If you encounter a problem that is not discussed in available Avigilon Access Control Manager
user guides or online help files, and need technical support, please contact your local Value
Added Reseller (VAR) or Avigilon support (888.281.5182).
When contacting your VAR, please be sure to have your registration material, serial number, and
software version number available.
Thank you for your purchase of the Access Control Manager software.
This configuration and workflow guide will walk you through the steps required to connect and
configure your new Access Control Manager system.
This is not a comprehensive guide of every feature and field in the system. For that, you can
review the Access Control Manager online help files. This guide handles the initial setup of your
system through the Access Control Manager appliance and bypasses some of the advanced
features and tasks that you may want to use later but don’t really need initially.
To that end, we begin with a flowchart of the steps you should take to get your Access Control
Manager system up and running.
We hope you enjoy your user experience with the Access Control Manager.
1
Flowchart
page 3
page 93
page 21
page 19
page 37
page 35
page 33
page 44
page 41
page 53
page 76
page 13
page 49
page 71
page 57
page 77
page 88
page 46
page 31
page 96
page 94
page 90
page 55
page 73
page 65
page 98
page 101
page 87
page 51
page 39
The flowchart below shows the basic steps you should follow to complete the setup process.
2
Access Control Manager Workflow
1
Express
Enterprise
The following workflow is divided into sections and subsections representing the steps you will
take in configuring the Access Control Manager system.
Connecting and Accessing the Access Control Manager
Appliance
Required Items
This is a list of items you will need to configure your new Access Control Manager appliance:
•Access Control Manager Appliance (or Access Control Manager Virtual Appliance DVD
with License)
•Power Cable
•Crossover Cable (not included)
•Static IP address
•Domain Name Server that will be responsible for resolving the static IP address to a name.
Configuration Procedure
1. Connect the power cord to the power connector on the Access Control Manager
appliance then plug the other end into an available electrical outlet.
If this is a Access Control Manager virtual appliance, skip Steps 1 and 2.
3
2. Connect the Access Control Manager appliance to a computer using the crossover
Express
Enterprise
Crossover Cable
(sold separately through third-party retailers)
Connect to Port 2
Crossover Cable
(sold separately through third-party retailers)
Connect to Port 2
cable to Port 2 of the appliance.
3. On your connected computer, open a web browser and type the appropriate address
into the address bar.
For the express and enterprise appliance, enter this address:
https://169.254.1.250
For the virtual appliance, enter this address:
https://169.254.1.201
4
At this point, you will probably see a message indicating that you are trying to reach an
If this is Internet Explorer:
If this is Safari:
If this is Firefox:
If this is Chrome:
Enter admin
in each field
unknown or insecure site, like these examples:
4. Do one of these things:
5. Enter these default values in the corresponding fields:
•If this is Firefox, click the “Or you can add an exception...” or “I understand the
risks” link, click the Add Exception button, click Get Certificate, then click Confirm Security Exception button.
•If this is Windows Explorer, click the “Continue to this website (not recommended)”
link.
•If this is Safari, click the Continue button.
•If this is Chrome, click the Proceed Anyway button.
This brings you to the login screen like this example:
5
Login: admin
Password: admin
NOTE: We highly recommend that you change the login and password for the
system administrator account as part of the configuring of your new
appliance.
6. Press Sign in.
The home page appears like this example:
7. From the Setup section in the upper right corner, click Settings then System Settings.
8. Make changes as required to the language displayed as well as the token expiration
time and the password strength, as required.
9. From the Setup section, click Appliance.
The Appliance page appears like this example:
10. Enter a Name, Host Name, Domain Name, and any other values you need to set.
If you need to change any other fields, they include:
NameEnter a descriptive name for this appliance.
System NameThis read-only field designates the name of the entire Access
Control Manager system.
6
Host NameThis is the DNS name for this appliance and is identified as
such under the 'DNS Name' field on the Appliance Listing
page.
Domain NameEnter the domain name where this appliance resides.
Name ServerEnter the name of the domain server.
Time ServerEnter the time server connected to this appliance.
Time zoneFrom the drop-down pick list, specify the time zone where this
appliance resides.
Use Daylight Savings
Time
Enable Remote TCP/
IP Management
Enable SNMPClick this box to enable SNMP functionality for this appliance.
