Indoor/outdoor access control and time attendance wi-fi tcp/ip wiegand or rs485 fingerprint biometric card reader and keypad / reader with software 125khz em card compatible 3,000 users (156 pages)
Indoor access control 2.4ghz wireless
request to exit button battery operated (3 pages)
Summary of Contents for Visionis VS-AXESS-1ETL
Page 1
Access Control Terminal·User Manual One Door Network Access Control Panel Controller Board with Cabinet TCP IP Wiegand with Desktop Software and Power Supply Included 10,000 Users VS-AXESS-1ETL VS-AXESS-1ETL-PCB User Manual...
Page 2
Access Control Terminal·User Manual User Manual About This Manual This Manual is applicable to access controller. The Manual includes instructions for using and managing the product. Pictures, charts, images and all other information hereinafter are for description and explanation only. The information contained in the Manual is subject to change, without notice, due to firmware updates or other reasons.
Page 3
Access Control Terminal·User Manual Regulatory Information FCC Information Please take attention that changes or modification not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment. FCC compliance: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules.
Page 4
Access Control Terminal·User Manual • Improper use or replacement of the battery may result in hazard of explosion. Replace with the same or equivalent type only. Dispose of used batteries according to the instructions provided by the manufacturer.
Page 5
Access Control Terminal·User Manual Safety Instruction These instructions are intended to ensure that user can use the product correctly to avoid danger or property loss. The precaution measure is divided into Warnings and Cautions: Warnings: Neglecting any of the warnings may cause serious injury or death. Cautions: Neglecting any of the cautions may cause injury or equipment damage.
Page 6
Access Control Terminal·User Manual Improper use or replacement of the battery may result in hazard of explosion. Replace with the same or equivalent type only. Dispose of used batteries according to the instructions provided by the battery manufacturer.
Product Description 1.1 Overview VS-AXESS-1ETL is a powerful and stable access controller, using the logical architecture design. VS-AXESS-1ETL is designed with TCP/IP network interface and its signal processed with special encryption and can be run offline. Anti-tampering function is also supported.
Access Control Terminal·User Manual Chapter 1 Component Description Take VS-AXESS-4ETL as an example, the component schematic diagram is shown below. VS-AXESS-1ETL component descriptions are as follows: Component Description Door Lock 1 Indicator Power Indicator Network Indicator Jumper Cap for Restoring Factory Settings...
Access Control Terminal·User Manual Chapter 2 Terminal Connection 2.1 Terminal Description VS-AXESS-1ETL Terminal descriptions are as follows: VS-AXESS-1ETL DC12V Grounding Power +12V DC12V Input Door Door Lock Relay Output...
Page 12
Access Control Terminal·User Manual VS-AXESS-1ETL BUTTON Door Button Input Grounding SENSOR Door Magnetic detector Alarm Output Alarm Relay Output (Dry Contact) NO/NC Grounding Alarm Input Event Input Indicator of Card Reader Control Output (Valid Card Output) Indicator of Card Reader Control Output...
Access Control Terminal·User Manual Chapter 3 External Device Wiring 3.1 Card Reader Wiring 3.1.1 Wiegand Card Reader Wiring Note: You must connect the OK/ERR/BZ, if using access controller to control the LED and buzzer of the Wiegand card reader.
Access Control Terminal·User Manual Chapter 4 Settings 4.1 Initializing the Hardware Option 1: Steps: Remove the jumper cap from the Normal terminal. Disconnect the power and restart the access controller. The controller buzzer buzzes a long beep. When the beep stopped, plug the jumper cap back to Normal. Option 2: Steps: Jump the jumper cap from Normal to Initial.
Access Control Terminal·User Manual 4.2.2 Alarm Relay Output Status Alarm Relay Output Normally Open: Alarm Relay Output Normally Closed: Work Flow of Software For detailed information, please see the user manual of the client software. Refer to the following work flow:...
