SmartPSSAC - Access Manual - Eng
SmartPSSAC - Access Manual - Eng
User’s Manual
V1.0.5
I
Foreword
General
This manual introduces the access control solution of SmartPSS-AC (hereinafter referred to as "the
SmartPSS-AC").
Safety Instructions
Revision History
V1.0.3 Updated manual font and content about anti-passback. March 2021
V1.0.2 Added descriptions of memory mode and second unlock. August 2020
I
Privacy Protection Notice
As the device user or data controller, you might collect the personal data of others such as their face,
fingerprints, and car plate number. You need to be in compliance with your local privacy protection laws
and regulations to protect the legitimate rights and interests of other people by implementing measures
which include but are not limited: Providing clear and visible identification to inform people of the
existence of the surveillance area and provide required contact information.
II
Table of Contents
Foreword............................................................................................................................................................ I
1 Overview ........................................................................................................................................................ 1
2 Access Guide .................................................................................................................................................. 2
3 Personnel Management ................................................................................................................................ 3
3.1 Department Management ...................................................................................................................................................... 3
3.2 Staff Management...................................................................................................................................................................... 3
3.2.1 Card Type Setting .......................................................................................................................................................... 4
3.2.2 Adding Staff ..................................................................................................................................................................... 4
3.2.3 Issuing Card in Batches ................................................................................................................................................ 9
3.2.4 Exporting Staff Information .....................................................................................................................................10
3.2.5 Searching for Staff .......................................................................................................................................................10
3.2.6 Staff Displaying.............................................................................................................................................................11
3.3 Permission Configuration......................................................................................................................................................11
3.3.1 Adding Permission Group ........................................................................................................................................11
3.3.2 Configuring Permission .............................................................................................................................................13
4 Time Template Setting ................................................................................................................................ 14
5 Advanced Functions Configuration ........................................................................................................... 17
5.1 First Card Unlock.......................................................................................................................................................................17
5.2 Multi Card Unlock .....................................................................................................................................................................18
5.3 Anti-passback.............................................................................................................................................................................20
5.4 Inter-door Lock ..........................................................................................................................................................................21
6 Access Controller Configuration ................................................................................................................ 23
7 Viewing Historical Event ............................................................................................................................. 26
8 Access Management.................................................................................................................................... 28
8.1 Remotely Opening and Closing Door ...............................................................................................................................28
8.2 Setting Always Open and Always Close...........................................................................................................................29
8.3 Resetting Door Status .............................................................................................................................................................29
Appendix 1 Cybersecurity Recommendations ............................................................................................. 30
III
1 Overview
The access control solution is used with the access control devices through SmartPSS-AC platform,
which is helpful in small and medium scenarios such as controlling doors remotely and configuring
alarms.
1
2 Access Guide
You can quickly use the common functions of access control here.
Step 1 Select Access Control Solution in the left bar.
Step 2 Click Access Guide on the homepage.
The guide bar is displayed at any functions.
Step 3 Configure functions in the order from top to bottom and from left to right. For details about
how to use these functions, see the corresponding chapters.
Figure 2-1 Access guide
Access Manger You can control door remotely. For details, see "8 Access Management."
2
3 Personnel Management
You can manage department information and staff information.
Step 2 (Optional) Select the company and click to modify company information, such as region,
Step 6 (Optional) Select the department and click in the Department List to modify.
3
3.2.1 Card Type Setting
Before issuing card, set card type first. For example, if the issued card is ID card, select the type as ID
card.
The system uses hexadecimal card number by default. Click to change to decimal card
number.
When the card number type is changed, the card number in the Access Manger, user's card,
and History Event will also be changed.
Figure 3-3 Set card type
The card number can be read automatically or filled in manually. To automatically read
card number, select the card reader next to Card No., and then place the card on the
card reader. The card number will be read automatically.
4
Figure 3-4 Add basic information
Step 3 Click Personnel Manger > User > Add > Certification to add staff certification information,
and then click Finish to save..
Configure password.
For second-generation access controllers, set personnel passwords; for other devices,
set card passwords. New passwords must consist of 6-8 digits.
For some access control devices (for example, ASI1212D model), the maximum length of
unlocking password is 6 characters. If you have configured unlocking passwords for
some devices but the passwords cannot unlock doors, change it to a 6-character
password.
Configure card.
5
controller is used.
3) After adding, you can select the card as main card or duress card, or replace the card
with new one, or delete the card.
2) Add fingerprint. Click Add Fingerprint and press finger on the scanner for three times
continuously.
