Table of Contents

Advertisement

Quick Links

DS-K2600 Series Access Controller
User Manual
Ness V1.0

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the DS-K2601 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Ness DS-K2601

  • Page 1 DS-K2600 Series Access Controller User Manual Ness V1.0...
  • Page 2 Hikvision. Modifications have been made to this manual by Ness Corporation Australia to suit the Australian market and to assist in Ness customers understanding the product easier.
  • Page 3 Access Controller· · · · User Manual Regulatory Information FCC Information Please take attention that changes or modification not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment. FCC compliance: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules.
  • Page 4 Access Controller· · · · User Manual Preventive and Cautionary Tips Before connecting and operating your device, please be advised of the following tips: Ensure unit is installed in a well-ventilated, dust-free environment. • Keep all liquids away from the device. •...
  • Page 5 Access Controller· · · · User Manual Safety Instruction WARNING Please note: There is high voltage (240VAC) inside the housing of the controller. Extreme caution should be taken and only installed and serviced by licensed trained installers. These instructions are intended to ensure that user can use the product correctly to avoid danger or property loss.
  • Page 6 Access Controller· · · · User Manual Cautions Do not drop the device or subject it to physical shock, and do not expose it to high electromagnetism radiation. Avoid the equipment installation on vibrations surface or places subject to shock (ignorance can cause equipment damage). Do not place the device in extremely hot (refer to the specification of the device for the detailed operating temperature), cold, dusty or damp locations, and do not expose it to high electromagnetic radiation.
  • Page 7: Table Of Contents

    3.1.3 DS-K2604 Terminal Description ..................9 Chapter 4 Card Reader Installation ..................13 External Terminal ....................... 13 4.1.1 DS-K2601 External Terminals ..................13 4.1.2 DS-K2602 External Terminals ..................13 4.1.3 DS-K2604 External Terminals ..................13 Card Reader Installation ..................... 14 4.2.1 The Connection of Wiegand Card Reader ..............
  • Page 8 Access Controller· · · · User Manual Activating via SADP Software ..................... 24 Activating via Client Software .................... 25 Chapter 7 Client Operation ....................28 Function Module ........................ 28 User Registration and Login ....................31 System Configuration ......................33 Access Control Management ..................... 33 7.4.1 Adding Access Control Device ..................
  • Page 9 Access Controller· · · · User Manual Searching Access Control Event ..................97 7.10 Access Control Event Configuration ................... 98 7.10.1 Access Control Event Linkage ..................99 7.10.2 Access Control Alarm Input Linkage ................. 100 7.10.3 Event Card Linkage ....................102 7.10.4 Cross-Device Linkage ....................
  • Page 10: Chapter 1 Product Description

    Access Controller· · · · User Manual Chapter 1 Product Description 1.1 Overview DS-K2600 is a powerful and stable access controller, using the logical architecture design. DS-K2600 is designed with TCP/IP network interface and its signal processed with special encryption and can be run offline.
  • Page 11 Access Controller· · · · User Manual Data can be permanently saved after the access controller is powered off. Supports I/O linkage, and event linkage 500 groups of password under the authentication mode of card and password...
  • Page 12: Chapter 2 Component Description

    Access Controller· · · · User Manual Chapter 2 Component Description Take DS-K2604 as an example, the component schematic diagram is shown below. Component Description DS-K2601 DS-K2602 DS-K2604 Alarm Relay Output Status (NC/NO) Network Data Indicator RS-485 Communication Indicator Network Status Indicator...
  • Page 13: Chapter 3 Terminal Connection

    Access Controller· · · · User Manual Chapter 3 Terminal Connection 3.1 Terminal Description 3.1.1 DS-K2601Terminal Description DS-K2601 Terminal descriptions are as follows: DS-K2601 Grounding Lock Power +12V Power Output of the Lock Grounding Card Reader Power +12V Power Output of the Head Read...
  • Page 14 Access Controller· · · · User Manual DS-K2601 Indicator of Card Reader Control Output (Invalid Card Output) Indicator of Card Reader Control Output (Valid Card Output) Grounding Wiegand Head Read Data Input Data0 Wiegand Head Read Data Input Data1 Card Reader Buzzer Control Output...
  • Page 15: Ds-K2602Terminal Description

