UD05674B Baseline Access Control Terminal DS-KIT802 User Manual V2.0 20180228
UD05674B Baseline Access Control Terminal DS-KIT802 User Manual V2.0 20180228
UD05674B Baseline Access Control Terminal DS-KIT802 User Manual V2.0 20180228
User Manual
Access Control Terminal·User Manual
User Manual
© 2018 Hangzhou Hikvision Digital Technology Co., Ltd.
This manual is applied for access control terminal.
Product Serials Model Product Name
DS-K1T802E Access Control Terminal (EM Card)
DS-K1T802
DS-K1T802M Access Control Terminal (Mifare Card)
It includes instructions on how to use the Product. The software embodied in the Product is
governed by the user license agreement covering that Product.
Trademarks
and other Hikvision marks are the property of Hikvision and are registered
trademarks or the subject of applications for the same by Hikvision and/or its affiliates. Other
trademarks mentioned in this manual are the properties of their respective owners. No right of
license is given to use such trademarks without express permission.
Disclaimer
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, HIKVISION MAKES NO WARRANTIES,
EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, REGARDING THIS MANUAL.
HIKVISION DOES NOT WARRANT, GUARANTEE, OR MAKE ANY REPRESENTATIONS REGARDING THE
USE OF THE MANUAL, OR THE CORRECTNESS, ACCURACY, OR RELIABILITY OF INFORMATION
CONTAINED HEREIN. YOUR USE OF THIS MANUAL AND ANY RELIANCE ON THIS MANUAL SHALL BE
WHOLLY AT YOUR OWN RISK AND RESPONSIBILITY.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT WILL HIKVISION, ITS
DIRECTORS, OFFICERS, EMPLOYEES, OR AGENTS BE LIABLE TO YOU FOR ANY SPECIAL,
CONSEQUENTIAL, INCIDENTAL, OR INDIRECT DAMAGES, INCLUDING, AMONG OTHERS, DAMAGES
FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, SECURITY BREACHES, OR LOSS OF DATA
OR DOCUMENTATION, IN CONNECTION WITH THE USE OF OR RELIANCE ON THIS MANUAL, EVEN IF
HIKVISION HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
i
Access Control Terminal·User Manual
Support
Should you have any questions, please do not hesitate to contact your local dealer.
Regulatory Information
FCC Information
Please take attention that changes or modification not expressly approved by the party responsible
for compliance could void the user’s authority to operate the equipment.
FCC compliance: This equipment has been tested and found to comply with the limits for a Class B
digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference in a residential installation. This equipment
generates, uses and can radiate radio frequency energy and, if not installed and used in accordance
with the instructions, may cause harmful interference to radio communications. However, there is
no guarantee that interference will not occur in a particular installation. If this equipment does
cause harmful interference to radio or television reception, which can be determined by turning
the equipment off and on, the user is encouraged to try to correct the interference by one or more
of the following measures:
—Reorient or relocate the receiving antenna.
—Increase the separation between the equipment and receiver.
—Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
—Consult the dealer or an experienced radio/TV technician for help.
This equipment should be installed and operated with a minimum distance 20cm between the
radiator and your body.
FCC Conditions
This device complies with part 15 of the FCC Rules. Operation is subject to the following two
conditions:
1. This device may not cause harmful interference.
2. This device must accept any interference received, including interference that may cause
undesired operation.
EU Conformity Statement
This product and - if applicable - the supplied accessories too are marked with "CE"
and comply therefore with the applicable harmonized European standards listed
under the EMC Directive 2004/30/EU, the RoHS Directive 2011/65/EU.
2012/19/EU (WEEE directive): Products marked with this symbol cannot be disposed
of as unsorted municipal waste in the European Union. For proper recycling, return
this product to your local supplier upon the purchase of equivalent new equipment,
or dispose of it at designated collection points. For more information see:
www.recyclethis.info.
ii
Access Control Terminal·User Manual
Cautions
Do not drop the device or subject it to physical shock, and do not expose it to high
electromagnetism radiation. Avoid the equipment installation on vibrations surface or places
subject to shock (ignorance can cause equipment damage).
Do not place the device in extremely hot (refer to the specification of the device for the detailed
operating temperature), cold, dusty or damp locations, and do not expose it to high
electromagnetic radiation. The appropriate operation temperature is 0℃ to +45℃, and the
storage temperature should be -10℃ to +55℃.
The device cover for indoor use shall be kept from rain and moisture.
Exposing the equipment to direct sun light, low ventilation or heat source such as heater or
radiator is forbidden (ignorance can cause fire danger).
Do not aim the device at the sun or extra bright places. A blooming or smear may occur
otherwise (which is not a malfunction however), and affecting the endurance of sensor at the
same time.
iii
Access Control Terminal·User Manual
Please use the provided glove when open up the device cover, avoid direct contact with the
device cover, because the acidic sweat of the fingers may erode the surface coating of the device
cover.
Please use a soft and dry cloth when clean inside and outside surfaces of the device cover, do
not use alkaline detergents.
Please keep all wrappers after unpack them for future use. In case of any failure occurred, you
need to return the device to the factory with the original wrapper. Transportation without the
original wrapper may result in damage on the device and lead to additional costs.
Improper use or replacement of the battery may result in hazard of explosion. Replace with the
same or equivalent type only. Dispose of used batteries according to the instructions provided by
the battery manufacturer.
iv
Access Control Terminal·User Manual
Table of Contents
v
Access Control Terminal·User Manual
vi
Access Control Terminal·User Manual
vii
Access Control Terminal·User Manual
Chapter 1 Overview
1.1 Introduction
DS-K1T802 is a series of standalone access control terminal designed with a LCD display
screen. It supports TCP/IP network communication, offline records storage functions and
so on.
1
Access Control Terminal·User Manual
2
Access Control Terminal·User Manual
Chapter 2 Appearance
2.1 Appearance of the Terminal
Please refer to the following content for detailed information of the terminal.
3
Access Control Terminal·User Manual
4
Access Control Terminal·User Manual
Description Color
12V DC Red
Power Input
GND Black
Bell+ Orange
Bell
Bell- Yellow
BUTTON_IN Purple
DOOR_COM Green
DOOR_NO/NC Blue
Door Lock
SENSOR_IN White
GND Black
12V_LOCK Brown
5
Access Control Terminal·User Manual
6
Access Control Terminal·User Manual
Chapter 4 Installation
Before you start
Please make sure that the device in the package is in good condition and all the assembly parts
are included.
Make sure that all the related equipment is power-off during the installation.
Check the specification of the products for the installation environment.
Check whether the power supply is matched with your AC outlet to avoid damage.
If the product does not function properly, please contact your dealer or the nearest service
center. Do not disassemble the camera for repair or maintenance by yourself.
Please make sure the wall is strong enough to withstand three times the weight of the camera
and the mounting.
7
Access Control Terminal·User Manual
8
Access Control Terminal·User Manual
9
Access Control Terminal·User Manual
3. Create a password and input the password in the password field, and confirm the password.
STRONG PASSWORD RECOMMENDED– We highly recommend you create a strong
password of your own choosing (using a minimum of 8 characters, including upper
case letters, lower case letters, numbers, and special characters) in order to increase
the security of your product. And we recommend you reset your password regularly,
especially in the high security system, resetting the password monthly or weekly can
better protect your product.
4. Click Activate to activate the device.
5. Check the activated device. You can change the device IP address to the same network
10
Access Control Terminal·User Manual
segment with your computer by either modifying the IP address manually or checking the
checkbox of Enable DHCP.
6. Input the password and click the Modify button to activate your IP address modification.
11
Access Control Terminal·User Manual
12
Access Control Terminal·User Manual
13
Access Control Terminal·User Manual
On the menu operation interface, you can manage users, set communication parameters, set
system parameters, and so on.
14
Access Control Terminal·User Manual
Purpose:
In the Add User menu, you can add users, and register card for the corresponding person.
Steps:
1. Move the cursor to Add User (add user) by using the direction keys.
2. Click the # key to enter the card registration interface.
5. Click the # key to enter the password registration interface. If the password is registered, the
card holder will be able to open the door with swiping card and entering password.