SNMP VersionFrom the pick list, select the version of SNMP being used for
SNMP ContactEnter the name of a contact that will oversee and collect
SNMP LocationEnter the location where the SNMP server resides.
Splunk URLEnter the URL where the Splunk application resides, if
Stored TransactionsEnter the maximum number of transactions that can be stored
Check this box to indicate that this appliance uses Daylight
Savings Time, when appropriate.
Check this box to indicate that this appliance can use remote
TCP/IP management. By default this feature is checked and
enabled, since the configuration or operator often needs to
access this appliance via the internet.
this appliance.
SNMP data.
appropriate.
on the appliance.
When the number of transactions exceeds this limit, new
transactions will start overwriting previously stored
transactions.
The default is 1,000,000 transactions.
Hardware TypeFrom the drop-down pick list, select the Access Control
Manager Appliance model. Available options are: Express,
Enterprise, and Virtual.
Web Server PortSpecify the port number that is used to connect the web
server to this appliance.
Service PortSpecify the port number that is used to access diagnostics
and service for this appliance.
Edge Listen PortSpecify the port number that accesses the listening feature on
this appliance for HID Edge panel communication.
Ldap Connect PortSpecify the port number that enables communications
between this appliance and other IP network-attached entities
using LDAP information service protocol.
This field is only applicable for LDAP devices.
Transactions Connect
Port
Specify the port number used for connecting to the Postgres
transaction database for ODBC connections.
7
Mercury Client PortSpecify the port number used to set the port you wish this
appliance to use in order to listen for IP client panel
connections.
Note: This must be the same port configured on all of the IP
Client panels that will connect to this appliance.
Mercury-Require TLSCheck this box, if required, to encrypt connections between
the appliance and the Mercury Panel.
Note: All IP client panels connecting to this appliance must be
configured for 'TLS Required' if this option is checked
SMTP ServerEnter the mailbox server for this system. This is the name of
the server that handles the transfer of email. This field and the
next four are required before email alerts can be sent
automatically in case of an alarm or event occurs.
SMTP PortEnter the name of the port that the Host uses to connect to the
SMTP Server.
SMTP Host NameEnter the name of the host used for SMTP traffic.
Use Start TLSCheck this box to indicate that this appliance uses Start TLS
cryptography to communicate with the SMTP server.
Use TLSCheck this box to indicate that this appliance uses generic
TLS cryptography to communicate with the SMTP server.
SMTP FromEnter the email address of the person or organization that
email will be from.
SMTP UserEnter the email addresses of persons or organizations to
which email alerts are sent in case of alarms.
SMTP PasswordEnter the password required to use the email server.
PartitionsFrom the window, click to highlight one or more partitions that
are assigned to this appliance.
Only those partitions previously defined for this system
appear in this window. If no partitions are defined for this
system, this field does not appear.
11. Click the button to save changes.
8
12. Click the button.
First click the Save
button then click
the Reboot
Appliance button.
EULA must be
completed before
you can install
the hardware
13. Once the appliance reboots, click the About tab.
The About page appears like the following example.
The essential information about this appliance, including the appliance license string
and key are displayed.
14. For initial setup, click the “View End User License Agreement Terms and Conditions”
link.
9
The Software Terms and Conditions form appears like this example:
15. Review the terms then enter the name of this company, the name of the administrator
or owner, and the title of the person whose name appears here, then click Back.
16. Reboot the appliance as explained in Step 10, then click Logout at the top of the page
to log out of the appliance.
17. Log in and click on Appliance.
The Appliance property sheet appears.
18. Click on the Ports tab.
The Ports page appears like this example:
19. Click on the Port-1 name.
The Port-1 edit page appears like this example:
20.At the ‘IP Address’ field, enter the selected static IP address.
This IP address should be in the range of your LAN. If needed, consult your IT
administrator for an appropriate address.
10
If you need to change any other values, they include:
Check the appropriate
boxes
All changes must be saved by pressing this button
before exiting a screen or changes will be lost
NameThis field contains the name of the Ethernet port. Initially, the name that
appears is the current or default name of the port; however, you can
enter a new name if you require.
Link StatusThis read-only field indicates whether the connection is currently up or
down.
IP AddressEnter the IP address for this port. If you aren't sure what the address is,
consult your IT administrator.