    Access Controller· · · · User Manual DS-K2601 RS 485D+ RS 485D- Reserved NO/NC1 Alarm Relay 1 Output (Dry Contact) COM1 Alarm Output NO/NC2 Alarm Relay 2 Output (Dry Contact) COM2 Event Alarm Input 2 Event Input Grounding Event Alarm Input 1 3.1.2 DS-K2602Terminal Description...
  • Page 16 Access Controller· · · · User Manual DS-K2602 Grounding Power for Card Reader +12V Power Output of the Head Read Grounding Wiegand Head Read Data Input Data0 Wiegand Head Read Data Input Data1 Wiegand Card Reader Card Reader Buzzer Control Output Indicator of Card Reader Control Output (Invalid Card Output) Indicator of Card Reader Control Output (Valid...
  • Page 17 Access Controller· · · · User Manual DS-K2602 E-Lock2 Door 2 Door Relay Input (Dry Contact) Door 1 Magnetic Detector Input Door Magnetics Signal Grounding Detector Door 2 Magnetic Detector Input Door 1 Door Button Input Door Button Signal Grounding Door 2 Door Button Input +12V DC12V Cathode...
  • Page 18: Ds-K2604 Terminal Description

    Access Controller· · · · User Manual 3.1.3 DS-K2604 Terminal Description DS-K2604 Terminal descriptions are as follows: DS-K2604 Power Supply Grounding of E-Lock +12V Power Supply of E-Lock Output Power Supply Grounding of Card Reader +12V Power Supply of Card Reader Output Grounding Wiegand Card Reader Data Input Data0 Wiegand Card Reader Data Input Data1...
  • Page 19 Access Controller· · · · User Manual DS-K2604 Cresset of Card Reader Control Output (Invalid Card Output) Cresset of Card Reader Control Output (Valid Card Output) Grounding Wiegand Card Reader Data Input Data0 Wiegand Card Reader Data Input Data1 Wiegand Card Buzzer of Card Reader Control Output Reader 2 Cresset of Card Reader Control Output (Invalid...
  • Page 20 Access Controller· · · · User Manual DS-K2604 Door 1 Door Button Input Signal Grounding Door 2 Door Button Input Door Button Door 3 Door Button Input Signal Grounding Door 4 Door Button Input +12V DC12V Cathode Power Grounding BAT+ DC12V Battery Cathode Battery BAT-...
  • Page 21 Access Controller· · · · User Manual Notes: The Alarm input hardware interface is normally open by default. So only the normally open signal is allowed. It can be linked to the buzzer of the card reader and access controller, and the alarm relay output and open door relay output.
  • Page 22: Chapter 4 Card Reader Installation

    Access Controller· · · · User Manual Chapter 4 Card Reader Installation 4.1 External Terminal 4.1.1 DS-K2601 External Terminals 4.1.2 DS-K2602 External Terminals 4.1.3 DS-K2604 External Terminals...
  • Page 23: Card Reader Installation

    Access Controller· · · · User Manual 4.2 Card Reader Installation 4.2.1 The Connection of Wiegand Card Reader Note: Optionally you must connect the OK/ERR/BZ, if using access controller to control the LED and buzzer of the Wiegand card reader.
  • Page 24: Rs485 Card Reader Connection

    Access Controller· · · · User Manual 4.2.2 RS485 Card Reader Connection Note: If the card reader is installed too far away from the access controller, you can use an external power supply.
  • Page 25: Installing E-Lock

    Access Controller· · · · User Manual 4.3 Installing E-Lock 4.3.1 Installation of Cathode Lock (Power to Unlock / Fail Secure) 4.3.2 Installation of Anode Lock (Power to lock / Fail Safe)
  • Page 26: Connecting The External Alarm Device

    Access Controller· · · · User Manual 4.4 Connecting the External Alarm Device 4.5 Door Button Wiring Diagram...
  • Page 27: Connecting Power Supply

    Access Controller· · · · User Manual The Connection of Door Monitoring Reed Switches (Magnetics Detection) 4.7 Connecting Power Supply...
  • Page 28: Arming Region Input Terminal

    Access Controller· · · · User Manual 4.8 Arming Region Input Terminal 4.8.1 Connecting Normally Open Detector 4.8.2 Connecting Normally Closed Detector...
  • Page 29: Fire Alarm Module Wiring

    Access Controller· · · · User Manual 4.9 Fire Alarm Module Wiring...
  • Page 30: Chapter 5 Settings

    Access Controller· · · · User Manual Chapter 5 Settings 5.1 Initializing the Hardware Option 1: Steps: 1. Remove the jumper cap from the Normal terminal. 2. Disconnect the power and restart the access controller. The controller buzzer buzzes a long beep.
  • Page 31: Alarm Relay Output Status