Access Control Terminal·User Manual Chapter 5 Activating the Access Control Terminal Purpose: You are required to activate the terminal first before using it. Activation via SADP, and activation via client software are supported. The default values of the control terminal are as follows. ...
Access Control Terminal·User Manual with your computer by either modifying the IP address manually or checking the checkbox of Enable DHCP. 6. Input the password and click the Modify button to activate your IP address modification. 5.2 Activating via Client Software The client software is versatile video management software for multiple kinds of devices.
Page 23
Access Control Terminal·User Manual Click the Device Management to enter the Device Management interface. Check the device status from the device list, and select an inactive device. Click the Activate button to pop up the Activation interface. In the pop-up window, create a password in the password field, and confirm the password. STRONG PASSWORD RECOMMENDED–...
Access Control Terminal·User Manual Chapter 6 Client Operation You can set and operate the access control devices via the client software. This chapter will introduce the access control device related operations in the client software. For integrated operations, refer to User Manual of VSAXESS Client Software.
Page 25
Access Control Terminal·User Manual 1024*768 Display the window at size of 1024*768 pixels. 1280*1024 Display the window at size of 1280*1024 pixels. 1440*900 Display the window at size of 1440*900 pixels. 1680*1050 Display the window at size of 1680*1050 pixels. Maximize Display the window in maximum mode.
Page 26
Access Control Terminal·User Manual software to activate the settings. For the first time running the software, you can click on the control panel to select the modules to display on the Operation and Control area of the control pane. Steps: 1.
Access Control Terminal·User Manual The Security Control Panel module provides operations such as arming, disarming, bypass, group bypass, and so on for both the partitions and zones. The Real-time Alarm module provides displaying the real-time alarm of security control panel, acknowledging alarms, and searching the history alarms. The Alarm Event module displays the alarm and event received by the client software.
Page 28
Access Control Terminal·User Manual A user name cannot contain any of the following characters: / \ : * ? “ < > |. And the length of the password cannot be less than 6 characters. For your privacy, we strongly recommend changing the password to something of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
Access Control Terminal·User Manual 6.3 System Configuration Purpose: You can synchronize the missed access control events to the client. Steps: Click Tool – System Configuration. In the System Configuration window, check the Auto-synchronize Access Control Event checkbox. Set the synchronization time. The client will auto-synchronize the missed access control event to the client at the set time.
Access Control Terminal·User Manual Before you start: For the first time opening the Access Control module, the following dialog will pop up and you are required to select the scene according to the actual needs. You can select the scene as Non-residence and Residence. Notes: ...
Page 31
Access Control Terminal·User Manual Note: After adding the device, you should check the device arming status in Tool – Device Arming Control. If the device is not armed, you should arm it, or you will not receive the real-time events via the client software.
Page 32
Access Control Terminal·User Manual (Optional) Enable Guarding Vision service when activating the device if the device supports. 1) Check Enable Guarding Vision checkbox to pop up the Note dialog. 2) Create a verification code. 3) Confirm the verification code. 4) Click Terms of Service and Privacy Policy to read the requirements. 5) Click OK to enable the Guarding Vision service.
Page 33
Overview VS-AXESS-1ETL is a powerful and stable access controller, using the logical architecture design. VS-AXESS-1ETL is designed with TCP/IP network interface and its signal processed with special encryption and can be run offline. Anti-tampering function is also supported. 6.5 Main Features ...
Page 34
Access Control Terminal·User Manual The access controller can store 10 thousand legal cards and 50 thousand card swiping records Supports first card open-door and first card authorization function, super card and super password function, online upgrade function and remote control of the doors ...
Page 35
Access Control Terminal·User Manual Chapter 2 Component Description Take VS-AXESS-4ETL as an example, the component schematic diagram is shown below. VS-AXESS-1ETL component descriptions are as follows: Component Description Door Lock 1 Indicator Power Indicator Network Indicator Jumper Cap for Restoring Factory Settings...
