL User Manual

One door network access control panel controller board with cabinet tcp ip wiegand with desktop software and power supply included 10,000 users
Table of Contents

Advertisement

Access Control Terminal·User Manual
One Door Network Access Control Panel
Controller Board with Cabinet TCP IP
Wiegand with Desktop Software and Power
Supply Included 10,000 Users
VS-AXESS-1ETL
VS-AXESS-1ETL-PCB
User Manual

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the VS-AXESS-1ETL and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Visionis VS-AXESS-1ETL

  • Page 1 Access Control Terminal·User Manual One Door Network Access Control Panel Controller Board with Cabinet TCP IP Wiegand with Desktop Software and Power Supply Included 10,000 Users VS-AXESS-1ETL VS-AXESS-1ETL-PCB User Manual...
  • Page 2 Access Control Terminal·User Manual User Manual About This Manual This Manual is applicable to access controller. The Manual includes instructions for using and managing the product. Pictures, charts, images and all other information hereinafter are for description and explanation only. The information contained in the Manual is subject to change, without notice, due to firmware updates or other reasons.
  • Page 3 Access Control Terminal·User Manual Regulatory Information FCC Information Please take attention that changes or modification not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment. FCC compliance: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules.
  • Page 4 Access Control Terminal·User Manual • Improper use or replacement of the battery may result in hazard of explosion. Replace with the same or equivalent type only. Dispose of used batteries according to the instructions provided by the manufacturer.
  • Page 5 Access Control Terminal·User Manual Safety Instruction These instructions are intended to ensure that user can use the product correctly to avoid danger or property loss. The precaution measure is divided into Warnings and Cautions: Warnings: Neglecting any of the warnings may cause serious injury or death. Cautions: Neglecting any of the cautions may cause injury or equipment damage.
  • Page 6 Access Control Terminal·User Manual  Improper use or replacement of the battery may result in hazard of explosion. Replace with the same or equivalent type only. Dispose of used batteries according to the instructions provided by the battery manufacturer.
  • Page 7: Table Of Contents

    Access Control Terminal·User Manual Table of Contents Chapter 1 Product Description ......................1 Overview .......................... 1 Main Features ........................1 Chapter 1 Component Description ....................2 Chapter 2 Terminal Connection ......................3 Terminal Description ......................3 Chapter 3 External Device Wiring ....................5 Card Reader Wiring ......................
  • Page 8 Access Control Terminal·User Manual 6.8.7 Multi-door Interlocking ..................95 6.8.8 Authentication Password ..................96 6.8.9 Custom Wiegand ....................97 Searching Access Control Event ..................99 6.10 Access Control Event Configuration ................100 6.10.1 Access Control Event Linkage ................100 6.10.2 Access Control Alarm Input Linkage ..............
  • Page 9: Chapter 1 Product Description

    Product Description 1.1 Overview VS-AXESS-1ETL is a powerful and stable access controller, using the logical architecture design. VS-AXESS-1ETL is designed with TCP/IP network interface and its signal processed with special encryption and can be run offline. Anti-tampering function is also supported.
  • Page 10: Chapter 1 Component Description

    Access Control Terminal·User Manual Chapter 1 Component Description Take VS-AXESS-4ETL as an example, the component schematic diagram is shown below. VS-AXESS-1ETL component descriptions are as follows: Component Description Door Lock 1 Indicator Power Indicator Network Indicator Jumper Cap for Restoring Factory Settings...
  • Page 11: Chapter 2 Terminal Connection

    Access Control Terminal·User Manual Chapter 2 Terminal Connection 2.1 Terminal Description VS-AXESS-1ETL Terminal descriptions are as follows: VS-AXESS-1ETL DC12V Grounding Power +12V DC12V Input Door Door Lock Relay Output...
  • Page 12 Access Control Terminal·User Manual VS-AXESS-1ETL BUTTON Door Button Input Grounding SENSOR Door Magnetic detector Alarm Output Alarm Relay Output (Dry Contact) NO/NC Grounding Alarm Input Event Input Indicator of Card Reader Control Output (Valid Card Output) Indicator of Card Reader Control Output...
  • Page 13: Chapter 3 External Device Wiring

    Access Control Terminal·User Manual Chapter 3 External Device Wiring 3.1 Card Reader Wiring 3.1.1 Wiegand Card Reader Wiring Note: You must connect the OK/ERR/BZ, if using access controller to control the LED and buzzer of the Wiegand card reader.
  • Page 14: External Terminals