    Access Controller· · · · User Manual Lock Relay Normally Closed Status: 5.2.2 Alarm Relay Output Status Alarm Relay Output Normally Open: Alarm Relay Output Normally Closed:...
  • Page 32 Access Controller· · · · User Manual Work Flow of Software For detailed information, please see the user manual of the client software. Refer to the following work flow:...
  • Page 33: Chapter 6 Activating The Access Control Terminal

    Access Controller· · · · User Manual Chapter 6 Activating the Access Control Terminal Purpose: You are required to activate the terminal first before using it. Activation via SADP, and Activation via client software are supported. The default values of the control terminal are as follows. The default IP address: 192.0.0.64.
  • Page 34: Activating Via Client Software

    Access Controller· · · · User Manual 6. Input the password and click the Modify button to activate your IP address modification. 6.2 Activating via Client Software The client software is versatile video management software for multiple kinds of devices. Get the client software from the supplied disk or the official website, and install the software according to the prompts.
  • Page 35 Access Controller· · · · User Manual 2. Click the Device Management to enter the Device Management interface. 3. Check the device status from the device list, and select an inactive device. 4. Click the Activate button to pop up the Activation interface. 5.
  • Page 36 Access Controller· · · · User Manual 6. Click OK button to start activation. 7. Click the Modify Netinfor button to pop up the Network Parameter Modification interface. 8. Change the device IP address to the same network segment with your computer by either modifying the IP address manually.
  • Page 37: Chapter 7 Client Operation

    Access Controller· · · · User Manual Chapter 7 Client Operation You can set and operate the access control devices via the client software. This chapter will introduce the access control device related operations in the client software. For integrated operations, refer to User Manual of iVMS-4200 Client Software.
  • Page 38 Access Controller· · · · User Manual 1280*1024 Display the window at size of 1280*1024 pixels. 1440*900 Display the window at size of 1440*900 pixels. 1680*1050 Display the window at size of 1680*1050 pixels. Maximize Display the window in maximum mode. Control Panel Enter Control Panel interface.
  • Page 39 Access Controller· · · · User Manual panel to select the modules to display on the Operation and Control area of the control pane. Steps: 1. Click to pop up the following dialog. 2. Check the module checkboxes to display them on the control panel according to the actual needs.
  • Page 40: User Registration And Login

    Access Controller· · · · User Manual The Real-time Alarm module provides displaying the real-time alarm of security control panel, acknowledging alarms, and searching the history alarms. The Alarm Event module displays the alarm and event received by the client software.
  • Page 41 Access Controller· · · · User Manual A user name cannot contain any of the following characters: / \ : * ? “ < > |. And the length of the password cannot be less than 6 characters. For your privacy, we strongly recommend changing the password to something of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
  • Page 42: System Configuration

    Access Controller· · · · User Manual 7.3 System Configuration Purpose: You can synchronize the missed access control events to the client. Steps: 1. Click Tool – System Configuration. 2. In the System Configuration window, check the Auto-synchronize Access Control Event checkbox.
  • Page 43 Access Controller· · · · User Manual Before you start: For the first time opening the Access Control module, the following dialog will pop up and you are required to select the scene according to the actual needs. You can select the scene as Non-residence and Residence. Notes: Once the scene is configured, you cannot change it later.
  • Page 44: Adding Access Control Device

    Access Controller· · · · User Manual 7.4.1 Adding Access Control Device From within the ‘Access Control” module, Click in the Access Control module to enter the following interface. Purpose: The active online devices in the same local subnet will be displayed in the in the Online Device area (i.e.
  • Page 45 Access Controller· · · · User Manual Steps for adding a device to your iVMS4200 Client Software: Note:. Before a device can be added to the software it need to be activated Refer Chapter 6 - Activating the Access Control Terminal (Page 24) 1.
  • Page 46 Access Controller· · · · User Manual Address: Input the device’s IP address. The IP address of the device is obtained automatically in this adding mode. Port: Input the device port No. The default value is 8000. User Name: Input the device user name. By default, the user name is admin. Password: Input the device password.
  • Page 47 Access Controller· · · · User Manual Note: After adding the device, you should check the device arming status in Tool – Device Arming Control. If the device is not armed, you should arm it, or you will not receive the real-time events via the client software.
  • Page 48: Viewing Device Status

    Access Controller· · · · User Manual 7.4.2 Viewing Device Status In the device list, you can select the device and then click Device Status button to view its status. Note: The interface may different from the picture displayed above. Refer to the actual interface when adopting this function.
  • Page 49: Editing Basic Information