If you assign or change an IP address, make sure that any switches or
routers on the appliance's network recognize the changed address. To
do this, either reboot the appliance, or unplug the Ethernet cable, wait a
few seconds, then plug it back in
NetmaskSelect from the drop-down list the netmask required for addressing this
connection. The values are 0 - 32 bits where a 24-bit netmask is the
default value.
Network
Gateway
MAC AddressThis read-only field displays the MAC address for this field.
InstalledCheck this box to indicate that this Ethernet port is already connected to
Data rateThis read-only field specifies the current data rate detected for this
Enter the gateway address of this appliance.
a panel.
connection.
21. Save your changes, reboot the appliance, and log out.
22.Log into the appliance again and click on the Appliance link.
23.From the property sheet, click the Access tab.
The Access page appears like this example:
24.Place a check mark in each box you need under the ‘Installed’ column.
At present this means checking Mercury Security. This enables the appliance to allow
for the configuration of the Mercury Field hardware devices.
25.Click to save your changes.
26.Connect the appliance to the network in this manner:
11
a.Remove the crossover cable and move the appliance to its required position in the
Express
Enterprise
system.
b.Using a standard Ethernet cable, connect one end of the RJ-45 to an available RJ-
45 port on the appliance.
c.Connect the other end of the Ethernet cable to the network.
If this is a Virtual appliance, ignored this step.
NOTE: Access Control Manager only supports connectivity to Mercury controllers through IP.
Serial connectivity to these panels is not currently supported.
12
Panels
2
After setting up the appliance, your next step is to configure the panels to which this appliance is
connected. For this document, we are only interested in Mercury Security panels.
To configure Mercury Security panels:
1. From the icon task bar of the home page, click on Physical Access then click on Panels.
2. Click the button to add a panel.
The Panel Add page appears like this example:
3. Assign the new panel a name, choose an appliance, and select Mercury for vendor
type.
New fields appear like this example:
4. Place a check mark in the ‘Installed’ checkbox.
5. At the ‘Model’ pick list, select your panel model then choose your time zone.
While Mercury panels appear in this list, you can also configure Lenel panels. A table of
equivalency is shown below:
LenelMercury
LNL-500SCP-C
LNL-1000SCP-2
LNL-2000SCP-E
LNL-2200EP1502
LNL-3300EP2500
LNL-2210EP1501
LNL-1100MR16in
LNL-1200MR16out
13
LenelMercury
LNL-1300MR50
LNL-1320MR52
—MR51e
6. Leave the rest of the fields at their default settings and click to save your
settings.
The Sub-panels page appears like this example:
7. Choose the appropriate quantity of downstream panels attached to this master panel.
8. Click to save your settings.
The Panel Configure page appears like this example:
9. Make changes, if required, and click to save your settings.
The fields on this page include:
NameEnter a unique name that identifies the panel.Duplicate
names are not allowed.
Physical
Location
ApplianceThis read-only field displays the panel model to which the
VendorThe read-only field has the Mercury Security option selected
InstalledCheck this box to indicate that this panel is communicating
Enter a description of the location of this panel.
subpanel is connected.
from the drop-down list.
with the appliance.
14
PartitionsFrom the window, select one or more partitions to which this
panel will be assigned.
Only those partitions presently defined by this system appear
in this list.
ModelThis read-only field displays the Panel model to which the sub
panel is connected.
Time zoneIdentifies which time zone applicable to the panel.Select the
time zone from the drop-down list. Only those time zones
previously defined for this system can appear in this list.
Allocate space for:
CredentialsDefines the amount of credentials that can be in the
panel.Enter a number between 0 and 100,000 where the
default value is 10,000.
The more credentials you designate, the less room there will
be for events.
EventsDefines how many events to buffer in the panel.Enter a
number between 0 and 5,000 where the default value is
5,000.
The more events you designate, the less room there will be for
credentials.
DB VersionThis read-only field indicates the version of the Access Control
Manager database currently used by this panel.
10. Click on the Host tab and configure the host communication settings.
11. Enter the primary IP address for the panel.
Leave the rest of the settings as default. However, if you need to change any of them,
the fields on this page include:
NameIdentities the name of the present panel.
ApplianceRead-only field that Identities the name of the selected
appliance.
InstalledCheck this box to indicate that the panel is currently running
and the application can begin to poll it.