    Access Control Terminal·User Manual 3.2 VS-AXESS-1ETL External Terminals 3.2.2 Installation of Cathode Lock 3.2.3 Installation of Anode Lock...
  • Page 15: Connecting The External Alarm Device

    Access Control Terminal·User Manual 3.3 Connecting the External Alarm Device...
  • Page 16: Door Button Wiring Diagram

    Access Control Terminal·User Manual 3.4 Door Button Wiring Diagram 3.5 The Connection of Magnetics Detection...
  • Page 17: Connecting Power Supply

    Access Control Terminal·User Manual 3.6 Connecting Power Supply...
  • Page 18: Chapter 4 Settings

    Access Control Terminal·User Manual Chapter 4 Settings 4.1 Initializing the Hardware Option 1: Steps: Remove the jumper cap from the Normal terminal. Disconnect the power and restart the access controller. The controller buzzer buzzes a long beep. When the beep stopped, plug the jumper cap back to Normal. Option 2: Steps: Jump the jumper cap from Normal to Initial.
  • Page 19: Alarm Relay Output Status

    Access Control Terminal·User Manual 4.2.2 Alarm Relay Output Status Alarm Relay Output Normally Open: Alarm Relay Output Normally Closed: Work Flow of Software For detailed information, please see the user manual of the client software. Refer to the following work flow:...
  • Page 20 Access Control Terminal·User Manual...
  • Page 21: Chapter 5 Activating The Access Control Terminal

    Access Control Terminal·User Manual Chapter 5 Activating the Access Control Terminal Purpose: You are required to activate the terminal first before using it. Activation via SADP, and activation via client software are supported. The default values of the control terminal are as follows. ...
  • Page 22: Activating Via Client Software

    Access Control Terminal·User Manual with your computer by either modifying the IP address manually or checking the checkbox of Enable DHCP. 6. Input the password and click the Modify button to activate your IP address modification. 5.2 Activating via Client Software The client software is versatile video management software for multiple kinds of devices.
  • Page 23 Access Control Terminal·User Manual Click the Device Management to enter the Device Management interface. Check the device status from the device list, and select an inactive device. Click the Activate button to pop up the Activation interface. In the pop-up window, create a password in the password field, and confirm the password. STRONG PASSWORD RECOMMENDED–...
  • Page 24: Chapter 6 Client Operation

    Access Control Terminal·User Manual Chapter 6 Client Operation You can set and operate the access control devices via the client software. This chapter will introduce the access control device related operations in the client software. For integrated operations, refer to User Manual of VSAXESS Client Software.
  • Page 25 Access Control Terminal·User Manual 1024*768 Display the window at size of 1024*768 pixels. 1280*1024 Display the window at size of 1280*1024 pixels. 1440*900 Display the window at size of 1440*900 pixels. 1680*1050 Display the window at size of 1680*1050 pixels. Maximize Display the window in maximum mode.
  • Page 26 Access Control Terminal·User Manual software to activate the settings. For the first time running the software, you can click on the control panel to select the modules to display on the Operation and Control area of the control pane. Steps: 1.
  • Page 27: User Registration And Login

    Access Control Terminal·User Manual The Security Control Panel module provides operations such as arming, disarming, bypass, group bypass, and so on for both the partitions and zones. The Real-time Alarm module provides displaying the real-time alarm of security control panel, acknowledging alarms, and searching the history alarms. The Alarm Event module displays the alarm and event received by the client software.
  • Page 28 Access Control Terminal·User Manual  A user name cannot contain any of the following characters: / \ : * ? “ < > |. And the length of the password cannot be less than 6 characters.  For your privacy, we strongly recommend changing the password to something of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
  • Page 29: System Configuration

    Access Control Terminal·User Manual 6.3 System Configuration Purpose: You can synchronize the missed access control events to the client. Steps: Click Tool – System Configuration. In the System Configuration window, check the Auto-synchronize Access Control Event checkbox. Set the synchronization time. The client will auto-synchronize the missed access control event to the client at the set time.
  • Page 30: Adding Access Control Device

