Page 1
DS-K2600 Series Access Controller User Manual Ness V1.0...
Page 2
Hikvision. Modifications have been made to this manual by Ness Corporation Australia to suit the Australian market and to assist in Ness customers understanding the product easier.
Page 3
Access Controller· · · · User Manual Regulatory Information FCC Information Please take attention that changes or modification not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment. FCC compliance: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules.
Page 4
Access Controller· · · · User Manual Preventive and Cautionary Tips Before connecting and operating your device, please be advised of the following tips: Ensure unit is installed in a well-ventilated, dust-free environment. • Keep all liquids away from the device. •...
Page 5
Access Controller· · · · User Manual Safety Instruction WARNING Please note: There is high voltage (240VAC) inside the housing of the controller. Extreme caution should be taken and only installed and serviced by licensed trained installers. These instructions are intended to ensure that user can use the product correctly to avoid danger or property loss.
Page 6
Access Controller· · · · User Manual Cautions Do not drop the device or subject it to physical shock, and do not expose it to high electromagnetism radiation. Avoid the equipment installation on vibrations surface or places subject to shock (ignorance can cause equipment damage). Do not place the device in extremely hot (refer to the specification of the device for the detailed operating temperature), cold, dusty or damp locations, and do not expose it to high electromagnetic radiation.
Access Controller· · · · User Manual Chapter 1 Product Description 1.1 Overview DS-K2600 is a powerful and stable access controller, using the logical architecture design. DS-K2600 is designed with TCP/IP network interface and its signal processed with special encryption and can be run offline.
Page 11
Access Controller· · · · User Manual Data can be permanently saved after the access controller is powered off. Supports I/O linkage, and event linkage 500 groups of password under the authentication mode of card and password...
Access Controller· · · · User Manual Chapter 2 Component Description Take DS-K2604 as an example, the component schematic diagram is shown below. Component Description DS-K2601 DS-K2602 DS-K2604 Alarm Relay Output Status (NC/NO) Network Data Indicator RS-485 Communication Indicator Network Status Indicator...
Access Controller· · · · User Manual Chapter 3 Terminal Connection 3.1 Terminal Description 3.1.1 DS-K2601Terminal Description DS-K2601 Terminal descriptions are as follows: DS-K2601 Grounding Lock Power +12V Power Output of the Lock Grounding Card Reader Power +12V Power Output of the Head Read...
Page 14
Access Controller· · · · User Manual DS-K2601 Indicator of Card Reader Control Output (Invalid Card Output) Indicator of Card Reader Control Output (Valid Card Output) Grounding Wiegand Head Read Data Input Data0 Wiegand Head Read Data Input Data1 Card Reader Buzzer Control Output...
Page 16
Access Controller· · · · User Manual DS-K2602 Grounding Power for Card Reader +12V Power Output of the Head Read Grounding Wiegand Head Read Data Input Data0 Wiegand Head Read Data Input Data1 Wiegand Card Reader Card Reader Buzzer Control Output Indicator of Card Reader Control Output (Invalid Card Output) Indicator of Card Reader Control Output (Valid...
Page 17
Access Controller· · · · User Manual DS-K2602 E-Lock2 Door 2 Door Relay Input (Dry Contact) Door 1 Magnetic Detector Input Door Magnetics Signal Grounding Detector Door 2 Magnetic Detector Input Door 1 Door Button Input Door Button Signal Grounding Door 2 Door Button Input +12V DC12V Cathode...
Access Controller· · · · User Manual 3.1.3 DS-K2604 Terminal Description DS-K2604 Terminal descriptions are as follows: DS-K2604 Power Supply Grounding of E-Lock +12V Power Supply of E-Lock Output Power Supply Grounding of Card Reader +12V Power Supply of Card Reader Output Grounding Wiegand Card Reader Data Input Data0 Wiegand Card Reader Data Input Data1...
Page 19
Access Controller· · · · User Manual DS-K2604 Cresset of Card Reader Control Output (Invalid Card Output) Cresset of Card Reader Control Output (Valid Card Output) Grounding Wiegand Card Reader Data Input Data0 Wiegand Card Reader Data Input Data1 Wiegand Card Buzzer of Card Reader Control Output Reader 2 Cresset of Card Reader Control Output (Invalid...