    Access Controller· · · · User Manual Door Status: The status of the connected door. Host Status: The status of the host, including Storage Battery Power Voltage, Device Power Supply Status, Multi-door Interlocking Status, Anti-passing Back Status, Host Anti-Tamper Status and number of cards added to the controller.
  • Page 50: Network Settings

    Select the device in the device list, and click Modify to pop up the modifying device information window. It is recommended to leave these settings as default unless instructed to change by Ness Technical staff. Click RS-485 Settings tab to enter the RS-485 settings interface.
  • Page 51: Wiegand Settings

    Select the device in the device list, and click Modify to pop up the modifying device information window. It is recommended to leave these settings as default unless instructed to change by Ness Technical staff. Click Wiegand-485 Settings tab to enter the Wiegand settings interface.
  • Page 52 Access Controller· · · · User Manual 1. Input the Organization Name as desired. 2. Click OK to save the adding. 3. You can add multiple levels of organizations according to the actual needs. To add sub organizations, select the parent organization and click Add. Repeat Step 2 and 3 to add the sub organization.
  • Page 53: Remote Configuration

    Access Controller· · · · User Manual 7.4.8 Remote Configuration Purpose: In the device list, select the device and click Remote Configuration button to enter the remote configuration interface. You can set the detailed parameters of the selected device. Checking Device Information Steps: 1.
  • Page 54 Access Controller· · · · User Manual Editing Device Name In the Remote Configuration interface, click System -> General to configure the device name and overwrite record files parameter. Click Save to save the settings. Editing Time Steps: 1. In the Remote Configuration interface, click System -> Time to configure the time zone. 2.
  • Page 55 Access Controller· · · · User Manual Note: The configuration file contains the device parameters. 3. You can also remote upgrade the device. 1) In the Remote Upgrade part, select an upgrade file type in the dropdown list. You can select Controller Upgrade File or Card Reader Upgrade in the drop-down list. 2) Click to select the upgrade file.
  • Page 56 Access Controller· · · · User Manual Configuring Access Control Parameters Steps: 1. In the Remote Configuration interface, click Other -> Access Control Parameters. 2. Select and check the Downstream RS-485 Communication Backup checkbox or the Press Key to Input Card No. checkbox. 3.
  • Page 57: Person And Card Management

    Access Controller· · · · User Manual Person and Card Management You can add, edit, and delete the organization and person in Person and Card Management module. From the ‘Access Control’ Module, Click tab to enter the Person and Card Management interface.
  • Page 58: Person Management

    Access Controller· · · · User Manual To add sub organizations, select the parent organization and click Add. Repeat Step 2 and 3 to add the sub organization. Then the added organization will be the sub-organization of the upper-level organization. Note: Up to 10 levels of organizations can be created.
  • Page 59 Access Controller· · · · User Manual 1. The Person No. will be generated automatically and is not editable. 2. Input the persons information as required. (i.e. Person name, gender, phone No., date of Birth, and email etc to suit the client’s actual needs. This is database information for the customer and will work without this information) 3.
  • Page 60 Access Controller· · · · User Manual display and you are required to select the door station to communicate with the analog indoor station. Room No.: You can input the room No. of the person, as used with the Apartment Intercom System.
  • Page 61 Access Controller· · · · User Manual (Optional) In the Selected Permission(s) list, select the selected permission and click < to remove it. You can also click << to remove all the selected permissions. 3. Click OK to save the settings. Adding Person (Card / Credential) You can add card and issue the card to the person.
  • Page 62 Access Controller· · · · User Manual 2. Click Add to pop up the Add Card dialog. 3. Select the card type according to actual needs. Normal Card Card for Disabled Person: The door will remain open for the configured time period for the card holder.
  • Page 63 Access Controller· · · · User Manual 4. Input the password (PIN No) of the card itself in the Card Password field. The card password should contain 4 to 8 digits. Note: The password will be required when the card holder swiping the card to get enter to or exit from the door if you enable the card reader authentication mode as Card and Password, Password and Fingerprint, and Card, Password, and Fingerprint.
  • Page 64 Access Controller· · · · User Manual 2) Select the Card Enrollment Station type. Note: Currently, the supported card reader types include DS-K1F100-D8E and DS-K1F180-D8E 4) Set the serial port No., the baud rate, the timeout value, the buzzing, or the card No. type.
  • Page 65 Access Controller· · · · User Manual Manually Input: Input the card No. and click Enter to input the card No. 7. Click OK and the card(s) will be issued to the person. 8. (Optional) You can select the added card and click Edit or Delete to edit or delete the card. 9.
  • Page 66 Access Controller· · · · User Manual 2. Before inputting the fingerprint, you should connect the fingerprint machine to the PC and set its parameters first. Click Set Fingerprint Machine to enter the following dialog box. 1) Select the device type: DS-K1F820-F 2) Click Save button to save the settings.
  • Page 67 Access Controller· · · · User Manual 9. Click Link Fingerprint to link the fingerprint to the card. Select the Fingerprints you wish to link to the added card and then click “OK”. Adding Person (Attendance Rule) You can set the attendance rule for the person. Note: This tab page will display when you select Non-Residence mode in the application scene when running the software for the first time.
  • Page 68 Access Controller· · · · User Manual 2. If the person joins in the time and attendance, check the Time and Attendance checkbox to enable this function for the person. Then the person’s card swiping records will be recorded and analyzed for time and attendance. For details about Time and Attendance, click More to go to the Time and Attendance module.
  • Page 69 Access Controller· · · · User Manual 2. Importing Person: You can import the Excel file with persons information in batch from the local PC 1) click Import Person button in the Person and Card tab. 2) You can click Download Template for Importing Person to download the template first. 3) Input the person information to the downloaded template.
  • Page 70 Access Controller· · · · User Manual Notes: The person information, including person details, person’s fingerprint information (if configured), and the linked card (if configured), will be imported to the selected organization. If the person name stored in the device is empty, the person name will be filled with the issued card No.
  • Page 71 Access Controller· · · · User Manual Issuing Card in Batch You can issue multiple cards for the person with no card issued in batch. Steps: 1. Click Issue Card in Batch button to enter the following dialog. All the added person with no card issued will display in the Person(s) with No Card Issued list. 2.
  • Page 72 Access Controller· · · · User Manual 1) Select the Card Enrollment Station type. 2) Currently, the supported card reader types include DS-K1F100-D8E and DS-K1F180-D8E 3) Set the parameters about the connected card enrollment station. If the card is M1 card, and if you need to enable the M1 Card Encryption function, you should check Enable checkbox of M1 Card Encryption and click Modify to select the sector.
  • Page 73: Schedule And Template