    Access Control Terminal·User Manual Before you start: For the first time opening the Access Control module, the following dialog will pop up and you are required to select the scene according to the actual needs. You can select the scene as Non-residence and Residence. Notes: ...
  • Page 31 Access Control Terminal·User Manual Note: After adding the device, you should check the device arming status in Tool – Device Arming Control. If the device is not armed, you should arm it, or you will not receive the real-time events via the client software.
  • Page 32 Access Control Terminal·User Manual (Optional) Enable Guarding Vision service when activating the device if the device supports. 1) Check Enable Guarding Vision checkbox to pop up the Note dialog. 2) Create a verification code. 3) Confirm the verification code. 4) Click Terms of Service and Privacy Policy to read the requirements. 5) Click OK to enable the Guarding Vision service.
  • Page 33 Overview VS-AXESS-1ETL is a powerful and stable access controller, using the logical architecture design. VS-AXESS-1ETL is designed with TCP/IP network interface and its signal processed with special encryption and can be run offline. Anti-tampering function is also supported. 6.5 Main Features ...
  • Page 34 Access Control Terminal·User Manual  The access controller can store 10 thousand legal cards and 50 thousand card swiping records  Supports first card open-door and first card authorization function, super card and super password function, online upgrade function and remote control of the doors ...
  • Page 35 Access Control Terminal·User Manual Chapter 2 Component Description Take VS-AXESS-4ETL as an example, the component schematic diagram is shown below. VS-AXESS-1ETL component descriptions are as follows: Component Description Door Lock 1 Indicator Power Indicator Network Indicator Jumper Cap for Restoring Factory Settings...
  • Page 36 Access Control Terminal·User Manual Chapter 7 Terminal Connection 7.1 Terminal Description VS-AXESS-1ETL Terminal descriptions are as follows: VS-AXESS-1ETL DC12V Grounding Power +12V DC12V Input Door Door Lock Relay Output...
  • Page 37 Access Control Terminal·User Manual VS-AXESS-1ETL BUTTON Door Button Input Grounding SENSOR Door Magnetic detector Alarm Output Alarm Relay Output (Dry Contact) NO/NC Grounding Alarm Input Event Input Indicator of Card Reader Control Output (Valid Card Output) Indicator of Card Reader Control Output...
  • Page 38 Access Control Terminal·User Manual Chapter 8 External Device Wiring 8.1 Card Reader Wiring 8.1.1 Wiegand Card Reader Wiring Controller Card Reader Note: You must connect the OK/ERR/BZ, if using access controller to control the LED and buzzer of the Wiegand card reader.
  • Page 39 Access Control Terminal·User Manual 8.2 VS-AXESS-1ETL External Terminals 8.2.2 Installation of Cathode Lock 8.2.3 Installation of Anode Lock...
  • Page 40 Access Control Terminal·User Manual 8.3 Connecting the External Alarm Device...
  • Page 41 Access Control Terminal·User Manual 8.4 Door Button Wiring Diagram 8.5 The Connection of Magnetics Detection...
  • Page 42 Access Control Terminal·User Manual 8.6 Connecting Power Supply...
  • Page 43 Access Control Terminal·User Manual Chapter 9 Settings 9.1 Initializing the Hardware Option 1: Steps: Remove the jumper cap from the Normal terminal. Disconnect the power and restart the access controller. The controller buzzer buzzes a long beep. When the beep stopped, plug the jumper cap back to Normal. Option 2: Steps: Jump the jumper cap from Normal to Initial.
  • Page 44 Access Control Terminal·User Manual 9.2.2 Alarm Relay Output Status Alarm Relay Output Normally Open: Alarm Relay Output Normally Closed: Work Flow of Software For detailed information, please see the user manual of the client software. Refer to the following work flow:...
  • Page 45 Access Control Terminal·User Manual...
  • Page 46 Access Control Terminal·User Manual Activating the Access Control Terminal. 2. Click Add to Client to open the device adding dialog box. 3. Input the required information. Nickname: Edit a name for the device as you want. Address: Input the device’s IP address. The IP address of the device is obtained automatically in this adding mode.
  • Page 47 Access Control Terminal·User Manual multiple devices, and click Add to Client to open the device adding dialog box. In the pop-up message box, enter the user name and password for the devices to be added.  Adding All Online Devices If you want to add all the online devices to the client software, click Add All and click OK in the pop-up message box.
  • Page 48 Access Control Terminal·User Manual 1) Check the Add Offline Device checkbox. 2) Input the required information, including the device channel number and alarm input number. 3) Click Add. When the offline device comes online, the software will connect it automatically. 5.
  • Page 49 Access Control Terminal·User Manual 1) Check the Add Offline Device checkbox. 2) Input the required information, including the device channel number and alarm input number. 3) Click Add. When the offline device comes online, the software will connect it automatically. 5.
  • Page 50 Access Control Terminal·User Manual The password strength of the device can be checked by the software. For your privacy, we strongly recommend changing the password to something of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
  • Page 51 Access Control Terminal·User Manual 3. Select Batch Adding. 4. Input the required information. Guarding Vision Account: Input the Guarding Vision account. Guarding Vision Password: Input the Guarding Vision password. 5. Click Get Device List to show the devices added to the Guarding Vision account. 6.
  • Page 52 Access Control Terminal·User Manual 3. Select Batch Adding. 4. Input the required information. Guarding Vision Account: Input the Guarding Vision account. Guarding Vision Password: Input the Guarding Vision password. 5. Click Get Device List to show the devices added to Guarding Vision account. 6.
  • Page 53 Access Control Terminal·User Manual 3. Input the required information. Nickname: Edit a name for the device as you want. Account: Input the account name registered on EHome protocol. 4. Optionally, check the Export to Group checkbox to create a group by the device name. You can import all the channels of the device to the corresponding group by default.
  • Page 54 Access Control Terminal·User Manual 3. Input the required information. Nickname: Edit a name for the device as you want. Serial Port No.: Select the device’s connected serial port No. Baud Rate: Input the baud rate of the access control device. DIP: Input the DIP address of the device.
  • Page 55 Access Control Terminal·User Manual 3. Input the required information. Nickname: Edit a name for the device as you want. Server Address: Input the IP address of the PC that installs the IP Server. Device ID: Input the device ID registered on the IP Server. User Name: Input the device user name.
  • Page 56 Access Control Terminal·User Manual 3. Input the required information. Nickname: Edit a name for the device as you want. Server Address: www.hiddns.com. Device Domain Name: Input the device domain name registered on HiDDNS server. User Name: Input the device user name. By default, the user name is admin. Password: Input the device password.
  • Page 57 Access Control Terminal·User Manual Steps: Click Add to open the device adding dialog box. Select Batch Import as the adding mode. Click Export Template and save the pre-defined template (CSV file) on your PC. Open the exported template file and input the required information of the devices to be added on the corresponding column.
  • Page 58: Viewing Device Status