Page 20
Access Controller· · · · User Manual DS-K2604 Door 1 Door Button Input Signal Grounding Door 2 Door Button Input Door Button Door 3 Door Button Input Signal Grounding Door 4 Door Button Input +12V DC12V Cathode Power Grounding BAT+ DC12V Battery Cathode Battery BAT-...
Page 21
Access Controller· · · · User Manual Notes: The Alarm input hardware interface is normally open by default. So only the normally open signal is allowed. It can be linked to the buzzer of the card reader and access controller, and the alarm relay output and open door relay output.
Access Controller· · · · User Manual 4.2 Card Reader Installation 4.2.1 The Connection of Wiegand Card Reader Note: Optionally you must connect the OK/ERR/BZ, if using access controller to control the LED and buzzer of the Wiegand card reader.
Access Controller· · · · User Manual 4.2.2 RS485 Card Reader Connection Note: If the card reader is installed too far away from the access controller, you can use an external power supply.
Access Controller· · · · User Manual Chapter 5 Settings 5.1 Initializing the Hardware Option 1: Steps: 1. Remove the jumper cap from the Normal terminal. 2. Disconnect the power and restart the access controller. The controller buzzer buzzes a long beep.
Page 32
Access Controller· · · · User Manual Work Flow of Software For detailed information, please see the user manual of the client software. Refer to the following work flow:...
Access Controller· · · · User Manual Chapter 6 Activating the Access Control Terminal Purpose: You are required to activate the terminal first before using it. Activation via SADP, and Activation via client software are supported. The default values of the control terminal are as follows. The default IP address: 192.0.0.64.
Access Controller· · · · User Manual 6. Input the password and click the Modify button to activate your IP address modification. 6.2 Activating via Client Software The client software is versatile video management software for multiple kinds of devices. Get the client software from the supplied disk or the official website, and install the software according to the prompts.
Page 35
Access Controller· · · · User Manual 2. Click the Device Management to enter the Device Management interface. 3. Check the device status from the device list, and select an inactive device. 4. Click the Activate button to pop up the Activation interface. 5.
Page 36
Access Controller· · · · User Manual 6. Click OK button to start activation. 7. Click the Modify Netinfor button to pop up the Network Parameter Modification interface. 8. Change the device IP address to the same network segment with your computer by either modifying the IP address manually.
Access Controller· · · · User Manual Chapter 7 Client Operation You can set and operate the access control devices via the client software. This chapter will introduce the access control device related operations in the client software. For integrated operations, refer to User Manual of iVMS-4200 Client Software.
Page 38
Access Controller· · · · User Manual 1280*1024 Display the window at size of 1280*1024 pixels. 1440*900 Display the window at size of 1440*900 pixels. 1680*1050 Display the window at size of 1680*1050 pixels. Maximize Display the window in maximum mode. Control Panel Enter Control Panel interface.
Page 39
Access Controller· · · · User Manual panel to select the modules to display on the Operation and Control area of the control pane. Steps: 1. Click to pop up the following dialog. 2. Check the module checkboxes to display them on the control panel according to the actual needs.
Access Controller· · · · User Manual The Real-time Alarm module provides displaying the real-time alarm of security control panel, acknowledging alarms, and searching the history alarms. The Alarm Event module displays the alarm and event received by the client software.
Page 41
Access Controller· · · · User Manual A user name cannot contain any of the following characters: / \ : * ? “ < > |. And the length of the password cannot be less than 6 characters. For your privacy, we strongly recommend changing the password to something of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
Access Controller· · · · User Manual 7.3 System Configuration Purpose: You can synchronize the missed access control events to the client. Steps: 1. Click Tool – System Configuration. 2. In the System Configuration window, check the Auto-synchronize Access Control Event checkbox.
Page 43
Access Controller· · · · User Manual Before you start: For the first time opening the Access Control module, the following dialog will pop up and you are required to select the scene according to the actual needs. You can select the scene as Non-residence and Residence. Notes: Once the scene is configured, you cannot change it later.
Access Controller· · · · User Manual 7.4.1 Adding Access Control Device From within the ‘Access Control” module, Click in the Access Control module to enter the following interface. Purpose: The active online devices in the same local subnet will be displayed in the in the Online Device area (i.e.
Page 45
Access Controller· · · · User Manual Steps for adding a device to your iVMS4200 Client Software: Note:. Before a device can be added to the software it need to be activated Refer Chapter 6 - Activating the Access Control Terminal (Page 24) 1.