    Access Controller· · · · User Manual 7.5 Schedule and Template Purpose: Schedules allow you to set what times and day’s events will occur. E.g. Door Auto unlocking, what times card holder can access doors etc. You can configure the template including a week’s schedule and holiday schedule. After setting the templates, you can adopt the configured templates to access control permissions when setting the permission.
  • Page 74 Access Controller· · · · User Manual Steps: 1. Click Add Week Schedule button to pop up the adding schedule interface. 2. Input a name of week schedule (e.g. Office Access Hours) and click OK button to add the week schedule.
  • Page 75: Holiday Group

    Access Controller· · · · User Manual 7.5.2 Holiday Group Click Holiday Group tab to enter the Holiday Group Management interface. Steps: 1. Click Add Holiday Group button on the left to pop up the adding holiday group interface. 2. Input the name of holiday group in the text filed and click OK button to add the holiday group. 3.
  • Page 76: Template

    Access Controller· · · · User Manual 1) On the period schedule, click and drag to draw the period, which means in that period of time, the configured permission is activated. Note: Up to 8 time durations can be set for each period in the schedule. 2) When the cursor turns to , you can move the selected time bar you just edited.
  • Page 77 Access Controller· · · · User Manual You can define custom templates on your demand. Steps: 1. Click Add Template to pop up the adding template interface. 2. Input the template name (for future use that makes easier reference in the future) in the text field and click OK button to add the template.
  • Page 78 Access Controller· · · · User Manual You can also click + Add Week Schedule to add a new week schedule. For details, refer to Chapter 7.5.1 Week Schedule.
  • Page 79 Access Controller· · · · User Manual 5. Select holiday groups to apply to the schedule. Note: Up to 4 holiday groups can be added. Click to select a holiday group in the list and click Add to add it to the template. You can also click Add Holiday Group to add a new one from this screen.
  • Page 80: Permission Configuration

    Access Controller· · · · User Manual Holiday Group. You can click to select an added holiday group in the right-side list and click Delete to delete it. You can click Clear to delete all the added holiday groups. 6. Click Save button to save the settings. 7.6 Permission Configuration In Permission Configuration module, you can add, edit, and delete the access control permission, and then apply the permission settings to the device to take effect.
  • Page 81: Adding Permission

    Access Controller· · · · User Manual 7.6.1 Adding Permission Purpose: You can assign permission for persons to enter/exist the access control points (doors) in this section. Steps: 1. Click Add icon to enter following interface. 2. In the Permission Name field, input the name for the permission as desired. 3.
  • Page 82: Applying Permission