15
Access Control Terminal·User Manual
6. Register password.
1) Enter a new password.
2) Confirm the new password.
3) Click the # key to confirm the settings.
Note: The valid length of the password is 1 to 8 characters.
7. If the password registration is not required, click the # key to return to the Add User interface.
Steps:
1. Move the cursor to Edit User by using direction keys on the user management interface.
2. Click the # key to enter the managing user interface.
5. If the password is not required, click the # key to clear the configured password.
6. Change the valid date
You can set the valid date (start/end date) of the card.
16
Access Control Terminal·User Manual
Note: After enabling first card, the door remains open during the pre-defined valid
duration.
8. Select the template for the user.
1) Click the # key to enter the editing mode.
2) Press the direction key to select the template No.
Note: Max.65 templates are selectable (including 64 schedule templates and 1 template
disabling option),the schedule template value is from 01 to 64, and Default indicates the
template 01. The template disabling option value is 00.
3) Click the # key to confirm the editing.
Steps:
1. Move the cursor to Search User.
2. Click the # key to enter the searching interface.
3. Select All User and the list of all user will be displayed.
17
Access Control Terminal·User Manual
4. Select the Selected User to enter the query specified user interface.
5. Swipe card or enter the card No.
6. Click the # key to view the basic information about the card holder.
Steps:
1. Move the cursor to Delete User, and click the # key to enter the deleting interface.
18
Access Control Terminal·User Manual
Reset: The device can be restored into factory defaults or default settings.
Login Pwd (Login Password): Change the login password.
Door Param (Door Parameters): Set parameters of the access control terminal, including Open
Time (Door Action Time), Open Time-out(Delayed Door Alarm), Door Magnetic (Door Magnetic
Status Settings), Button Type (Exit Button Status Settings), and First Card settings.
Mode (Authentication Mode): You can select the card authentication mode.
Reboot (Reboot Device): You can reboot the device
Purpose:
On the restore settings interface, you can restore Factory Defaults or Default Settings.
Steps:
1. Move the cursor to Reset (restore settings) by using direction keys on the system settings
interface.
19
Access Control Terminal·User Manual
Steps:
1. Click the # key to enter the password settings interface.
Purpose:
On the door settings interface, you can set door parameters, including Open Time (Door Action
Time), Open Time-out (Delayed Door Alarm), Door Magnetic (Door Magnetic Status Settings),
Button Type (Exit Button Status Settings), First Card (First Card Mode Settings), and Remain Open
(Remain Open Duration Settings).
Steps:
1. Move the cursor to Door Param (door settings) by using direction keys in the system settings
interface.
2. Click the # key to enter the door settings interface.
20
Access Control Terminal·User Manual
Door Param: ↓
Open Time 5
Open Time-out 50
Door Magnetic NO
Button Type NC
Firs Card OFF
Remain Open XXXX
In this section, you can set the controller authentication mode for opening the door, that is, Card
(Swipe Card Only), Card & Pwd (Card and Password), and Card/Pwd (Card or Password).
Steps:
1. Move the cursor to Mode (Authentication Settings) by using direction keys in the system
settings interface.
Steps:
21
Access Control Terminal·User Manual
3. Select to edit the Edit Date Time or DST (Daylight Saving Time) parameters of the device.
Edit Date Time:
When enabling DST, you should set the offset time, the start time, and the end time of DST.
Notes:
Press * key to cancel the date/time settings, and return to the Date Time interface.
Press # key to confirm the date/time settings, and return to the Date Time interface.
22
Access Control Terminal·User Manual
3. Set the plan No., with entering the plan No. by the numeric keys.
Max. 32 plans can be configured, and the plan No. range is from 1 to 32.
4. Set the detailed time periods from Sunday to Saturday with entering the start time and end
time by the numeric keys.
5. Click the * key to return to the Access Opt interface.
Holiday Schedule Settings
Steps:
1. Move the cursor to Holiday Plan by using direction keys.
2. Click the # key to enter the holiday schedule configuration interface.
3. Set the plan No., with entering the plan No. by the numeric keys.
Max. 128 plans can be configured, and the plan No. range is from 1 to 128.
4. Set the detailed holiday information.
Date: Enter the start date and end date by the numeric keys.
Period: Enter the start time and end time by the numeric keys.
5. Click the * key to return to the Access Opt interface.
23
Access Control Terminal·User Manual
3. Set the group No., with entering the group No. by the numeric keys.
Max. 64 groups can be configured, and the group No. range is from 1 to 64.
4. Set the holiday group. Move the cursor to holiday No.(the default is 000), and
Enter the holiday No. configured in Holiday Schedule Settings by the numeric keys.
The holiday schedule No. is separated by a comma.
5. Click the * key to return to the Access Opt interface.
Template Settings
Steps:
1. Move the cursor to Template by using direction keys.
2. Click the # key to enter the template configuration interface.
3. Set the template No., with entering the template No. by the numeric keys.
Max. 64 templates can be configured, and the template No. range is from 1 to 64.
4. Enter the Weekly Plan No. by the numeric keys.
5. Set the Holiday groups. Move the cursor to holiday group No.(the default is 000), and Enter the
holiday group No. configured in Holiday Group Settings by the numeric keys.
The holiday group No. is separated by a comma.
6. Click the * key to return to the Access Opt interface.
24
Access Control Terminal·User Manual
25
Access Control Terminal·User Manual
Menu Bar:
Search and view the captured pictures stored on local
Open Image File
PC.
File Open Video File Search and view the video files recorded on local PC.
Open Log File View the backup log files.
Exit Exit the iVMS-4200 client software.
Lock screen operations. Log in the client again to
Lock
unlock.
Switch User Switch the login user.
System Import System Config Import client configuration file from your computer.
File
Export System Config File Export client configuration file to your computer.
Auto Backup Set the schedule for backing up the database
26
Access Control Terminal·User Manual
27
Access Control Terminal·User Manual
For the first time running the software, you can click on the control
panel to select the modules to display on the Operation and Control area of the control pane.
Steps:
2. Check the module checkboxes to display them on the control panel according to the actual
needs.
3. Click OK to save the settings.
Notes:
After adding the access control device in Device Management module, the Access Control,
Status, and Time and Attendance module will be displayed on the control panel automatically.
After adding the security control panel in Device Management module, the Security Control
Panel and Real-time Alarm modules will be displayed on the control panel automatically.
The iVMS-4200 client software is composed of the following function modules:
The Main View module provides live view of network cameras and video
encoders, and supports some basic operations, such as picture capturing,
recording, PTZ control, etc.
The Remote Playback module provides the search, playback, export of video
files.
The Access Control module provides managing the organizations, persons,
permissions, and advanced access control functions.
Provides video intercom function.
28
Access Control Terminal·User Manual
The Status Monitor module provides monitoring and controlling the door
status, viewing the real-time card swiping records and access control events.
The Time and Attendance module provides setting the attendance rule for the
employees and generating the reports.
The Security Control Panel module provides operations such as arming,
disarming, bypass, group bypass, and so on for both the partitions and zones.
The Real-time Alarm module provides displaying the real-time alarm of
security control panel, acknowledging alarms, and searching the history
alarms.
The Alarm Event module displays the alarm and event received by the client
software.
The Video Wall module provides the management of decoding device and
video wall and the function of displaying the decoded video on video wall.
The E-map module provides the displaying and management of E-maps, alarm
inputs, hot regions and hot spots.
The Device Management module provides the adding, modifying and deleting
of different devices and the devices can be imported into groups for
management.
The Event Management module provides the settings of arming schedule,
alarm linkage actions and other parameters for different events.
The Storage Schedule module provides the schedule settings for recording and
pictures.
The Account Management module provides the adding, modifying and
deleting of user accounts and different permissions can be assigned for
different users.
The Log Search module provides the query of system log files and the log files
can be filtered by different types.
The System Configuration module provides the configuration of general
parameters, file saving paths, alarm sounds and other system settings.