15
PartitionsFrom the window, select one or more partitions to which this
Click this button
panel will be assigned.
Only those partitions presently defined by this system appear
in this list.
IP AddressEnter the IP address of this panel.
Reply TimeoutFrom the list, select the number of milliseconds this panel is
allowed to wait for a reply from the primary Access Control
Manager host.
Offline TimeoutFrom the list, select the number of milliseconds this panel can
remain offline (disconnected from the host) before the panel
attempts to contact an alternative host, if one exists.
RetriesFrom the list, select the number of retries allowed before this
panel stops polling the host and attempts to connect the
alternative host, if one is configured.
Poll DelayDefines the number of milliseconds it is required for the panel
to wait between polls.
12. Click to save your settings.
Once the previous settings have been saved, the system returns to the Panels Listing
page. You should see that the panel you created is online.
13. Click on the Panel name to get to Panel Edit screen with the Panel Status page displays.
14. On the Status page, click on the Firmware button like this example:
16
The Firmware listing like this example:
Click this button
15. Locate the firmware for the panel you installed and configured, then click the green
check mark to download the firmware to the panel.
NOTE: For instructions on copying firmware to your host computer, refer to the
Access Control Manager online help.
The system asks you to confirm that you want to download the firmware to the panel.
16. Click Ye s .
The firmware is installed. This takes approximately five minutes.
17. Once the firmware is installed, click the Reset/Download button and allow one minute
for the panel to reset and an additional two minutes for the parameters and tokens to
download.
Panel Add Summary
To summarize the panel configuration process:
1. Add the Panel and configure required settings
2. Once installed go to the status screen for the panel and install the latest firmware
(approximately five minutes).
3. Once the firmware is installed click the reset button and allow 1 minute for the panel to
reset.
4. After the panel has completed resetting, click the download parameters button and
allow the parameters to download which takes approximately two minutes.
5. After the parameters are completed downloading click the download tokens button.
17
6. Proceed to add Areas (page 19).
If you do not require areas in order to define the doors, you can skip Areas and go
directly to Doors (page 21).
18
Areas
3
Areas are zones the Access Control Manager assigns to define a physical area within a secured
location. This area can be relatively small, like a lab or a store room, or large, like a collection of
buildings. Areas often incorporate one or more doors with their attached inputs and outputs. Once
an area is defined, it can be assigned to a role or policy indicating that portion of a facility or
company to which assigned users are limited.
For example, a scientist works in an area designated as Laboratory A. As long as he accesses
doors leading into or exiting that area, he is granted access. But if he attempts to enter an area
designated as Administrative A, he is denied access.
To define an area:
1. From the icon task bar on the home page, click or mouse-over Physical Access.
The Physical Access main page appears.
2. Click the Areas submenu option.
The Areas Listing page appears like this example:
3. Click the button.
The Area Add page appears like this example:
4. Fill in the fields as required.
19
These fields include:
ApplianceFrom the drop-down pick list, select one of the existing
appliances in which this area appears.
Only those appliances currently defined for this system appear in
this list.
NameEnter the name of this area
Maximum
Occupancy
Log Min ReachedRecord a transaction when the minimum count for this area is
Log Max ReachedRecord a transaction when the maximum count for this area is
Enable AreaCheck this box to enable use of this area definition.
2-Person ControlCheck this box to indicate a two-person rule is imposed for this
PartitionsSelect one or more partitions from the partitions list. This includes
Enter the maximum number of cardholders allowed in this area at
a specified time.
reached.
reached.
area.
When checked, two or more people must be in the area at times
when occupied. When the area is empty, two valid cardholders
must present their credentials to the entry reader before entry is
granted. Once occupied by two or more people, individual
access can be granted. The same rules apply for exit until two
cardholders are left in the area; at this point, both cardholders
must present their credentials and exit the area together.
those partitions in this area definition.
Only those partitions currently defined for this system appear in
this list.
5. Click to save these values.
A message appears “Area was successfully created” and the Areas Listing page
reappears with the newly added area on the list.
20
Doors
4
After you have configured both the appliance and the panels it controls, it is time to create and
configure each door associated with the created panels.