Page 36
Access Control Terminal·User Manual Chapter 7 Terminal Connection 7.1 Terminal Description VS-AXESS-1ETL Terminal descriptions are as follows: VS-AXESS-1ETL DC12V Grounding Power +12V DC12V Input Door Door Lock Relay Output...
Page 37
Access Control Terminal·User Manual VS-AXESS-1ETL BUTTON Door Button Input Grounding SENSOR Door Magnetic detector Alarm Output Alarm Relay Output (Dry Contact) NO/NC Grounding Alarm Input Event Input Indicator of Card Reader Control Output (Valid Card Output) Indicator of Card Reader Control Output...
Page 38
Access Control Terminal·User Manual Chapter 8 External Device Wiring 8.1 Card Reader Wiring 8.1.1 Wiegand Card Reader Wiring Controller Card Reader Note: You must connect the OK/ERR/BZ, if using access controller to control the LED and buzzer of the Wiegand card reader.
Page 39
Access Control Terminal·User Manual 8.2 VS-AXESS-1ETL External Terminals 8.2.2 Installation of Cathode Lock 8.2.3 Installation of Anode Lock...
Page 40
Access Control Terminal·User Manual 8.3 Connecting the External Alarm Device...
Page 41
Access Control Terminal·User Manual 8.4 Door Button Wiring Diagram 8.5 The Connection of Magnetics Detection...
Page 42
Access Control Terminal·User Manual 8.6 Connecting Power Supply...
Page 43
Access Control Terminal·User Manual Chapter 9 Settings 9.1 Initializing the Hardware Option 1: Steps: Remove the jumper cap from the Normal terminal. Disconnect the power and restart the access controller. The controller buzzer buzzes a long beep. When the beep stopped, plug the jumper cap back to Normal. Option 2: Steps: Jump the jumper cap from Normal to Initial.
Page 44
Access Control Terminal·User Manual 9.2.2 Alarm Relay Output Status Alarm Relay Output Normally Open: Alarm Relay Output Normally Closed: Work Flow of Software For detailed information, please see the user manual of the client software. Refer to the following work flow:...
Page 46
Access Control Terminal·User Manual Activating the Access Control Terminal. 2. Click Add to Client to open the device adding dialog box. 3. Input the required information. Nickname: Edit a name for the device as you want. Address: Input the device’s IP address. The IP address of the device is obtained automatically in this adding mode.
Page 47
Access Control Terminal·User Manual multiple devices, and click Add to Client to open the device adding dialog box. In the pop-up message box, enter the user name and password for the devices to be added. Adding All Online Devices If you want to add all the online devices to the client software, click Add All and click OK in the pop-up message box.
Page 48
Access Control Terminal·User Manual 1) Check the Add Offline Device checkbox. 2) Input the required information, including the device channel number and alarm input number. 3) Click Add. When the offline device comes online, the software will connect it automatically. 5.
Page 49
Access Control Terminal·User Manual 1) Check the Add Offline Device checkbox. 2) Input the required information, including the device channel number and alarm input number. 3) Click Add. When the offline device comes online, the software will connect it automatically. 5.
Page 50
Access Control Terminal·User Manual The password strength of the device can be checked by the software. For your privacy, we strongly recommend changing the password to something of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
Page 51
Access Control Terminal·User Manual 3. Select Batch Adding. 4. Input the required information. Guarding Vision Account: Input the Guarding Vision account. Guarding Vision Password: Input the Guarding Vision password. 5. Click Get Device List to show the devices added to the Guarding Vision account. 6.
Page 52
Access Control Terminal·User Manual 3. Select Batch Adding. 4. Input the required information. Guarding Vision Account: Input the Guarding Vision account. Guarding Vision Password: Input the Guarding Vision password. 5. Click Get Device List to show the devices added to Guarding Vision account. 6.
