Cosec Panel Lite System Manual v15r2 4
Cosec Panel Lite System Manual v15r2 4
System Manual
System Manual
Documentation Disclaimer
Matrix Comsec reserves the right to make changes in the design or components of the product as engineering and
manufacturing may warrant. Specifications are subject to change without notice.
This is a general documentation for all variants of the product. The product may not support all the features and
facilities described in the documentation.
Information in this documentation may change from time to time. Matrix Comsec reserves the right to revise
information in this publication for any reason without prior notice. Matrix Comsec makes no warranties with respect
to this documentation and disclaims any implied warranties. While every precaution has been taken in the
preparation of this system manual, Matrix Comsec assumes no responsibility for errors or omissions. Neither is any
liability assumed for damages resulting from the use of the information contained herein.
Neither Matrix Comsec nor its affiliates shall be liable to the buyer of this product or third parties for damages,
losses, costs or expenses incurred by the buyer or third parties as a result of: accident, misuse or abuse of this
product or unauthorized modifications, repairs or alterations to this product or failure to strictly comply with Matrix
Comsec operating and maintenance instructions.
Warranty
For product registration and warranty related details visit us at:
http://www.matrixcomsec.com/product-registration-form.html
Copyright
All rights reserved. No part of this system manual may be copied or reproduced in any form or by any means
without the prior written consent of Matrix Comsec.
Version 15
Release date: January 27, 2020
Contents
Introduction..................................................................................................................................................... 1
Dashboard ..................................................................................................................................................... 10
Panel Configuration...................................................................................................................................... 14
Basic Profile ...................................................................................................................................................... 15
Advanced Profile ............................................................................................................................................... 20
Access Features ............................................................................................................................................... 29
Special Functions .............................................................................................................................................. 35
Input Output ...................................................................................................................................................... 37
Zone Configuration ............................................................................................................................................ 44
Man Trap Door Group ....................................................................................................................................... 52
Network Settings ............................................................................................................................................... 54
Date and Time ................................................................................................................................................... 64
Devices .......................................................................................................................................................... 66
Door Configuration ............................................................................................................................................ 67
Door Group ....................................................................................................................................................... 75
Video Surveillance ............................................................................................................................................ 77
Card Format ...................................................................................................................................................... 79
Card Personalization ......................................................................................................................................... 81
Wiegand Format ................................................................................................................................................ 84
Users.............................................................................................................................................................. 86
User Configuration ............................................................................................................................................ 87
Access Group .................................................................................................................................................... 93
Functional Group ............................................................................................................................................... 96
Blocked User ..................................................................................................................................................... 97
User ................................................................................................................................................................... 99
SI User ............................................................................................................................................................ 102
Special Card .................................................................................................................................................... 104
Authorization ................................................................................................................................................... 105
Table of Contents i
Time Zone ....................................................................................................................................................... 120
Access Cluster ................................................................................................................................................ 123
Occupancy Control .......................................................................................................................................... 126
Access Rule .................................................................................................................................................... 132
Shifts and Schedules ...................................................................................................................................... 135
Holiday Schedule ............................................................................................................................................ 140
Alerts............................................................................................................................................................ 178
Alert Message Configuration ........................................................................................................................... 179
Alert Server Configuration ............................................................................................................................... 182
Table of Contents ii
CHAPTER 1 Introduction
Welcome
Thank you for choosing the Matrix COSEC Multi-door Access Control System! We are sure you will be able to
make optimum use of this feature rich, Integrated Access Control and Time and Attendance system. Please read
this document carefully to get acquainted with the product before installing and operating it.
The COSEC application is a powerful web based multi-user Access Control cum Time and Attendance system that
provides all the features required for medium to large size enterprises. A host of modules are available making the
COSEC application a comprehensive, menu-driven software application.
This system manual is a common documentation for all variants of COSEC Controllers - PANEL, DOOR Controllers
and their variants. This document is primarily for the hardware and software installation and configuration of the
COSEC application components. This manual also includes sufficient information to install and interconnect the
controllers on various network topologies.This manual must be read, and its contents clearly understood, before
proceeding with any work relating to the COSEC Web Application.
Intended Audience
• System Administrators, who are persons who will monitor and control the COSEC system after
installation. Generally, an employee of the IT/HR designation in an organization or establishment is
selected as the System Administrator. It is assumed that the System Administrator has some previous
experience in configuring and deploying a security cum Time and Attendance system. The System
• Users, persons/organizations who will use the COSEC system. They may be executives, include
personnel of small and medium businesses, large enterprises, front desk and service staff of Hotels/
Motels, hospitals, and other commercial and public organizations/institutions.
• Introduction - gives an overview of this document, its purpose, intended audience, organization, terms
and conventions used to present information and instructions along with Dashboard of Panel lite.
• Configuration - describes the Panel configuration along with other doors, users and access control
policies.
• Monitor - describes details of door, Alarms, Live events of devices connected to Panel lite.
• Event Log- gives the log of events based on different search criterias.
This System Manual is presented in a manner that will help you find the information you need easily and quickly.
You may use the table of contents and the Index to navigate through this document to the relevant topic or
information you want to look up.
• Instructions
The instructions in this document are written in a step-by-step format, as follows. Each step, its outcome
and indication/notification, wherever applicable, have been described.
• Notices
The following symbols have been used for notices to draw your attention to important items.
Important: to indicate something that requires your special attention or to remind you of
something you might need to do when you are using the system.
Caution: to indicate an action or condition that is likely to result in malfunction or damage to the
system or your property.
Tip: to indicate a helpful hint giving you an alternative way to operate the system or carry out a
procedure, or use a feature more efficiently.
The terms PANEL refers to COSEC PANEL-LITE 2, PANEL DOOR and DIRECT DOOR are used to refer the
COSEC DOOR (including their variants) respectively. The term device is a general term referring collectively to any
or all of the above controllers.
Using this Manual in conjunction with the COSEC PANEL and Doors Quick starts, we hope, you will be able to set
up, configure and make optimum use of this feature packed COSEC access control system.
Getting Help
Our online help will provide you with immediate and context-related help. Click on the Help button, found in all the
system windows. A help file will open up which enables the user to navigate to the relevant topic of interest. To get
a more focused and context sensitive help click on the “?” symbol located on the upper right half of the web page.
Technical Support
If you cannot find the answer to your question in this manual or in the Help files, we recommend you contact your
system installer. Your installer is familiar with your system configuration and should be able to answer any of your
questions.
If you need additional information or technical assistance with the COSEC system and other Matrix products,
contact our Technical Support Help desk, Monday to Saturday 9:00 AM to 6:00 PM (GMT +5:30) except company
holidays.
Internet www.MatrixComSec.com
E-mail [email protected]
Quick setup wizard is easy and time saving installation process for Panel Lite V2, which enables user to configure
basic parameters; Date & Time, Network Parameters, Camera assignment step by step very quickly.
After the PANEL LITE V2 is powered on, login with the Administrator.
For the Login details,See “Panel Configuration” on page 14.
Once the Panel is logged in, Setup Wizard will start automatically and the welcome screen appears as shown
below.
You can quit the Setup Wizard from any of the page by clicking on Quit button. Once quited, it will be redirected to
the Dashboard. For the configuration of Dashboard, See “Dashboard” on page 10.
Click on the Next button to configure the basic parameters as described below:
The Date and Time page enables you to view and set date and time parameters for the Panel Lite device. The date
and time on display shows the current date and time settings on the device.
• Time Zone: Select the relevant time zone as per your region from the given drop-down list.
• Time Format: Select time format from the given drop-down list as 12hour or 24hour.
• Date & Time: The current Date and Time will be automatically set as per your system. You can also set
it as per your requirement
If Date and time is to be automatically synchronized as per the Preferred NTP Server (predefined or user-defined
NTP server address) selected by user, then you must enable Auto Synchronize With NTP check-box.
Independent of the mode set from server as Auto or Manual, the user can change the date and time settings from
device webpage, which will be reflected on device display.
• When Auto Synchronization with NTP is disabled Preferred NTP Server field will be disabled.
• When Auto Synchronization with NTP is enabled,
2. You can keep the Preferred NTP server as blank. In this case device will check for Date and Time from
the first NTP server.
3. If you have manually entered Date and Time from webpage or Device Menu then those values of Date
and Time will be reflected on device webpage and display screen.
Many countries observe the convention of adjusting clocks forward and backward. Clocks are set ahead during the
spring and back to standard time in the autumn. The COSEC Panel Lite can be configured to be compatible with
this procedure keeping the RTC of the system updated with such changes.
For the Forward Clock, set a month, week, day and time at which the clock is to be set forward. Similarly, set the
Reverse Clock. Also, set the Duration in hh:mm format by which the clock is to be set forward or backward.
Example: The above DST Setting implies that on 1st Sunday of November at 09:00 hours, the clock will be
forwarded by 05:00 hours. And on last Monday of January at 09:00 hours, the clock will be reversed or backwarded
by 05:00 hours.
Click on the Next button to save the configuration and configure the Network settings.
The basic details of the panel lite; Name, IP Address, Subnet Mask, Default Gateway, Preferred DNS and Alternate
DNS is displayed. The MAC Address field is non-editable field.
Click on the Back button to re-configure the previous parameter or Next to save the current configuration.
You can add the scanned device by selecting check-box of respective devices.
Select the Door which is to be added to the panel lite by enabling the respective check box.
In the status column, the devices which are online will be displayed by ‘Green’ colour and offline will be displayed
by the ‘Red’ colour dot.
Click on the Done button to finish the setup wizard and Back button to reconfigure the previous parameters.
The above parameters can also be configured manually if the Quick setup wizard is quited as described in this
manual.
Dashboard
Dashboard will show you some of the major module of the Panel Lite Configuration like Users, Doors and Access
Rules as shown below.
Users
This section shows the number of Total users, Active Users , Inactive Users and Blocked users .A
This section shows the number of Total configured Doors, Online Doors , Inactive Doors and Offline Doors
. A new Door can be added manually by clicking on the button as shown below.
Click on the button to Scan for the available doors which are connected with the same network.
This section shows the Number of Total Configured Access Rules, total Active and Inactive rules .
Click on the button to add a new access rule and can also configure added ones.
For the detailed configuration of Access Rule, See “Access Rule” on page 132.
The terms Panel, Panel lite and Panel lite V2 are used alternately to refer to Panel Lite V2 in this manual.
The Panel Lite V2 in Standalone Mode is called as Standalone Panel Lite.
The COSEC Panel Lite V2 is pre-configured with default IP address: 192.168.50.1 and Subnet Mask:
255.255.255.0. You can login to the Webpage of panel lite V2 using default IP in the browser.
Then enter the login credentials for Panel lite V2: Default Username: Admin; User defined Password.
Once Logged in, user will be redirected to the ‘Quick Setup Wizard’.See “Quick Setup Wizard” on page 4.
To change the IP address of Panel lite V2; Go to Configuration> Panel Configuration> Network Settings.
See Network Settings for details.
To change the mode of Panel Lite V2; Go to Configuration> Panel Configuration> Basic Profile> Panel Mode. The
default mode is Standalone Mode.
When you switch to Server Mode; then Server address is to be specified where the Panel lite V2 is to be added.
The Basic Profile enables to define and configure basic parameters for the Panel lite.
Certain fields may appear as read-only fields when device is in Server Mode.
General
Template Per Finger: Select the no. of template copies to be saved per fingerprint credential enrolled for the user.
Max. No. of Fingers/Palms Per User: Select the maximum number of fingers/palms per user allowed for the
enrollment.
Run PVR Door in Guide Mode: PVR (Palm Vein Reader) panel doors can be used with or without hand guides,
depending on which, the enrollment and identification of palm credentials vary. Hence, PVR can run in two modes,
the Guide Mode and the Non-guide mode (default mode). Palm templates are saved and identified by the device
differently, depending on the mode selected.
Enable this option to remove all existing palm templates from the Panel Lite and for all future palm enrollment and
identification to be performed in the Guide mode only.
Auto Clear Alarm: Select this check-box to enable the feature. Specify the timer duration in seconds for alarms to
be auto cleared.
Access Settings
Access Settings allows you to select the days and configure the hours duration for which Panel lite can be
accessed.
Working Days: While adding new devices, by default all the days including holidays for access are enabled. To
change the default settings of working days, click on the relevant boxes(i.e. disable the box) which are not to be
included in active working days.
Working Hours (HH:MM): While adding new devices, the default working hours is set as 00:00 to 23:59. The user
can change the default working hours in HH:MM format.
Break Hours (HH:MM): The default break hours are set as 13:00 to 14:00. The user can change the default break
hours in HH:MM format.
Allowed Early-IN (HH:MM): It specifies the number of hours before official entry time, during which the user is
allowed to enter the office. Eg: If 10 minutes is allowed early-in; then user can enter 10 mins before the shift start
time.
Allowed Late-OUT (HH:MM): It specifies the number of hours after official exit time, during which the user is
allowed to exit from the office. Eg: If 10 minutes is allowed late-out; then user can go out 10 mins after the shift end.
You can enter the custom messages in the desired languages for the variants of panel door [DMD & vega
separately] and upload the file. After successful uploading of file, Panel lite will sync the Labels to the respective
panel doors.
Customized Labels: Select this check-box to view the panel lite’s webpage in multi-language for all static strings
and labels.
Customized Label File (Panel): Click Browse button to select the file and then click Upload button to upload the
string file for panel with multi-language strings. If there is no file uploaded then first download the sample file, enter
the data and then upload it.
Customized Label File (Panel Door): Click Browse button to select the file and then click Upload button to upload
the string file for panel door with multi-language strings. This will provide multi-language for labels of panel door
display screen.
Multi-Language Data Input: Check this box to view the panel's webpage in multi-language for all the data entered
by the user. The extended ASCII keypad must be used to intake the multi-language data. The same will be stored
in the device in Extended ASCII format.
Font File: Click Browse button to select the font file and then click Upload button to upload the font file of the
required language. Click Delete button to remove the font file.
Download Format: Select the download format as xls or csv in which the sample file is to be downloaded.
Download File: You can download both original sample file as well as current file by selecting the file from the
options.
The Help file and file which is imported will be in english only.
Enable Display Messages: This feature allows the user to enable display messages on door controllers assigned
to the panel lite. Upto 4 display messages can be configured for a door.
Schedule: For each message, the user needs to define the time period between which this message is to be
displayed.
Message 1-4: Enter the message to be displayed in this field. Maximum 21 characters are allowed.
Server/Standalone Mode: Select the appropriate option to switch between the Server and Standalone Modes. The
Server mode should be enabled only if the Panel Lite is to be configured using COSEC server application.
The Panel lite will reboot when the mode is changed and the configurations will have to be done again.
Encryption Mode: Enable the Encryption mode checkbox to establish secure HTTPS connection between client-
server.
The Advanced Profile enables to define and configure advanced parameters for the Panel lite.
Settings
Generate Events: This check-box is enabled by default. You can disable this check-box if events are not required
to be generated and stored in Event logs. This will save the space in Panel Lite V2. The events can be user events,
door events, alarm events and system events.
However; disabling Generate Events will still display User Allowed, User Denied, Time Out etc on door display.