Page 46
Access Controller· · · · User Manual Address: Input the device’s IP address. The IP address of the device is obtained automatically in this adding mode. Port: Input the device port No. The default value is 8000. User Name: Input the device user name. By default, the user name is admin. Password: Input the device password.
Page 47
Access Controller· · · · User Manual Note: After adding the device, you should check the device arming status in Tool – Device Arming Control. If the device is not armed, you should arm it, or you will not receive the real-time events via the client software.
Access Controller· · · · User Manual 7.4.2 Viewing Device Status In the device list, you can select the device and then click Device Status button to view its status. Note: The interface may different from the picture displayed above. Refer to the actual interface when adopting this function.
Access Controller· · · · User Manual Door Status: The status of the connected door. Host Status: The status of the host, including Storage Battery Power Voltage, Device Power Supply Status, Multi-door Interlocking Status, Anti-passing Back Status, Host Anti-Tamper Status and number of cards added to the controller.
Select the device in the device list, and click Modify to pop up the modifying device information window. It is recommended to leave these settings as default unless instructed to change by Ness Technical staff. Click RS-485 Settings tab to enter the RS-485 settings interface.
Select the device in the device list, and click Modify to pop up the modifying device information window. It is recommended to leave these settings as default unless instructed to change by Ness Technical staff. Click Wiegand-485 Settings tab to enter the Wiegand settings interface.
Page 52
Access Controller· · · · User Manual 1. Input the Organization Name as desired. 2. Click OK to save the adding. 3. You can add multiple levels of organizations according to the actual needs. To add sub organizations, select the parent organization and click Add. Repeat Step 2 and 3 to add the sub organization.
Access Controller· · · · User Manual 7.4.8 Remote Configuration Purpose: In the device list, select the device and click Remote Configuration button to enter the remote configuration interface. You can set the detailed parameters of the selected device. Checking Device Information Steps: 1.
Page 54
Access Controller· · · · User Manual Editing Device Name In the Remote Configuration interface, click System -> General to configure the device name and overwrite record files parameter. Click Save to save the settings. Editing Time Steps: 1. In the Remote Configuration interface, click System -> Time to configure the time zone. 2.
Page 55
Access Controller· · · · User Manual Note: The configuration file contains the device parameters. 3. You can also remote upgrade the device. 1) In the Remote Upgrade part, select an upgrade file type in the dropdown list. You can select Controller Upgrade File or Card Reader Upgrade in the drop-down list. 2) Click to select the upgrade file.
Page 56
Access Controller· · · · User Manual Configuring Access Control Parameters Steps: 1. In the Remote Configuration interface, click Other -> Access Control Parameters. 2. Select and check the Downstream RS-485 Communication Backup checkbox or the Press Key to Input Card No. checkbox. 3.
Access Controller· · · · User Manual Person and Card Management You can add, edit, and delete the organization and person in Person and Card Management module. From the ‘Access Control’ Module, Click tab to enter the Person and Card Management interface.
Access Controller· · · · User Manual To add sub organizations, select the parent organization and click Add. Repeat Step 2 and 3 to add the sub organization. Then the added organization will be the sub-organization of the upper-level organization. Note: Up to 10 levels of organizations can be created.
Page 59
Access Controller· · · · User Manual 1. The Person No. will be generated automatically and is not editable. 2. Input the persons information as required. (i.e. Person name, gender, phone No., date of Birth, and email etc to suit the client’s actual needs. This is database information for the customer and will work without this information) 3.
Page 60
Access Controller· · · · User Manual display and you are required to select the door station to communicate with the analog indoor station. Room No.: You can input the room No. of the person, as used with the Apartment Intercom System.
Page 61
Access Controller· · · · User Manual (Optional) In the Selected Permission(s) list, select the selected permission and click < to remove it. You can also click << to remove all the selected permissions. 3. Click OK to save the settings. Adding Person (Card / Credential) You can add card and issue the card to the person.
Page 62
Access Controller· · · · User Manual 2. Click Add to pop up the Add Card dialog. 3. Select the card type according to actual needs. Normal Card Card for Disabled Person: The door will remain open for the configured time period for the card holder.
Page 63
Access Controller· · · · User Manual 4. Input the password (PIN No) of the card itself in the Card Password field. The card password should contain 4 to 8 digits. Note: The password will be required when the card holder swiping the card to get enter to or exit from the door if you enable the card reader authentication mode as Card and Password, Password and Fingerprint, and Card, Password, and Fingerprint.