    Access Controller· · · · User Manual 6. Click OK button to complete the permission adding. The selected person will have the permission to enter/exit the selected door/door station with their linked card(s). 7. (Optional) after adding the permission, you can click Details to modify it. Or you can select the permission and click Modify to modify.
  • Page 83: Advanced Functions

    Access Controller· · · · User Manual 7.7 Advanced Functions Purpose: After configuring the person, template, and access control permission, you can configure the advanced functions of access control application, such as access control parameters, authentication password, and opening door with first card, anti-passing back, etc. Note: The advanced functions should be supported by the device.
  • Page 84 Access Controller· · · · User Manual 2. You can editing the following parameters: Door Magnetic: (reed switch for monitoring the state (open/close) of the door. When using door monitoring with a N/C Reed Switch, then select ‘Remain Closed’. If not monitoring the state of the door with a N/C Reed switch then have it set to “Remain Open”...
  • Page 85 Access Controller· · · · User Manual Notes: The duress code, Super password, and dismiss code should be different. The duress code, super password, and the dismiss code should be different from the authentication password. The duress code, super password, and the dismiss code should contain 4 to 8 digits. AUTO UNLOCKING OF DOORS Purpose: You can schedule weekly time periods for an access control point (door) to remain open or remain...
  • Page 86 Access Controller· · · · User Manual B. Click and drag on the timeline to draw a colour bar on the schedule to set the duration. C. When the cursor turns to , you can move the selected time bar you just edited. You can also edit the displayed time point to set the accurate time period.
  • Page 87 Access Controller· · · · User Manual 2. You can editing the following parameters: Nickname: Edit the card reader name as desired. (e.g. Front Door Entry Reader) Enable Card Reader: Select Yes to enable the card reader. OK LED Polarity: Select the OK LED Polarity of the card reader main board. Error LED Polarity: Select the Error LED Polarity of the card reader main board.
  • Page 88: Card Reader Authentication

    Access Controller· · · · User Manual system showing the description of the reader. Buzzer Time: sets how long the reader buzzer will pulse for if programmed to pulse. 3. Click the Save button to save parameters. 7.7.2 Card Reader Authentication Purpose: You can set what credential is required and during what time for access to be granted.
  • Page 89 Access Controller· · · · User Manual All available options for your Controller and Reader will be displayed on the left hand window in the ‘Selectable Mode’ column. Select the option you want to use from the ‘Selectable Mode’ column and then select click on the to add them to the ‘Selected Mode’.
  • Page 90 Access Controller· · · · User Manual They will then display in the order you selected. The following possible options are dependent on the Controller and Reader you have. Card: The door can be unlocked by presenting a Valid Card only. Card and Password: The door can open by both inputting the card password and swiping the card.
  • Page 91 Access Controller· · · · User Manual To add sub organizations, select the parent organization and click Add. Repeat Step 2 and 3 to add the sub organization. Then the added organization will be the sub-organization of the upper-level organization. Note: Up to 10 levels of organizations can be created.
  • Page 92 Access Controller· · · · User Manual The lower-level organizations will be deleted as well if you delete an organization. Make sure there is no person added under the organization, or the organization cannot be deleted. Person Management. Card and Fingerprint: The door can open by both inputting the fingerprint and swiping the card.
  • Page 93 Access Controller· · · · User Manual 4. Repeat the above step to set other time periods. Or you can select a configured day and click Copy to Week button (from the top right of the window) to copy the same settings to the whole week. (Optional) You can click Delete button to delete the selected time period or click Clear button to delete all the configured time periods.
  • Page 94: Multiple Authentication

    Access Controller· · · · User Manual 6. Click Save button to save parameters. 7.7.3 Multiple Authentication Purpose: You can manage the cards by group and set the authentication for multiple cards for one access control point (door). Note: Please set the card permission and apply the permission setting to the access control device first.
  • Page 95 Access Controller· · · · User Manual 3. In the Set Card Group panel on the right, click Add button to pop up the following dialog: 1) In the Card Group Name field, input the name for the group as desired. 2) Click to set the effective time and expiry time of the card group.
  • Page 96: Open Door With First Card

    Access Controller· · · · User Manual 3) Select the template of the authentication group from the dropdown list. For details about setting the template, refer to Chapter 7.5 Schedule and Template. 4) Select the authentication type of the authentication group from the dropdown list. Local Authentication: Authentication by the access control device.
  • Page 97 Access Controller· · · · User Manual Option 1 – Disabling / Postpone ‘auto unlocking’ of doors If you select a Door(s) to ‘Remain Open with First Card’ but do not assign any Cards (i.e. No card in the ‘first Card list’, then this feature will be used to ‘postpone Auto Unlocking of the door until any user uses their card at the door.
  • Page 98: Anti-Passing Back