The function modules are easily accessed by clicking the navigation buttons on the control panel or
by selecting the function module from the View or Tool menu.
You can check the information, including current user, network usage, CPU usage, memory usage
and time, in the upper-right corner of the main page.
29
Access Control Terminal·User Manual
A user name cannot contain any of the following characters: / \ : * ? “ < > |. And the length
of the password cannot be less than 6 characters.
For your privacy, we strongly recommend changing the password to something of your own
choosing (using a minimum of 8 characters, including upper case letters, lower case letters,
numbers, and special characters) in order to increase the security of your product.
Proper configuration of all passwords and other security settings is the responsibility of the
installer and/or end-user.
When opening iVMS-4200 after registration, you can log into the client software with the
registered user name and password.
Steps:
1. Input the user name and password you registered.
Note: If you forget your password, please click Forgot Password and remember the encrypted
string in the pop-up window. Contact your dealer and send the encrypted string to him to reset
your password.
2. Optionally, check the checkbox Enable Auto-login to log into the software automatically.
3. Click Login.
After running the client software, you can open the wizards (including video wizard, video wall
wizard, security control panel wizard, access control and video intercom wizard, and attendance
wizard), to guide you to add the device and do other settings and operations. For detailed
configuration about the wizards, please refer to the Quick Start Guide of iVMS-4200.
30
Access Control Terminal·User Manual
Steps:
1. Click Tool – System Configuration.
2. In the System Configuration window, check the Auto-synchronize Access Control Event
checkbox.
3. Set the synchronization time.
The client will auto-synchronize the missed access control event to the client at the set time.
Click in the control panel, and check Access Control to add the Access Control module to
the control panel.
31
Access Control Terminal·User Manual
Notes:
Once the scene is configured, you cannot change it later.
When you select Non-Residence mode, you cannot configure the Attendance Rule when
adding person.
32
Access Control Terminal·User Manual
Note: After adding the device, you should check the device arming status in Tool – Device Arming
Control. If the device is not armed, you should arm it, or you will not receive the real-time events
via the client software. For details about device arming control, refer 7.12 Arming Control.
Creating Password
Purpose:
For some devices, you are required to create the password to activate them before they can be
added to the software and work properly.
Note: This function should be supported by the device.
Steps:
1. Enter the Device Management page.
2. On the Device for Management or Online Device area, check the device status (shown on
Security column) and select an inactive device.
33
Access Control Terminal·User Manual
resetting the password monthly or weekly can better protect your product.
5. (Optional) Enable Hik-Connect service when activating the device if the device supports.
1) Check Enable Hik-Connect checkbox to pop up the Note dialog.
34
Access Control Terminal·User Manual
Steps:
1. Select the devices to be added from the list.
Note: For the inactive device, you need to create the password for it before you can add the
device properly. For detailed steps, please refer to Chapter 5 Activating the Access Control
Terminal.
2. Click Add to Client to open the device adding dialog box.
3. Input the required information.
Nickname: Edit a name for the device as you want.
Address: Input the device’s IP address. The IP address of the device is obtained automatically in
this adding mode.
Port: Input the device port No. The default value is 8000.
User Name: Input the device user name. By default, the user name is admin.
Password: Input the device password.
The password strength of the device can be checked by the software. For your privacy, we
strongly recommend changing the password to something of your own choosing (using a
35
Access Control Terminal·User Manual
minimum of 8 characters, including upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. And we recommend you reset your
password regularly, especially in the high security system, resetting the password monthly or
weekly can better protect your product.
4. Optionally, check the Export to Group checkbox to create a group by the device name.
You can import all the channels of the device to the corresponding group by default.
Note: iVMS-4200 also provides a method to add the offline devices.
1) Check the Add Offline Device checkbox.
2) Input the required information, including the device channel number and alarm input
number.
3) Click Add.
When the offline device comes online, the software will connect it automatically.
5. Click Add to add the device.
36
Access Control Terminal·User Manual
The password strength of the device can be checked by the software. For your privacy, we
strongly recommend changing the password to something of your own choosing (using a
minimum of 8 characters, including upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. And we recommend you reset your
password regularly, especially in the high security system, resetting the password monthly or
weekly can better protect your product.
4. Optionally, check the Export to Group checkbox to create a group by the device name.
You can import all the channels of the device to the corresponding group by default.
Note: iVMS-4200 also provides a method to add the offline devices.
1) Check the Add Offline Device checkbox.
2) Input the required information, including the device channel number and alarm input
number.
3) Click Add.
When the offline device comes online, the software will connect it automatically.
5. Click Add to add the device.
37
Access Control Terminal·User Manual
The password strength of the device can be checked by the software. For your privacy, we
strongly recommend changing the password to something of your own choosing (using a
minimum of 8 characters, including upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. And we recommend you reset your
password regularly, especially in the high security system, resetting the password monthly or
weekly can better protect your product.
4. Optionally, check the Export to Group checkbox to create a group by the device name.
You can import all the channels of the device to the corresponding group by default.
Note: iVMS-4200 also provides a method to add the offline devices.
1) Check the Add Offline Device checkbox.
2) Input the required information, including the device channel number and alarm input
number.
3) Click Add.
When the offline device comes online, the software will connect it automatically.
5. Click Add.
You can add the device which the IP address is between the start IP and end IP to the device
38
Access Control Terminal·User Manual
list.
The password strength of the device can be checked by the software. For your privacy, we
strongly recommend changing the password to something of your own choosing (using a
minimum of 8 characters, including upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. And we recommend you reset your
password regularly, especially in the high security system, resetting the password monthly or
weekly can better protect your product.
Hik-Connect Account: Input the Hik-Connect account.
Hik-Connect Password: Input the Hik-Connect password.
39
Access Control Terminal·User Manual
5. Optionally, check the Export to Group checkbox to create a group by the device name.
You can import all the channels of the device to the corresponding group by default.
6. Click Add to add the device.
40
Access Control Terminal·User Manual
41
Access Control Terminal·User Manual
42
Access Control Terminal·User Manual
3) Click Add.
When the offline device comes online, the software will connect it automatically.
5. Click Add to add the device.
The password strength of the device can be checked by the software. For your privacy, we
strongly recommend changing the password to something of your own choosing (using a
minimum of 8 characters, including upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. And we recommend you reset your
password regularly, especially in the high security system, resetting the password monthly or
weekly can better protect your product.
4. Optionally, check the Export to Group checkbox to create a group by the device name.
You can import all the channels of the device to the corresponding group by default.
Note: iVMS-4200 also provides a method to add the offline devices.
1) Check the Add Offline Device checkbox.
2) Input the required information, including the device channel number and alarm input
number.
3) Click Add.
43
Access Control Terminal·User Manual
When the offline device comes online, the software will connect it automatically.
5. Click Add to add the device.
The password strength of the device can be checked by the software. For your privacy, we
strongly recommend changing the password to something of your own choosing (using a
minimum of 8 characters, including upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. And we recommend you reset your
password regularly, especially in the high security system, resetting the password monthly or
weekly can better protect your product.
4. Optionally, check the Export to Group checkbox to create a group by the device name.
You can import all the channels of the device to the corresponding group by default.
Note: iVMS-4200 also provides a method to add the offline devices.
1) Check the Add Offline Device checkbox.
2) Input the required information, including the device channel number and alarm input
number.
3) Click Add.
When the offline device comes online, the software will connect it automatically.
44
Access Control Terminal·User Manual
3. Click Export Template and save the pre-defined template (CSV file) on your PC.
4. Open the exported template file and input the required information of the devices to be added
on the corresponding column.
Nickname: Edit a name for the device as you want.
Adding Mode: You can input 0, 2, 3, 4, 5, or 6 which indicated different adding modes. 0
indicates that the device is added by IP address or domain name; 2 indicates that the device is
added via IP server; 3 indicates that the device is added via HiDDNS; 4 indicates that the device
is added via EHome protocol; 5 indicates that the device is added by serial port; 6 indicates
that the device is added via Hik-Connect Domain.