Generate Exit Switch Events: Check this box to enable Panel Doors to generate events for the inputs from the
Exit Switch. The exit switch events will be generated when the mode is either exit or both.
Generate Invalid User Events: Check this box to enable the Panel Doors to generate events for invalid user
access on door.
Degraded Access: Degraded mode allows a valid user to access the facility even if the Panel Door is not
communicating with the Panel Lite. Check this box to enable this feature at the panel level.
• Degraded Wait Timer (sec): Specify the time period in seconds before the door controller switches from
Network Fault to DEGRADE MODE. The default value is 5 sec.
• The Master controller (here Panel lite V2) continuously monitors the status of all configured Door
controllers through the pulses regularly transmitted from Master Controller and ACK message is received
back from Door Controller. Once the Door Controller detects Panel lite as Offline, then Door will start the
Facility Code Check: Check this box to enable the Panel Doors to check the Facility Code always for the access
via RFID Cards even if the Doors are not in degraded mode.
Facility Code: Facility or site codes are encoded on cards, along with a card number, to ensure that cards belong
to the facility where access is attempted. Facility code is unique 8 or 16 bits of every HID Proximity card number
specific to a site and is encoded into the card by the manufacturer.
• User defined Facility Code (FC) can also be written onto the card at the time of enrollment while using
smart cards and system reads this code while allowing access to the Device.
• Enter a facility code (ranging from 1 to 65535) to be written onto the card. This Facility code can be
included in the Card format (Masters> Card Format) which can then be assigned to the user. When user
tries to access a facility, then FC will be verified to allow access to the door.
Additional Security Code: In order to keep Additional level of security check other than Facility code and card
number check, smart cards can be written with additional security code (ASC) that takes security to the next higher
level.
• This Additional Security Check is possible only with Smart Cards which will prevent the duplicacy of card
and unauthorized access to the facility.
• This feature must be enabled at the Zone level (Panel Configuration> Zone Configuration> Advance
Configuration3). Now the user; who is assigned the zone enabled with ASC will be checked for ASC
verification on the door.
Smart Identification: Select this check-box to enable smart card identification of the user.
• This enables to identify a user into another office by means of Smart Card, though he is not enrolled into
that particular office's system. Eg Employee working in Mumbai branch of a office can be identified on the
door of Delhi’s office using Smart identification.
• For this the Smart Identification feature must be enabled from Panel Configuration > Zone Configuration.
Then the SI user must be enrolled with desired SI options from Enrollment > SI User.
Auto Acknowledge Alarm: Select this check-box to enable the auto-acknowledgment of all alarms for this device.
The Alarms can be enabled from Alarms and Timers section.
• Set the time in seconds for the Alarm Auto Acknowledge Wait Timer (sec). The wait timer will start and
on expiry of the timer, the alarm buzzer will stop automatically.
Allow Door Access Through API: Select this check-box to allow the access to device using COSEC APTA.
• API Entry Access mode: Select the entry access mode from the options of API Only, API then Biometrics
and API then Card.
• API Exit Access mode: Select the exit access mode from the options of API Only, API then Biometrics
and API then Card.
• API Security Key: Specify the security key for the API.
• PIN Change Code: Enter the code for changing pin of the user. This pin is to be entered from the weigand
input pin pad connected to the device. When entered, the device gets changed into pin change mode and
asks for the old and new password.
Select the appropriate check-boxes for the respective alarms to be activated on the Panel Lite.
1. Duress Alarm:
Duress Alarm can be generated when a facility/ premises has been accessed by a valid user but under some threat
or force entry. In this situation; the user can alert the security by entering the duress code along with user code.
This duress will be reported to the security at remote location without any local alarm.
Enable the Duress Detection feature and set the Duress Code from Panel Configuration> Access
Features> Set2
Dead Man Alarm is generated when the person working in restricted environment does-not come out of the Dead
Man Zone within a pre-defined Alert time.
Enable the Dead Man Zone feature at PANEL level from Panel Configuration> Access Features> Set1 and
at ZONE level from Zone Configuration.
3. Panic Alarm:
The user can enable the system to generate a Panic Alarm from the Door Controller by enabling the Panic Alarm
check-box.
Also door alarm must be active and the door in normal condition (i.e. armed) then Panic alarm will be displayed
accordingly.
6. Tail-Gating Alarm:
When more than one person enters a secured area using a single person’s access credentials then Tail-Gating
alarm will be generated.
Whenever the timer “Man Trap Timer Internal/External Reader (Sec)” is configured for a particular door say for
internal reader from Advanced configuration; user is expected to punch on internal reader of any other door
present in the same zone/door group within the specified Mantrap timer. If user fails to do so, Mantrap violation
alarm will be triggered.
If Block User for Mantrap is enabled in Panel Configuration >Access Features >Set 3 then user will be
blocked whenever Mantrap Timer is violated.
Enable the Anti-Pass back feature at PANEL level from Panel Configuration> Access Features> Set1 and
at ZONE level from Zone Configuration.
Enable the Access Route feature at PANEL level from Panel Configuration> Access Features> Set1 and
configure the Access Route feature from Access Policies > Access Route.
Alarm Reissue Wait Timer (min): Enter the time in minutes for which an acknowledged alarm should wait before
being re-issued in the Alarm Reissue Wait Timer (min). The default value is 5 minutes.
Man Trap Alarm Wait Timer: This check-box enables an alarm wait timer on the panel-lite to ensure that the user
accesses sequential doors of a man-trap (Zone/ Door group) within a specific time-frame.
Inter-Digit Wait Timer (sec): Enter the time period in seconds for which a door controller waits between two digits
before considering the user input code to be complete.
Multi-Input Wait Timer (sec): Enter the time period in seconds for which system needs to wait for the second
credential input from the user when more than one credential is to be used to grant access.
Late-IN Early-OUT Timer (min): Enter the time period in minutes for which the Late In and Early Out special
functions will remain in effect after being enabled at the panel lite.
Door Abnormal Wait Timer (sec): Enter the time period in seconds for which system needs to wait before
generating an alarm for abnormal door status.
Palm Enrollment Time Out (sec): Enter the time period in seconds for which a Palm enrollment command will be
valid for credential input on a PVR Panel Door. Once this timer runs out, a new enrollment command will have to be
generated.
Enrollment
Enrollment Mode: When the enrollment using door is enable; you can select a mode for user enrollment from the
drop down list.
• If Read Only Card, Smart Card or Biometric Then Card is selected, select the Number of Cards to be
enrolled.
• If Biometric is selected, select the Number of Fingers and Number of Palms to be enrolled.
Enrollment Using: Select the option as alphanumeric User ID or Reference Number which the user must enter at
the door at the time of enrollment using special function.
Template Using Finger: It displays the number of templates to be saved per fingerprint credential enrolled for the
user. It is configured from Panel Configuration > Basic Settings > General
Max Number Of Fingers: It displays the maximum number of fingers allowed to be enrolled for a user. It is
configured from Panel Configuration > Basic Settings > General
Max Number Of Palms: It displays the maximum number of palms allowed to be enrolled for a user. It is
configured from Panel Configuration > Basic Settings > General
Enable Self-Enrollment: Select this check-box to activate self-enrollment.The Self-Enrollment feature enables the
user to enroll himself/herself at a COSEC door controller using an already provided access PIN, without the help of
any operator or HR executive.
• An alert message containing the access PIN is sent to the user once this feature is enabled for the user.
(User Configuration > Basic Access Control) Self-Enrollment can be especially beneficial for organizations
with large number of employees.
• Self-Enrollment Retry Count: Enter the maximum number of retry counts for self-enrollment.The user
gets locked if the retry counts exceeds the limit.
Authorization on Enrollment: Select this check-box to allow authorization of users who has enrolled biometric
credentials or card. Once the user is authorized; he can access all the Panel doors using the credential.
The VIP user will be allowed access even if VIP user is not yet authorized. However, VIP user will be displayed
on Authorization page.
Wiegand Interface: Select the interface as Input Mode or Output Mode. The COSEC device can be connected
both as input devices (e.g. to receive data from a Wiegand Reader) or output devices (e.g. to support output to third
party panel) via the Wiegand interface.
Wait for Panel Signal: If this option is enabled the door will wait for reply from the connected third party device
before triggering any output, as per the defined Wait Timer (Sec).
Wait for User Verification: If this option is enabled, user verification will be requested on third party device before
triggering any output.
Select the Wiegand Output Format from the dropdown list and the format sending order for reader data as MSB
or LSB Bit in the Send From field.
If Custom option is selected as Weigand output format, the device will receive all different Wiegand output
formats configured from the Wiegand Format page of Masters tab. These formats represent the format in which the
output will be sent on Wiegand interface. You can assign six formats for different events or a single format for single
event. You can also select the output format by clicking on Select Weigand-Out Format button.
The Access Features page enables to configure the access control features for the device.
Set1
Absentee Rule: Select the check-box to enable this feature at Panel level. This rule sets the maximum number of
days for non-use of a credential (1 - 365 Days). On expiration (no credential usage - for the maximum number of
days set) the User will be automatically blocked.
Absentee Rule must be enabled at user level from Users > User Configuration > Profile.
Occupancy Control: Select the check-box to enable this feature at Panel level. This feature enables the system to
monitor and control the number of users permitted within a secured area or controlled zone. Occupancy control
functionality requires entry and exit readers on the controlled area.
Occupancy Control must be enabled at Zone level from Panel Configuration > Zone configuration>
Advance Configuration 2
• Use count limit sets a maximum number of times an authorized user can use the credentials in order to
enter/exit a controlled area within a specified time period, after which the credential is blocked. Specify the
maximum number of uses per minute in the Use Count Limit (per minute) field provided.
• Example: If the use count per minute is set as 5,then the valid user can access the door i.e. he can punch
on door for entry/exit only 5 times in a minute. After one minute his credential will be blocked. And the
credential will be required to restore back.
First-IN User Rule: Select the check-box to enable this rule at the Panel level. The First-IN user functionality
enables the system to wait in locked mode till a valid First-IN user credential is detected whose effective working
hours or the configured time overlaps with the current system time. First-IN users are users defined in the system
whose credentials are used to unlock the Access to a particular zone. As soon as the zone is unlocked using a
First-IN user credential, the system will allow access to that zone till the detected First-IN user's effective working
hours or the expiry of the configured time.
Once the period is over then system deactivates the access to the designated zone. The system now waits for
another valid first in user credential with valid access time to return the door to normal mode and allow access to
users.
First-IN User Rule must be enabled and configured from Zone level from Panel Configuration > Zone
configuration> Advance Configuration2.
You can create First IN User Group from Access Policies > First-IN User Rule.
Access Route: Select this check-box to enable the Access Route feature on Panel lite V2. The members doors of
the Access Route are configured and the Access route is assigned to the user from User Configuration > Basic
Access Control. The user has to follow the access route as per configured levels and restrictions.
You can configure the Access Route from Access Policies > Access Route.
Allow Access while not in Route: Select this check-box to allow the access to the door which is not in Access
Route but assigned to the user in door assignment from user configuration.
Anti-Pass Back: Select this check-box to enable the Anti-pass back feature.
• Exit reader must be available before the anti-pass back feature is configured.
You must activate the Anti-Pass Back feature at Zone level from Panel Configuration > Zone Configuration
> Advance Configuration 1.
2 Person-Rule: Select the check-box to enable this feature at the panel.This functionality requires 2 person to
unlock the facility and access the secured premise. This is typically used in high security areas such as cash room,
locker room, high end server room, research lab etc.
• 2nd Person Wait Timer (sec): Set the wait time in seconds after which the second person is allowed to
punch on the door when the 2-Person Rule is enabled.
You must activate the 2 Person Rule at Zone level from Panel Configuration > Zone Configuration >
Advance Configuration 1.
The Primary and Secondary groups for the 2 Person Rule are created from Access Policies > 2 Person
Rule.
Dead Man Zone: Select the check-box to enable this feature at the panel level. It ensures the physical safety of an
employee who is working in the risky environment. The user is expected to come out of the zone at predefined
intervals to reset the alarm.
You must activate the Dead Man Zone feature at Zone level from Panel Configuration > Zone
Configuration > Advance Configuration 2.
• Warning Timer specifies the minimum time within which user needs to come out and show his credentials.
• Alert Timer specifies the maximum time for which user is allowed to remain in the dead man zone.
In case; the presence of user is not marked at a predefined time an alarm is generated.
• When the user enters into the zone, the warning timer and the Alert timer will be started. If the user comes
out of the zone within the Alert time, then the alarm will be reset else generates a warning alarm.
• Dead Man Zone can be activated by special function 23, Activate Dead-man.
Elevator Access Control: Select this check-box to activate the elevator access control functionality. It is used for
controlling the access to the floors of elevators for security purpose.
• Through user linking of Elevator Floor Group; user can be assigned in any of Elevator Floor group, but he
can access those floors only if EAC is enabled for that user.
• The user who is not enabled for EAC can access free access floors only.
You must activate the Elevator Access Control feature at User level from User Configuration > Advance
Access Control 2
Access Cluster: Select the check-box to enable this feature at the Panel lite V2 level.
Duress Detection: Select this check-box to enable duress detection feature. This allows the user to alert the
security when he is forced to access the door under constraint, threat or force.
• A Duress Alarm event will be generated in Master controller (Panel lite) when duress is detected. For direct
doors; alarm event can be generated at remote location using IO linking.
• Duress Code: Enter the 2 digit Duress Code. The default code is 10. The user can enter this 2 digit duress
code after his alloted pin code when he is forced to access the door.
1. Only those users, who are assigned with PIN code, can access this feature.
2. If the door is in Lock state then, user is not allowed, so no duress will be detected.
DND Zone: Select the check-box to enable this feature at the system level. DND feature allows the user to declare
that a particular zone is not to be accessed by other users for a specific period of time thereby ensuring that the
users inside the zone are not disturbed by others.
• The DND can be activated using a special card i.e. Special function21 on Panel lite or it can be activated
on the door using Active DND special function.
• DND access Level must be higher than the zone access level. Eg:If DND Zone access level - 5 and User
access level - 4; then user is not allowed to enter in DND zone.
You must activate the DND Zone feature at Zone level from Panel Configuration > Zone Configuration >
Advance Configuration 1.
• Access Route Type: You can select the Access Route type as incremental by selecting Level 0 as lowest
level and decremental by selecting Level 1 as highest level.
Man Trap Door Interlock: Select the check-box to enable the feature at the Panel level. Mantrap, interlock or
airlock systems provide safety, security and environmental control between two or more rooms by ensuring that
opening any door causes all other doors to lock until the opened door returns to the closed position.
• Man Trap Wait Timer (sec): Specify the time in seconds for which the door needs to wait for the other
door in the same zone where the mantrap feature is enabled to get closed. By default, the value of the
Man-trap timer is 5 seconds and valid range is from 3 sec to 99 sec.
• Apply Mantrap on: Select the option as Zone or Door Group on which the Mantrap rule is to be applied.
When Man Trap is configured for Door Group then you must activate the Man Trap feature at Door Group
level from Panel Configuration > Door Group.
Custom Key
You can either use the default Matrix Key for Smart Cards or customize the Smart Card key. You can change
the Smart Card key as many times as you want or revert to the default Matrix Smart Card key.