Extract feature code: Click Extract to extract the face feature information from the
device.
Figure 3-5 Configure certification
6
Permission group is a combination of all devices supported by various solutions. After
selecting the permission group, the personnel info will be sent to corresponding device and
used for related functions of access control and attendance check. For details, see "3.3
Permission Configuration."
Figure 3-6 Permission configuration
7
Figure 3-7 Add staff in batches
Step 5 In the list of staff, click to modify information or add details of staff.
8
Figure 3-8 Devices with staff information
Step 4 In the list of staff, click to modify information or add details of staff.
9
Figure 3-9 Issue card in batches
10
3.2.6 Staff Displaying
You can select display modes: card display and list display; and you can also edit department and
valid time of users in batches.
Figure 3-11 Card display
11
For details of time template setting, see SmartPSS-AC_Access Control Solution_User's
Manual.
3) Select the corresponding device, such as door 1.
Step 4 Click OK to save operations.
12
3.3.2 Configuring Permission
The method to configure permission for department and for personnel is similar, and here takes
department as an example.
Step 1 Click Personnel Manger > Permission Configuration.
Step 2 Click .
Step 3 Select the department need to be configured permission.
Step 4 Click OK.
Figure 3-16
Step 5 (Optional) Click in the left navigation bar to view the authorization progress. Click
13
4 Time Template Setting
Time template is to configure the working hours of access controllers, such as when to open and
when to open. The SmartPSS-AC provides 4 time templates by default. You can set new time
templates as needed.
Step 1 Click Access Configuration on the homepage. (Or select Access Guide > on the
homepage.)
Step 2 Click Add.
Step 3 Set time template.
1) Enter Template Name and description note.
2) Click Week Plan to set week plan to allow personnel to pass through during specified
periods from Monday to Sunday. Up to 4 needed time periods for each day.
There are two methods.
Method 1: Move the cursor to the period area. When cursor is , click the periods
that are not needed, and the periods become gray and not allow personnel to pass
through. When cursor is , click the needed periods, and the periods become
Method 2: Click to the right of the time bar, and set time period. You can apply
the set time period to other days. Click OK and Save.
14
Figure 4-2 Set week plan (method 2)
When the week plan and the holiday plan are in conflict, the holiday plan has higher priority.
For example, if the week plan is set to allow access but the holiday plan is not, the access
controller is accessible.
After the time template is configured, assign the permission in Personnel Manager >
Permission Configuration when selecting time template.
Figure 4-3 Set holiday plan (1)
15
Figure 4-4 Set holiday plan (2)
16
5 Advanced Functions Configuration
The person to be granted with the first card unlock permission should be the General user type
and have permission of the certain door. Set the type when adding. For details, see "3.2.2
Adding Staff."
For details of permission assignment, see "3.3 Permission Configuration."
Step 1 Select Access Configuration > Advanced Config.
Step 2 Click the First Card Unlock tab.
Step 3 Click Add.
Step 4 Configure the First Card Unlock parameters and click Save.
Figure 5-1 First card unlock configuration
17
Parameter Description
Select the user to hold the first card. Supports selecting a number of users to
User hold first cards. Any one of them swiping the first card means first card unlock is
done.
Step 5 (Optional) Click . The icon changing into indicates First Card Unlock is enabled.
6) The newly added First Card Unlock is enabled by default.
First card unlock has higher priority than multi-card unlock, which means if the two rules are
both enabled, the system performs first card unlock first.
You are recommended to add people with first card unlock permission to the multi-card Unlock
group.
Do not set the VIP or Patrol type for people in the user group. For details, see "3.2.2 Adding
Staff."
For details of permission assignment, see "3.3 Permission Configuration."
Step 1 Select Access Configuration > Advanced Config.
Step 2 Click the Multi Card Unlock tab.
Step 3 Add user group.
1) Click User Group.
Figure 5-2 User group manager
18
2) Click Add.
Figure 5-3 User group configuration
3) Set up User Group Name. Select users from User List and click OK. You can select up
to 50 users.
4) Click at the upper-right corner of the User Group Manager interface.
Step 4 Configure parameter of multi card unlock.
1) Click Add.
Figure 5-4 Multi card unlock configuration (1)
19
Figure 5-5 Multi card unlock configuration (2)
4) Fill in the Valid Count for each group to be on site and the Unlock Mode. Click or
The valid count refers to the number of users in each group that must be on site to
swipe their cards. Take Figure 5-5 as an example. The door can be unlocked only if it
swiped by any person of group 1 and 2 persons of group 2.