To create and configure doors:
1. From the icon task bar on the home page, click Physical Access.
2. Click Doors.
The Doors Listing page appears like this example:
3. Click the button.
The Door Add screen appears like this example:
4. Enter the following information:
• Door Name
• An Alternate name (optional)
• Location (optional)
5. From the ‘Appliance’ pick list, select the appliance to which this door is connected.
6. From the ‘Vendor’ pick list, select the vendor.
In this case, you should select Mercury Security.
21
The Door Add page expands to include basic door configuration values, like the
following example:
The fields on this page include:
NameEnter the name of this panel.
PartitionsFrom the window, select the partitions to which this door
should be added.
Only those partitions currently defined by the system appear
in this window.
Alt NameEnter a description of this panel, such as 'front door' or 'lab
door'.
AddressThis is a display-only field that is generated by the Access
Control Manager.
LocationEnter the location of this door.
ApplianceFrom the drop-down pick list, select a appliance to which this
door is connected.Only those appliances previously defined
by this system appear on this list.
PanelSpecifies the panel to which the door is to be assigned. Select
one of the previously defined panel from the drop-down list.
Ven dorSelect the appropriate door manufacturer from the drop-down
list.
Currently, the only option is Mercury Security.
InstalledCheck this box to indicate that this door is communicating with
the panel.
Access TypeSelect the Access Type from the drop-down list.
Note: If the access type is a paired door (paired master or paired
slave), the Door Add page re-displays with the additional
field, Paired Door. Select the Paired Door option from the
drop-down list.
Door ModeSpecifies the entry mode for the door when online with the
host. Select the Door Mode option from the drop-down list.
22
Offline ModeSpecifies the entry mode used for the door if the door
controller is no longer communicating with the panel.
Note: In many cases, the limited memory of most readers in offline
mode requires a very simple solution to entry or exit, such as
use of a facility code.
Select the Offline Mode option from the drop-down list.
Custom modeFrom the drop-down list, select the special mode to use during
a time zone specified in the 'Custom Schedule' field. For
example, during normal working hours, it might only be
necessary to use a card only entry at a particular door,
whereas after midnight, you would enforce PIN code and card.
Custom
Schedule
Mask Forced
During
Mask Held
During
Always Mask
Forced
Always Mask
Held
Door Processing Attributes
Log Grants Right
Away
From the drop-down list, select the interval during which the
custom mode specified above is activated. Only those time
zones previously defined for this system appear in this list.
From the drop-down list, select the time during which this door
is masked even when a forced open condition is detected.
Only those schedules previously defined for this system
appear in this list.
From the drop-down list, select the time during which Door
Held Open alarms from this door will be masked. Only those
schedules previously defined for this system appear in this list.
From the drop-down box, select TRUE to specify that Door
Forced Open alarms at this door are always masked. Normally,
this box is blank.
From the drop-down box, select TRUE to specify that Door
Held Open alarms at this door are always masked. Normally,
this box is blank.
When this box is checked, the system logs an extra event as
soon as there is a grant (that is, before entry / no entry is
determined). This event is not turned into a Access Control
Manager event. Check this box in order to initiate local I/O in
the panel using the panel triggers.
Certain customers may have a trigger they want to fire (to
execute a macro) as soon as there is a grant, but before entry
/ no entry is determined.
Deny DuressIf a user indicates duress at a door, checking this box denies
access.
Don't Pulse Door
Strike on REX
Require Two
Card Control
Check this box to disable the pulse of the door strike output
when the request-to-exit button is pressed.This can be used
to effect a 'quiet' exit. If this box is not checked, the output is
pulsed.
Check this box to specify that two tokens are required to open
this door. This enforces two-person rule at a specified door.
23
Door Forced
Filter
Check this box to enable the filter feature for door forced
alarms. There are instances when a door is either slow to
close or is slammed shut and bounces open for a few
seconds. With this filter, the monitor allows three seconds for a
door to close before issuing an alarm.
Log All Access as
Used
Detailed EventsCheck this box to generate detailed events of all hardware at
Enable Cipher
Mode
Use Shunt RelayCheck this box to enable the use of a shunt relay for this door.
Do Not Log Rex
Tra nsactions
Check this box to log all access grant transactions as if the
person used the door. If this box is not checked, the door
determines if it was opened and will distinguish if the door was
used or not used for grant.
the door including door position masking, timer expirations
and output status. Typically, five to ten detailed transactions
will be generated for each grant transactions. During the
normal course of operation, most guards don't need to see
extensive reports on events; however, after hours, it is often
useful to see every detail.