You can define two custom keys—one for HID and one for MiFare cards. To use a custom key, select the type
of Smart card to be used and enter the desired key in hexadecimal digits.
MiFare Custom Key: Check the box to enable Mifare Card Key configuration. For MiFare Cards, enter 12
hexadecimal digits as custom key.
HID iClass Custom Key: Check the box to enable HID iClass Card Key configuration. For HID Cards, enter a 16-
hexadecimal-digit key.
Set3
Block User For: Enable the checkbox to block the users for violating the access policies like Tail-Gating, Man Trap
Timer Violation, Occupancy Violation, Anti-Pass Back Violation and Multiple Unauthorized Attempts on standalone
panellite.
For Multiple Unauthorized Attempts, specify the Allowed Unauthorized Attempts.
Special Functions are some functions that can be activated/ deactivated directly from the door controller itself.
These functions allow user to use designated special function card to operate the special functions.
Example: In factories where workers avail shortleave; security guard can show the Special card enrolled for
Shortleave IN on the Entry door and can give the access to the worker. This same card can be used for multiple
workers.
It is used to activate enrollment mode, DND Zone, Dead-man Timer, Lock door, unlock etc from any door controller
without using the web access or COSEC.
It may also be required to mute an active alarm on door controller or Panel lite.
There are four major groups of special functions and they are
• User
• Admin / HRD
• Zone Controls
• Alarms
Select a Functional Group from the drop-down list which will be responsible for activating this function. With
V13R3 firmware in device; the special functions Enroll User, Enroll Special Card, Deleted Credentials will have
Admin as the default functional group.
So the user having functional group as “Admin” can enroll the credentials for other users. You can also change the
functional group as required.
Eg: “Enroll User” special function can be enabled for the functional group HRD as shown below.
However, some of the special functions can be activated by all the users by default.
Specify the Card IDs in the Card fields which would be registered to activate the special function at the doors. You
can configure 4 cards for one special function.
You can enroll the card which is to be used for special function (say Short leave IN) from Enrollment >
Special Card. Once the enrollment of card is done; the Card ID will appear in the Card field as shown
above.
If the Card ID is already known before enrollment, then you can enter it here.
Use the Undo button to cancel the changes made for a special function.
The Input Output page enables you to define Input/Output (I/O) configuration for the device.
The Input/Output (I/O) configuration of a system determines how the output or response of a system is influenced
by the input applied on it. The system can be configured to trigger a specific response to any changes in door state
or event occurrences at the door device.
This change of door state or occurrence of events may be considered as an input while the response or action that
is generated by the system on detection of this input, is defined as the output.
Configuration
Auxiliary Input
Enable: Enable this option for Auxiliary Input (e.g. Smoke Detectors) monitoring.
Supervised: Select this check-box, to enable the auxiliary input for four-state monitoring where the door is also
monitored for door fault and door disconnection.
Sense Type: The system by can sense two states of a door - Normally Open (NO) and Normally Closed (NC)
depending on which the output is determined. Specify the normal Sense Type as NC or NO.
For example, any deviation of the door from its normal state may lead to the trigger of a Door Abnormal alarm.
Debounce Time (sec): It defines the minimum time for which an input interface must be maintained in a given state
before the system reports it. Enter the Debounce time in seconds. The default value is 3 sec.
For example, if a Normal door state is changed to Alarm, the state must remain in Alarm for five seconds before an
alarm is generated.
Enable: Select this check-box to enable the Auxiliary Output port (e.g. Fire Alarm) for the panel.
Output Group No.: Specify the Output Group Number to which the auxiliary output is to be assigned based on the
output groups defined in the system.
This page displays a grid containing a list of configured input groups along with their details like input group type
and the number of members in a particular group.
You can also delete a particular input group from this grid by clicking on Delete button.
Specify the Input group name and select the type for the group.
If you select the Source as “Panel” and Port as “DC_USER_ALLOWED” or “DC_USER_DENIED”, Then a new
parameter “User” will appear.
Pick List
This section enables the user to club output ports of Panels and Panel Doors into groups before they can be used
in the Input/Output linking programs. Maximum 99 Output Groups can be added.
• Pulse: With this type of output, the user needs to define the Pulse time in seconds. The output will be
continuously active for the defined pulse time say 5 sec.
• Interlock: With this option, the output follows the input. The output will be active till the input is active after
which it returns to normal state.
• Latch: With this option, the relay output will be in an energized condition for infinite period and needs to be
reset manually. It means once the input is active, output will be active. It has to be reset manually. Eg:
During fire alarm, door should be unlocked permanently so Latch output can be used.
• Toggle: With this option, the output group toggles its state whenever an input group is activated.
Click the Add button and the created group gets displayed in the grid.
IO Linking
Input Output Group linking is a feature which enables the user to define programs that activates single or multiple
output ports (output Group) based on a trigger received from single or multiple input ports (Input Group) on the
Panels and Doors.
Link Name: Specify a user-friendly name to the linking program and check the Active box to activate the linking
program.
Input Group Name: Click Select Input Group button and select an input group from the list.
Output Group Name: Click Select Output Group button and select an output group from the list.
Click the Add button and the created link gets displayed in the grid.
Time Triggered
This function enables the user to control the activity of an Output or Output group without manual intervention. The
time triggered functions are used for activating events like door unlocks and siren activation which are set as per
the start time and for the configured time duration. This functionality is designed to energize outputs for predefined
periods at the configured time. Maximum 99 Time Triggered functions can be defined on a single COSEC Panel
Lite.
Name: Specify a user-friendly name to the time triggered function and check the Active box to activate the
function.
Schedule Time: Set the schedule time at which the function is to be activated.
Duration: Specify the duration in seconds till which the function will remain active.
Days: Select the days on which the schedule is to be activated.
Output Port: Click Select Output Group button to select the output ports from the list.
Access Zones are areas with well defined boundaries, which are defined to effectively implement an Access
Security System with Access Policies. A site can have multiple Access Zones, each Zone having multiple door
controllers. User needs to define the Access Zones before defining the door controllers and assigning the Access
Zones.
The page displays a grid containing a list of created access zones and its details.
Zone-1 is predefined on the Panel Lite. You can define additional Zones with unique names.
Click the Add button to define a new access zone. While editing or adding an access zone you can also click View
List button at the top right corner of the page to go to the main page.
Basic Configuration
In basic configuration of Access control; none of the Access Control functionalities will be applicable for the zone.
System will not check the user access level on Time and Attendance zone.
Access Level: Select the access level from the drop-down list. The Valid access level range can be assigned to a
zone from the range 01 to 15.
Access Control on Exit Mode: Select this check-box to enable access control checking for users on exit mode.
The following policies will be checked for the user:
• User validity check
• Blocked user check
• Inactive (disabled) user check
• Additional security code when credential type is card
• Time based access check
• Access group enabled check
Allow Exit When Locked: Select this check-box to enable the user to exit when the door is locked.
Degraded Mode: Select this check-box to allow a valid user to access the facility even if the door controller is not
in communication with the master.
Door Mode Selection: Select this check-box to allow the user to select the punch type i.e. IN/OUT while punching
on the door.
Access Mode
Internal or Reader Group1 Mode: Select the access mode from the combinations of Biometric, Card, PIN and
Group or None.
External or Reader Group2 Mode: Select the access mode from the combinations of Biometric and Card or None.
This functionality requires that two people present valid credentials to access a secure area. This is typically used
in high security areas or in areas where industrial safety is an issue. Select the Enable check-box to enable this
feature on the zone.
Primary Group: Select a Primary Group from the drop-down list. This is mandatory because a member from the
secondary group has to be always accompanied by a member from the primary group to be considered as a valid
transaction. However, any two members from the primary group are treated as a valid user for accessing a Door.
Secondary Group: Select a Secondary group from the drop-down list. A member from this group can be allowed
access if accompanied by a member from a Primary Group. If Secondary Group is selected as None then both
members from Primary group are required to access the door.
The Groups selected as Primary and Secondary are configured from Access Policies > 2-Person Rule.
Primary Must - In this mode, the 2-Person Rule will grant access only when at least 1 user from the 2 person
group is from the primary group. i.e. the access is granted if both users are from primary group or 1 from primary
and second from secondary group. The only situation when the access will be denied is when both the users are
from secondary group.
Primary & Secondary Must - In this mode, the 2-Person Rule will grant access only in one condition, one
user from primary group and the other from secondary group. In all other situations the access will be denied.
2-Person Rule is enabled for both entry and exit readers if both are installed.
The Anti-Pass Back or APB feature is used to ensure that users pass through an entry reader followed by an exit
reader before their ID will be accepted a second time at another designated entry reader.
On Entry: Check this box so that the system monitors the entry reader for APB violation. Select the options from
Local or Global from the drop down list.
• Local: In the event of the Local APB, the system applies the Anti-Pass back rule at the Zone level.
• Global: In the event of the Global APB, the system applies the rule across all zones at the PANEL level.
On Exit: Check this box also so that the system monitors the entry as well as the exit readers for APB violations.
Eg: If Anti Pass back in exit mode is configured for the internal port then the system shall display 'Access
Allowed' 'Entry Was Not Registered' for Soft Anti Pass Back and for Hard Anti Pass back display 'Access
Denied, Entry Not Recorded'.
Restriction Type: Select the restriction type as Hard or Soft option from the drop down options.
• Hard APB: The access will be denied if the exit is not registered first. It does not allow a second entry
using the same card without an exit.
• Soft APB: The access will be granted even if the exit is not registered. It allows a second entry of the
same user without an exit; however, an event and a warning are generated that indicates the second entry.
Forgiveness: Check this box to enable the system to reset the APB status.When forgiveness is enabled, then
there will be following options to reset the pass.
1. Reset After Day Change: This will reset the APB status of all the users to NULL at midnight. This enables
a user, who left the building in the evening without exit punch, to use his card for entry in the next morning.
2. Reset After Timer Expiry: This will reset the APB status of all the users after the expiry of user defined
time.
• Forgiveness Timer (Mins): Enter the time duration in minutes after which Anti-pass back status will
get reset and the pass will be in original state.
Between Anti-Pass back and Occupancy control, occupancy control has higher priority. So, forgiveness
based on timer expiry won't work when occupancy control feature is enabled.
Forgiveness timer and user IN/ OUT punches will get reset; If timer is already running and device gets
rebooted.
DND feature allows the user to declare that a particular zone is not to be accessed by other users for a specific
period of time thereby ensuring that the users inside the zone are not disturbed by others.
Select the Enable check-box to enable this feature on the zone.
The DND is activated using a special card or through the Menu on the COSEC door.
Enter the Access level for DND Zone within a range of 1-15. DND access Level must be higher than the zone
access level so that the unwanted users are restricted to access the DND zone.
The First-IN user functionality enables the device to wait in locked mode till a valid First-IN user credential is
detected whose effective working hours overlaps with current device time.
As soon as the zone is unlocked using a First-IN user credential, the system will allow access to that zone till the
detected First-IN user's effective working hours.
Once the period is over then system deactivates the access to the designated zone. The system now waits for
another valid first in user credential with valid working hours to return the door to normal mode and allow access to
users.
Enable: Select this check-box to enable this rule on the zone.
First-IN User Group: Select a First-IN User Group from the drop-down list. These groups are created from Access
Policies> First-IN User Rule. Eg: The users of “First IN-TL” group can unlock the doors of the selected zone.
Reset After: Select the option to Reset timer after Working Hours Expiry or Timer Expiry.
• If Working Hours Expiry is selected; then first-in user’s punch will remain valid till the working hours of
first-in user. Then first-in user has to punch again so that other users can access the premise.
• If Timer Expiry option is selected; then you must specify the Timer in seconds. Say timer is set to
3600sec. So the first-in user punch will remain valid for 1hr. After that first-in user has to punch again so
that other users can access the premise.
A VIP user is allowed to access the First-IN enabled zone even when the zone is not activated by a First-
IN user. However, the VIP user cannot activate the zone to allow access to other users.
Occupancy Control
This functionality enables the monitoring and control of the number of users permitted within a secured area or
controlled zone. It requires entry and exit readers on the controlled area.
This condition allows the tracking of safety and security of a user while a specific task is being performed, by
requiring the user to show his card within the pre-defined dead man time period.
Warning Timer (min): This specifies the minimum time in minutes, within which any user inside the dead man
zone should show his card/finger to reset the timer and thus prevent the alarm.
Alert Timer (min): This specifies the maximum time in minutes, for which the user is allowed to remain inside the
dead man zone.
Man Trap
Mantrap, interlock or airlock systems provide safety, security and environmental control between two or more
rooms by ensuring that opening any door causes all other doors to lock until the opened door returns to the closed
position.
Enable: Select this check-box to enable this feature on the zone.
Ignore Man Trap Timer: Enable the Ignore Man Trap Timer to ignore the Wait Timer in access zone, i.e. the man
trap process will not use the wait timer to open the next door. Instead it will indefinitely wait for one door to close
before the second door can open.
Enable: Select this check-box to enable the additional security feature for the Zone.
This Additional Security Check is possible only with Smart Cards which will prevent the duplicacy of card and
unauthorized access to the facility.
The user; who is assigned the zone enabled with ASC will be checked for ASC verification on the door.
Smart Identification
Enable: Select this check-box to enable the smart card identification feature on the zone.
Access Mode: Select the access mode applicable for smart identification such as card, card + pin etc.
This enables to identify a user into another office by means of Smart Card, though he is not enrolled into that
particular office's system.
The Man Trap Door Group page enables to configure a group of panel doors. You can create maximum 15 door
groups. And maximum 9 panel doors (except IO controllers) can be added in a door group.
Group
Door: Click the door pick-list button and select the door to be added to the group. You cannot add one door to
multiple groups. The doors are configured from Devices > Door Configuration.
Click on Update to add the selected door to the group. Similarly you can add other doors to the group.
Then click Save button to save the configured door group.
Man Trap Door Group: Click the pick-list button and select the door group on which man trap is to be configured.
Enable Man Trap: Select this check-box to enable the Man Trap feature on selected Door Group. When one door
is opened then all other doors of the group will remain locked untill the wait timer expires. If the user tries to access
the other door after completion of timer then user will be allowed to access the door.
The Man Trap Wait Timer can be set from Panel Configuration > Access Features > Set2.
Enable Strict Man Trap: Select this check-box to enable Strict Man Trap. By this the man trap process will not use
the wait timer to open the next door. Instead it will indefinitely wait for one door to close before the second door can
open. If the user tries to access the second door then he will be denied the access to the door.
Click on Save button. The Man Trap Rule will be activated on Door Group.
Network Settings page enables configuration of the LAN Settings, Wi-Fi Settings and Mobile Broadband settings of
the Panel-lite.
Certain fields may appear as read-only fields when the Panel lite is in Server Mode.
LAN Settings
You can change the IP Address, Subnet Mask, Default Gateway, Preferred DNS and Alternate DNS for the Panel
lite. The MAC address of the panel lite is displayed.
To test the network connection of panel lite, enter the URL and click Test button. The
IP Assignment: You can select the IP assignment mode as either Static or Dynamic.
In Static mode specify the IP Address, Subnet mask, Default Gateway, Preferred DNS and Alternate DNS for Wi-Fi
access.