5.3 Anti-passback
The Anti-passback feature requires a person to enter/exit through defined entry/exit door group.
What is more, you cannot leave without matched entry record, nor can you enter without a complete
entry/exit record (for example, only entry record).
Step 1 Select Access Configuration > Advanced Config.
Step 2 Click Add.
Step 3 Configure parameters.
1) Select device and enter device name.
2) Select time template.
3) Set rest time and the unit is minute. For example, set the reset time as 30 minutes. If
one staff has swiped in but not swiped out, the anti-pass back alarm will be triggered
when this staff tends to swipe in again within the 30 minutes. The second swipe-in of
this staff is only valid after 30 minutes later.
20
4) Click In Group and select the corresponding reader. And then click Out Group and
select the corresponding reader.
5) Click OK. And then the configuration will issue to device and take effect.
Figure 5-6 Anti-pass back configuration
Step 4 (Optional) Click . The icon changing into indicates Anti-passback is enabled.
The newly added Anti-passback is enabled by default.
21
4) Add doors of the access controller to the needed door group. Click one door group and
then click doors to add.
5) Click OK.
Figure 5-7 Inter-door lock configuration
Step 5 (Optional) Click . The icon changing into indicates Inter-door Lock is enabled.
The newly added Inter-door Lock is enabled by default.
22
6 Access Controller Configuration
You can configure access door, such as reader direction, door status and unlock mode.
Step 1 Select Access Configuration > Access Config.
Step 2 Click the door needs to be configured.
Step 3 Configure parameters.
Figure 6-1 Configure access door
23
Figure 6-2 Unlock by time period
Set door status, including Normal, Always Open and Always Close.
Status It is not the actual door status because the SmartPSS-AC can only
send commands to the device. If you want to know the actual door
status, enable door sensor.
Keep Open Timezone Select time template when door is always opened.
Keep Close Timezone Select time template when door is always closed.
Enable alarm function and set alarm type, including intrusion,
Alarm overtime and duress. When alarm enabled, the SmartPSS-AC will
receive uploaded message when the alarm is triggered.
Enable door sensor so that you can know the actual door status. You
Door Sensor
are recommended to enable the function.
Enable and set the administrator password. You can access by
Administrator Password
entering the password.
Enable the function and set the time template, and then the access
Remote Verification of personnel have to be verified remotely through the SmartPSS-AC
during the template periods.
Set the unlock holding interval. The door will auto close when time is
Unlock Hold Interval
over.
Set the timeout for alarm. For example, set close timeout as 60
Close Timeout seconds. If the door is not closed for more than 60 seconds, the
alarm message will be uploaded.
24
Parameter Description
After swiping card once, more than one person can pass the
turnstile. There are two modes: Off (default) and On.
If several people are permitted to pass the turnstile, and one of
them did not start to pass the turnstile in 5 seconds, or the one
did not pass the turnstile within specified duration and stayed
overtime between the turnstiles, the swing barriers will be
locked. At this time, you need to swipe cards several times to
allow several people pass the turnstile continuously.
In the memory mode, if card swiping interval exceeds single
Memory Mode
person passing duration, the memory function will not be
triggered.
The interval between two identity verifications must be longer
than the unlock duration of the access controller or the face
recognitions access controller; otherwise, only one identity
verification will be counted. The recommended identity
verification interval is 2 s to 5 s.
In the memory mode, at most 255 people can pass the turnstile
continuously.
After people entered the turnstile and triggered alarms, they do not
need to step backwards and can get identities verified directly.
Second Unlock
Memory mode and second unlock functions are only available for
turnstiles.
Step 4 Click Save and then the configuration will issue to device and take effect.
25
7 Viewing Historical Event
Historical door events include those happened on the SmartPSS-AC and door devices. Before viewing,
extract historical events on the door devices to ensure that all events are searched.
Step 1 Add the needed personnel to the SmartPSS-AC.
Step 2 Click Access Configuration > History Event on the homepage.
Step 3 Click on the Access Manager interface.
Step 4 Extract events from door device to the local. Click Extract, set the time, select the door
device, and then click Extract Now.
26
Figure 7-2 Search for events by filtering conditions
Step 6 (Optional) Click Export, and then operate according to instructions to save the searched
door events to the local.
27
8 Access Management
Step 1 Click Access Manager on the homepage. (Or click Access Guide > ).
Step 3 View door status by Event Info list. For details, see "7 Viewing Historical Event."
Event filtering: Select the event type in the Event Info, and the event list displays
events of the selected types. For example, select Alarm, and the event list only
displays alarm events.