Page 53
Access Control Terminal·User Manual 3. Input the required information. Nickname: Edit a name for the device as you want. Account: Input the account name registered on EHome protocol. 4. Optionally, check the Export to Group checkbox to create a group by the device name. You can import all the channels of the device to the corresponding group by default.
Page 54
Access Control Terminal·User Manual 3. Input the required information. Nickname: Edit a name for the device as you want. Serial Port No.: Select the device’s connected serial port No. Baud Rate: Input the baud rate of the access control device. DIP: Input the DIP address of the device.
Page 55
Access Control Terminal·User Manual 3. Input the required information. Nickname: Edit a name for the device as you want. Server Address: Input the IP address of the PC that installs the IP Server. Device ID: Input the device ID registered on the IP Server. User Name: Input the device user name.
Page 56
Access Control Terminal·User Manual 3. Input the required information. Nickname: Edit a name for the device as you want. Server Address: www.hiddns.com. Device Domain Name: Input the device domain name registered on HiDDNS server. User Name: Input the device user name. By default, the user name is admin. Password: Input the device password.
Page 57
Access Control Terminal·User Manual Steps: Click Add to open the device adding dialog box. Select Batch Import as the adding mode. Click Export Template and save the pre-defined template (CSV file) on your PC. Open the exported template file and input the required information of the devices to be added on the corresponding column.
Access Control Terminal·User Manual password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product. Add Offline Device: You can input 1 to enable adding the offline device, and then the software will automatically connect it when the offline device comes online.
Access Control Terminal·User Manual Note: The interface may different from the picture displayed above. Refer to the actual interface when adopting this function. Door Status: The status of the connected door. Host Status: The status of the host, including Storage Battery Power Voltage, Device Power Supply Status, Multi-door Interlocking Status, Anti-passing Back Status, and Host Anti-Tamper Status.
Access Control Terminal·User Manual Edit the device information, including the adding mode, the device name, the device IP address, port No., user name, and the password. 9.2.5 Network Settings Purpose: After adding the access control device, you can set the uploading mode, and set the network center and wireless communication center.
Page 61
Access Control Terminal·User Manual 5. Click Save button to save parameters. Network Center Settings You can set the account for EHome protocol in Network Settings page. Then you can add devices via EHome protocol. Steps: 1. Click the Network Center tab. 2.
Access Control Terminal·User Manual 2. Select the APN name as CMNET or UNINET. 3. Input the SIM Card No. 4. Select the center group in the dropdown list. 5. Input the IP address and port No. 6. Select the protocol type as EHome. By default, the port No. for EHome is 7660. 7.
Access Control Terminal·User Manual 2. Set the linked capture times once triggered. Set the capture interval according to the capture times. 3. Click Save to save the settings. Manual Capture Steps: 1. Select the Manual Capture tab. 2. Select the resolution of the captured pictures from the dropdown list. Note: The supported resolution types are CIF, QCIF, 4CIF/D1, SVGA, HD720P, VGA, WD1, and AUTO.
Access Control Terminal·User Manual 1. Select the serial No. of the port from the dropdown list to set the RS-485 parameters. 2. Set the baud rate, data bit, the stop bit, parity type, communication mode, and work mode in the dropdown list.
Access Control Terminal·User Manual 9.2.9 M1 Card Encryption The M1 Card Encryption function increases the authentication security level, which should be applied together with the card enrollment station of our company via the client software or the web client. After issuing the card, you can set the M1 card encryption function on the controller. Notes: ...
Page 66
Access Control Terminal·User Manual Editing Device Name In the Remote Configuration interface, click System -> General to configure the device name and overwrite record files parameter. Click Save to save the settings. Editing Time Steps: In the Remote Configuration interface, click System -> Time to configure the time zone. (Optional) Check Enable NTP and configure the NTP server address, the NTP port, and the synchronization interval.
Page 67
Access Control Terminal·User Manual Setting System Maintenance Steps: In the Remote Configuration interface, click System -> System Maintenance. Click Reboot to reboot the device. Or click Restore Default Settings to restore the device settings to the default ones, excluding the IP address.