    Access Control Terminal·User Manual password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product. Add Offline Device: You can input 1 to enable adding the offline device, and then the software will automatically connect it when the offline device comes online.
  • Page 59: Editing Basic Information

    Access Control Terminal·User Manual Note: The interface may different from the picture displayed above. Refer to the actual interface when adopting this function. Door Status: The status of the connected door. Host Status: The status of the host, including Storage Battery Power Voltage, Device Power Supply Status, Multi-door Interlocking Status, Anti-passing Back Status, and Host Anti-Tamper Status.
  • Page 60: Network Settings

    Access Control Terminal·User Manual Edit the device information, including the adding mode, the device name, the device IP address, port No., user name, and the password. 9.2.5 Network Settings Purpose: After adding the access control device, you can set the uploading mode, and set the network center and wireless communication center.
  • Page 61 Access Control Terminal·User Manual 5. Click Save button to save parameters. Network Center Settings You can set the account for EHome protocol in Network Settings page. Then you can add devices via EHome protocol. Steps: 1. Click the Network Center tab. 2.
  • Page 62: Capture Settings

    Access Control Terminal·User Manual 2. Select the APN name as CMNET or UNINET. 3. Input the SIM Card No. 4. Select the center group in the dropdown list. 5. Input the IP address and port No. 6. Select the protocol type as EHome. By default, the port No. for EHome is 7660. 7.
  • Page 63: Settings

    Access Control Terminal·User Manual 2. Set the linked capture times once triggered. Set the capture interval according to the capture times. 3. Click Save to save the settings. Manual Capture Steps: 1. Select the Manual Capture tab. 2. Select the resolution of the captured pictures from the dropdown list. Note: The supported resolution types are CIF, QCIF, 4CIF/D1, SVGA, HD720P, VGA, WD1, and AUTO.
  • Page 64: Wiegand Settings

    Access Control Terminal·User Manual 1. Select the serial No. of the port from the dropdown list to set the RS-485 parameters. 2. Set the baud rate, data bit, the stop bit, parity type, communication mode, and work mode in the dropdown list.
  • Page 65: M1 Card Encryption