The Wi-Fi Access Point supports wireless connection to communicate between the Standalone panel-lite and the
application software. The user has to explicitly configure the security type and encryption option also. Only the
SSID(Service Set Identifier) field will be automatically detected.
Enable the Wi-Fi. Then insert the Wi-Fi dongle in your panel lite and click on Search Network to search the
available wi-fi networks.
For eg: Using a mobile as hotsport will show WPA-2 personal security type. And you have to enter hotspot
password in security Key field.
Test Connection
The mobile broadband using USB dongle connects the system in wireless mode through Internet and transfer data
through it.The appropriate broadband USB dongle has to be inserted into the USB port available on the device for
broadband communication.
The options of dongle are Airtel, BSNL, Vodafone, TATA Photon+ and Reliance-Jio. After connecting the broadband
dongle, select the respective profile.
Specify the Profile Name, the Dialing Number which needs to be dialed to establish connectivity, Username and
Password for authentication.
Then service type can be selected from GSM and CDMA.
Specify the APN (Access Point Name) i.e. the URL to be used to access the respective service provider in case
GSM is selected.
Set the Preferred Port as the COM Port on which the device should communicate with the dongle.
The connection details of the selected Profile shows the Connection Status, IP address, Default Gateway, Preferred
DNS and Alternate DNS address.
Before configuring DDNS settings, check the Internet connectivity from LAN settings page by entering URL:
www.google.com. Once the connection is successful, the Panel liteV2 is connected with Internet.
Enable the check-box to activate the registration of host name on DDNS server.
Host Name: Enter the host name as the name registered on DDNS server. Eg: “cosecdevice.dyndns.org”
The Panel lite V2 can be accessed by using this host name. The new host name can also be added if required.
Now you can log into DDNS server by entering URL “account.dyndns.com” and view the registration of host name.
The Panel Lite V2 is registered by the host name with the public IP as shown below.
Matrix DNS
The Matrix DNS section enables to register Panel lite V2 on Matrix DNS Server by configuring its Hostname. Matrix
DNS Server will resolve the IP address of configured host-name and will map the same also.
Host Name: Enter the host name as the name with which Panel lite V2 can be accessed from the Matrix DNS
server.
Forwarded Port: Enter the communication port on which Panel Lite V2 will listen. It is 80 by default.
Update Interval: Enter the time in minutes after which device will discover its public IP and update it in selected
Matrix DNS server if it is different than registered one.
Once the host name is registered, the successful registration will be shown as below.
Now on Matrix DNS server i.e. URL: www.matrixdnserve.com; you can enter the registered host name.
Matrix DNS Server will resolve the IP Address for configured Hostname. So, now Panel Lite V2 can be accessible
through same hostname but with new IP Address.
The Date and Time page enables you to view and set date and time parameters for the Panel Lite device. The date
and time on display shows the current date and time settings on the device.
Time Zone: Select the geographic time zone in which the Panel Lite will operate.
Time Format: Select the time format for display as 12 Hours or 24 Hours.
Date/Time: To change date and time manually, select a date using the calender button and a time by manually
entering the value or using up-down arrows.
Then click the Set Date and Time button to save the manual changes.
If Date and time is to be automatically synchronized as per the Preferred NTP Server (predefined or user-defined
NTP server address) selected by user, then you must enable Auto Synchronize With NTP check-box.
Independent of the mode set from server as Auto or Manual, the user can change the date and time settings from
device webpage, which will be reflected on device display.
• When Auto Synchronization with NTP is disabled Preferred NTP Server field will be disabled.
• When Auto Synchronization with NTP is enabled,
1. You can specify the Preferred NTP server of your choice. In this case device will first try to get Date and
Time from that server address. If it does not get Date and Time in three tries; device will check from
pre-defined NTP servers. If you have entered one of the three pre-defined NTP
servers(ntp1.cs.wisc.edu , time.windows.com , time.nist.gov); then device will first check that server
first. If it receives updated Date and Time then Updated Date and Time will be reflected on device
webpage and display screen.
2. You can keep the Preferred NTP server as blank. In this case device will check for Date and Time from
the first NTP server.
Many countries observe the convention of adjusting clocks forward and backward. Clocks are set ahead during the
spring and back to standard time in the autumn. The COSEC Panel Lite can be configured to be compatible with
this procedure keeping the RTC of the system updated with such changes.
For the Forward Clock, set a month, week, day and time at which the clock is to be set forward. Similarly, set the
Reverse Clock. Also, set the Duration in hh:mm format by which the clock is to be set forward or backward.
Example: The above DST Setting implies that on 1st Sunday of November at 09:00 hours, the clock will be
forwarded by 05:00 hours. And on last Monday of January at 09:00 hours, the clock will be reversed or backwarded
by 05:00 hours.
The Devices section enables you to add different type of devices such as PATH Door, PVR Door, VEGA Door,
ARGO Door, ARC Controllers, V3 Door and set the basic and advanced configurations.
You can assign 4 special functions to the arrow keys of Panel Door keypad which makes the user to navigate to
device menu and access the door easily.
The total number of devices configured in Panel lite is shown as Total Devices on dashboard. The number of Online
Devices, Offline Devices and Inactive Devices is also displayed on the Dashboard as shown below.
You can also integrate COSEC devices with SATATYA devices to get images and videos triggered by user events
at doors.
See Video Surveillance section for details.
This page enables user to add slave door controllers to the Panel Lite and configure parameters for each door. A
Panel Lite can control up to 255 doors using Ethernet communication and up to 32 doors when communication type
is RS-485.
The page displays a search criteria to find a required door and a grid containing a list of added devices along with
its details. You can also delete a particular door by clicking on Delete icon.
To add a new door click Add button and configure the following parameters.
When device is in Server Mode, select a door to view its details. Certain fields may appear as read-only
fields in this mode.
Door Type: Select the type of door controller to be added. You can select the door type from the options of V1
DOOR/V2 DOOR/V3 DOOR/PATH DOOR/PVR DOOR/VEGA DOOR/ARC DC 100/ARC IO 800/ARGO DOOR.
Mode (Only for ARC DC 100): Select the mode of ARC DC 100. You can select Single Door to control a single
door or select Dual Door to control two doors from a single ARC DC 100.
Inverse Polarity for External Buzzer: When external reader is connected to ARC controller via Wiegand Interface
and external buzzer is required to connect with ARC; then enable this inverse polarity checkbox to get buzzer
output when any event (eg: user allowed)is generated.
This is applicable for ARC Dual Door Dual Reader, Dual Door Single Reader and ARC Single Door.
If the mode of ARC DC 100 is selected as Dual Door with Dual Readers, then along with the above parameters
configure Door Name, Mute Buzzer and Access Zone for Door 1 and Door2 respectively.
Access Cluster: Select the configured Cluster from the drop down options to which the door is to be assigned.
Readers
As per the door type selected there are different parameters for configuring readers. Below parameters are not
applicable for ARC DC 100 door type.
Internal Readers
Select the card reader and finger reader/palm vein reader types for internal readers.
External Reader
You can select the checkbox to enable the use of exit switch.
Select the card format from the configured formats for external reader.
CARD FORMAT
You can select maximum 5 card formats for Internal as well as External reader
The selected card formats will be then displayed.
When you show card on a reader then received bits will be compared with the configured card reader’s
configurable bits.
• The card format will be applied to the card whose configurable bits matches with the received bits.
• If a card is detected for which received bits does not match with any of the configured bits then default
format for that card will be used.
• If there are two or more card formats assigned in a device whose configurable bits are same then card
formats based on Format ID will be applied.
Case1: Suppose there are five formats configured for a reader. Formats 3 and 5 have same number of configurable
bits equal to 26 bits.
Now a 26 bit card is shown on reader. Then only format 3 will be applied on the card.
Now, if a 26 bit card is shown at the reader then as configurable bits are also 26 this format should be applied.
Now truncated Bits = 24. First 26 bits will be reversed and then bit configuration will be applied for first 24 bits only.
Last 2 bits after reversal will be discarded.
For Single Door ARC DC 100 configure the following parameters for Reader1 Group and Reader2 Group
respectively.
RS-485 Reader: Select the type of RS-485 readers from the dropdown list.
Weigand Reader: Select the weigand reader from the dropdown list. The available options are:
• Short-Range Reader: Select this option to identify the user from a short distance.
• Long-Range Reader: Select this option to identify the user from a long distance.
• PIN-W Reader: Select this option to support PIN pad device and accept the PIN from pin pad for identifying
the user.
• Card+PIN-W Reader: Select this option to identify the user with Card and the PIN from pin pad. If card
format is 4 or 8 bit then first entered input is considered as PIN input. If card format is greater than 8 bit
then first entered input is considered as CARD input.
If Card format is of 26 bit, then it is must to show Card first. When card is verified, then PIN must be
entered to verify the user.
For ARC DC 100-Dual DOOR,Dual Reader configure the following parameters for Door 1 and Door 2 respectively.
RS-485 Reader: Select the type of RS-485 readers from the dropdown list.
Weigand Reader: Select the weigand reader from the dropdown list. The available options are:
• Short-Range Reader: Select this option to identify the user from a short distance.
• Long-Range Reader: Select this option to identify the user from a long distance.
If Card format is of 26 bit, then it is must to show Card first. When card is verified, then PIN must be
entered to verify the user.
For ARC DC 100-Dual DOOR,Single Reader configure the parameters as described for Dual Door,Dual Reader.
For Door2, Exit switch can be configured as it is not connected with any reader.
The following Access Policies will not work with ARC Dual Door, Single Reader:
Duress Detection, Mantrap, Anti Pass Back (APB), Dead Man, Occupancy Control, Use count, Door lock,
Door unlock, smart card based access route, Multi credential access mode.
The Mifare- DESfire EV1 card is supported on internal and external readers(PN532 Reader for MiFare) of
Door V3, PVR, NGT and Vega controller.
Advance Configuration
Auto Re-lock: Select this checkbox to allow the door to relock immediately when the door status changes to close
after normal open irrespective of the defined pulse time. However, it is supported only if a door sense is installed
and enabled.
• Auto Re-lock Timer: Specify the time in seconds for the Auto Relock operation.
Alarm: Select this checkbox to set all door-based alarms as active
Tamper Alarm: Select this checkbox to activate the Tamper Alarm.
Pulse Timer(sec): Specify the time in seconds for which a panel door will remain in an open state on receiving a
valid credential.
Auto IP Assignment: There is option where panel door can be assigned its IP from device webpage.To enable this
check the Auto IP Assignment box.
Network Protocol: Select the Network protocol from the options of ICMP or UDP.
Tail-Gating: Tail-gating refers to an access violation which occurs when more than one person tries to enter a
secured area using a single person’s access credentials. If this option is enabled on the panel door, the occupancy
count of a zone will be incremented or decremented considering both the punch as well as the auxiliary input port of
the panel door (say, input from a beam-counter).
• Reset Wait Timer: Set the wait timer for resetting the tailgating count (Reset Wait Timer) based on the
door lock status or the door pulse wait timer (as configured).
• Door: Click the picklist and select the doors to be assigned for the Interlock to the selected door (PVR
door). Suppose Door V3 and Vega Door are selected for Interlock with PVR door. So When PVR opens;
V3 and Vega door will remain close.
Whenever a door is in abnormal state and for that door interlocking is enabled then user access in other
doors of the interlocking group is allowed.
The Man Trap timer Internal/External reader- allows to fix a maximum time within which the user has to cross the
high security corridor.
Man Trap Timer Internal Reader (Sec) - This is an alarm wait timer on the panel door to ensure that the user
enters the next sequential door of a man-trap within a specific time-frame.
Man Trap Timer External Reader (Sec) - This is an alarm wait timer on the panel door to ensure that the user exits
the panel door to enter the next sequential door of a man-trap within a specific time-frame.
Whenever this timer is configured for a particular door say for internal reader; user is expected to punch on internal
reader of any other door present in the same zone/door group within the specified Mantrap timer. If user fails to do
so, Mantrap violation alarm shall be triggered if configured.
Unless and until the same user punches on any internal reader in the same zone/group, no other user will be
allowed to any other internal reader in the same zone/group.
Input Output
Door Sense
Enable Door Sense: Select this to enable the door for two-state monitoring.
Supervised: Select this to enable the door for four-state monitoring where the door is also monitored for door fault
and door disconnection.
Door Sense Type: Specify the Sense Type as NC or NO (Default: NC).
Door Relay
Output Group No.: Select an Output Group No. from the picklist for door relay.
For ARC DC 100-Dual Door configure the above Door Sense and Door Relay parameters for both Door 1
and Door 2 respectively.
Lock
Lock Sense: Select this to enable the lock for two-state monitoring.
Lock Sense Type: Specify the Sense Type as NC or NO (Default: NO).
Whenever Lock Sense status is changed; Lock Open/ Lock Close or Manual Lock Override event is generated.
Also, whenever lock status condition is violated respective alarm is generated for Door Lock.
The “Alarm” check-box in Door Configuration > Advance Configuration must be enabled for generating alarms.
The local alarm events i.e Lock Open Too Long, Lock Abnormal and Manual Lock Open alarms are sent to CCC
Server.
Lock Open event is generated when Exit Switch is in Lock Sense Mode i.e. Lock Sense check-box in Input Output
page is enabled.
When Lock Sense is enabled for Door1 then Exit Switch gets disabled for Door1. Similarly for Door2 also.
Once the lock sense is enabled, lock open event will be generated when lock relay is energized.
Manual Lock Override event is generated when lock is opened manually i.e., by inserting physical key.
Lock Alarms
Whenever Lock related conditions are violated following alarms will be generated and displayed in Monitor> Live
Events and Event log.
Auxiliary Input
Aux Input Port (Applicable only for ARC IO 800): Select the auxiliary input port from the dropdown list.
Enable Auxiliary Input: Select this to enable Auxiliary Input (e.g. Smoke Detectors) depending on normal door
state monitoring.
Supervised: Select this to enable Auxiliary Input (e.g. Smoke Detectors) depending on supervised door state
monitoring.
Aux Input Sense Type: Specify the Sense Type as NC or NO (Default: NC).
Debounce Time(sec): Specify the Debounce time in seconds. Default value is 3 sec and range should be 0-99
sec. It defines the minimum time for which an input interface must be maintained in a given state before the system
reports it. For example, if a Normal door state is changed to Alarm, the state must remain in Alarm for five seconds
before an alarm is generated.
Auxiliary Output
Aux Output Port (Applicable only for ARC IO 800): Select the auxiliary output port from the dropdown list.
For ARC IO 800 configure only the above Auxiliary Input and Auxiliary Output parameters.
Special Function
The user can map up to 4 special functions to the arrow keys on a Panel Door keypad. For each arrow key, select a
special function from the respective dropdown list.
Special function is not applicable for devices ARC DC 100, VEGA DOOR, PATH DOOR, ARGO DOOR
and ARC IO 800.
This page enables to configure the Door Group with multiple doors in the group. This door group can be assigned
to the user who is to be allowed access on selected doors only.
You can configure maximum 99 device groups and each device group can have upto 255 doors.
To add a new Door Group click Add button and configure the following parameters.
Once the door group is saved, you can view the door groups by clicking on View List button.