Page 64
Access Controller· · · · User Manual 2) Select the Card Enrollment Station type. Note: Currently, the supported card reader types include DS-K1F100-D8E and DS-K1F180-D8E 4) Set the serial port No., the baud rate, the timeout value, the buzzing, or the card No. type.
Page 65
Access Controller· · · · User Manual Manually Input: Input the card No. and click Enter to input the card No. 7. Click OK and the card(s) will be issued to the person. 8. (Optional) You can select the added card and click Edit or Delete to edit or delete the card. 9.
Page 66
Access Controller· · · · User Manual 2. Before inputting the fingerprint, you should connect the fingerprint machine to the PC and set its parameters first. Click Set Fingerprint Machine to enter the following dialog box. 1) Select the device type: DS-K1F820-F 2) Click Save button to save the settings.
Page 67
Access Controller· · · · User Manual 9. Click Link Fingerprint to link the fingerprint to the card. Select the Fingerprints you wish to link to the added card and then click “OK”. Adding Person (Attendance Rule) You can set the attendance rule for the person. Note: This tab page will display when you select Non-Residence mode in the application scene when running the software for the first time.
Page 68
Access Controller· · · · User Manual 2. If the person joins in the time and attendance, check the Time and Attendance checkbox to enable this function for the person. Then the person’s card swiping records will be recorded and analyzed for time and attendance. For details about Time and Attendance, click More to go to the Time and Attendance module.
Page 69
Access Controller· · · · User Manual 2. Importing Person: You can import the Excel file with persons information in batch from the local PC 1) click Import Person button in the Person and Card tab. 2) You can click Download Template for Importing Person to download the template first. 3) Input the person information to the downloaded template.
Page 70
Access Controller· · · · User Manual Notes: The person information, including person details, person’s fingerprint information (if configured), and the linked card (if configured), will be imported to the selected organization. If the person name stored in the device is empty, the person name will be filled with the issued card No.
Page 71
Access Controller· · · · User Manual Issuing Card in Batch You can issue multiple cards for the person with no card issued in batch. Steps: 1. Click Issue Card in Batch button to enter the following dialog. All the added person with no card issued will display in the Person(s) with No Card Issued list. 2.
Page 72
Access Controller· · · · User Manual 1) Select the Card Enrollment Station type. 2) Currently, the supported card reader types include DS-K1F100-D8E and DS-K1F180-D8E 3) Set the parameters about the connected card enrollment station. If the card is M1 card, and if you need to enable the M1 Card Encryption function, you should check Enable checkbox of M1 Card Encryption and click Modify to select the sector.
Access Controller· · · · User Manual 7.5 Schedule and Template Purpose: Schedules allow you to set what times and day’s events will occur. E.g. Door Auto unlocking, what times card holder can access doors etc. You can configure the template including a week’s schedule and holiday schedule. After setting the templates, you can adopt the configured templates to access control permissions when setting the permission.
Page 74
Access Controller· · · · User Manual Steps: 1. Click Add Week Schedule button to pop up the adding schedule interface. 2. Input a name of week schedule (e.g. Office Access Hours) and click OK button to add the week schedule.
Access Controller· · · · User Manual 7.5.2 Holiday Group Click Holiday Group tab to enter the Holiday Group Management interface. Steps: 1. Click Add Holiday Group button on the left to pop up the adding holiday group interface. 2. Input the name of holiday group in the text filed and click OK button to add the holiday group. 3.
Access Controller· · · · User Manual 1) On the period schedule, click and drag to draw the period, which means in that period of time, the configured permission is activated. Note: Up to 8 time durations can be set for each period in the schedule. 2) When the cursor turns to , you can move the selected time bar you just edited.
Page 77
Access Controller· · · · User Manual You can define custom templates on your demand. Steps: 1. Click Add Template to pop up the adding template interface. 2. Input the template name (for future use that makes easier reference in the future) in the text field and click OK button to add the template.
Page 78
Access Controller· · · · User Manual You can also click + Add Week Schedule to add a new week schedule. For details, refer to Chapter 7.5.1 Week Schedule.
Page 79
Access Controller· · · · User Manual 5. Select holiday groups to apply to the schedule. Note: Up to 4 holiday groups can be added. Click to select a holiday group in the list and click Add to add it to the template. You can also click Add Holiday Group to add a new one from this screen.