Page 68
Access Control Terminal·User Manual Managing User Steps: 1. In the Remote Configuration interface, click System -> User. 2. Click Add to add the user (Do not support by the elevator controller.). Or select a user in the user list and click Edit to edit the user. You are able to edit the user password, the IP address, the MAC address and the user permission.
Page 69
Access Control Terminal·User Manual Configuring Network Parameters Click Network -> General. You can configure the NIC type, the IPv4 address, the subnet mask (IPv4), the default gateway (IPv4), MTU address, MTU, and the device port. Click Save to save the settings. Configuring Upload Method :...
Page 70
Access Control Terminal·User Manual Configuring Zone Parameters Step: Click Alarm -> Zone to enter the Zone interface. Click to pop up the Zone Settings window. Set the zone name, the detector type, the zone type and the sensitivity. Click Save to save the settings. Or click Copy to…...
Page 71
Access Control Terminal·User Manual 2. Click the to pop up the Relay Parameters Settings window. 3. Set the relay name and the output delay. 4. Click Save to save the paramters. Or click Copy to… to copy the relay information to other relays. Configuring Access Control Parameters Steps: 1.
Page 72
Access Control Terminal·User Manual Configuring Face Detection Parameters Click Other -> Face Detection. You can check the Enable checkbox to enable the device face detection function. Note: Only devices with video function support this function. Operating Zone Steps: 1. Click Operation -> Zone. You can view the zone information.
Access Control Terminal·User Manual Operating Relay Steps: 1. Click Operation -> Relay. You can view the relay status. 2. Check the relay checkbox 3. Click Open or Close to open/close the relay. 4. (Optional) Click Refresh to refresh the relay status. Viewing Relay Status Click Status ->...
Access Control Terminal·User Manual The interface is divided into two parts: Organization Management and Person Management. Organization Management You can add, edit, or delete the organization as desired. After adding the organization, you can add the person to the Person Management organization and issue card to persons for further management.
Access Control Terminal·User Manual deleted. 9.3.2 Person Management After adding the organization, you can add person to the organization and manage the added person such as issuing cards in batch, importing and exporting persons information in batch, etc. Note: Up to 10,000 persons or cards can be added. Adding Person Adding Person (Basic Information) Steps:...
Page 76
Access Control Terminal·User Manual 1. In the Add Person interface, click Details tab. 2. Input the detailed information of the person, including person’s ID type, ID No., country, etc., according to actual needs. Linked Device: You can bind the indoor station to the person. Note: If you select Analog Indoor Station in the Linked Device, the Door Station field will display and you are required to select the door station to communicate with the analog...
Page 77
Access Control Terminal·User Manual (Optional) In the Selected Permission(s) list, select the selected permission and click < to remove it. You can also click << to remove all the selected permissions. 4. Click OK to save the settings. Adding Person (Card) You can add card and issue the card to the person.
Page 78
Access Control Terminal·User Manual Visitor Card: The card is assigned for visitors. For the Visitor Card, you can set the Max. Swipe Times. Notes: The Max. Swipe Times should be between 0 and 255. When your swiping card times is more than the configured times, card swiping will be invalid.
Page 79
Access Control Terminal·User Manual 1) Select the device type. 2) For fingerprint machine, you can set the serial port number, baud rate, and overtime parameters of the fingerprint machine. 3) Click Save button to save the settings. You can click Restore Default Value button to restore the default settings. Notes: ...
Page 80
Access Control Terminal·User Manual 2. If the person joins in the time and attendance, check the Time and Attendance checkbox to enable this function for the person. Then the person’s card swiping records will be recorded and analyzed for time and attendance. For details about Time and Attendance, click More to go to the Time and Attendance module.