    Access Control Terminal·User Manual 9.2.9 M1 Card Encryption The M1 Card Encryption function increases the authentication security level, which should be applied together with the card enrollment station of our company via the client software or the web client. After issuing the card, you can set the M1 card encryption function on the controller. Notes: ...
  • Page 66 Access Control Terminal·User Manual Editing Device Name In the Remote Configuration interface, click System -> General to configure the device name and overwrite record files parameter. Click Save to save the settings. Editing Time Steps: In the Remote Configuration interface, click System -> Time to configure the time zone. (Optional) Check Enable NTP and configure the NTP server address, the NTP port, and the synchronization interval.
  • Page 67 Access Control Terminal·User Manual Setting System Maintenance Steps: In the Remote Configuration interface, click System -> System Maintenance. Click Reboot to reboot the device. Or click Restore Default Settings to restore the device settings to the default ones, excluding the IP address.
  • Page 68 Access Control Terminal·User Manual Managing User Steps: 1. In the Remote Configuration interface, click System -> User. 2. Click Add to add the user (Do not support by the elevator controller.). Or select a user in the user list and click Edit to edit the user. You are able to edit the user password, the IP address, the MAC address and the user permission.
  • Page 69 Access Control Terminal·User Manual Configuring Network Parameters Click Network -> General. You can configure the NIC type, the IPv4 address, the subnet mask (IPv4), the default gateway (IPv4), MTU address, MTU, and the device port. Click Save to save the settings. Configuring Upload Method :...
  • Page 70 Access Control Terminal·User Manual Configuring Zone Parameters Step: Click Alarm -> Zone to enter the Zone interface. Click to pop up the Zone Settings window. Set the zone name, the detector type, the zone type and the sensitivity. Click Save to save the settings. Or click Copy to…...
  • Page 71 Access Control Terminal·User Manual 2. Click the to pop up the Relay Parameters Settings window. 3. Set the relay name and the output delay. 4. Click Save to save the paramters. Or click Copy to… to copy the relay information to other relays. Configuring Access Control Parameters Steps: 1.
  • Page 72 Access Control Terminal·User Manual Configuring Face Detection Parameters Click Other -> Face Detection. You can check the Enable checkbox to enable the device face detection function. Note: Only devices with video function support this function. Operating Zone Steps: 1. Click Operation -> Zone. You can view the zone information.
  • Page 73: Person And Card Management

    Access Control Terminal·User Manual Operating Relay Steps: 1. Click Operation -> Relay. You can view the relay status. 2. Check the relay checkbox 3. Click Open or Close to open/close the relay. 4. (Optional) Click Refresh to refresh the relay status. Viewing Relay Status Click Status ->...
  • Page 74: Organization Management

    Access Control Terminal·User Manual The interface is divided into two parts: Organization Management and Person Management. Organization Management You can add, edit, or delete the organization as desired. After adding the organization, you can add the person to the Person Management organization and issue card to persons for further management.
  • Page 75: Person Management

    Access Control Terminal·User Manual deleted. 9.3.2 Person Management After adding the organization, you can add person to the organization and manage the added person such as issuing cards in batch, importing and exporting persons information in batch, etc. Note: Up to 10,000 persons or cards can be added. Adding Person Adding Person (Basic Information) Steps:...
  • Page 76 Access Control Terminal·User Manual 1. In the Add Person interface, click Details tab. 2. Input the detailed information of the person, including person’s ID type, ID No., country, etc., according to actual needs.  Linked Device: You can bind the indoor station to the person. Note: If you select Analog Indoor Station in the Linked Device, the Door Station field will display and you are required to select the door station to communicate with the analog...
  • Page 77 Access Control Terminal·User Manual (Optional) In the Selected Permission(s) list, select the selected permission and click < to remove it. You can also click << to remove all the selected permissions. 4. Click OK to save the settings. Adding Person (Card) You can add card and issue the card to the person.
  • Page 78 Access Control Terminal·User Manual  Visitor Card: The card is assigned for visitors. For the Visitor Card, you can set the Max. Swipe Times. Notes:  The Max. Swipe Times should be between 0 and 255. When your swiping card times is more than the configured times, card swiping will be invalid.
  • Page 79 Access Control Terminal·User Manual 1) Select the device type. 2) For fingerprint machine, you can set the serial port number, baud rate, and overtime parameters of the fingerprint machine. 3) Click Save button to save the settings. You can click Restore Default Value button to restore the default settings. Notes: ...
  • Page 80 Access Control Terminal·User Manual 2. If the person joins in the time and attendance, check the Time and Attendance checkbox to enable this function for the person. Then the person’s card swiping records will be recorded and analyzed for time and attendance. For details about Time and Attendance, click More to go to the Time and Attendance module.
  • Page 81 Access Control Terminal·User Manual 2) You can click Download Template for Importing Person to download the template first. 3) Input the person information to the downloaded template. 4) Click to select the Excel file with person information. 5) Click OK to start importing. Getting Person Information from Access Control Device If the added access control device has been configured with person information (including person details, fingerprint, issued card information), you can get the person information from the device and...
  • Page 82 Access Control Terminal·User Manual Managing Person Modifying and Deleting Person To modify the person information and attendance rule, click in the Operation column, or select the person and click Modify to open the editing person dialog. You can click to view the person’s card swiping records. To delete the person, select a person and click Delete to delete it.
  • Page 83: Schedule And Template