This page allows configuring Matrix Network Video Recorder (NVR)and Hybrid Video Recorder(HVR) with Panel
lite V2 and get images and videos triggered by the user events at the door.
Configuration
Door: Select the type of door controller for configuring video surveillance. The picklist shows all the configured
doors.
Active: Check the box to activate the connection.
Network Connection: Select the Network connection from the options of Ethernet, Broadband, Wireless.
IP Address: Enter the IP address of Satatya NVR/ HVR which is to be configured for surveillance.
Port Number: Enter the port number of NVR/HVR at which COSEC door will connect with SATATYA device. The
default port is 8000.
Satatya Integration
Example: A schedule from 09:00 to 18:00 can be configured for working days (Monday- Friday) to monitor the exit
of employees from the working area.
Event: Select a COSEC event from the drop down list for which the resultant action is to be configured.
Mode: Select the event mode from the options of Entry, Exit and Both from the drop down list wherever applicable.
Action: Select the action for the Satatya device from the drop down list. The options available are:
• Recording - Specify the duration in minutes.
• Upload Image - This will be uploaded as per the ftp settings.
• Video Pop-up - Specify the duration in seconds. The video pop up will be generated on the local client of
Satatya device on the selected camera.
• PTZ Preset - Specify the PTZ position number as defined on the SATATYA device.
• Mail Image - Specify the email-ID.
Camera: Select the relevant camera channels depending on the action selected.
Example: For Access allowed event on COSEC Device, the video pop up of Camera 12 will be shown for 10
seconds.
Click the Add button to complete the process of linking the event to the action. The integration will be updated in
the grid.
All cards store a sequence of numbers which can be read by card reader devices, when a card is swiped. This
unique card number sequence is then verified against a user enrolled on the COSEC access control system to
allow access to the card-holder. Hence, the pattern or structure of this card number must be compatible with the
corresponding card reader format to support identification. This programmable data pattern of a proximity card is
known as its card format.
ID: To configure a card format select the ID number from the grid on right side of the page. This ID will be displayed
here.
Name: Specify a name for the card format.
Read Order: The Read Order parameter indicates the sequence in which the card serial number should be read by
the card reader. You can specify the Read Order as one of the following:
• Forward- This implies that the bits should be processed in the order of their arrival.
• Reverse bitwise- This implies that all incoming bits will be received and then reversed before processing
them further.
• Reverse bytewise- This implies that each incoming byte will be reversed separately and then used for
further processing.
Truncate To (Bits): Specify the maximum number of bits that will be allowed for the format.
In the Bit Configuration section, all configurable bits of the card data will appear numerically in a serial order, from
left to right, as boxes.
For eg: If you set Configurable bits as 32, then a grid from 1 to 32 will be created. Here, each box represents a bit.
Sequence of Operation: Select the sequence of operation based on which operation is to be performed first and
then second between Reading Order and Card Format Configuration.
Include FC in Card No.Enable the Include FC in Card No. checkbox to ensure that the Card Number or Card ID
includes Facility Code as well.
You can add Parity and Facility Code to the Card number. For this, In the Color Selection area, click to select the
colour box which represents the bit type to be added to the card number. Then click on the number in the grid
where the selected bit type is to be placed.
For eg: If you select Odd Parity(blue colour) and select 10 and 11 from 32 configurable bits. Then these 2 bits
will be set with Odd parity and rest with card number.
This page allows users to program the memory mapping of smart cards as per their requirement. Users can
configure their own card format by adding user-defined fields as well as modifying length, type and location of pre-
defined fields on the different available memory sectors in specific HID iClass and MiFare cards. A total of
maximum 99 fields can be configured for each personalized format out of which 22 fields are pre-defined.
• Add or modify fields such as name, ID, department, shift, fingerprint templates etc. to be written on the
Smart Card.
• Configure a field profile based on card type and card mode.
Fields
For Text and Numeric fields, specify the Max Field Length in bytes. For a Date field, specify a date type, format
and separator. Based on your selection the maximum field length will be automatically determined.
If some pre-defined field type is changed from text to numeric, the admin should make sure to have only
numeric value in such fields. If any mismatch occurs, then while writing or reading information from card,
conversion will not be performed and the field shall remain <Blank>.
Configuration
Select a Card Type using the dropdown list. You can view the memory size of each card on hovering your mouse
on the icon.
Card Mode
1. Default: Select the Card Mode as Default to use the default card format where location of each field is
fixed as per card type selected.
• Card No.: If Default Card Mode is selected, you can specify if the Card No. to be used is the original
CSN, or UID (Universal Identifier number).
2. Custom Mode: If Custom mode is selected then location of all pre-defined fields will be allowed to be
changed as per available memory sectors on the card. Maximum 99 newly created fields will be accepted
for such card types.
• Card No.: If Custom Card Mode is selected, you can specify if the Card No. to be used is the original
CSN, UID or Custom card no. as is defined at the time of enrollment. While location of CSN is fixed, it
is mandatory to define a Field Profile for Custom Card Nos.
Read CSN: If Card number is selected as Custom, then you can enable Read CSN option. This will allow to read
CSN number in case the custom number gets failed to read.
For the Custom Card Mode, location on the card memory can be defined for each selected field. For this, select a
Field using the picklist button.
Specify the Length, Page and Block on the card and number of Bytes to be used depending on the field type and
the available memory for the selected field.
Click the Add button. The configured field will appear on the grid list.
Wiegand readers can send outputs not only in the standard formats or the actual information, but also in a custom
data format whose structure can be defined. The administrator can use this page to create and save multiple
profiles for different Wiegand Output Formats. Based on the output required, Wiegand output format in the Device
Configuration module should be selected for allowed and denied events.
The page displays two panels one for configuring the weigand format and the second contains a grid consisting of
created formats. You can also delete a particular format from the grid itself.
Name: Specify a name for the format. You can specify upto 6 formats.
Output bits: Specify the number of bits to be configured in Wiegand Output Format.
• You can add Parity, Facility Code, Access Code and Blank to the Card number.
Access Code indicates to the 3rd party panel whether the user has been allowed or not by the device.
• For this, In the Color Selection area, click to select the colour box which represents the bit type to be added
to the card number. Then click on the number in the grid where the selected bit type is to be placed.
• For eg: If you select Odd Parity (blue colour) and select 1,2 and 3 from 32 configurable bits. Then these
3 bits will be set with Odd parity.
Facility Code
If Facility Code is marked in the output bits, you must specify the source from where it must be read i.e. from Card
No., from Card Personalization data or as per Device Configuration.
Replace with Card No.: When FC is not obtained then you can select the alternate option of card number to send
for FC by enabling this check box.
1. If a Wiegand Output format is edited and saved, it will be automatically sent to all the devices to which
this format is assigned.
2. The maximum bits of Facility Code and Card No. should be as defined in Card Personalization page of
the Devices module. They should be selected one at a time.
3. At a time, Access Code should be of 1 bit only but user can select it to be of more than 1 bit and till
maximum 20 bits.
The Users section enables you to add users on the Panel lite V2 and select Group and Zone for the user. You can
assign basic and advanced Access Control policies to the users as well as enroll credentials of the user.
Z1
Access Level=8
D1 D2
Access Access
Allowed Denied
Access Level=9 Access Level=7
The total number of users configured in Panel lite is shown as Total Users on dashboard. The number of Active
Users, Inactive Users and Blocked Users is also displayed on the Dashboard as shown below.
User Configuration enables to configure a user on the Panel Lite. This page displays a search criteria and grid
containing a list of created users along with the details of user credentials, Access Group and Access Schedule.
You can also edit or delete a user from the grid itself.
When the 1st schedule is created from Shifts and Schedule; then it will get assigned to all the users and
will be displayed in Access Schedule column.
Both Panel Lite and Panel Lite V2 supports a maximum of 25000 users.
To create new user click Add button and configure basic and advanced access control parameters.
Profile
User ID: Specify a unique User ID. It can have an alphanumeric value with a maximum of 10 characters.
User Name: Enter a name in this field that identifies the user. Maximum upto 45 characters allowed.
Access Group: Assign an Access Group, Functional Group, Home Zone and Visit Zone to the user from the
available options configured on the Panel Lite.
Functional Group: Select the functional group for the user from the dropdown list.
Assign Door: The doors configured in Panel Lite V2 will be assigned to the user.
To remove the assignment of particular door; click the picklist and delete the door from the list.
The Door Group picklist and Door picklist enables you to select the door groups or individual doors
respectively for assigning to the user.
Home Zone: Select the home zone to be configured for the user from the dropdown list.
Absentee Rule: Check this box to enable the Absentee rule at user level.This rule will allow you to configure
maximum no. of days for user to be absent after which the user will be disabled/denied. However, this option needs
to be first enabled at the Panel level. See Absentee Rule.
Absent Days Count: Specify the day count for the Absentee rule ranging from 1 to 365
You can upload the image of user by clicking Select Image button and browsing the image. Then click Upload
Image button to upload the image of user.
Credentials
PIN: Specify the PIN no. for the user. User PIN should be a numeric value ranging from 1 digit to a maximum of 6
digits.
Card 1/Card 2: Specify a card ID no. to be assigned to the user. The maximum value for the card ID is 20 digits.
Specify a second card ID in the Card 2 field, if required.
Enrolled Fingers/Palm: This option displays the number of fingerprint/palm templates enrolled against the
selected user.
Enable Self-Enrollment: Select the checkbox to enable self-enrollment feature for the user.The Self-Enrollment
feature enables the user to enroll himself/herself at a COSEC door controller using an already provided access
PIN, without the help of any operator or HR executive.
You must enable Self-Enrollment from Panel Configuration> Advanced Profile> Enrollment
Validity
Enable: Enable this option if the user credential is to be activated for a predefined period.
Valid Upto: Specify the end date of the validity of the user credential in this field.
Access Route
Route: Click Select Route button to assign a predefined access route to the user based on which user has to
access the configured devices of the route. The Access Route is configured from Access Policies> Access Route.
Basic
Restrict Access: Enable this to restrict access for the user on the Panel Lite. This implies that punches on the
panel door will be considered for attendance only and will not open the door for access.
Bypass Finger/Palm: This option can be enabled in the event of the Finger/Palm Vein image not being in order
and the system thus has problems identifying the user. In such cases, the system administrator can bypass the
Finger/Palm check for the user. The user can punch in or out using any of the assigned pin or card and the same
will be considered for attendance calculation.
Enable: Enable user access based on the shift working time of the user. If the Shift Based Access option is not
enabled, then the default Access Settings will be applied as defined on the Panel Lite.
Shift Schedule: Select a shift schedule from the drop-down list to be assigned to the user.
Start Shift: In case of multiple shifts in the schedule group, the starting shift needs to be selected from the drop
down list.
Holiday Schedule: Select the Holiday schedule to be assigned to the user from the drop down list.
The Shift Schedule and Holiday schedule has to be configured from Access Schedule.
Max Route Level: Select the route level up to which the user is to be allowed access.
Smart Card Access Route: Select the Smart Card Based Access Route to be assigned to the user.
Enable: Enable this check-box to allow the user to access the COSEC device through the Mobile.
IMEI: Specify the IMEI (International Mobile Equipment Identity) number of the mobile to be registered.
Click Enroll IMEI button to enroll a user for access COSEC device through mobile. On clicking the button, the
enrollment for the selected user will be activated for 60 seconds.
Elevator Access Control: Enable the checkbox to allow the user to access the elevator. If disabled the user will
not be allowed to access.
Access Cluster
Access Cluster Check: Enable the checkbox to allow the user to access the cluster.
Access Rule
Assign the Access Rules from the pick-list button to the user. The access of the doors to the user will be as per the
rule is configured.
This page enables you to view the created access groups as well as create new Access Groups.
An Access Group can be defined as a group of users having similar job functions and needing equal privileges
throughout the day. Access Groups have Time Zone based Access Levels programmed, and when assigned to a
user, enable the determination of user Access Level at any particular time.
The Panel Lite compares Access Level of User with Access Level of the Zone before the user is Allowed or Denied
to access the restricted areas. A maximum of 99 Access Groups can be defined in the system.
Click Add button to add an Access group. The page appears with the configurations and a grid comprising of
predefined members. These members cannot be deleted, they can only be updated from the Schedule Based
Access Level Override section.
After creating the access group, it can be assigned to the user from User Configuration.
Specify the User Access Levels for Working hours, Break Hours and Non-Working Hours, ranging from 01 to 15
from the drop down list.
The access level of the user is compared to the access level of the zone and user is granted access only if user
access level is greater than or equal to the access level of the zone.
The access level of zone is assigned from Zone Configuration > Basic Configuration
Example:
If shift is defined from 9am to 6pm and Access Level for Work Hours is set at 9, Access Level for Break Hours is set
at 8, Access Level for Non-Working Hours is set at 8, Access Level for the Zone1 is set at 9 (Not Home zone)
Time Zone: Select a Member on the grid to which a Time Zone is to be assigned. Then click the Select Time Zone
picklist and select the time zone as configured from Access Policies > Time Zone.
The Time schedule for “Lunch Time” zone is activated for the RnD Employees group as shown above.
Either the User Access Levels or the Schedule Based Access Levels will work at a time.
For example: If Access level of Break is 8; then employee will not be allowed to access in break hours. But
the Lunch Time Zone has access level 9, so the employee will be allowed to access the lunch area.
This page enables you to create a new Functional Group and view the created ones.
Users whose credentials have been temporarily blocked due to inactivity for prolonged periods are referred to as
Blocked Users. This could happen in the event of the Absentee rule being applied to the user or unauthorized
access attempts exceeding the defined limit.
Blocking a user only deactivates the credential and does not result in the deletion of user information from the
device. The possible reasons for deactivation are:
• Absentee rule being applied to user (Must be enabled from Access Features> Set1)
• Failed Access attempts exceeded five
• The Use Count Control rule has been violated (Must be enabled from Access Features> Set1)
The other conditional violations that may lead to blocking of a user can be enabled from Panel
Configuration > Access Features > Set 3
The Alert Service must be running to generate the Block User event.
The alert can be configured from Alert Message Configuration which will send SMS or Email to Admin or
Reporting In-charge notifying that the user is blocked.
Once users have been added to the Panel Lite, the enrollment process can be initiated from this page. Enrollment
can be defined as a process wherein the Panel Lite accepts and stores the user credentials against a particular
user. It supports enrollment of user cards, finger print templates, palm templates and special cards.
Select a User from the user picklist, for whom the enrollment is to be done.
Select a Panel Door from the door picklist, on which the enrollment is to be performed for the user.
1. For Read Only Cards, select the Number of Cards to be enrolled from the dropdown list.
2. For Smart Card, select the number of smart cards to be enrolled. Check the boxes against the appropriate
Details on Smart Card parameters. The following information can be written onto the Smart Card:
User ID
User Name
Facility Code (FC)
Additional Security Code (ASC)
Finger Template: Select the number of templates to be written on to the card from the dropdown list.
Apart from the above, the following Additional Details on Smart Card can also be written:
Designation
Branch
Department
Blood Group
Emergency Contact
Check the box against the relevant personal detail entry and provide the relevant information in the respective
fields.
3. For Biometric, select the Number of Fingers/Palms to be enrolled from the dropdown list.
4. For Biometric then Card, select the Number of Cards and Number of Fingers/Palms to be enrolled from
the dropdown list.