Access Controller· · · · User Manual Holiday Group. You can click to select an added holiday group in the right-side list and click Delete to delete it. You can click Clear to delete all the added holiday groups. 6. Click Save button to save the settings. 7.6 Permission Configuration In Permission Configuration module, you can add, edit, and delete the access control permission, and then apply the permission settings to the device to take effect.
Access Controller· · · · User Manual 7.6.1 Adding Permission Purpose: You can assign permission for persons to enter/exist the access control points (doors) in this section. Steps: 1. Click Add icon to enter following interface. 2. In the Permission Name field, input the name for the permission as desired. 3.
Access Controller· · · · User Manual 6. Click OK button to complete the permission adding. The selected person will have the permission to enter/exit the selected door/door station with their linked card(s). 7. (Optional) after adding the permission, you can click Details to modify it. Or you can select the permission and click Modify to modify.
Access Controller· · · · User Manual 7.7 Advanced Functions Purpose: After configuring the person, template, and access control permission, you can configure the advanced functions of access control application, such as access control parameters, authentication password, and opening door with first card, anti-passing back, etc. Note: The advanced functions should be supported by the device.
Page 84
Access Controller· · · · User Manual 2. You can editing the following parameters: Door Magnetic: (reed switch for monitoring the state (open/close) of the door. When using door monitoring with a N/C Reed Switch, then select ‘Remain Closed’. If not monitoring the state of the door with a N/C Reed switch then have it set to “Remain Open”...
Page 85
Access Controller· · · · User Manual Notes: The duress code, Super password, and dismiss code should be different. The duress code, super password, and the dismiss code should be different from the authentication password. The duress code, super password, and the dismiss code should contain 4 to 8 digits. AUTO UNLOCKING OF DOORS Purpose: You can schedule weekly time periods for an access control point (door) to remain open or remain...
Page 86
Access Controller· · · · User Manual B. Click and drag on the timeline to draw a colour bar on the schedule to set the duration. C. When the cursor turns to , you can move the selected time bar you just edited. You can also edit the displayed time point to set the accurate time period.
Page 87
Access Controller· · · · User Manual 2. You can editing the following parameters: Nickname: Edit the card reader name as desired. (e.g. Front Door Entry Reader) Enable Card Reader: Select Yes to enable the card reader. OK LED Polarity: Select the OK LED Polarity of the card reader main board. Error LED Polarity: Select the Error LED Polarity of the card reader main board.
Access Controller· · · · User Manual system showing the description of the reader. Buzzer Time: sets how long the reader buzzer will pulse for if programmed to pulse. 3. Click the Save button to save parameters. 7.7.2 Card Reader Authentication Purpose: You can set what credential is required and during what time for access to be granted.
Page 89
Access Controller· · · · User Manual All available options for your Controller and Reader will be displayed on the left hand window in the ‘Selectable Mode’ column. Select the option you want to use from the ‘Selectable Mode’ column and then select click on the to add them to the ‘Selected Mode’.
Page 90
Access Controller· · · · User Manual They will then display in the order you selected. The following possible options are dependent on the Controller and Reader you have. Card: The door can be unlocked by presenting a Valid Card only. Card and Password: The door can open by both inputting the card password and swiping the card.
Page 91
Access Controller· · · · User Manual To add sub organizations, select the parent organization and click Add. Repeat Step 2 and 3 to add the sub organization. Then the added organization will be the sub-organization of the upper-level organization. Note: Up to 10 levels of organizations can be created.
Page 92
Access Controller· · · · User Manual The lower-level organizations will be deleted as well if you delete an organization. Make sure there is no person added under the organization, or the organization cannot be deleted. Person Management. Card and Fingerprint: The door can open by both inputting the fingerprint and swiping the card.
Page 93
Access Controller· · · · User Manual 4. Repeat the above step to set other time periods. Or you can select a configured day and click Copy to Week button (from the top right of the window) to copy the same settings to the whole week. (Optional) You can click Delete button to delete the selected time period or click Clear button to delete all the configured time periods.
Access Controller· · · · User Manual 6. Click Save button to save parameters. 7.7.3 Multiple Authentication Purpose: You can manage the cards by group and set the authentication for multiple cards for one access control point (door). Note: Please set the card permission and apply the permission setting to the access control device first.
Page 95
Access Controller· · · · User Manual 3. In the Set Card Group panel on the right, click Add button to pop up the following dialog: 1) In the Card Group Name field, input the name for the group as desired. 2) Click to set the effective time and expiry time of the card group.