    Access Control Terminal·User Manual Select the card type according to actual needs. Note: For details about the card type, refer to Adding Person. Input the password of the card itself in the Card Password field. The card password should contain 4 to 8 digits. Note: The password will be required when the card holder swiping the card to get enter to or exit from the door if you enable the card reader authentication mode as Card and Password,...
  • Page 84: Week Schedule

    Access Control Terminal·User Manual Click to enter the schedule and template interface. You can manage the schedule of access control permission including Week Schedule, Holiday Schedule, and Template. For permission settings, please refer to Chapter 9.5 Permission Configuration. 9.4.1 Week Schedule Click Week Schedule tab to enter the Week Schedule Management interface.
  • Page 85: Holiday Group

    Access Control Terminal·User Manual period of time, the configured permission is activated. Note: Up to 8 time periods can be set for each day in the schedule. 5. When the cursor turns to , you can move the selected time bar you just edited. You can also edit the displayed time point to set the accurate time period.
  • Page 86: Template

    Access Control Terminal·User Manual 4. Click Add Holiday icon on the right to add a holiday period to the holiday list and configure the duration of the holiday. Note: Up to 16 holidays can be added to one holiday group. 1) On the period schedule, click and drag to draw the period, which means in that period of time, the configured permission is activated.
  • Page 87 Access Control Terminal·User Manual There are two pre-defined templates by default: Whole Week Template and Blank Template, which cannot be deleted and edited.  Whole Week Template: The card swiping is valid on each day of the week and it has no holiday group schedule.
  • Page 88: Permission Configuration

    Access Control Terminal·User Manual 5. Select holiday groups to apply to the schedule. Note: Up to 4 holiday groups can be added. Click to select a holiday group in the list and click Add to add it to the template. You can also click Add Holiday Group to add a new one.
  • Page 89: Adding Permission

    Access Control Terminal·User Manual 9.5.1 Adding Permission Purpose: You can assign permission for persons to enter/exist the access control points (doors) in this section. Steps: Click Add icon to enter following interface. In the Permission Name field, input the name for the permission as desired. Click on the dropdown menu to select a template for the permission.
  • Page 90: Applying Permission

    Access Control Terminal·User Manual permission and click Modify to modify. You can select the added permission in the list and click Delete to delete it. 9.5.2 Applying Permission Purpose: After configuring the permissions, you should apply the added permission to the access control device to take effect.
  • Page 91: Access Control Parameters

    Access Control Terminal·User Manual 9.6.1 Access Control Parameters Purpose: After adding the access control device, you can configure its access control point (door)’s parameters, and its card readers’ parameters. Click Access Control Parameters tab to enter the parameters settings interface. Door Parameters Steps: 1.
  • Page 92 Access Control Terminal·User Manual Door Magnetic: The Door Magnetic is in the status of Remain Closed (excluding special conditions). Exit Button Type: The Exit Button Type is in the status of Remain Open (excluding special conditions). Door Locked Time: After swiping the normal card and relay action, the timer for locking the door starts working.
  • Page 93 Access Control Terminal·User Manual 2. You can editing the following parameters: Nickname: Edit the card reader name as desired. Enable Card Reader: Select Yes to enable the card reader. OK LED Polarity: Select the OK LED Polarity of the card reader mainboard. Error LED Polarity: Select the Error LED Polarity of the card reader mainboard.
  • Page 94: Card Reader Authentication

    Access Control Terminal·User Manual 9.6.2 Card Reader Authentication Purpose: You can set the passing rules for the card reader of the access control device. Steps: Click Card Reader Authentication tab and select a card reader on the left. Select a card reader authentication mode. The available authentication modes depend on the card reader type: ...
  • Page 95: Multiple Authentication