Page 81
Access Control Terminal·User Manual 2) You can click Download Template for Importing Person to download the template first. 3) Input the person information to the downloaded template. 4) Click to select the Excel file with person information. 5) Click OK to start importing. Getting Person Information from Access Control Device If the added access control device has been configured with person information (including person details, fingerprint, issued card information), you can get the person information from the device and...
Page 82
Access Control Terminal·User Manual Managing Person Modifying and Deleting Person To modify the person information and attendance rule, click in the Operation column, or select the person and click Modify to open the editing person dialog. You can click to view the person’s card swiping records. To delete the person, select a person and click Delete to delete it.
Access Control Terminal·User Manual Select the card type according to actual needs. Note: For details about the card type, refer to Adding Person. Input the password of the card itself in the Card Password field. The card password should contain 4 to 8 digits. Note: The password will be required when the card holder swiping the card to get enter to or exit from the door if you enable the card reader authentication mode as Card and Password,...
Access Control Terminal·User Manual Click to enter the schedule and template interface. You can manage the schedule of access control permission including Week Schedule, Holiday Schedule, and Template. For permission settings, please refer to Chapter 9.5 Permission Configuration. 9.4.1 Week Schedule Click Week Schedule tab to enter the Week Schedule Management interface.
Access Control Terminal·User Manual period of time, the configured permission is activated. Note: Up to 8 time periods can be set for each day in the schedule. 5. When the cursor turns to , you can move the selected time bar you just edited. You can also edit the displayed time point to set the accurate time period.
Access Control Terminal·User Manual 4. Click Add Holiday icon on the right to add a holiday period to the holiday list and configure the duration of the holiday. Note: Up to 16 holidays can be added to one holiday group. 1) On the period schedule, click and drag to draw the period, which means in that period of time, the configured permission is activated.
Page 87
Access Control Terminal·User Manual There are two pre-defined templates by default: Whole Week Template and Blank Template, which cannot be deleted and edited. Whole Week Template: The card swiping is valid on each day of the week and it has no holiday group schedule.
Access Control Terminal·User Manual 5. Select holiday groups to apply to the schedule. Note: Up to 4 holiday groups can be added. Click to select a holiday group in the list and click Add to add it to the template. You can also click Add Holiday Group to add a new one.
Access Control Terminal·User Manual 9.5.1 Adding Permission Purpose: You can assign permission for persons to enter/exist the access control points (doors) in this section. Steps: Click Add icon to enter following interface. In the Permission Name field, input the name for the permission as desired. Click on the dropdown menu to select a template for the permission.
Access Control Terminal·User Manual permission and click Modify to modify. You can select the added permission in the list and click Delete to delete it. 9.5.2 Applying Permission Purpose: After configuring the permissions, you should apply the added permission to the access control device to take effect.
Access Control Terminal·User Manual 9.6.1 Access Control Parameters Purpose: After adding the access control device, you can configure its access control point (door)’s parameters, and its card readers’ parameters. Click Access Control Parameters tab to enter the parameters settings interface. Door Parameters Steps: 1.
Page 92
Access Control Terminal·User Manual Door Magnetic: The Door Magnetic is in the status of Remain Closed (excluding special conditions). Exit Button Type: The Exit Button Type is in the status of Remain Open (excluding special conditions). Door Locked Time: After swiping the normal card and relay action, the timer for locking the door starts working.
Page 93
Access Control Terminal·User Manual 2. You can editing the following parameters: Nickname: Edit the card reader name as desired. Enable Card Reader: Select Yes to enable the card reader. OK LED Polarity: Select the OK LED Polarity of the card reader mainboard. Error LED Polarity: Select the Error LED Polarity of the card reader mainboard.
Access Control Terminal·User Manual 9.6.2 Card Reader Authentication Purpose: You can set the passing rules for the card reader of the access control device. Steps: Click Card Reader Authentication tab and select a card reader on the left. Select a card reader authentication mode. The available authentication modes depend on the card reader type: ...