    Access Controller· · · · User Manual Example. User arrives in the morning and presents his valid card at the door reader. The door them remains unlocked for the time programmed in the ‘Remain Open Duration (Mins)’ time. (e.g. 8 hours).
  • Page 99: Cross-Controller Anti-Passing Back

    Access Controller· · · · User Manual 2. Select an access control device from the device list on the left. Note: Not all controllers support Anti-Passback feature. E.g. It is not supported in the DS-K2800 series. 3. In the First Card Read… field, leave this as disable. 4.
  • Page 100 Access Controller· · · · User Manual You can set anti-passing back for card readers in multiple access controllers. You should swipe the card according to the configured swiping card route. And only one person could pass the access control point after swiping the card. For the Cross-Controller Anti-passing Back”...
  • Page 101 Access Controller· · · · User Manual 6) Click the card reader afterward input field to select the card readers afterward in the pop-up window. 7) Check the checkbox in the Enable Anti-passing Back column to enable the anti-passing back function. Notes: The displayed card readers in the card reader afterward input field should be in authentication order.
  • Page 102: Multi-Door Interlocking

    Access Controller· · · · User Manual Based on Card Note: The system will judge the anti-passing back according to the entrance and exit records on the card. 1) Select Based on Card as the anti-passing back mode in the drop-down list. 2) Select Entrance/Exit Anti-passing Back as the rule.
  • Page 103: Authentication Password

    Access Controller· · · · User Manual Either the anti-passing back or multi-door interlocking function can be configured for an access control device at the same time. Steps: 1. Click Multi-door Interlocking tab to enter the multi-door interlock settings page. 2.
  • Page 104: Custom Wiegand

    Access Controller· · · · User Manual Steps: 1. Click Authentication Password tab and select an access control device from the list. Once the controller is selected, all the cards and persons which have been applied to the device will be displayed. Note: •...
  • Page 105 Access Controller· · · · User Manual Before you start: Wire the third party card readers to the controller. Steps: 1. Click Custom Wiegand to enter the Custom Wiegand tab. 2. Select a custom wiegand on the left of the interface. 3.
  • Page 106 Access Controller· · · · User Manual 3) Click to move the selected rules to the right list. 4) (Optional) Click to change the rule order. 5) (Optional) Select the rules in the Selected Rule list and click to remove the rule from the list on the right.
  • Page 107: Searching Access Control Event

    Access Controller· · · · User Manual 7.8 Searching Access Control Event Purpose: You can search the access control history events including device exception event, door event, alarm input, and card reader event. Click icon and click Access Control Event tab to enter the following interface.
  • Page 108: Access Control Event Configuration

    Access Controller· · · · User Manual Steps: 1. Select the source. You can select Client or Device. 2. Enter the search condition (source, event type/card holder name/card No./capture/start & end time). 3. Click Search to get the search results. 4.
  • Page 109: Access Control Event Linkage

    Access Controller· · · · User Manual 7.9.1 Access Control Event Linkage Purpose: You can assign linkage actions to the access control event by setting up a rule. For example, when the access control event is detected, an audible warning appears or other linkage actions happen. Note: The linkage here refers to the linkage of the client software’s (iVMS4200) actions.
  • Page 110: Access Control Alarm Input Linkage

    Access Controller· · · · User Manual 6. Click Save to save the settings. 7. You can click Copy to button to copy the access control event to other access control device, alarm input, access control point, or card reader. Select the parameters for copy, select the target to copy to, and click OK to confirm.
  • Page 111 Access Controller· · · · User Manual Steps: 1. Click Access Control Alarm Input tab to enter the following interface. 2. In the event list on the left, select an alarm / Event input. 3. Switch the property from to enable this action. Host Buzzer: The audible warning of controller will be triggered.
  • Page 112: Event Card Linkage

    Access Controller· · · · User Manual 7.9.3 Event Card Linkage Click Event Card Linkage tab to enter the following interface. Notes: The Event Card Linkage should be supported by the device. The linkage here refers to the linkage of the iVMS4200 client software’s own actions. Select the access control device from the list on the left.
  • Page 113 3 Card swipes of the same card (as programmed in the event linkage) within 5 seconds will deactivate the O/P. This could be used for Arming and Disarming an alarm panel such as the Ness M1 Controller or Ness D8X panels.
  • Page 114: Cross-Device Linkage