Click the Enroll button to initiate enrollment on the selected Panel Door. The user will be prompted by the selected
door controller to display the credentials for enrollment.
After the enrollment is successful, the number of credentials enrolled for a user can be viewed from User
Configuration page as shown below.
The SI User page enables to enroll a SI(Smart Identification) user for allowing access to the system. SI user is a
user who is allowed access to another office by means of Smart Card, though he is not enrolled into that particular
office's system.
Door ID: Enter Door ID or click Select Door button to select the door on which the user is to be enrolled.
Enrollment Type: It displays the enrollment type. By default, Smart Card type of enrollment is displayed.
Select the below appropriate parameters for writing in the smart card for SI user enrollment.
Reference ID: If reference ID is to be used for smart identification, then first enable the checkbox and then enter
the ID. Maximum 8 digits of ID can be entered.
User ID: If User ID is to be used for smart identification, then first enable the checkbox and then enter the ID. User
ID can be maximum of 10 characters.
User Name: If User Name is to be used for smart identification, then first enable the checkbox and then enter the
user name. Maximum length is 15 characters.
Access Level: If Access Level is to be used for smart identification, then first enable the checkbox and then specify
the level. Its value can be from 1 to 75.
Validity Date: If Validity Date is to be used for smart identification, then first enable the checkbox and then select
the date after which the user is considered as an invalid user.
Finger Template: If Finger Template is to be used for smart identification, then first enable the checkbox and then
select the number of templates to be considered for enrollment from the dropdown list. This option is not available
for PVR doors.
Designation: If Designation is to be used for smart identification, then first enable the checkbox and then enter the
designation.
Branch: If Branch is to be used for smart identification, then first enable the checkbox and then enter the branch
name.
Department: If department is to be used for smart identification, then first enable the checkbox and then enter the
department name.
Blood Group: If blood group is to be used for smart identification, then first enable the checkbox and then select
the blood group from the dropdown list to be used.
Emergency Contact: If emergency contact is to be used for smart identification, then first enable the checkbox and
then enter the contact number.
Medical History: If medical history is to be used for smart identification, then first enable the checkbox and then
enter the medical history.
ASC: If enabled, the ASC defined in the panel is written on the card.
Facility Code: If enabled, the facility code defined in the panel is written on the card.
Click Enroll to enroll the user or click Cancel to cancel the changes made.
A Special Card is an RFID card can be encoded for a special function and the card-holder can perform a special
function at the device just by showing this special card.
A Special Card is especially useful when the user has to perform routine tasks, where repeated manual entry of
codes can become tedious. It is also required when a door controller device does not have keypad or LCD display
for manual entry of special codes.
Example: In factories where workers avail shortleave; security guard can show the Special card enrolled for
Shortleave IN on the Entry door and can give the access to the worker. This same card can be used for multiple
workers.
The enrollment for a special card can be initiated from this page.
Select a Door using picklist on which the special card enrollment is to be performed.
Enrollment Type: Specify whether a Read Only Card or Smart Card is to be enrolled.
Special Function: Select a Special Function from the dropdown list for which the special card is to be enrolled.
Card: Select the Number of Cards to be enrolled for a special function from the dropdown list. Maximum four cards
can be enrolled for a single special function.
Click the Enroll button to initiate enrollment on the selected Panel Door. The user will be prompted by the selected
door controller to display the special card for enrollment.
This page enables the system user to authorize the newly enrolled users.
When enrollment of new user is done, then the enrolled biometric credential and card requires authorization for
accessing the panel doors. This user authorization is done from this page.
The Enrolled credential of user goes to Authorization when “Authorization on Enrollment” is enabled from
Panel Configuration> Advanced Profile > Enrollment
The system user or the users having Enrollment Authorization rights can check the box to Authorize or Reject the
record.
Then click Save to apply the authorization. Now the authorized user can use the credentials to access the door.
Access Control System can detect and report intrusion, access to warehouse, cash rooms in banks, R&D
departments in corporate, troubled conditions, any other place, where unauthorized access needs to be monitored.
Access control systems can grant, record, deny, detect and report access to facilities, services, information and
other assets that need to be protected from mass access.
The Access Policies section enables to configure Access control policies such as 2 person Rule, First-IN user rule
etc which will restrict the user from accessing the device when the configured rule is violated. The Alarms can also
be configured which will be generated on violation of rule.
The number of configured Shifts, Schedule and Holiday Schedules are displayed on the Access Schedule section
of Dashboard as shown below.
2-Person rule is a feature that enables the system to insist for two valid user entries within specified time to allow
access to a secured zone.
This is a control mechanism, designed to achieve a high level of security, especially for critical areas like Cash
rooms, R&D Labs, sensitive documents storage etc.
The page will display a list of created 2-person groups along with its details. You can click on the group to edit it or
click Delete icon to delete it.
To add a new group click Add button and enter the following details.
To add the members to the group click on the Member ID to which user is to be added.
User ID: Now click the user picklist to select the user.
After selecting the user click on Update to save the members to the grid.
Then Click on Save to save the group.
You can add more members to the group in the same way as described above.
If the first person is an authorized user and the 2nd person is a VIP then, system considers the VIP as an
authorized 2nd person to validate the 2 -person rule.
After creating groups for 2 person rule, you must enable the rule from Panel Configuration> Access
Features> Set1
Then configure the rule at Zone Configuration > AdvanceConfiguration1.
Now this rule will be applicable for those doors who are assigned the zone which is enabled for the rule.
The Access Route functionality enables the administrator to define an access policy which allows the user to
access only specified doors (applicable to Panel and Panel doors) with specified levels in predefined route,
sequenced or unsequenced.
The page will display a list of created access routes along with its details. You can click on the access route to edit
it or click Delete icon to delete it.
To add a new Access Route click Add button and enter the following details.
You can add maximum 255 Access routes and maximum 255 doors can be added to a route.
In case of the sequenced option the system checks on the route based on the levels defined. For e.g. the user
has to swipe the credential on a level 1 door and then go on to Level 2, level 3 and so on. In this case the order has
to be maintained for both the IN as well as the OUT punches. Therefore it is necessary to have exit readers
installed on all doors of the access route.
Restrictions: Select the Restriction from the dropdown options of Soft and Hard.
• Hard: Access will be allowed only if the access route is followed.
• Soft: Access will be allowed on any door on the access route with an access route violation message.
Reset on Lowest Level: Select the checkbox to enable the system to reset the current level status to allow access
on the lowest level.
This option is useful in the event of the user not following the proper order while exiting the premises. If this
functionality is enabled then the user will be allowed access on the lowest level irrespective of his/her state but this
will happen only on entry side.
Configured Route
Door: To select the Member Doors for the Access Route, click on the Member ID from the right side grid to which
door is to be assigned.
Then click on the Picklist button to select the appropriate Panel door from the Device Picklist.
Level: Select the Level number for the Door from the dropdown list.
Multiple Doors can be assigned to a single level. However, the same door cannot be assigned to multiple levels.
Click on Update to save the door. You can define upto 255 doors per access route.
You can click on View list button to view the list of configured Access Routes as shown below.
First-IN User rule uses a card or biometric credential of the user who is declared as First-IN User to unlock the
Access locked to a particular zone.
The page will display a list of created rules along with its details. You can click on the rule to edit it or click Delete
icon to delete it.
To add a new First-IN User Rule click Add button and enter the following details.
User ID: To select the user members, click on the Member No. to which user is to be assigned.
Then click on the Picklist button to select the user from the Picklist.
Click on Update to save the user member. You can define upto 25 person per group.
A VIP user is allowed to access the First-In enabled zone even when the zone is not activated by a First-
In user. However, the VIP user cannot activate the zone to allow access to other users.
After configuring the First-In user Rule, you must enable the rule from Panel Configuration> Access
Features> Set1
Then configure the rule at Zone Configuration > AdvanceConfiguration2.
Now this rule will be applicable for those doors who are assigned the zone which is enabled for the rule.
The Access Route using cards functionality enables the administrator to define an access policy which allows the
user to access the COSEC Doors in the configured sequence.
The page will display a list of created smart card access routes along with its details. You can click on the route to
edit it or click Delete icon to delete it.
To add a new Access Route click Add button and enter the following details.
T
h
e
I
D
w
il
l
b
e
a
u
The ID will be autogenerated.
Name: Specify a descriptive name for the Smart Card Access Route.
Active: Select the checkbox to activate the Smart Card Access Route.
Restrictions: Select the Restriction from the drop down options of Soft and Hard.
Configured Route
Door: To select the member Doors for the Access Route click on the Picklist button to select the Device.
Level: Select the Level number for the Door from the dropdown list.
After configuring the Smart Card Access Route, you must enable the rule from Panel Configuration>
Access Features> Set2
Then it must be assigned to the user from User Configuration> Advanced Access Control.
Time Zone allows the system to grant access to the users to certain Access Zone only in a specified time period.
This time period can be set to a full 24-hours or any limited set of hours or minutes.
Each time zone represents a particular period of time and time zones may have overlapping time periods. The
maximum time period which can be assigned to a time zone is 23:59 hours.
Configuration
The configuration tab enables to create time zone by clicking Add button and providing the following parameters.
Group
The group tab enables to create time zone groups by clicking Add button and providing the following parameters.
After configuring the Time Zone, you can assign to the Schedule based Access level override in Users >
Access Group.
The Access Cluster page enables to configure access clusters i.e. zones or group of devices.
In chemical industries; when a user accesses a chemical prone area then he is restricted from going into zones
which can harm him or the surroundings. So if the user is accessing one cluster (say chemical area); then he can
be restricted to go to second cluster (public area).
• Allow All Clusters- Users accessing Cluster A will be allowed to access all other clusters.
• Allow Selected- Users accessing Cluster A will be allowed to access only selected clusters.
• Deny All Clusters- Users accessing Cluster A will be denied access to all other clusters till the restricted
duration.
Restricted Duration: Enter the time duration before completion of which; user cannot access another cluster.
First time i.e. after panel is rebooted when user accesses door of any cluster, user should be allowed.
(Provided other access policies are verified).
Case: 2 - For first time user is accessing a door that belongs to cluster 2 at 2 o'clock.
• Now if user accesses cluster 2 he will be allowed.
• If user accesses cluster 3 he will be allowed as allowed cluster is cluster3.
• After accessing cluster 3, if user accesses cluster 1 or 2 before 1 hr. I.e. at 3:00 on same day he will not be
allowed.
The Access Cluster is enabled for Users from User Configuration> Advanced Access Control2
Occupancy Control functionality enables the system to monitor and control the number of users permitted within a
secured area or controlled zone. This feature can be useful for high security bank vaults, research organizations
where single person can't be trusted.
Occupancy rule can be applied on each zone separately or occupancy of one zone (Monitor zone) can be
monitored to control access into another zone (Control zone).
The page will display a list of created rules along with its details. You can click on the rule to edit it or click Delete
icon to delete it.
To configure the Occupancy Rule; click Add button and enter the following details.
Access Mode: You can select the Access Mode as Entry, Exit or Both based on which Occupancy rule will be
checked.
Action: Select the action from the options which is to be executed when condition in Monitor zone fails.
• Alarm: On violation of occupancy rule; Alarm will be generated after the elapse of Alarm timer.
• Alarm Timer: It defines the time for which device will wait for satisfaction of occupancy rule. Alarm
timer (0 to 999 seconds) is user configurable.
On violation of occupancy rule "Occupancy violated" alarm will be generated after the alarm timer
elapses and user is allowed to either enter or exit the zone.
• Restrict: On violation of occupancy rule user won't be allowed to enter or exit the zone.
Check Conditions For: Select the option as Any One Zone or Both Zones to check the Avoid Occupancy
condition for the respective zone.
When second user comes in monitor zone; he will be access allowed but occupancy will be violated. The
occupancy violated Alarm will be generated when a user tries to access the control zone.
Example2:
Let there be two zones,
• Zone 1 - Control Zone - Door V3
• Zone 2 - Monitor Zone - PVR door
Initially occupancy of both the zones is empty.
Access mode of both zones is Exit.
Action- is selected as “Restrict”.
Condition - is avoid occupancy greater than 1
When second user comes in monitor zone; he will be access allowed but occupancy will be violated. When a user
tries to access the control zone; he will be restricted access due to violation of occupancy in monitor zone.
Access mode of both zones is Exit. For this “Access Control on Exit mode” check-box must be enabled for both the
zones from Panel Lite V2> Zones> Setup.
• Exit of user1 from monitor zone is allowed. Exit of user2 (normal user) or user4(VIP user) from monitor
zone will be allowed but it violates occupancy.
• Now when user5 tries to exit from the control zone then access will be denied to him. But on the same time
if user8 (VIP user) tries to exit from the control zone then access will be allowed to him.
Example4:
Let there be two zones,
• Zone 1 - Control Zone - Door V3
• Zone 2 - Monitor Zone - PVR door
Initially occupancy of both the zones is empty.
Access mode of both zones is Entry. (Configure Access mode from Panel door> Reader section.)
Access mode- is selected as Entry. This is the access mode of user in control zone (Zone-1) for which the Action
(Alarm/ Restrict) is to be taken.
Action - is selected as “Restrict“. This will restrict the access to the user in control zone if occupancy is violated in
monitor zone.
Condition- is Avoid occupancy equal to 2 in monitor zone-1 (Zone-2)
The IN- OUT punches are stored in memory of Panel lite. Re-booting the panel/panel doors will not reset
the occupancy count to zero.
If there are entry punches in a zone so zone will be occupied. There must be exit punch from the reader or
from door in Exit mode to decrease the occupancy from the zone.
Example5:
Consider the above example 4 with change in Action as Alarm.
Action - is selected as “Alarm“. And Alarm Timer as 2 seconds. This will raise the alarm after 2 seconds of user
access in control zone when the occupancy is violated in monitor zone.
• When user1 and user2 punches on PVR door, they will be access allowed.
• But when user3 punches on Door V3 then he will be access allowed but after 2 seconds alarm will be
generated.
Example6:
Let there be 3 zones of Panel lite V2:
• Zone 1 - Control Zone - Door V3
• Zone 2 - Monitor Zone1- PVR Door
• Zone-3- Monitor Zone 2- Door V3-115
Initially occupancy of all the zones is empty. Access mode of all zones is Entry. (Configure Access mode from Panel
doors> Reader section.)
Access mode- is selected as Entry. This is the access mode of user in control zone (Zone-1) for which the Action
(Alarm/ Restrict) is to be taken.
Action - is selected as “Alarm“. And Alarm Timer as 2 seconds. This will raise the alarm after 2 seconds of user
access in control zone when the occupancy is violated in monitor zone.
Condition- For Monitor Zone 1 condition is Avoid occupancy equal to 2. For Monitor Zone 2 condition is Avoid
occupancy greater than 1.
If Check Conditions For is selected as
• Any One Zone then occupancy avoidance condition will be checked for any1 zone. If occupancy is
violated in either of the monitor zone then Alarm will be generated after the duration of Alarm Timer when
the user punches in Control zone.
• If Both Zones is selected then occupancy avoidance condition will be checked for both the zones. And
alarm will be generated in control zone if occupancy is violated in both the monitor zones.