Access Controller· · · · User Manual 3) Select the template of the authentication group from the dropdown list. For details about setting the template, refer to Chapter 7.5 Schedule and Template. 4) Select the authentication type of the authentication group from the dropdown list. Local Authentication: Authentication by the access control device.
Page 97
Access Controller· · · · User Manual Option 1 – Disabling / Postpone ‘auto unlocking’ of doors If you select a Door(s) to ‘Remain Open with First Card’ but do not assign any Cards (i.e. No card in the ‘first Card list’, then this feature will be used to ‘postpone Auto Unlocking of the door until any user uses their card at the door.
Access Controller· · · · User Manual Example. User arrives in the morning and presents his valid card at the door reader. The door them remains unlocked for the time programmed in the ‘Remain Open Duration (Mins)’ time. (e.g. 8 hours).
Access Controller· · · · User Manual 2. Select an access control device from the device list on the left. Note: Not all controllers support Anti-Passback feature. E.g. It is not supported in the DS-K2800 series. 3. In the First Card Read… field, leave this as disable. 4.
Page 100
Access Controller· · · · User Manual You can set anti-passing back for card readers in multiple access controllers. You should swipe the card according to the configured swiping card route. And only one person could pass the access control point after swiping the card. For the Cross-Controller Anti-passing Back”...
Page 101
Access Controller· · · · User Manual 6) Click the card reader afterward input field to select the card readers afterward in the pop-up window. 7) Check the checkbox in the Enable Anti-passing Back column to enable the anti-passing back function. Notes: The displayed card readers in the card reader afterward input field should be in authentication order.
Access Controller· · · · User Manual Based on Card Note: The system will judge the anti-passing back according to the entrance and exit records on the card. 1) Select Based on Card as the anti-passing back mode in the drop-down list. 2) Select Entrance/Exit Anti-passing Back as the rule.
Access Controller· · · · User Manual Either the anti-passing back or multi-door interlocking function can be configured for an access control device at the same time. Steps: 1. Click Multi-door Interlocking tab to enter the multi-door interlock settings page. 2.
Access Controller· · · · User Manual Steps: 1. Click Authentication Password tab and select an access control device from the list. Once the controller is selected, all the cards and persons which have been applied to the device will be displayed. Note: •...
Page 105
Access Controller· · · · User Manual Before you start: Wire the third party card readers to the controller. Steps: 1. Click Custom Wiegand to enter the Custom Wiegand tab. 2. Select a custom wiegand on the left of the interface. 3.
Page 106
Access Controller· · · · User Manual 3) Click to move the selected rules to the right list. 4) (Optional) Click to change the rule order. 5) (Optional) Select the rules in the Selected Rule list and click to remove the rule from the list on the right.
Access Controller· · · · User Manual 7.8 Searching Access Control Event Purpose: You can search the access control history events including device exception event, door event, alarm input, and card reader event. Click icon and click Access Control Event tab to enter the following interface.
Access Controller· · · · User Manual Steps: 1. Select the source. You can select Client or Device. 2. Enter the search condition (source, event type/card holder name/card No./capture/start & end time). 3. Click Search to get the search results. 4.
Access Controller· · · · User Manual 7.9.1 Access Control Event Linkage Purpose: You can assign linkage actions to the access control event by setting up a rule. For example, when the access control event is detected, an audible warning appears or other linkage actions happen. Note: The linkage here refers to the linkage of the client software’s (iVMS4200) actions.
Access Controller· · · · User Manual 6. Click Save to save the settings. 7. You can click Copy to button to copy the access control event to other access control device, alarm input, access control point, or card reader. Select the parameters for copy, select the target to copy to, and click OK to confirm.
Page 111
Access Controller· · · · User Manual Steps: 1. Click Access Control Alarm Input tab to enter the following interface. 2. In the event list on the left, select an alarm / Event input. 3. Switch the property from to enable this action. Host Buzzer: The audible warning of controller will be triggered.
Access Controller· · · · User Manual 7.9.3 Event Card Linkage Click Event Card Linkage tab to enter the following interface. Notes: The Event Card Linkage should be supported by the device. The linkage here refers to the linkage of the iVMS4200 client software’s own actions. Select the access control device from the list on the left.