Address: Edit the address of the device. If you set 0 as the adding mode, you should input the
IP address or domain name of the device; if you set 2 as the adding mode, you should input
the IP address of the PC that installs the IP Server; if you set 3 as the adding mode, you should
input www.hik-online.com.
Port: Input the device port No.. The default value is 8000.
Device Information: If you set 0 as the adding mode, this field is not required; if you set 2 as
the adding mode, input the device ID registered on the IP Server; if you set 3 as the adding
mode, input the device domain name registered on HiDDNS server; if you set 4 as the adding
mode, input the EHome account; if you set 6 as the adding mode, input the device serial No.
User Name: Input the device user name. By default, the user name is admin.
Password: Input the device password.
45
Access Control Terminal·User Manual
The password strength of the device can be checked by the software. For your privacy, we
strongly recommend changing the password to something of your own choosing (using a
minimum of 8 characters, including upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. And we recommend you reset
your password regularly, especially in the high security system, resetting the password monthly
or weekly can better protect your product.
Add Offline Device: You can input 1 to enable adding the offline device, and then the software
will automatically connect it when the offline device comes online. 0 indicates disabling this
function.
Export to Group: You can input 1 to create a group by the device name (nickname). All the
channels of the device will be imported to the corresponding group by default. 0 indicates
disabling this function.
Channel Number: If you set 1 for Add Offline Device, input the channel number of the device.
If you set 0 for Add Offline Device, this field is not required.
Alarm Input Number: If you set 1 for Add Offline Device, input the alarm input number of the
device. If you set 0 for Add Offline Device, this field is not required.
Serial Port No.: If you set 5 as the adding mode, input the serial port No. for the access control
device.
Baud Rate: If you set 5 as the adding mode, input the baud rate of the access control device.
DIP: If you set 5 as the adding mode, input the DIP address of the access control device.
Hik-Connect Account: If you set 6 as the adding mode, input the Hik-Connect account.
Hik-Connect Password: If you set 6 as the adding mode, input the Hik-Connect password.
5. Click and select the template file.
6. Click Add to import the devices.
The devices will be displayed on the device list for management after added successfully. You can
check the resource usage, HDD status, recording status, and other information of the added
devices on the list.
Click Refresh All to refresh the information of all added devices. You can also input the device
name in the filter field for search.
In the device list, you can select the device and then click Device Status button to view its status.
46
Access Control Terminal·User Manual
Note: The interface may different from the picture displayed above. Refer to the actual interface
when adopting this function.
Door Status: The status of the connected door.
Host Status: The status of the host, including Storage Battery Power Voltage, Device Power Supply
Status, Multi-door Interlocking Status, Anti-passing Back Status, and Host Anti-Tamper Status.
Card Reader Status: The status of card reader.
Note: If you use the card reader with RS-485 connection, you can view the status of online or
offline. If you use the card reader with Wiegand connection, you can view the status of offline.
Alarm Input Status: The alarm input status of each port.
Alarm Output Status: The alarm output status of each port.
Event Sensor Status: The event sensor status of each port.
Secure Door Control Unit Status: The online status and tamper status of the Secure Door Control
Unit.
Arming Status: The status of the device.
Purpose:
After adding the access control device, you can edit the device basic information.
Steps:
1. Select the device in the device list.
2. Click Modify to pop up the modifying device information window.
3. Click Basic Information tab to enter the Basic Information interface.
47
Access Control Terminal·User Manual
4. Edit the device information, including the adding mode, the device name, the device IP address,
port No., user name, and the password.
Purpose:
After adding the access control device, you can set the uploading mode, and set the network
center and wireless communication center.
Select the device in the device list, and click Modify to pop up the modifying device information
window.
Click Network Settings tab to enter the network settings interface.
48
Access Control Terminal·User Manual
49
Access Control Terminal·User Manual
You can set the parameters of capture linkage and manual capture.
Select the device in the device list, and click Modify to pop up the modifying device information
window.
Click Capture Settings tab to enter the capture settings interface.
Notes:
The Capture Settings should be supported by the device.
Before setting the capture setting, you should configure the storage server for picture storage.
Linked Capture
Steps:
1. Select the Linked Capture tab.
Manual Capture
Steps:
1. Select the Manual Capture tab.
50
Access Control Terminal·User Manual
2. Select the resolution of the captured pictures from the dropdown list.
Note: The supported resolution types are CIF, QCIF, 4CIF/D1, SVGA, HD720P, VGA, WD1, and
AUTO.
3. Select the picture quality as High, Medium, or Low.
4. Click Save to save the settings.
5. You can click Restore Default Value to restore the parameters to default settings.
Purpose:
You can set the RS-485 parameters including the serial port, the baud rate, the data bit, the stop
bit, the parity type, the communication mode, and the working mode.
Select the device in the device list, and click Modify to pop up the modifying device information
window.
Click RS-485 Settings tab to enter the RS-485 settings interface.
Note: The RS-485 Settings should be supported by the device.
Steps:
1. Click RS-485 Settings tab to enter the RS-485 settings interface.
2. Select the serial No. of the port from the dropdown list to set the RS-485 parameters.
3. Set the baud rate, data bit, the stop bit, parity type, communication mode, and work mode in
the dropdown list.
4. Click Save to save the settings and the configured parameters will be applied to the device
automatically.
Note: After changing the working mode, the device will be rebooted. A prompt will be popped up
after changing the working mode.
51
Access Control Terminal·User Manual
Purpose:
You can set the Wiegand channel and the communication mode.
Select the device in the device list, and click Modify to pop up the modifying device information
window.
Click Wiegand-485 Settings tab to enter the Wiegand settings interface.
Note: The Wiegand Settings should be supported by the device.
Steps:
1. Click the Wiegand Settings tab to enter the Wiegand Settings interface.
2. Select the Wiegand channel No. and the communication mode in the dropdown list.
If you set the Communication Direction as Send, you are required to set the Wiegand Mode as
Wiegand 26 or Wiegand 34.
3. Click Save to save the settings and the configured parameters will be applied to the device
automatically.
Note: After changing the communication direction, the device will be rebooted. A prompt will be
popped up after changing the communication direction.
The M1 Card Encryption function increases the authentication security level, which should be
applied together with the card enrollment station of our company via the client software or the
web client. After issuing the card, you can set the M1 card encryption function on the controller.
Notes:
The function should be supported by the device.
For details about issuing card, refer to Adding Person (Card) in 7.5.2 Person Management.
Select the device in the device list, and click Modify to pop up the modifying device information
window.
Click M1 Card Encryption tab to enter the M1 Card Encryption interface.
Steps:
1. In the M1 Card Encryption interface, check Enable checkbox to enable the M1 card encryption
function.
52
Access Control Terminal·User Manual
Purpose:
In the device list, select the device and click Remote Configuration button to enter the remote
configuration interface. You can set the detailed parameters of the selected device.
53
Access Control Terminal·User Manual
Editing Time
Steps:
1. In the Remote Configuration interface, click System -> Time to configure the time zone.
2. (Optional) Check Enable NTP and configure the NTP server address, the NTP port, and the
synchronization interval.
3. (Optional) Check Enable DST and configure the DST star time, end time and the bias.
4. Click Save to save the settings.
54
Access Control Terminal·User Manual
Managing User
Steps:
1. In the Remote Configuration interface, click System -> User.
2. Click Add to add the user (Do not support by the elevator controller.).
Or select a user in the user list and click Edit to edit the user. You are able to edit the user
password, the IP address, the MAC address and the user permission. Cilck OK to confirm
editing.
55
Access Control Terminal·User Manual
Setting Security
Steps:
1. Click System -> Security.
56
Access Control Terminal·User Manual
You can set the center group for uploading the log via the EHome protocol.
Steps:
1. Click Network -> Report Strategy.
57
Access Control Terminal·User Manual
3. Set the zone name, the detector type, the zone type and the sensitivity.
4. Click Save to save the settings.
Or click Copy to… to copy the parameters to other zones.