Check this box to enable cipher mode. Cipher mode allows
the operator to enter card number digits at the door’s keypad.
Check this box to indicate that return-to-exit transactions are
not logged by the system.
7. Choose the following for basic door configurations values:
• Access Type: Single
• Door Mode: Card Only
• Offline Mode: Facility Code Only
• Unlock During: Never Active
8. In the ‘Door Processing Attributes’ section, choose the appropriate settings.
9. Click to save your settings.
The Operations page appears like this example:
The fields on this page include:
NameIdentifies the door.Enter a unique name that identifies the door.
24
Alt NameIdentifies an alternate name for the door. If there is an additional
name the door is identified by, enter this alternate name.
LocationIdentifies the location of the door.Enter a description of the door’s
location.
ApplianceIdentifies the appliance of the door.This is a display only field when
in edit mode.
VendorIdentifies the vendor of the door.This is a display only field when in
edit mode.
InstalledCheck this box to indicate that this door is currently connected and
communicating with the panel and appliance.
PartitionsFrom the window, select the partitions to which this door should be
added.
Only those partitions currently defined by the system appear in this
window.
PanelSpecifies the panel the door is assigned to. This is a display only
field when editing the hardware (the panel can be changed when
editing the door operations).
APB ModeIndicates the anti-passback mode for the door. Select the APB
Mode from the drop-down list. The available options are:
No Selection – The specified door is not involved in APB at all.
Grants do not take APB into consideration at all.
Soft area APB – The specified door should have an area entering
and area leaving configured for it.
Hard area APB – The specified door should have an area entering
and area leaving configured for it.
Door-based timed APB – The specified door should not have an
area entering or area leaving configured for it. There should be a
timeout value configured for the door (a value entered in the 'APB
Delay' field).
Token-based timed APB – The specified door should not have an
area entering or area leaving configured for it. There should be a
timeout value configured for the door (a value entered in the 'APB
Delay' field).
Timed area APB – The specified door should have an area
entering, area leaving, and timeout configured for it.
APB DelaySpecifies the number of seconds before another entry is allowed.
Enter the number of seconds.
Area EnteringIdentifies the area the user enters when entering through the door.
If no area is specified, any location is valid. Select the area from the
drop-down list. Only those areas currently defined for this system
appear in this list.
Area LeavingIdentifies the area the user moves into when exiting the door.
Select the area from the drop-down list.In addition to the Don't
Care option, only those areas currently defined for this system
appear in this list.
25
Strike ModeDefines when a door should unlock. Specifies if the strike is
deactivated when the door is opened, when the door is closed, or
when the strike timer expires. Select the strike mode from the
drop-down list.
Cut short when open – the strike is deactivated on open
Turn off on close – the strike is deactivated on close.
LED ModeSpecifies how the reader LEDs are to be displayed. Select the LED
mode from the drop-down list.
Your choice is 1, 2, or 3.
Held Pre-AlarmSpecifies the number of seconds before the held open alarm is
generated. Once the number of seconds is reached, a transaction
will be generated which can be used to activate a warning signal.
Enter the number of seconds.
Access time
when open
Standard
Access time
Held OpenSpecifies the number of seconds before the held open door event
Extended
Access
Extended HeldSpecifies the number of seconds before the held open door event
Card FormatsSpecifies card formats compatible with the reader at the door.
Specifies the minimum number of seconds the strike will be
activated. Enter the number of seconds.
Specifies the standard number of seconds the strike will be
activated. Enter the number of seconds. If the door is not opened
within this interval, the door is automatically locked.
is generated. Enter the number of seconds.
Specifies the strike time for a door configured for persons that
require more time to enter. For example, persons covered under
the Americans with Disabilities Act may require extended access.
Enter the number of seconds.
is generated for tokens marked with extended access. Enter the
number of seconds.
10. Configure these door attributes as required:
•Anti-passback settings
• PIN attributes
•Strike Mode
• Access times
• Card format settings
Other fields on this screen, such as the ‘Simple Macros’ section, represent advanced
functions and should be consulted in the Access Control Manager Online Help.
11. Click to save these values.
26
Loading...
+ 89 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.