• When user1 punches on Door V3-115 (Zone-3), he is access allowed. When user2 punches on Door V3-
115 (Zone-3), he will be also be access allowed. But this is violating occupancy >1
• Now when user3 punches on Door V3 (Zone-1) then he will be access allowed but after 2 seconds alarm
will be generated.
Similarly if Action= Restrict; then user3 will be access denied on Door V3.
If Check Conditions For = Both Zones, then occupancy in PVR door will also be monitored.
This option allows administrator to create the ‘Conditional Access Rules’ of particular time duration for the access
of doors. These rules can be assigned to the user from user module.
Start-End Time: Specify the time duration for the rule by defining the Start and End time in 24hrs clock format. The
rule will be enabled at the Start time and Disabled by the end time.
Active Days: Enable the required check-boxes for the days for which the rule is to be configured.
Assign Door: Click on the picklist button to select the Door/Door group.
The required Doors/Door Group can be assigned to the rule from the respective picklist button as shown below.
Click on the Ok button to save the door configuration. The assigned door/door group will be displayed in the grid.
Click on the Save button to save the Access Rule configuration. The total configure rules will be displayed on the
right side panel.
Shift Schedules are detailed chart indicating the working hours and break hours of employees. It defines the details
like timing, no. of days, shift rotation, rotation count etc for each shift configured.
It enables the user to group multiple shifts into a single entity called Schedule which can then be assigned to the
employees. With this you can assign different working hours and Off days for each user by defining different
schedules.
Shifts and Schedules allow access to work place according to the user shift schedules only.
Shifts
Shift Code: Specify a descriptive Shift code. For eg. GS for General Shift.
Name: Specify the user friendly name of the shift.
Start Time: Specify the Start Time of the shift in hh:mm format.
End Time: Specify the End Time of the shift in hh:mm format. The Shift duration or the total working hours of the
shift is the difference of end time and start time.
Start Time: Specify the Start Time of the break in hh:mm format.
End Time: Specify the End Time of the break in hh:mm format.
Click on Save to save the configured Shift. Similarly you can configure other shifts. You can click on View list
button to view the list of configured shifts as shown below.
For configuring second week off, select the Off Day 2 from the drop down list(eg: Saturday). If only one week off is
to be given, then select “None” for Off Day2.
Off Day 1: Select the Off Day 1 from the drop down list of Weekdays (eg: Sunday).
Off Day 2: For configuring second week off, select the Off Day 2 from the drop down list(eg: Saturday). If only one
week off is to be given, then select “None” for Off Day2.
Rotation Count: Specify the Rotation Count for rotating single or both week offs as configured.However, Rotation
Count can not be less than 7.
For eg. if Rotation Count is 15 Then the off day on sunday will rotate to monday after the count of 15 days. Similarly
it will continue to rotate further to Tuesday and so on. If both the off days are assigned, then both will rotate
similarly.
Allow Multiple Shift: To allow the User to work in multiple or any of the shifts from the schedule check the Allow
Multiple Shift box.
Deny on Field Break: To deny access on field break days check the Deny on Field Break box.
Deny on Week Off: To deny access on Week Off days check the Deny on Week Off box.
Deny on Rest Day: To deny access on Rest Day check the Deny on Rest Day box.
Deny on Holiday: To deny access on Holiday check the Deny on Holiday box.
Click on Save to save the configured Schedule. Click on View List button to view the list of configured Schedules
as shown below.
The 1st schedule will get assigned to all the users and will be displayed on User configuration page.
But you have to enable it for the desired user from User Configuration> Advance Access Control > Shift
Based Access.
Holiday Schedule is a list of non-working days in a calendar year which are user defined. The user can define up to
32 holidays in a schedule.
Configured Holidays
Holiday No: To add the holidays to the list select the number from the grid.
Holiday Name: Specify the name of the holiday.
From Date: Select the Starting date of the holiday from the calender.
To Date: Specify the Ending date of the holiday from the calender.
The holiday schedule can be assigned to the user from User Configuration> Advance Access Control >
Shift Based Access.
The Panel lite V2 firmware version can be viewed from About page. It also shows IP address and MAC address of
the Panel lite.
The firmware of panel lite can be upgraded manually or automatically from the System Maintenance page. The
Event backup and configuration backup can be taken manually or you can schedule the backup.
System Maintenance enables to take Backup and Updation of Firmware, Restore configuration and manage
System Settings.
Firmware Upgrade
Upgrade For: Select the device for which the firmware is to be upgraded from the drop-down list. The firmware of
PVR Door, ARGO Door, V3 Door and Vega Door(V2)-bluetooth supported Vega will be stored in the memory card
of Panel lite V2. The firmware of other panel doors will be stored in the flash of panel lite V2.
Upgrade To: Click Browse File to browse the file and select the firmware. Click to Upgrade button to upgrade the
firmware.
Network Interface: Select the Interface from the options of Ethernet, WiFi and Broadband with which the
communication is to be established.
FTP Server URL: Enter the URL as the combined path with FTP server address, port and folder name, from where
you want to upgrade the firmware version.
You must specify the URL path up- till COSEC_ DEVICE folder. i.e. if your COSEC_ DEVICE folder is at path ftp://
192.168.107.15/Softwares/COSEC_DEVICE then your URL would be ftp://192.168.107.15/Softwares
The firmware must be placed and available from the configured FTP in the folder structure as
COSEC_DEVICE> Vega Panellite> Standalone
Auto Upgrade: Enable the Auto Upgrade checkbox to automatically upgrade the firmware of panel lite.
If Auto Upgrade enabled, Device will check the latest version of firmware available at FTP at 00:00 AM every day. It
will check whether there is mismatch in the current version stored in device and available at FTP.
Last Upgrade on: It will display the last Date and Time when firmware was installed on device.
Current Version in Panel: It will show the current firmware version stored in the memory of Panel lite.
Click Check Version button to check Current Firmware version in panel lite and Latest firmware version available
at FTP.
Status: It will display the status whether device is connected with FTP server or not.
Latest Version on FTP: It will show the latest firmware version available at FTP.
Then click OK to upgrade. Then wait for the panel lite to reboot. After login, you can check the Current version in
Panel lite which will be upgraded.
Click Default button to default the FTP Server URL, Username, Password, Status and Latest Version on FTP.
Manual Backup
Backup File: The backup of the Event and Configuration can be stored at desired location.
• The Configuration backup will be generated in a zip file which includes configuration of Panel lite, finger
templates and palm templates.
• The Event backup can be taken in Native, XLS or CSV file format. In Native format, a zip file containing
Events folder will be created. If Panel MAC address is 001b0904ac65 then backup file created will be
"0904ac65_02102017.zip
Backup For: Enable the Event and/or Configuration checkbox for which backup is to be scheduled.
FTP Server URL: Enter the URL as the combined path with FTP server address, port and folder name, where the
backup is to be taken.
Specify the User Name and Password of the configured FTP server.
Event File Format: Select the file format as Native, XLS or CSV in which backup is to be scheduled.
Monthly Backup On: Select the date in the month on which backup is to be scheduled.
Schedule Time: Enter the time in hh:mm format at which backup will be taken.
If the Configuration size is > 250 MB; then manual backup or schedule backup may be failed.
Restore
Restore All configurations except: If Network Settings and Users are not required to be restored then select the
respective checkbox. The files can be browsed and restored by clicking Restore button. The file can be restored in
Native file format only.
If the Configuration size of the selected file is > 250 MB; then Restore of file may be failed.
System
The About Device page shows the name of panel lite, firmware version available in panel lite, last build date of
firmware, IP Address and MAC address of Panel lite.
Elevator can be considered as doorways to many organizations, buildings and restricted areas. A person accessing
the elevator can gain access to any floor he wishes. Hence, to increase the security and control for different floors
in a building Elevator Access Control feature must be used.
Configure Elevator1 with 4 floors and Elevator 2 with 4 floors. Now configure an Elevator group say RnD Elevators
which includes Elevator1 with floor1 and 2 and Elevator2 with floor 3 and 4.
This means using Elevator1 you can access floors1 and 2 and with elevator2 you can access floors 3 and 4.
Now users must be authorized to access the elevators by linking them to the Elevator group. So link the RnD
Elevator group from Users Linking tab by selecting the users from the pick-list. Say user Dinesh is linked to RnD
Elevators.
When the user Dinesh comes in the Elevator1, then he has to punch on the authentication device say Door V3.
Once he is allowed the access to Door V3, the floors of Elevator1 (floor1 and 2)for which he is allowed access will
get enabled. The enabling of floor1 and floor2 is done through the output port of IO controller. Hence he can press
the desired floor button.
The IO controller has 8 output ports which can be linked to 8 floors of an elevator.
If an Output Port is already active with EAC Link and IO LINK is activated having same output port, then
priority must be given to IO LINK and the desired port can be activated as per IO Link. The EAC Link will
be deactivated.
The Elevator Configuration page enables to configure elevators in the standalone panel lite whose access can be
given to authorized users only.
This feature is applicable to PVR Door, V3 Door, Wireless, Vega, ARC IO 800, ARGO Door and ARC DC
100 only.
You can configure maximum 24 elevators in one panel lite.
To configure a new elevator click Add button and enter the following parameters.
Number of Floors: Enter the number of floors till which the configured elevator is accessible. You can configure
maximum 64 floors of Elevator. Then click Update to update the rows equal to number of floors in the grid. From
the grid you can do the following settings:
You can also clear the floor details by clicking Clear button from the grid.
Access Duration For Floors: Specify the duration in seconds till which the floor numbers in the elevator will be
enabled for the user to access. After authenticating if the user does not press the floor number within the specified
duration, then he will not be able to access and is required to re-authenticate.
You can assign IO controller Output port to the desired floor of elevator by selecting the IO controller and the port
from pick-list.
Ensure that the same IO controller port should not be assigned to different floors of elevator.
Click Save to save the configured elevator. The created elevator gets displayed in the grid on the main page. Click
View List button on the top right corner to view the list of elevators configured in the panel.
Elevator Floor Group page enables to group elevators and their desired floors and assign them to users for giving
access to the required elevators only.
Configuration
Configuration tab displays a grid containing a list of configured elevator floor groups.
To configure a new elevator floor group click Add button and enter the following parameters.
Group Name: Enter the name for the elevator floor group to be configured.
Elevator: Select the elevator using the pick-list to include in the floor group. The Elevators are configured from
Elevator Configuration.
Floor: Select the floor of the elevator using the pick-list to include in the floor group.
Time Zone Group: Select the time zone group to assign to the elevator floor group. The floors will be accessible
during the selected time zone only. If no time zone is selected then the selected floors of the elevator will be
accessible throughout the day.
Click Update to add the group members in the group. The members will get updated in the grid on the right hand
side. You can add more members to the group. Here Marketing floor of HO Elevator can be accessed throughout
the day.
You can also click View List button on the top right corner to view the list of elevator floor groups configured in the
panel lite.
Users Linking
Users Linking tab displays the elevator floor groups and the number of users linked with respective groups.
Click on the group and enter the following parameters for user linking.
Group ID/ Group Name: It displays the group ID and group name for which users are to be linked.
Group Members
You can select the users based on Access Group or individual Users for assigning to Elevator group.
Access Group: Select the access group using the picklist.The Access group is created from Users> Access
Group.
Users: Select the individual users using the pick-list and checking the respective boxes to be assigned to the
elevator group.
The selected users get displayed in the grid below.
You can click Clear All Users button to clear all the users and access groups from the elevator floor group.
You can also click View List button on the top right corner to view the number of users assigned to a group.
Multi-Level Access enables the user to access multiple doors using single biometric/card reader.
Configuration
Monitor Authentication: You can monitor the live status of all the doors of Panel from MLAT Monitor. For
authenticating the users for accessing MLAT Monitor; you can select following two options:
• User Credential: Select the User Credential option if all normal users are to be given the MLAT monitor
access. The user can show their credential on configured Authentication Device and monitor the status of
doors.
• Password: Select the Password option if only System users are to be given the MLAT monitor access.
The system users will have to provide their username and password on the authorization page after which
they can monitor the status of doors.
Page Time-Out Duration (sec): Specify the time in seconds after which the idle page will become time-out.
Group Label: You can give a name to the group of doors in an area. The default name is Rack.
Door Unlock Timer: Specify the door unlock time in seconds after which the door gets locked automatically. Time
can be specified in the range of 1-999.
Organization Logo: After saving other configurations you can select and upload the logo of the Organization. The
maximum size allowed is 250 KB.
The user can assign racks to the door controllers. For each door, enter the Rack number to be assigned. Upto 255
Rack assignment is supported.
The Panel lite V2 enables you to import data from excel files with predefined format. This would save the end user
a lot of time and effort in making individual data entries at the application level.
Similarly the user can also export data to external applications based on the pre-configured data templates. The
user has the flexibility to select the output formats as desired.
The Reports section enables to view different reports based on Alarms, Device, Access Policies, User and Elevator
Access Control for the selected date range.
The Import feature helps in importing the data from one device or server to the other device. This feature is useful if
you want to upload particular type of data in one go.
Import Data: Select the type of data from the options of User Configuration, Access Group, Shifts, Schedules etc
which is to be imported to the panel lite through the import file.
Click on the Download Sample Import File button to download the sample file. You can open or save this sample
file.Now in this sample file you can enter the data (say for devices) which can be uploaded to the panel lite.
File Format: Select the option of XLS or CSV for the format of file to be imported (uploaded to panel lite).
The excel file imported here has following device configurations as shown below:
The imported data of devices can be viewed from Device Configuration page as shown below:
The Export feature helps in exporting the files from one device or server to other device. This feature is useful if you
want to download (export) particular type of data from panel lite in one go which can be then used to upload in
some other device.
Export
Template Type: Select the template type as Custom or System defined in which data is to be exported.
• For System defined template type; data will be exported in the default template format.
• For Custom type of template you must create template from “Templates” tab.
Template: Depending on the template type; select the template which is to be exported.
• If you select System defined template, then you can select the templates for User Configuration, Access
Group, Shifts, Schedules etc.
• If you select Custom type of template, then user defined templates can be selected from the list. The
Export field list of the custom template will be shown as below.
File Format: Select the option of CSV, XLS or Text for the format of file to be exported.
Text File Separator: If the file format selected is Text or CSV then select the separator for the file.
User Filter: Select the user based on the filter options of Randomly, Access Group and ALL.
You can open the exported file or save the file at desired path.
Templates
The user can define templates for export of data in a customizable format by selecting the Templates tab.
Then click Add button to create the template.
Template Type: Select the type of template from the options of User Configuration, Access Group, shifts,
Schedules, Device Configuration etc.
Click on Add Field. Then select the fields from drop down list and specify respective display names to be added in
the template.
After selecting the required fields; click on Save to save the custom Template.
Reports enable you to view the Alarm, Device, Rule Violation and User details based on the date filter.
Alarm
Click on Generate Report to view the Alarm Report for the selected dates. You can open or save the report at
desired location.
Select the type of door from the dropdown list for which the report is to be generated.
Click on Generate Report to view the Device Report for the selected door.
Access Policies
Report
The Report can be generated for a particular Access policy by selecting the option for the following filters.
Select the From and To Date using the calender button for which report is to be generated.