58
Access Control Terminal·User Manual
1. In the Remote Configuration interface, click Other -> Access Control Parameters.
2. Select and check the Downstream RS-485 Communication Backup checkbox or the Press Key
to Input Card No. checkbox.
3. Click Save to save the settings.
Operating Zone
Steps:
1. Click Operation -> Zone.
59
Access Control Terminal·User Manual
Operating Relay
Steps:
1. Click Operation -> Relay.
You can view the relay status.
2. Check the relay checkbox
3. Click Open or Close to open/close the relay.
4. (Optional) Click Refresh to refresh the relay status.
60
Access Control Terminal·User Manual
The interface
is divided into two parts: Organization Management and Person Management.
Organization You can add, edit, or delete the organization as
1
Management desired.
After adding the organization, you can add the
2 Person Management person to the organization and issue card to persons
for further management.
Adding Organization
Steps:
1. In the organization list on the left, you should add a top organization as the parent organization
of all organizations.
Click Add button to pop up the adding organization interface.
61
Access Control Terminal·User Manual
Notes:
The lower-level organizations will be deleted as well if you delete an organization.
Make sure there is no person added under the organization, or the organization cannot be
deleted.
After adding the organization, you can add person to the organization and manage the added
person such as issuing cards in batch, importing and exporting persons information in batch, etc.
Note: Up to 10,000 persons or cards can be added.
Adding Person
Adding Person (Basic Information)
Steps:
1. Select an organization in the organization list and click Add button on the Person panel to pop
up the adding person dialog.
62
Access Control Terminal·User Manual
2. Input the detailed information of the person, including person’s ID type, ID No., country, etc.,
according to actual needs.
Linked Device: You can bind the indoor station to the person.
Note: If you select Analog Indoor Station in the Linked Device, the Door Station field will
display and you are required to select the door station to communicate with the analog
indoor station.
Room No.: You can input the room No. of the person.
3. Click OK to save the settings.
Adding Person (Permission)
You can assign the permissions (including operation permissions of access control device and
access control permissions) to the person when adding person.
Note: For setting the access control permission, refer to Chapter 7.7 Permission Configuration.
Steps:
1. In the Add Person interface, click Permission tab.
2. In the Device Operation Role field, select the role of operating the access control device.
Normal User: The person has the permission to check-in/out on the device, pass the access
control point, etc.
Administrator: The person has the normal user permission, as well as permission to configure
the device, including adding normal user, etc.
3. In the Permission(s) to Select list, all the configured permissions display.
Check the permission(s) checkbox(es) and click > to add to the Selected Permission(s) list.
63
Access Control Terminal·User Manual
(Optional) You can click >> to add all the displayed permissions to the Selected Permission(s)
list.
(Optional) In the Selected Permission(s) list, select the selected permission and click < to
remove it. You can also click << to remove all the selected permissions.
4. Click OK to save the settings.
Adding Person (Card)
You can add card and issue the card to the person.
Steps:
1. In the Add Person interface, click Card tab.
64
Access Control Terminal·User Manual
Super Card: The card is valid for all the doors of the controller during the configured
schedule.
Visitor Card: The card is assigned for visitors. For the Visitor Card, you can set the Max.
Swipe Times.
Notes:
The Max. Swipe Times should be between 0 and 255. When your swiping card times is
more than the configured times, card swiping will be invalid.
When set the times as 0, it means the card swiping is unlimited.
4. Input the password of the card itself in the Card Password field. The card password should
contain 4 to 8 digits.
Note: The password will be required when the card holder swiping the card to get enter to or
exit from the door if you enable the card reader authentication mode as Card and Password,
Password and Fingerprint, and Card, Password, and Fingerprint. For details, Chapter 7.8.2
Card Reader Authentication.
5. Click to set the effective time and expiry time of the card.
6. Select the Card Reader Mode for reading the card No.
Access Controller Reader: Place the card on the reader of the Access Controller and click
Read to get the card No.
Card Enrollment Station: Place the card on the Card Enrollment Station and click Read to
get the card No.
Note: The Card Enrollment Station should connect with the PC running the client. You can
click Set Card Enrollment Station to enter the following dialog.
65
Access Control Terminal·User Manual
2. Before inputting the fingerprint, you should connect the fingerprint machine to the PC and set
its parameters first.
Click Set Fingerprint Machine to enter the following dialog box.
66
Access Control Terminal·User Manual
value is 19200.
Timeout after field refers to the valid fingerprint collecting time. If the user does not input
a fingerprint or inputs a fingerprint unsuccessfully, the device will indicate that the
fingerprint collecting is over.
3. Click Start button, click to select the fingerprint to start collecting.
4. Lift and rest the corresponding fingerprint on the fingerprint scanner twice to collect the
fingerprint to the client.
5. Click Stop button can stop collecting.
You can also click Collect from Device button and select the device to collect fingerprint. (The
function should be supported by the device.
6. After collecting the fingerprint, click Card in the Add Person window to enter the Card tab.
7. Click Link Fingerprint to link the fingerprint to the card.
You can select the registered fingerprint and click Delete to delete it.
You can click Clear to clear all fingerprints.
8. Click OK to save the fingerprints.
Adding Person (Attendance Rule)
You can set the attendance rule for the person.
Note: This tab page will display when you select Non-Residence mode in the application scene
when running the software for the first time.
Steps:
1. In the Add Person interface, click Attendance Rule tab.
2. If the person joins in the time and attendance, check the Time and Attendance checkbox to
enable this function for the person. Then the person’s card swiping records will be recorded
and analyzed for time and attendance.
For details about Time and Attendance, click More to go to the Time and Attendance module.
3. Click OK to save the settings.
Importing and Exporting Person Information
The person information can be imported and exported in batch.
Steps:
1. Exporting Person: You can export the added persons’ information in Excel format to the local
PC.
1) After adding the person, you can click Export Person button in the Person and Card tab to
pop up the following dialog.
67
Access Control Terminal·User Manual
2) You can click Download Template for Importing Person to download the template first.
3) Input the person information to the downloaded template.
4) Click to select the Excel file with person information.
5) Click OK to start importing.
Getting Person Information from Access Control Device
If the added access control device has been configured with person information (including person
details, fingerprint, issued card information), you can get the person information from the device
and import to the client for further operation.
Note: This function is only supported by the device the connection mothod of which is TCP/IP
when adding the device.
Steps:
1. In the organization list on the left, click to select an organization to import the persons.
2. Click Get Person button to pop up the following dialog box.
68
Access Control Terminal·User Manual
Managing Person
Modifying and Deleting Person
To modify the person information and attendance rule, click or in the Operation column,
or select the person and click Modify to open the editing person dialog.
You can click to view the person’s card swiping records.
To delete the person, select a person and click Delete to delete it.
Note: If a card is issued to the current person, the linkage will be invalid after the person is deleted.
Changing Person to Other Organization
You can move the person to another organization if needed.
Steps:
1. Select the person in the list and click Change Organization button.
69
Access Control Terminal·User Manual
70
Access Control Terminal·User Manual
71
Access Control Terminal·User Manual
You can manage the schedule of access control permission including Week Schedule, Holiday
Schedule, and Template. For permission settings, please refer to Chapter 7.7 Permission
Configuration.
Click Week Schedule tab to enter the Week Schedule Management interface.
The client defines two kinds of week plan by default: Whole Week Schedule and Blank Schedule,
which cannot be deleted and edited.
Whole Week Schedule: Card swiping is valid on each day of the week.
Blank Schedule: Card swiping is invalid on each day of the week.
You can perform the following steps to define custom schedules on your demand.
Steps:
1. Click Add Week Schedule button to pop up the adding schedule interface.
2. Input the name of week schedule and click OK button to add the week schedule.
3. Select the added week schedule in the schedule list and you can view its property on the right.
You can edit the week schedule name and input the remark information.
4. On the week schedule, click and drag on a day to draw on the schedule, which means in that
72
Access Control Terminal·User Manual
Click Holiday Group tab to enter the Holiday Group Management interface.