    Access Control Terminal·User Manual Repeat the above step to set other time periods. Or you can select a configured day and click Copy to Week button to copy the same settings to the whole week. (Optional) You can click Delete button to delete the selected time period or click Clear button to delete all the configured time periods.
  • Page 96 Access Control Terminal·User Manual Note: Please set the card permission and apply the permission setting to the access control device first. For details, refer to Chapter 9.5 Permission Configuration. Steps: 1. Click Multiple Authentication tab to enter the following interface. 2.
  • Page 97 Access Control Terminal·User Manual 4) Click OK to save the card group. 4. In the Set Authentication Group panel on the left, click Add to pop up the following dialog. 1) Select the access control point (door) of the device for multiple authentication. 2) Input the time interval for card swiping.
  • Page 98: Open Door With First Card

    Access Control Terminal·User Manual Notes:  For each access control point (door), up to four authentication groups can be added.  For the authentication group which certificate type is Local Authentication, up to 8 card groups can be added to the authentication group. ...
  • Page 99: Anti-Passing Back

    Access Control Terminal·User Manual In the First Card list, Click Add button to pop up the following dialog box. Select the cards to add as first card for the door Note: Please set the card permission and apply the permission setting to the access control device first.
  • Page 100: Cross-Controller Anti-Passing Back

    Access Control Terminal·User Manual Select an access control device from the device list on the left. In the First Card Reader field, select the card reader as the beginning of the path. In the list, click the text filed of Card Reader Afterward and select the linked card readers. Example: If you select Reader In_01 as the beginning, and select Reader In_02, Reader Out_04 as the linked card readers.
  • Page 101 Access Control Terminal·User Manual according to the configured swiping card route. And only one person could pass the access control point after swiping the card. Click Cross-Controller Anti-passing Back to enter the Cross-Controller Anti-passing Back tab. Setting Route Anti-passing Back Purpose: The route anti-passing back depends on the card swiping route.
  • Page 102 Access Control Terminal·User Manual Notes:  The displayed card readers in the card reader afterward input field should be in authentication order.  Up to 64 controllers with anti-passing back function can be added.  Up to 16 card readers afterward can be added for each card reader. ...
  • Page 103: Multi-Door Interlocking

    Access Control Terminal·User Manual 4) Click Select Device to select a device in the pop-up window for anti-passing back authentication. 5) In the Set Card Reader area, check the checkboxes in the Enable Anti-passing Back column to select the entrance card reader and the exit card reader. 6) Click Save to save the settings.
  • Page 104: Authentication Password

    Access Control Terminal·User Manual 2. Select an access controller from the Controller List. 3. Click Add to pop up the Add Access Control Point to Interlock interface. 4. Select the access control point (door) from the list. Note: Up to four doors can be added in one multi-door interlocking combination. 5.
  • Page 105: Custom Wiegand

    Access Control Terminal·User Manual All the cards and persons which have been applied to the device will be displayed. Note: For setting and applying the permissions to the device, refer to Chapter 9.5 Permission Configuration. 2. Click the Password field of the card and input the authentication password for the card. Note: The authentication password should contain 4 to 8 digits.
  • Page 106 Access Control Terminal·User Manual 2. Select a custom wiegand on the left of the interface. 3. Check Enable checkbox to enable the custom wiegand. 4. Set the wiegand name. 5. Select device. 1) Click Select Device. 2) Select the device need to use custom wiegand. 3) Click OK to save the settings.
  • Page 107: Searching Access Control Event

    Access Control Terminal·User Manual 5) (Optional) Select the rules in the Selected Rule list and click to remove the rule from the list on the right. 6) Click OK to save the settings. 7) In the Custom Wiegand tab, set the rule start bit, length, and the decimal digit. 8.
  • Page 108: Access Control Event Configuration

    Access Control Terminal·User Manual 1. Select the source. You can select Client or Device. 2. Enter the search condition (source, event type/card holder name/card No./capture/start & end time). 3. Click Search to get the search results. 4. View the event information in the event list. 5.
  • Page 109: Access Control Alarm Input Linkage

    Access Control Terminal·User Manual Table 9. 1 Linkage Actions for Access Control Event Linkage Actions Descriptions The client software gives an audible warning when alarm is triggered. You can Audible Warning select the alarm sound for audible warning. For setting the alarm sound, please refer to User Manual of VSAXESS Client Software.
  • Page 110: Event Card Linkage