• Select the Event as Allowed or Denied. Eg: If event is selected as “Allowed” then report will be
generated for Allowed events for the selected Rule.
• Select the specific Access Rule from the drop down list to generate the report based on selected rule.
You can also select the option All to include all the rules.
• Select the Door Wise or User Wise Report Generation filter. The Door/User can be selected randomly
from the picklist.
Click on Generate Report to view the Report for the selected dates.
Here Template based report for 2-person rule allowed is shown as below.
The Report templates can be created based on which report can be generated. You can create maximum 9
templates.Click on Add to create report template.
Select the specific Rule violation from the drop down list to generate the report based on selected rule. You can
also select the option All to include all the rules in the template.
Select the Door Wise or User Wise Report Generation filter. The Door/User can be selected randomly from the
picklist.
Click on Save button to save the configured template. After saving the template; it will appear in Template picklist in
Report tab.
Select the type from the options of Configured Users, Blocked Users, Enrollment Info, Door Wise User, User Wise
Door and Who Is In.
Select the From and To Date using the calender button for Blocked Users and Who Is IN.
Click on Generate Report to view the User Report for the selected type and dates.
Select Date: Select the From and To date using the calendar for specifying the duration for which the report is to be
generated.
Report Type: Select the type of report to be generated from the dropdown list. You can generate elevator wise and
user wise reports.
Select Elevator/User: Select the elevator or user using the picklist for which the report is to be generated. The
elevator picklist contains elevators configured from the Elevator Configuration page. You can also select All to
generate report for all the elevators or users.
Click on Generate Report to view the report for the selected elevators or users.
The Panel lite V2 can be configured to send the preset alerts to its users in response to certain predefined user
events. If such a predefined user event occurs, it will trigger off an alert message to be sent to the relevant user or
users via SMS or E-mail.
The Alert Server parameters must be configured for sending SMS using one the selected SMS service providers. to
set email configurations. Before configuring ensure that an SMTP Server has been set up on the network.
See Topics: Alert Message Configuration and Alert Server Configuration for details.
The Alert Message Configuration enables the user to configure Email and SMS alert messages for Access Control
events, System events and Alarm events.
This page displays all the active events along with default Alert, Alert Schedule and Recipients.
To activate alert for a particular event; select that event from the grid.The alert configuration for selected event
appears as shown below.
You can go back to the event grid page by clicking View List button at top right corner.
Event Type: Select the type of event from the options of Access Control, Alarm and System.
Event: As per the type of event selected; you can select the specific event for which alert message can be
configured.
Active: Select the Active checkbox to activate the alert for the selected event.
Alerts: Select the checkbox for SMS and/or Email alerts to be sent whenever the event occurs.
Alert Schedule: Select the alert schedule as Time Zone or Time Zone Group and select the respective time zone
from the picklist for which alert messages are to be sent.
When client is situated in a time zone other than Alert Service's time zone; Alert Service will take tenant's
time zone into consideration while processing scheduled tasks.
Time Zone and Time Zone Group can be configured from Access Policies> Time Zone.
Message Preview
SMS: The SMS format is displayed in the Message box. Click on Default Message to send the default SMS.
Email: The Email format is displayed in the Email box. Click on Default Email to send the default Email. You can
edit Email Subject, Salutation, Additional Message and Signature.
You can add dynamic fields in SMS and Email by writing the field in tags <>
Recipients
Send To: You can send the messages to Individual, Selected Recipients or Both.
• Individual: The configured alert will be sent to the user for whom event is generated. Eg: If Access
Allowed event for the user James is generated; then the alert message will be sent to James only.
• Selected Recipients: Click the Select Recipients picklist button and select the users to whom alert is to be
sent. You can select maximum 10 users. You can also search the user by entering the name in the field.
Then click Add Recipient button.
• Both: Click the Select Recipients picklist button and select the users to whom alert is to be sent. You can
select maximum 10 users. So alert can be sent to maximum 10 users and 1 individual user for whom event
is generated.
The Alert Server Configuration enables the user to get Email and SMS alerts for Access Control events, System
events and Alarm events.
Test Connection
Email ID: Enter the Email ID of the receiver for testing the connection. Click on Send Message button to send the
test mail.
SMS
UserName, Password: Enter the Username and Password to use the selected SMS service.
Test Connection
Mobile Number: Enter the Mobile Number of the receiver for testing the connection. Click on Send Message
button to send the test SMS.
Click Save to save the Alert Server Settings. You can also click Default to set all the parameters to its default value.
You can configure upto 5 new custom service providers by clicking on Add button.
• Service Provider Name: Enter the name of the new service provider. Eg: Way2Sms
• SMS Base URL: Enter the base url of the service provider as given in the API document. This is used for
sending the message through SMS. Eg: library/send_sms_2.php?
• Request Preview: It displays the preview of URL i.e. Service Provider URL + SMS Base URL + SMS
Arguments separated by argument separator in sequence. The complete URL along with arguments will
be displayed in Request Preview.
• Eg: http://www.way2sms.com/library/
send_sms_2.php?uname=UserName;pwd=Password;To=MobileNumber;Mask=SenderID
• API Argument: Enter the API argument name as specified in the API document of the service provider.
You can add maximum 10 API Arguments. Eg: uname, pwd, To are the arguments specified from the API
document in the above URL.
• Argument Value: Select the argument value from the dropdown list which is to be associated with the API
argument.
• Click Add button to associate API Arguments with the Argument value. The added arguments get
displayed in the grid.
• Argument Separator: Enter the argument separator to be used for firing a command.
• Request Method: Select the method for sending the message via sms. The options are: Post and Web. If
Post is selected, you can send long messages without any limitation. If Web is selected, you can send only
short messages.
• Check Balance: Select to allow balance check, if the service provider needs to use it. And enter the
corresponding API.
• Click Save button to save the settings.
The Account Management allows you to configure user accounts of Admin, HRD and Operator types and give them
different access rights of accessing features of Panel lite V2 as per the requirement.
You can configure password policy i.e. the minimum password length with the required strength as well as
password expiration and lockout policy. The password of Panel lite can be changed from Change password page.
User Account Management allows defining all the parameters pertaining to a user, such as user name, password,
user type (i.e. admin, hrd, or operator); and based on the user type, authorizing the user to configure a device.
The Admin, Hrd and Operator are the default user accounts. You can create upto 7 user accounts.
User
To create the new user account click on the user number from the grid.
User Type: Select the User Type as Admin, Hrd or Operator to be alloted to the created user.
The Access Rights to the user can be assigned depending on the user type. The rights can be assigned by
selecting the checkbox against the respective functionality.
You can set the policy for configuration of password from the Password Policy page.
The password of the device can be changed through Change Password tab.
HRD Password
The administrator can default the HRD password by clicking on Default HRD password icon.
The administrator can change the admin password of Panel Door by specifying new password here.
In SNMP (Simple Network Management Protocol), when a manager requests information; SNMP agent (server)
sends that information to the manager.
Also, an Agent can send Trap messages to the manager without any GetRequest command. In Trap messages
there is no need of acknowledgement.
When specific event occurs; a TRAP or Inform message will be sent to manager from Agent. The message can be
Information, Warning or Error.
This SNMP Configuration page is used for configuring panel lite V2 as an SNMP agent and to create Management
Information Base (MIB) for SNMP.
Request
Port: 161
Response
Manager Agent
(Client) (Server)
Notifications
Port: 162
This SNMP Configuration page is used for configuring panel lite V2 as an SNMP agent and to create Management
Information Base (MIB) for SNMP.
MIB file manages all the information which is exchanged between Agent and Manager. Any sort of Status or
Information that can be accessed by the manager is defined in the MIB.
SNMP Settings
Enable: To activate the SNMP settings; enable this checkbox. When it is enabled; system will process the incoming
SNMP messages or outgoing messages.
You can download MIB file even if Enable checkbox is unchecked.
The user is required to download the MIB file from the panel lite and upload the same MIB in the Manager
so that it will be loaded in the tree.
SNMP Listening Port: It is the UDP port on which system starts listening for incoming SNMP messages.
By default, Port is 161 which is standard UDP port assigned for SNMP.
SNMP Version: Select the desired SNMP version as the network infrastructure.
• SNMPv1- Trap message only (no need of acknowledgement).
• SNMPv2c- Trap and Information (acknowledgement required) message both.
• SNMPv3- Privacy enabled
System Name: Enter the System Name which is useful in discovery process of the Agent for SNMPv1 and
SNMPv2c. Maximum 40 characters is allowed.
"For this, system should support "SNMPv2-MIB".
System Contact: Enter the Contact information which is useful in discovery process of the Agent for SNMPv1 and
SNMPv2c. Maximum 40 characters is allowed.
"For this, system should support "SNMPv2-MIB".
Allow Access to SNMP Manager from: Select the option as Any IP Address to allow all IP Addresses
(Managers) to allow accessing the system using SNMP or only Specific IP addresses (specific Managers) to
access the system.
• Any IP Address: If this option is selected, then Manager with any IP Address will be allowed to access the
system (SNMP Server).
• Specific IP Addresses: If this option is selected, then system will process the incoming message only if
received Source IP Address is from the configured Manager's IP Address in "IP Address 1" to "IP
Address 5" field.
Community Name: This Community Name is used only for SNMPv1 and SNMPv2c and works as password. You
have to enter this community name in manager login. It is used for both Read-only operations and Trap/Notification
in SNMPv1 and SNMPv2c. The System will process the incoming message only when received Community
matches with programmed Community String in the system. Maximum 40 characters is allowed.
Security Settings
User Name: The User Name is used for Authentication and Privacy in SNMPv3. It is used for both Read-only
operations and Trap/Notification in SNMPv3. Maximum 40 characters is allowed.
Security Type: It provides the Security Type currently used for SNMPv3. You can select the following options:
1. No Authentication-No Privacy
This should be used when Authentication and Privacy is not required.
Authentication Algorithm: It provides the option for message digest algorithm. When Security Type is selected as
"Authentication without Privacy" or "Authentication with Privacy"; then you can select Authentication algorithm as:
• MD5: It is a message-digest algorithm which uses 128 bits and it is selected by default.
• SHA: It is a Secure Hash Algorithm. It is a message-digest algorithm which uses 160 bits.
Privacy Algorithm: When Security Type is selected as "Authentication with Privacy"; then you can select Privacy
algorithm as:
• DES: It is an encryption-decryption method which uses 56 bits and it is selected by default.
• AES-128: It is an encryption-decryption method which uses 128 bits.
Privacy Password: It is a password used for privacy with selected Privacy Type.
Notification Settings
Enable Notification: Enable this check-box to enable or disable the Trap/Notification. If this check-box is enabled
then system will generate Notification message (Trap/Inform) as per version selected and Notification Filter settings
when any error condition is occurred.
• For SNMPv1: Trap message is generated
• For SNMPv2c: Trap or Inform message is generated as selected in Notification Type
• For SNMPv3: Trap or Inform message is generated as selected in Notification Type
Notification Type: Select the notification type as Trap or Inform. Notification Type is applicable only for SNMPv2c
and SNMPv3.
• Inform is used when it is required to send notification message with acknowledgement. In this case if
acknowledgment is not received then system will keep retransmitting Inform message as per Retry
parameters.
Destination IP Address: It is the host IP Address i.e. IP address of SNMP Manager (Browser) where you wants to
receive Trap/Inform messages.
Destination Port: The Port is 162 which is standard UDP port assigned for SNMP Trap/Notification in the PC
where SNMP Manager is running.
Retry Attempts: It is applicable when Notification Type is selected as “Inform”. It specifies the number of count
the system will retransmit the request if no acknowledge/response is received from Manager. This is applicable only
for SNMPv2c and SNMPv3.
Notification Filters
System offers filters to send the Trap/Inform messages. Below Category/Filter is provided:
• Door Events
• Alarm Events
• System Events
Each filter option contains severity as:
• Information
• Warning
• Error
The Monitor displays the door status as Offline, Online, Upgrade and Degrade mode. Also different types of Actions
can be performed on the door.
Door
Door Selection
The door can be searched by entering the door name or its IP/RS-485 address in Search field. The door can also
be searched by selecting the Door type from the drop down list.
The devices can also be filtered on the basis of their Status. You can select the icon of Online Devices, Offline
Devices, Devices in Degrade State, Upgrading Device, Alarms on Device. By default All Devices are selected
and shown in the list.
The count of the different door status represents the total number of doors belonging to the respective status. For
example: If Online devices shows count as 3; then total 3 doors are online.
The right side on the Door page shows the details of device depending on the door type which is hovered.
The command can be sent to the Panel lite V2 by clicking on Select Command button as shown above.You can
Reset Aux O/P Latch, Reset Device and Reset Access Policy by selecting the respective commands.
When user violates an access policy he is denied access on the Panel lite V2 if hard violation is configured for
access policies So you can reset the Access policy to allow the access to the user.
When the Reset Access Policy is selected; then Reset Access Policy page appears as shown below.
Anti-Pass Back:
• For APB; if user's last punch is Entry punch on device and then APB is reset for that user then user's
punch status will become unknown.
• User will be allowed to mark Entry/ Exit punch without considering prior punch. After Entry/ Exit punch APB
will work as before.
• Also, whenever APB is reset for any user Occupancy of Device will not be increased/ decreased at that
moment. When user punches on device after resetting APB if Entry Punch is found then Occupancy will be
increased and if Out Punch is found then Occupancy will be decreased.
IO Link
All types of active IO Links configured on the device can be viewed here with name and output type. User can reset
only the "latch" type of IO Links. By default, this page is available only to a user with administrator rights.
Alarms
Alarms displays various alarms which have been activated on the system. It also provides the user with the option
to acknowledge or clear these reported alarm conditions.
For generating Alarm, the Alarm must be enabled from Advance Profile and Door Configuration.
• The Date and time at which alarm generated with the description of Alarm is displayed in the list.
• The Category of the alarm and status is displayed in the list.
• To acknowledge the alarm, click the button in Acknowledge column for the respective alarm.
• To clear the alarm, click the button in Clear column for the respective alarm.
Live Events page enables to view the events occurring at device with auto refresh in 3s.
Filter
To view the particular event on the Live Events page, click the Filter and select the checkbox for the respective
event.
The generated events will appear in the list. The details of events like Date and Time, event type, device, source
and description will appear on the page.
Click on the Manual Refresh button to get new live events as per the selected filter.
The log maintains a record of occurrence of events, such as User allowed, user denied, door events, alarm events,
system events etc.; along with the date and time of its occurrence.
Search Criteria
The event log can be filtered as per the date, time and type of the log.
Select the From date and To date from the calendar button to view the log for selected dates.
Set the From and To time by up-down arrow buttons.
Select the type of log as User allowed, User denied, Door, Alarm and/or System.
Display Log
The event log will be displayed along with the date and time of generation. The Type of event, Device, Source and
Description is also displayed.
You can view the events on other pages by scrolling the arrows.
Backup
The backup of the event log can be taken in XLS, CSV or text format and saved at the desired location on the PC.
MATRIX COMSEC
Version 15, January 2020
Head Office:
394-GIDC, Makarpura, Vadodara - 390010, India.
Ph:(+91)18002587747
E-mail: [email protected]
www.matrixaccesscontrol.com