Steps:
1. Click Add Holiday Group button on the left to pop up the adding holiday group interface.
2. Input the name of holiday group in the text filed and click OK button to add the holiday group.
73
Access Control Terminal·User Manual
3. Select the added holiday group and you can edit the holiday group name and input the remark
information.
4. Click Add Holiday icon on the right to add a holiday period to the holiday list and configure the
duration of the holiday.
Note: Up to 16 holidays can be added to one holiday group.
1) On the period schedule, click and drag to draw the period, which means in that period of
time, the configured permission is activated.
Note: Up to 8 time durations can be set for each period in the schedule.
2) When the cursor turns to , you can move the selected time bar you just edited. You can
also edit the displayed time point to set the accurate time period.
3) When the cursor turns to , you can lengthen or shorten the selected time bar.
4) Optionally, you can select the schedule time bar,
and then click to delete the selected time bar,
or click to delete all the time bars of the holiday,
or click to delete the holiday directly.
5. Click Save to save the settings.
Note: The holidays cannot be overlapped with each other.
7.6.3 Template
After setting the week schedule and holiday group, you can configure the template which contains
week schedule and holiday group schedule.
Note: The priority of holiday group schedule is higher than the week schedule.
Click Template tab to enter the Template Management interface.
74
Access Control Terminal·User Manual
There are two pre-defined templates by default: Whole Week Template and Blank Template,
which cannot be deleted and edited.
Whole Week Template: The card swiping is valid on each day of the week and it has no holiday
group schedule.
Blank Template: The card swiping is invalid on each day of the week and it has no holiday
group schedule.
You can define custom templates on your demand.
Steps:
1. Click Add Template to pop up the adding template interface.
2. Input the template name in the text filed and click OK button to add the template.
3. Select the added template and you can edit its property on the right. You can edit the template
name and input the remark information.
4. Select a week schedule to apply to the schedule.
Click Week Schedule tab and select a schedule in the dropdown list.
You can also click Add Week Schedule to add a new week schedule. For details, refer to
Chapter 7.6.1 Week Schedule.
75
Access Control Terminal·User Manual
Click to select a holiday group in the list and click Add to add it to the template. You can also
click Add Holiday Group to add a new one. For details, refer to Chapter 7.6.2 Holiday Group.
You can click to select an added holiday group in the right-side list and click Delete to delete it.
You can click Clear to delete all the added holiday groups.
6. Click Save button to save the settings.
76
Access Control Terminal·User Manual
Purpose:
You can assign permission for persons to enter/exist the access control points (doors) in this
section.
Steps:
1. Click Add icon to enter following interface.
2. In the Permission Name field, input the name for the permission as desired.
3. Click on the dropdown menu to select a template for the permission.
Note: You should configure the template before permission settings. You can click Add
Template button to add the template. Refer to Chapter 7.6 Schedule and Template for details.
4. In the Person list, all the added persons display.
Check the checkbox(es) to select person(s) and click > to add to the Selected Person list.
(Optional) You can select the person in Selected Person list and click < to cancel the selection.
5. In the Access Control Point/Device list, all the added access control points (doors) and door
stations will display.
Check the checkbox(es) to select door(s) or door station(s) and click > to add to the selected
list.
(Optional) You can select the door or door station in the selected list and click < to cancel the
selection.
6. Click OK button to complete the permission adding. The selected person will have the
77
Access Control Terminal·User Manual
permission to enter/exit the selected door/door station with their linked card(s) or fingerprints.
7. (Optional) after adding the permission, you can click Details to modify it. Or you can select the
permission and click Modify to modify.
You can select the added permission in the list and click Delete to delete it.
Purpose:
After configuring the permissions, you should apply the added permission to the access control
device to take effect.
Steps:
1. Select the permission(s) to apply to the access control device. To select multiple permissions,
you can hold the Ctrl or Shift key and select permissions.
2. Click Apply to Device to start applying the selected permission(s) to the access control device
or door station.
3. The following window will pop up, indicating the applying permission result.
78
Access Control Terminal·User Manual
Purpose:
After adding the access control device, you can configure its access control point (door)’s
parameters, and its card readers’ parameters.
Click Access Control Parameters tab to enter the parameters settings interface.
Door Parameters
Steps:
1. In the controller list on the left, click to expand the access control device, select the door
(access control point) and you can edit the information of the selected door on the right.
79
Access Control Terminal·User Manual
80
Access Control Terminal·User Manual
Purpose:
You can set the passing rules for the card reader of the access control device.
81
Access Control Terminal·User Manual
Steps:
1. Click Card Reader Authentication tab and select a card reader on the left.
2. Select a card reader authentication mode. The available authentication modes depend on the
card reader type:
Card and Password: The door can open by both inputting the card password and swiping
the card.
Note: Here the password refers to the password set when issuing the card to the person.
Chapter 7.5.2 Person Management.
Card or Authentication Password: The door can open by inputting the authentication
password or swiping the card.
Note: Here the authentication password refers to the password set to open the door.
Refer to Chapter 7.8.8 Authentication Password.
Fingerprint: The door can open by only inputting the fingerprint.
Card: The door can open by only swiping the card.
Card or Fingerprint: The door can open by inputting the fingerprint or swiping the card.
Password and Fingerprint: The door can open by both inputting the card password and
inputting the fingerprint.
Note: Here the password refers to the card password set when issuing the card to the
person. Refer to Chapter 7.5.2 Person Management.
Card and Fingerprint: The door can open by both inputting the fingerprint and swiping
the card.
Card, Password and Fingerprint: The door can open by both inputting the fingerprint,
inputting the card password, and swiping the card.
Note: Here the password refers to the card password set when issuing the card to the
person. Refer to Chapter 7.5.2 Person Management.
3. Click and drag your mouse on a day to draw a color bar on the schedule, which means in that
period of time, the card reader authentication is valid.
82
Access Control Terminal·User Manual
Purpose:
83
Access Control Terminal·User Manual
You can manage the cards by group and set the authentication for multiple cards for one access
control point (door).
Note: Please set the card permission and apply the permission setting to the access control device
first. For details, refer to Chapter 7.7 Permission Configuration.
Steps:
1. Click Multiple Authentication tab to enter the following interface.
84
Access Control Terminal·User Manual
1) In the Card Group Name field, input the name for the group as desired.
2) Click to set the effective time and expiry time of the card group.
3) Check the checkbox(es) to select the card(s) to add the card group.
4) Click OK to save the card group.
4. In the Set Authentication Group panel on the left, click Add to pop up the following dialog.
1) Select the access control point (door) of the device for multiple authentication.
2) Input the time interval for card swiping.
3) Select the template of the authentication group from the dropdown list. For details about
setting the template, refer to Chapter 7.6 Schedule and Template.
4) Select the authentication type of the authentication group from the dropdown list.
Local Authentication: Authentication by the access control device.
Local Authentication and Remotely Open Door: Authentication by the access control
device and by the client.
For Local Authentication and Remotely Open Door type, you can check the checkbox to
enable the super password authentication when the access control device is
disconnected with the client.
Local Authentication and Super Password: Authentication by the access control device
and by the super password.
5) In the list on the left, the added card group will display. You can click the card group and
click to add the group to the authentication group.
You can click the added card group and click to remove it from the authentication
group.
You can also click or to set the card swiping order.
5) Input the Card Swiping Times for the selected card group.
Notes:
85
Access Control Terminal·User Manual
The Card Swiping Times should be larger than 0 and smaller than the added card
quantity in the card group.
The upper limit of Card Swiping Times is 16.
6) Click OK to save the settings.
5. Click Save to save and take effect of the new settings.
Notes:
For each access control point (door), up to four authentication groups can be added.
For the authentication group which certificate type is Local Authentication, up to 8 card
groups can be added to the authentication group.
For the authentication group which certificate type is Local Authentication and Super
Password or Local Authentication and Remotely Open Door, up to 7 card groups can be
added to the authentication group.
Purpose:
You can set multiple first cards for one access control point. After the first card swiping, it allows
multiple persons access the door or other authentication actions. The first card mode contains
Remain Open with First Card, Disable Remain Open with First Card, and First Card Authorization.