Event refresh locking: Click to the right of Event Info to lock or unlock the event
Event deleting: Click to the right of Event Info to clear all events in the event list.
28
8.2 Setting Always Open and Always Close
After setting always open or always close, the door is open or closed all the time and cannot be
controlled manually. If you want to manually control the door again, click Normal to reset the door
status.
Step 1 Click Access Manager on the homepage. (Or click Access Guide > ).
Step 2 Select the needed door, and then click Always Open or Always Close.
Figure 8-3 Set always open or always close
Step 1 Click Access Manager on the homepage. (Or click Access Guide > ).
Step 2 Select the needed door, and then click Normal. And then follow the on-screen instructions
to operate.
Figure 8-4 Reset door status
29
Appendix 1 Cybersecurity Recommendations
Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is
connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps
toward protecting and strengthening networks and networked appliances will make them less
susceptible to attacks. Below are some tips and recommendations on how to create a more secured
security system.
Mandatory actions to be taken for basic device network security:
1. Use Strong Passwords
Please refer to the following suggestions to set passwords:
The length should not be less than 8 characters;
Include at least two types of characters; character types include upper and lower case
letters, numbers and symbols;
Do not contain the account name or the account name in reverse order;
Do not use continuous characters, such as 123, abc, etc.;
Do not use overlapped characters, such as 111, aaa, etc.;
2. Update Firmware and Client Software in Time
According to the standard procedure in Tech-industry, we recommend to keep your device
(such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is equipped
with the latest security patches and fixes. When the device is connected to the public
network, it is recommended to enable the “auto-check for updates” function to obtain
timely information of firmware updates released by the manufacturer.
We suggest that you download and use the latest version of client software.
"Nice to have" recommendations to improve your device network security:
1. Physical Protection
We suggest that you perform physical protection to device, especially storage devices. For
example, place the device in a special computer room and cabinet, and implement well-done
access control permission and key management to prevent unauthorized personnel from
carrying out physical contacts such as damaging hardware, unauthorized connection of
removable device (such as USB flash disk, serial port), etc.
2. Change Passwords Regularly
We suggest that you change passwords regularly to reduce the risk of being guessed or
cracked.
3. Set and Update Passwords Reset Information Timely
The device supports password reset function. Please set up related information for password
reset in time, including the end user’s mailbox and password protection questions. If the
information changes, please modify it in time. When setting password protection questions, it is
suggested not to use those that can be easily guessed.
4. Enable Account Lock
The account lock feature is enabled by default, and we recommend you to keep it on to
guarantee the account security. If an attacker attempts to log in with the wrong password
several times, the corresponding account and the source IP address will be locked.
5. Change Default HTTP and Other Service Ports
We suggest you to change default HTTP and other service ports into any set of numbers
between 1024~65535, reducing the risk of outsiders being able to guess which ports you are
using.
30
6. Enable HTTPS
We suggest you to enable HTTPS, so that you visit Web service through a secure
communication channel.
7. MAC Address Binding
We recommend you to bind the IP and MAC address of the gateway to the device, thus
reducing the risk of ARP spoofing.
8. Assign Accounts and Privileges Reasonably
According to business and management requirements, reasonably add users and assign a
minimum set of permissions to them.
9. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to
reduce risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to the
following services:
SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.
SMTP: Choose TLS to access mailbox server.
FTP: Choose SFTP, and set up strong passwords.
AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords.
10. Audio and Video Encrypted Transmission
If your audio and video data contents are very important or sensitive, we recommend that you
use encrypted transmission function, to reduce the risk of audio and video data being stolen
during transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.
11. Secure Auditing
Check online users: we suggest that you check online users regularly to see if the device is
logged in without authorization.
Check device log: By viewing the logs, you can know the IP addresses that were used to log
in to your devices and their key operations.
12. Network Log
Due to the limited storage capacity of the device, the stored log is limited. If you need to save
the log for a long time, it is recommended that you enable the network log function to ensure
that the critical logs are synchronized to the network log server for tracing.
13. Construct a Safe Network Environment
In order to better ensure the safety of device and reduce potential cyber risks, we recommend:
Disable the port mapping function of the router to avoid direct access to the intranet
devices from external network.
The network should be partitioned and isolated according to the actual network needs. If
there are no communication requirements between two sub networks, it is suggested to
use VLAN, network GAP and other technologies to partition the network, so as to achieve
the network isolation effect.
Establish the 802.1x access authentication system to reduce the risk of unauthorized access
to private networks.
Enable IP/MAC address filtering function to limit the range of hosts allowed to access the
device.
31