Access Control Terminal·User Manual Repeat the above step to set other time periods. Or you can select a configured day and click Copy to Week button to copy the same settings to the whole week. (Optional) You can click Delete button to delete the selected time period or click Clear button to delete all the configured time periods.
Page 96
Access Control Terminal·User Manual Note: Please set the card permission and apply the permission setting to the access control device first. For details, refer to Chapter 9.5 Permission Configuration. Steps: 1. Click Multiple Authentication tab to enter the following interface. 2.
Page 97
Access Control Terminal·User Manual 4) Click OK to save the card group. 4. In the Set Authentication Group panel on the left, click Add to pop up the following dialog. 1) Select the access control point (door) of the device for multiple authentication. 2) Input the time interval for card swiping.
Access Control Terminal·User Manual Notes: For each access control point (door), up to four authentication groups can be added. For the authentication group which certificate type is Local Authentication, up to 8 card groups can be added to the authentication group. ...
Access Control Terminal·User Manual In the First Card list, Click Add button to pop up the following dialog box. Select the cards to add as first card for the door Note: Please set the card permission and apply the permission setting to the access control device first.
Access Control Terminal·User Manual Select an access control device from the device list on the left. In the First Card Reader field, select the card reader as the beginning of the path. In the list, click the text filed of Card Reader Afterward and select the linked card readers. Example: If you select Reader In_01 as the beginning, and select Reader In_02, Reader Out_04 as the linked card readers.
Page 101
Access Control Terminal·User Manual according to the configured swiping card route. And only one person could pass the access control point after swiping the card. Click Cross-Controller Anti-passing Back to enter the Cross-Controller Anti-passing Back tab. Setting Route Anti-passing Back Purpose: The route anti-passing back depends on the card swiping route.
Page 102
Access Control Terminal·User Manual Notes: The displayed card readers in the card reader afterward input field should be in authentication order. Up to 64 controllers with anti-passing back function can be added. Up to 16 card readers afterward can be added for each card reader. ...
Access Control Terminal·User Manual 4) Click Select Device to select a device in the pop-up window for anti-passing back authentication. 5) In the Set Card Reader area, check the checkboxes in the Enable Anti-passing Back column to select the entrance card reader and the exit card reader. 6) Click Save to save the settings.
Access Control Terminal·User Manual 2. Select an access controller from the Controller List. 3. Click Add to pop up the Add Access Control Point to Interlock interface. 4. Select the access control point (door) from the list. Note: Up to four doors can be added in one multi-door interlocking combination. 5.
Access Control Terminal·User Manual All the cards and persons which have been applied to the device will be displayed. Note: For setting and applying the permissions to the device, refer to Chapter 9.5 Permission Configuration. 2. Click the Password field of the card and input the authentication password for the card. Note: The authentication password should contain 4 to 8 digits.
Page 106
Access Control Terminal·User Manual 2. Select a custom wiegand on the left of the interface. 3. Check Enable checkbox to enable the custom wiegand. 4. Set the wiegand name. 5. Select device. 1) Click Select Device. 2) Select the device need to use custom wiegand. 3) Click OK to save the settings.
Access Control Terminal·User Manual 5) (Optional) Select the rules in the Selected Rule list and click to remove the rule from the list on the right. 6) Click OK to save the settings. 7) In the Custom Wiegand tab, set the rule start bit, length, and the decimal digit. 8.
Access Control Terminal·User Manual 1. Select the source. You can select Client or Device. 2. Enter the search condition (source, event type/card holder name/card No./capture/start & end time). 3. Click Search to get the search results. 4. View the event information in the event list. 5.
Access Control Terminal·User Manual Table 9. 1 Linkage Actions for Access Control Event Linkage Actions Descriptions The client software gives an audible warning when alarm is triggered. You can Audible Warning select the alarm sound for audible warning. For setting the alarm sound, please refer to User Manual of VSAXESS Client Software.