Remain Open with First Card: The door remains open for the configured time duration after the
first card swiping until the remain open duration ends.
First Card Authorization: All authentications, except for the authentications of super card, duress
card, and duress code, are allowed only after the first card authorization.
Steps:
1. Click Open Door with First Card tab to enter the following interface.
86
Access Control Terminal·User Manual
Notes:
The Remain Open Duration should be between 0 and 1440 minutes. By default, it is 10
minutes.
In the First Card Authorization mode, you can access the door when swiping the super
card, the duress card or input the duress code without swiping the first card.
You can swipe the first card again to disable the first card mode.
The first card authorization is effective only on the current day. The authorization will be
expired after 24:00 on the current day.
5. In the First Card list, Click Add button to pop up the following dialog box.
Purpose:
You can set anti-passing back for card readers in the same access controller. You should swipe the
card according to the configured swiping card route. And only one person could pass the access
control point after swiping the card.
Notes:
Either the anti-passing back or multi-door interlocking function can be configured for an access
control device at the same time.
You should enable the anti-passing back function on the access control device first.
Setting the Path of Swiping Card (Card Reader Order)
87
Access Control Terminal·User Manual
Steps:
1. Click Anti-passing Back tab to enter the following interface.
2. Select an access control device from the device list on the left.
3. In the First Card Reader field, select the card reader as the beginning of the path.
4. In the list, click the text filed of Card Reader Afterward and select the linked card readers.
Example: If you select Reader In_01 as the beginning, and select Reader In_02, Reader Out_04
as the linked card readers. Then you can only get through the access control point by swiping
the card in the order as Reader In_01, Reader In_02 and Reader Out_04.
Note: Up to four afterward card readers can be added for one card reader.
5. (Optional) You can enter the Select Card Reader dialog box again to edit its afterward card
readers.
6. Click Save to save and take effect of the new settings.
Purpose:
88
Access Control Terminal·User Manual
You can set anti-passing back for card readers in multiple access controllers. You should swipe the
card according to the configured swiping card route. And only one person could pass the access
control point after swiping the card.
Click Cross-Controller Anti-passing Back to enter the Cross-Controller Anti-passing Back tab.
column to select the first card reader. The icon will turn to .
6) Click the card reader afterward input field to select the card readers afterward in the
pop-up window.
7) Check the checkbox in the Enable Anti-passing Back column to enable the anti-passing
89
Access Control Terminal·User Manual
back function.
Notes:
The displayed card readers in the card reader afterward input field should be in
authentication order.
Up to 64 controllers with anti-passing back function can be added.
Up to 16 card readers afterward can be added for each card reader.
It supports M1 card at present and the sector cannot be encrypted. For details
about sector encryption, refers to 7.4.8 M1 Card Encryption.
Based on Network
Note: Authenticate the anti-passing back according to the entrance and exit information
on the card reader.
1) Select Based on Network as the anti-passing back mode in the drop-down list.
2) Select Route Anti-passing Back as the rule.
3) Select a server in the drop-down list for judging the anti-passing back.
4) (Optional) You can click Delete Anti-passing Back Record and select the card in the
pop-up window to delete the card swiping information in all devices.
The user should be start swiping card again from the first card reader.
5) In the Set Card Reader area, click the icon on the left of the card enrollment station
column to select the first card reader. The icon will turn to .
6) Click the card reader afterward input field to select the card readers afterward in the
pop-up window.
7) Check the checkbox in the Enable Anti-passing Back column to enable the anti-passing
back function.
Notes:
The displayed card readers in the card reader afterward input field should be in
authentication order.
Up to 64 controllers with anti-passing back function can be added.
Up to 16 card readers afterward can be added for each card reader.
Up to 5000 cards’ swiping records can be stored in the selected server.
Setting Entrance/Exit Anti-passing Back
Purpose:
You can set the entrance card reader and the exit card reader only for entering and exiting, without
setting the first card reader and the card readers afterwards.
Steps:
1. In the Cross-Controller Anti-passing Back tab, check the Enable Cross-Controller Anti-passing
Back checkbox to enable the function.
2. Set the anti-passing back parameters.
Based on Card
Note: The system will judge the anti-passing back according to the entrance and exit
records on the card.
1) Select Based on Card as the anti-passing back mode in the drop-down list.
90
Access Control Terminal·User Manual
Purpose:
You can set the multi-door interlocking between multiple doors of the same access control device.
To open one of the doors, other doors must keep closed. That means in the interlocking combined
door group, up to one door can be opened at the same time.
Notes:
The Multi-door Interlocking function is only supported by the access control device which has
more than one access control points (doors).
Either the anti-passing back or multi-door interlocking function can be configured for an access
control device at the same time.
91
Access Control Terminal·User Manual
Steps:
1. Click Multi-door Interlocking tab to enter the multi-door interlock settings page.
Purpose:
You can open the door by inputting the authentication password on the card reader keypad after
finishing the operation of setting authentication password.
Notes:
This authentication password function is only valid during the schedules when the card reader
authentication mode for the access control device is set as Card or Authentication Password.
For details, please refer to Chapter 7.8.2 Card Reader Authentication.
This function should be supported by the access control device.
Steps:
1. Click Authentication Password tab and select an access control device from the list.
92
Access Control Terminal·User Manual
All the cards and persons which have been applied to the device will be displayed.
Note: For setting and applying the permissions to the device, refer to Chapter 7.7 Permission
Configuration.
2. Click the Password field of the card and input the authentication password for the card.
Note: The authentication password should contain 4 to 8 digits.
3. After setting the authentication password, the authentication password function of the card
will be enabled by default.
4. (Optional) You can input the keywords of card No., person name, or authentication password to
search.
Notes:
Up to 500 cards with authentication password can be added to one access control device.
The password should be unique and cannot be the same with super password, duress code,
and dismiss code in the access control parameters.
Purpose:
Based on the knowledge of uploading rule for the third party wiegand, you can set multiple
customized wiegand protocols to communicate between the controller and the third party card
readers.
Before you start:
Wire the third party card readers to the controller.
Steps:
1. Click Custom Wiegand to enter the Custom Wiegand tab.
93
Access Control Terminal·User Manual
94
Access Control Terminal·User Manual
Click icon and click Access Control Event tab to enter the following interface.
95
Access Control Terminal·User Manual
Steps:
1. Select the source.
You can select Client or Device.
2. Enter the search condition (source, event type/card holder name/card No./capture/start & end
time).
3. Click Search to get the search results.
4. View the event information in the event list.
5. Click an event to view the information of the card holder on the Card Holder Information panel
on the left side of the page.
6. You can click Export button to export the search results to the local PC.
Purpose:
You can assign linkage actions to the access control event by setting up a rule. For example, when
the access control event is detected, an audible warning appears or other linkage actions happen.
96
Access Control Terminal·User Manual
Note: The linkage here refers to the linkage of the client software’s own actions.
Steps:
1. Click the Access Control Event tab.
2. The added access control devices will display in the Access Control Device panel on the left.
Select the access control device, or alarm input, or access control point (door), or card reader
to configure the event linkage.
3. Select the event type to set the linkage.
4. Select the triggered camera. The image or video from the triggered camera will pop up when
the selected event occurs.
To capture the picture of the triggered camera when the selected event occurs, you can also set
the capture schedule and the storage in Storage Schedule.
5. Check the checkboxes to activate the linkage actions. For details, refer to Table 14.1 Linkage
Actions for Access Control Event.
6. Click Save to save the settings.
7. You can click Copy to button to copy the access control event to other access control device,
alarm input, access control point, or card reader.
Select the parameters for copy, select the target to copy to, and click OK to confirm.
97
Access Control Terminal·User Manual
Alarm Triggered The image with alarm information pops up when alarm is
Pop-up Image triggered.
Purpose:
The access control alarm inputs can be linked to some actions (e.g., alarm output, host buzzer)
when it is triggered.
Note: The linkage here refers to the linkage of the client software’s own actions.
Steps:
1. Click Access Control Alarm Input tab to enter the following interface.
98
Access Control Terminal·User Manual
The linkage here refers to the linkage of the client software’s own actions.