    Access Controller· · · · User Manual 7.9.4 Cross-Device Linkage Purpose: You can assign to trigger other access control device’s action by setting up a rule when the access control event is triggered. Click Cross-Device Linkage tab to enter the following interface. Click Add button to add a new client linkage.
  • Page 115 Access Controller· · · · User Manual 3. Click Save button to save parameters.
  • Page 116: Door Status Management

    Access Controller· · · · User Manual Card Linkage Steps: 1. Click to select the linkage type as Card Linkage. 2. Select the card from the dropdown list and select the access control device as event source. 3. Select the card reader from the table for triggering. 4.
  • Page 117 Access Controller· · · · User Manual Select the “Card Swiping Record” to view live Card Swiping events as they come in. (Note – When first opening the above screen, previous events may not be visible and only new events will come through as they occur. For past events use the Access Control / Search feature.
  • Page 118: Access Control Group Management

    Access Controller· · · · User Manual Access Control Group Management 7.10.1 Purpose: Before controlling the door status and setting the status duration, you are required to organize it into group for convenient management. Perform the following steps to create the group for the access control device: Steps: 1.
  • Page 119 Access Controller· · · · User Manual 3. Perform the following steps to add the group. 1) Click to open the ‘Add’ Group dialog box. 2) Enter a group name as you want. (e.g. All Access Doors) 3) Click OK to add the new group to the group list. You can also check the checkbox Create Group by Device Name to create the new group by the name of the selected device.
  • Page 120: Anti-Control The Access Control Point (Door)

    Access Controller· · · · User Manual 1) Click Import on Group Management interface, and then click the Access Control tab to open the Import Access Control page. Notes: You can also select Alarm Input tab and import the alarm inputs to group. For the Video Access Control Terminal, you can add the cameras as encoding channel to the group.
  • Page 121 Access Controller· · · · User Manual Steps: 1. Select an access control group on the left. For managing the access control group, refer to Chapter 0 Purpose: 2. The door status of the added access control device will be displayed in real time. You can check the door status and the linked event(s) of the selected door.
  • Page 122 Access Controller· · · · User Manual Select the “Card Swiping Record” to view live Card Swiping events as they come in. (Note – When first opening the above screen, previous events may not be visible and only new events will come through as they occur. For past events use the Access Control / Search feature.
  • Page 123 Access Controller· · · · User Manual Access Control Group Management 4. The access control points of the selected access control group will be displayed on the right. Click icon on the Status Information panel to select a door. 5. Click the following button listed on the Status Information panel to control the door. : Click to open the door once.
  • Page 124: Real-Time Card Swiping Record

    Access Controller· · · · User Manual 7.10.3 Real-time Card Swiping Record Click Card Swiping Record tab to enter the following interface. The logs of card swiping records of all access control devices will display in real time. You can view the details of the card swiping event, including card No., person name, organization, event time, etc.
  • Page 125 Access Controller· · · · User Manual Steps: 1. All access control alarms will display in the list in real time. You can view the alarm type, alarm time, location, etc. 2. Click to view the alarm on E-map. 3. You can click to view the live view or the captured picture of the triggered camera when the alarm is trigged.
  • Page 126: Arming Control

    Access Controller· · · · User Manual 7.11 Arming Control Purpose: You can arm or disarm the device. After arming the device , the client can receive the alarm information from the device. Steps: 1. Click Tool->Device Arming Control to pop up the Device Arming Control window. 2.
  • Page 127: Appendix A Sound Prompt And Indicator

    Access Controller· · · · User Manual Appendix A Sound Prompt and Indicator After the card reader is powered on, LED status indicator will turn blue and blink for 1 time. Then it will turn red and blink for 3 times. At last the buzzer will send out a beep sound indicating the starting up process is completed.
  • Page 128: Appendix B Custom Wiegand Rule Descriptions

    Access Controller· · · · User Manual Appendix B Custom Wiegand Rule Descriptions Take Wiegand 44 as an example, the setting values in the Custom Wiegand tab are as follows: Custom Wiegand Name: Wiegand 44 Total Length Transformation Rule (Decimal byFormatRule[4]=[1][4][0][0] Digit) Parity Mode...
  • Page 129 Access Controller· · · · User Manual available. Depending on the table displayed above, the manufacturer code start bit is 32, length is 8, and decimal digit is 3. It represents that from bit 32, there are 8 bits are manufacturer code. (The length here is calculated by bit.) And the decimal length is 3.
  • Page 130 Access Controller· · · · User Manual This manual has been modified by Ness Corporation for our valued customers. www.nesscorporation.com...

Table of Contents