    Access Control Terminal·User Manual 2. In the event list on the left, select an alarm input. 3. Switch the property from to enable this action. Host Buzzer: The audible warning of controller will be triggered. Card Reader Buzzer: The audible warning of card reader will be triggered. Alarm Output: The alarm output will be triggered for notification.
  • Page 111 Access Control Terminal·User Manual Select the access control device from the list on the left. Click Add button to add a new linkage. You can select the event source as Event Linkage or Card Linkage. Event Linkage For the event linkage, the alarm event can be divided into four types: device event, alarm input, door event, and card reader event.
  • Page 112: Cross-Device Linkage

    Access Control Terminal·User Manual  The door status of open, close, remain open, and remain close cannot be triggered at the same time.  The target door and the source door cannot be the same one. 3. Click Save button to save and take effect of the parameters. Card Linkage Steps: 1.
  • Page 113 Access Control Terminal·User Manual Event Linkage For the event linkage, the alarm event can be divided into four types: device event, alarm input, door event, and card reader event. Steps: 1. Click to select the linkage type as Event Linkage, select the access control device as event source, and select the event type from the dropdown list.
  • Page 114: Door Status Management

    Access Control Terminal·User Manual  Access Control Point: The door status of open, close, remain open, and remain closed will be enabled. 5. Click Save button to save parameters. 9.9 Door Status Management Purpose: The door status of the added access control device will be displayed in real time. You can check the door status and the linked event(s) of the selected door.
  • Page 115: Anti-Control The Access Control Point (Door)

    Access Control Terminal·User Manual 4. Perform the following steps to import the access control points to the group: 1) Click Import on Group Management interface, and then click the Access Control tab to open the Import Access Control page. Notes: ...
  • Page 116: Status Duration Configuration

    Access Control Terminal·User Manual Steps: Select an access control group on the left. For managing the access control group, refer to Chapter 9.9.1 Access Control Group Management. The access control points of the selected access control group will be displayed on the right. Click icon on the Status Information panel to select a door.
  • Page 117 Access Control Terminal·User Manual In the Door Status module, click Status Duration button to enter the Status Duration interface. Steps: 1. Click to select a door from the access control device list on the left. 2. On the Door Status Configuration panel on the right, draw a schedule for the selected door. Select a door status brush as Remain Open: The door will keep open during the configured time period.
  • Page 118: Real-Time Card Swiping Record

    Access Control Terminal·User Manual 3. Optionally, you can select the schedule time bar and click Copy to Whole Week to copy the time bar settings to the other days in the week. 4. You can select the time bar and click Delete Duration to delete the time period. Or you can click Clear to clear all configured durations on the schedule.
  • Page 119: Arming Control

    Access Control Terminal·User Manual Steps: 1. All access control alarms will display in the list in real time. You can view the alarm type, alarm time, location, etc. 2. Click to view the alarm on E-map. For configuring the access control point on E-map, refer to User Manual of VSAXESS Client Software .
  • Page 120 Access Control Terminal·User Manual information from the device. Steps: 1. Click Tool->Device Arming Control to pop up the Device Arming Control window. 2. Arm the device by checking the corresponding checkbox. Then the alarm information will be auto uploaded to the client software when alarm occurs.
  • Page 121: Appendix 1 Sound Prompt And Indicator

    Access Control Terminal·User Manual Appendix 1 Sound Prompt and Indicator After the card reader is powered on, LED status indicator will turn blue and blink for 1 time. Then it will turn red and blink for 3 times. At last the buzzer will send out a beep sound indicating the starting up process is completed.
  • Page 122: Appendix 2 Custom Wiegand Rule Descriptions

    Access Control Terminal·User Manual Appendix 2 Custom Wiegand Rule Descriptions Take Wiegand 44 as an example, the setting values in the Custom Wiegand tab are as follows: Custom Wiegand Name: Wiegand 44 Total Length Transformation Rule (Decimal Digit) byFormatRule[4]=[1][4][0][0] Parity Mode XOR Parity Odd Parity Start Bit Length...
  • Page 123 Access Control Terminal·User Manual OEM Start Bit, Length, and Decimal Digit: If you use the transformation rule, these items are available. For detailed information, see the explanation of the card ID. Manufacturer Code Start Bit, Length, and Decimal Digit: If you use the transformation rule, these items are available.

This manual is also suitable for:

Vs-axess-1etl-pcb

Table of Contents