Page 113
3 Card swipes of the same card (as programmed in the event linkage) within 5 seconds will deactivate the O/P. This could be used for Arming and Disarming an alarm panel such as the Ness M1 Controller or Ness D8X panels.
Access Controller· · · · User Manual 7.9.4 Cross-Device Linkage Purpose: You can assign to trigger other access control device’s action by setting up a rule when the access control event is triggered. Click Cross-Device Linkage tab to enter the following interface. Click Add button to add a new client linkage.
Page 115
Access Controller· · · · User Manual 3. Click Save button to save parameters.
Access Controller· · · · User Manual Card Linkage Steps: 1. Click to select the linkage type as Card Linkage. 2. Select the card from the dropdown list and select the access control device as event source. 3. Select the card reader from the table for triggering. 4.
Page 117
Access Controller· · · · User Manual Select the “Card Swiping Record” to view live Card Swiping events as they come in. (Note – When first opening the above screen, previous events may not be visible and only new events will come through as they occur. For past events use the Access Control / Search feature.
Access Controller· · · · User Manual Access Control Group Management 7.10.1 Purpose: Before controlling the door status and setting the status duration, you are required to organize it into group for convenient management. Perform the following steps to create the group for the access control device: Steps: 1.
Page 119
Access Controller· · · · User Manual 3. Perform the following steps to add the group. 1) Click to open the ‘Add’ Group dialog box. 2) Enter a group name as you want. (e.g. All Access Doors) 3) Click OK to add the new group to the group list. You can also check the checkbox Create Group by Device Name to create the new group by the name of the selected device.
Access Controller· · · · User Manual 1) Click Import on Group Management interface, and then click the Access Control tab to open the Import Access Control page. Notes: You can also select Alarm Input tab and import the alarm inputs to group. For the Video Access Control Terminal, you can add the cameras as encoding channel to the group.
Page 121
Access Controller· · · · User Manual Steps: 1. Select an access control group on the left. For managing the access control group, refer to Chapter 0 Purpose: 2. The door status of the added access control device will be displayed in real time. You can check the door status and the linked event(s) of the selected door.
Page 122
Access Controller· · · · User Manual Select the “Card Swiping Record” to view live Card Swiping events as they come in. (Note – When first opening the above screen, previous events may not be visible and only new events will come through as they occur. For past events use the Access Control / Search feature.
Page 123
Access Controller· · · · User Manual Access Control Group Management 4. The access control points of the selected access control group will be displayed on the right. Click icon on the Status Information panel to select a door. 5. Click the following button listed on the Status Information panel to control the door. : Click to open the door once.
Access Controller· · · · User Manual 7.10.3 Real-time Card Swiping Record Click Card Swiping Record tab to enter the following interface. The logs of card swiping records of all access control devices will display in real time. You can view the details of the card swiping event, including card No., person name, organization, event time, etc.
Page 125
Access Controller· · · · User Manual Steps: 1. All access control alarms will display in the list in real time. You can view the alarm type, alarm time, location, etc. 2. Click to view the alarm on E-map. 3. You can click to view the live view or the captured picture of the triggered camera when the alarm is trigged.
Access Controller· · · · User Manual 7.11 Arming Control Purpose: You can arm or disarm the device. After arming the device , the client can receive the alarm information from the device. Steps: 1. Click Tool->Device Arming Control to pop up the Device Arming Control window. 2.
Access Controller· · · · User Manual Appendix A Sound Prompt and Indicator After the card reader is powered on, LED status indicator will turn blue and blink for 1 time. Then it will turn red and blink for 3 times. At last the buzzer will send out a beep sound indicating the starting up process is completed.
Access Controller· · · · User Manual Appendix B Custom Wiegand Rule Descriptions Take Wiegand 44 as an example, the setting values in the Custom Wiegand tab are as follows: Custom Wiegand Name: Wiegand 44 Total Length Transformation Rule (Decimal byFormatRule[4]=[1][4][0][0] Digit) Parity Mode...
Page 129
Access Controller· · · · User Manual available. Depending on the table displayed above, the manufacturer code start bit is 32, length is 8, and decimal digit is 3. It represents that from bit 32, there are 8 bits are manufacturer code. (The length here is calculated by bit.) And the decimal length is 3.
Page 130
Access Controller· · · · User Manual This manual has been modified by Ness Corporation for our valued customers. www.nesscorporation.com...
Need help?
Do you have a question about the DS-K2601 and is the answer not in the manual?
Questions and answers