Select the access control device from the list on the left.
Click Add button to add a new linkage. You can select the event source as Event Linkage or Card
Linkage.
Event Linkage
For the event linkage, the alarm event can be divided into four types: device event, alarm input,
door event, and card reader event.
Steps:
1. Click to select the linkage type as Event Linkage, and select the event type from the dropdown
list.
For Device Event, select the detailed event type from the dropdown list.
For Alarm Input, select the type as alarm or alarm recovery and select the alarm input
name from the table.
For Door Event, select the detailed event type and select the source door from the table.
For Card Reader Event, select the detailed event type and select the card reader from the
table.
2. Set the linkage target, and switch the property from to to enable this function.
Host Buzzer: The audible warning of controller will be enabled/disabled.
Capture: The real-time capture will be enabled.
Card Reader Buzzer: The audible warning of card reader will be enabled/disabled.
Alarm Output: The alarm output will be enabled/disabled for notification.
Zone: Arm or disarm the zone.
Access Control Point: The door status of open, close, remain open, and remain closed will
be enabled.
Notes:
99
Access Control Terminal·User Manual
The door status of open, close, remain open, and remain close cannot be triggered at
the same time.
The target door and the source door cannot be the same one.
3. Click Save button to save and take effect of the parameters.
Card Linkage
Steps:
1. Click to select the linkage type as Card Linkage.
2. Input the card No. or select the card from the dropdown list.
3. Select the card reader from the table for triggering.
4. Set the linkage target, and switch the property from to to enable this function.
Host Buzzer: The audible warning of controller will be enabled/disabled.
Capture: The real-time capture will be enabled.
Card Reader Buzzer: The audible warning of card reader will be enabled/disabled.
Alarm Output: The alarm output will be enabled/disabled for notification.
Zone: Arm or disarm the zone.
Access Control Point: The door status of open, close, remain open, and remain closed will
be enabled.
5. Click Save button to save and take effect of the parameters.
Purpose:
You can assign to trigger other access control device’s action by setting up a rule when the access
control event is triggered.
Click Cross-Device Linkage tab to enter the following interface.
100
Access Control Terminal·User Manual
Click Add button to add a new client linkage. You can select the event source as Event Linkage or
Card Linkage.
Event Linkage
For the event linkage, the alarm event can be divided into four types: device event, alarm input,
door event, and card reader event.
Steps:
1. Click to select the linkage type as Event Linkage, select the access control device as event
source, and select the event type from the dropdown list.
For Device Event, select the detailed event type from the dropdown list.
For Alarm Input, select the type as alarm or alarm recovery and select the alarm input
name from the table.
For Door Event, select the detailed event type and select the door from the table.
For Card Reader Event, select the detailed event type and select the card reader from the
table.
2. Set the linkage target, select the access control device from the dropdown list as the linkage
target, and switch the property from to to enable this function.
Alarm Output: The alarm output will be triggered for notification.
Access Control Point: The door status of open, close, remain open, and remain close will
be triggered. Note: The door status of open, close, remain open, and remain close cannot
be triggered at the same time.
3. Click Save button to save parameters.
Card Linkage
Steps:
1. Click to select the linkage type as Card Linkage.
101
Access Control Terminal·User Manual
2. Select the card from the dropdown list and select the access control device as event source.
3. Select the card reader from the table for triggering.
4. Set the linkage target, select the access control device from the dropdown list as the linkage
target, and switch the property from to to enable this function.
Alarm Output: The alarm output will be triggered for notification.
5. Click Save button to save parameters.
Purpose:
Before controlling the door status and setting the status duration, you are required to organize it
into group for convenient management.
Perform the following steps to create the group for the access control device:
Steps:
102
Access Control Terminal·User Manual
4. Perform the following steps to import the access control points to the group:
1) Click Import on Group Management interface, and then click the Access Control tab to
open the Import Access Control page.
Notes:
You can also select Alarm Input tab and import the alarm inputs to group.
For the Video Access Control Terminal, you can add the cameras as encoding channel
to the group.
2) Select the names of the access control points in the list.
3) Select a group from the group list.
4) Click Import to import the selected access control points to the group.
You can also click Import All to import all the access control points to a selected group.
5. After importing the access control points to the group, you can click , or double-click the
group/access control point name to modify it.
Purpose:
You can control the status for a single access control point (a door), including opening door, closing
door, remaining open, and remaining closed.
103
Access Control Terminal·User Manual
Click icon on the control panel to enter the Status Monitor interface.
Steps:
1. Select an access control group on the left. For managing the access control group, refer to
Chapter 7.11.1 Access Control Group Management.
2. The access control points of the selected access control group will be displayed on the right.
104
Access Control Terminal·User Manual
Purpose:
You can schedule weekly time periods for an access control point (door) to remain open or remain
closed.
In the Door Status module, click Status Duration button to enter the Status Duration interface.
Steps:
1. Click to select a door from the access control device list on the left.
2. On the Door Status Configuration panel on the right, draw a schedule for the selected door.
1) Select a door status brush as or .
Remain Open: The door will keep open during the configured time period. The brush is
marked as .
Remain Closed: The door will keep closed during the configured duration. The brush is
marked as .
2) Click and drag on the timeline to draw a color bar on the schedule to set the duration.
105
Access Control Terminal·User Manual
3) When the cursor turns to , you can move the selected time bar you just edited. You can
also edit the displayed time point to set the accurate time period.
When the cursor turns to , you can lengthen or shorten the selected time bar.
3. Optionally, you can select the schedule time bar and click Copy to Whole Week to copy the
time bar settings to the other days in the week.
4. You can select the time bar and click Delete Duration to delete the time period.
Or you can click Clear to clear all configured durations on the schedule.
5. Click Save to save the settings.
6. You can click Copy to button to copy the schedule to other doors.
106
Access Control Terminal·User Manual
The logs of card swiping records of all access control devices will display in real time. You can view
the details of the card swiping event, including card No., person name, organization, event time,
etc.
You can also click the event to view the card holder details, including person No., person name,
organization, phone, contact address, etc.
Purpose:
The logs of access control events will be displayed in real time, including device exception, door
event, card reader event, and alarm input.
Click Access Control Alarm tab to enter the following interface.
107
Access Control Terminal·User Manual
Steps:
1. All access control alarms will display in the list in real time.
You can view the alarm type, alarm time, location, etc.
2. Click to view the alarm on E-map.
3. You can click or to view the live view or the captured picture of the triggered camera
when the alarm is trigged.
Note: For setting the triggered camera, refer to Chapter 7.10.1 Access Control Event Linkage.
4. Click Subscribe to select the alarm that the client can receive when the alarm is triggered.
1) Check the checkbox(es) to select the alarm(s), including device exception alarm, door event
alarm, card reader alarm, and alarm input.
2) Click OK to save the settings.
108
Access Control Terminal·User Manual
You can arm or disarm the device. After arming the device , the client can receive the alarm
information from the device.
Steps:
1. Click Tool->Device Arming Control to pop up the Device Arming Control window.
2. Arm the device by checking the corresponding checkbox.
Then the alarm information will be auto uploaded to the client software when alarm occurs.
109
Access Control Terminal·User Manual
110
Access Control Terminal·User Manual
111
Access Control Terminal·User Manual
length here is calculated by bit.) And the decimal digit length is 10 bits.
Site Code Start Bit, Length, and Decimal Digit: If you use the transformation rule, these items are
available. For detailed information, see the explanation of the card ID.
OEM Start Bit, Length, and Decimal Digit: If you use the transformation rule, these items are
available. For detailed information, see the explanation of the card ID.
Manufacturer Code Start Bit, Length, and Decimal Digit: If you use the transformation rule, these
items are available. Depending on the table displayed above, the manufacturer code start bit is 32,
length is 8, and decimal digit is 3. It represents that from bit 32, there are 8 bits are manufacturer
code. (The length here is calculated by bit.) And the decimal length is 3.
0200001080228
112
Access Control Terminal·User Manual
UD05674B
113