Access Control Terminal·User Manual 2. In the event list on the left, select an alarm input. 3. Switch the property from to enable this action. Host Buzzer: The audible warning of controller will be triggered. Card Reader Buzzer: The audible warning of card reader will be triggered. Alarm Output: The alarm output will be triggered for notification.
Page 111
Access Control Terminal·User Manual Select the access control device from the list on the left. Click Add button to add a new linkage. You can select the event source as Event Linkage or Card Linkage. Event Linkage For the event linkage, the alarm event can be divided into four types: device event, alarm input, door event, and card reader event.
Access Control Terminal·User Manual The door status of open, close, remain open, and remain close cannot be triggered at the same time. The target door and the source door cannot be the same one. 3. Click Save button to save and take effect of the parameters. Card Linkage Steps: 1.
Page 113
Access Control Terminal·User Manual Event Linkage For the event linkage, the alarm event can be divided into four types: device event, alarm input, door event, and card reader event. Steps: 1. Click to select the linkage type as Event Linkage, select the access control device as event source, and select the event type from the dropdown list.
Access Control Terminal·User Manual Access Control Point: The door status of open, close, remain open, and remain closed will be enabled. 5. Click Save button to save parameters. 9.9 Door Status Management Purpose: The door status of the added access control device will be displayed in real time. You can check the door status and the linked event(s) of the selected door.
Access Control Terminal·User Manual 4. Perform the following steps to import the access control points to the group: 1) Click Import on Group Management interface, and then click the Access Control tab to open the Import Access Control page. Notes: ...
Access Control Terminal·User Manual Steps: Select an access control group on the left. For managing the access control group, refer to Chapter 9.9.1 Access Control Group Management. The access control points of the selected access control group will be displayed on the right. Click icon on the Status Information panel to select a door.
Page 117
Access Control Terminal·User Manual In the Door Status module, click Status Duration button to enter the Status Duration interface. Steps: 1. Click to select a door from the access control device list on the left. 2. On the Door Status Configuration panel on the right, draw a schedule for the selected door. Select a door status brush as Remain Open: The door will keep open during the configured time period.
Access Control Terminal·User Manual 3. Optionally, you can select the schedule time bar and click Copy to Whole Week to copy the time bar settings to the other days in the week. 4. You can select the time bar and click Delete Duration to delete the time period. Or you can click Clear to clear all configured durations on the schedule.
Access Control Terminal·User Manual Steps: 1. All access control alarms will display in the list in real time. You can view the alarm type, alarm time, location, etc. 2. Click to view the alarm on E-map. For configuring the access control point on E-map, refer to User Manual of VSAXESS Client Software .
Page 120
Access Control Terminal·User Manual information from the device. Steps: 1. Click Tool->Device Arming Control to pop up the Device Arming Control window. 2. Arm the device by checking the corresponding checkbox. Then the alarm information will be auto uploaded to the client software when alarm occurs.
Access Control Terminal·User Manual Appendix 1 Sound Prompt and Indicator After the card reader is powered on, LED status indicator will turn blue and blink for 1 time. Then it will turn red and blink for 3 times. At last the buzzer will send out a beep sound indicating the starting up process is completed.
Access Control Terminal·User Manual Appendix 2 Custom Wiegand Rule Descriptions Take Wiegand 44 as an example, the setting values in the Custom Wiegand tab are as follows: Custom Wiegand Name: Wiegand 44 Total Length Transformation Rule (Decimal Digit) byFormatRule[4]=[1][4][0][0] Parity Mode XOR Parity Odd Parity Start Bit Length...
Page 123
Access Control Terminal·User Manual OEM Start Bit, Length, and Decimal Digit: If you use the transformation rule, these items are available. For detailed information, see the explanation of the card ID. Manufacturer Code Start Bit, Length, and Decimal Digit: If you use the transformation rule, these items are available.
Need help?
Do you have a question about the VS-AXESS-1ETL and is the answer not in the manual?
Questions and answers