Cisco Identiv ICPAM EM-100 Quick Start Manual

“We need to
What Is ICPAM?
Identiv Connected Physical Access Manager (ICPAM)
is a management application for physical access that
integrates into the Cisco ecosystem. ICPAM is used to
congure Identiv Physical Access Controllers and
uTrust TS Readers, monitor activity, enroll users,
create identication badges, and integrate with
security and IT applications and data stores.
What Is Included in the ICPAM Kit?
The ICPAM Kit contains the following:
• Identiv EM-100 Physical Access Controller
• One of the following uTrust TS Readers:
• Wall Mount
• Mullion
• Key Pad
• ScramblePad
Where to Get the Software
The ICPAM Software is available as a download from: identiv.com/icpam-support
This is an OVF le to be installed on either a Cisco UCS Server or a VMWare ESX v.5.x with the following:
• 4 vCPUs
• 16 GB RAM
• 500 GB of available disk space
• See the "System Requirements" in the ICPAM Installation Guide
ICPAM Quick Start Guide
Where Is ICPAM on the Network? How to Install ICPAM Hardware and
Default Settings for EM-100 Controller
IP Address: 10.19.4.129
Subnet: 255.255.0.0
Back Access IP Address: 169.254.242.121
Username: admin
Password: identiv123
How to Contact Support
Web: identiv.com/icpam-support
Email: support@identiv.com
Toll-Free Phone (North America): +1 888-809-8880
Step 1: Install the server hardware. For a Cisco UCS server, see
the Cisco Unied Compute System (UCS) User Guide. For a server running VMware, see the “System Requirements” topic in the ICPAM Installation Guide.
Step 2: Design and congure your security network. See the “Network Design Requirements and Recommendations” section in the ICPAM Installation Guide.
Step 3: Install and congure the ICPAM Server software. See the “Installing and Conguring the ICPAM Server Software” section in the ICPAM Installation Guide.
Step 4: Install the JRE and the ICPAM Client software. See the “Installing the Necessary Version of the Java Runtime Environment and the ICPAM Client” topic in the ICPAM Installation Guide.
Step 5: Install an EM-100 controller and the associated door devices (including locks, card readers, and other input and output devices). See the “Identiv EM-100 Controllers” section in the ICPAM Installation Guide. If you are including the optional Exit Reader Expansion Module, see the “Connecting an Exit Reader Expansion Module” topic in the ICPAM Installation Guide.
Step 6: Connect a Windows PC (with version 8 through 11 of Internet Explorer) to the EM-100 controller's RJ-45 Ethernet port, and congure its settings as explained in the “Conguring an EM-100 Controller” topic in the ICPAM Installation Guide.
Step 7: Disconnect the EM-100 controller from the Windows PC, connect it to your security network, and nish conguring it as explained in “Chapter 6: Conguring Controllers” in the ICPAM User Guide.
The ICPAM documents are available at:
identiv.com/icpam-support
© 2016 Idenitv, Inc. All rights reserved.
ICPAM Quick Start Guide
“We need to
ICPAM EM-100 Controllers
The ICPAM EM-100 Controllers comply with the
following certications for electrical, emissions, and
environmental compliance:
• FCC, Part 15, class B digital device
• UL
• CE, compliance with the essential requirements and
other relevant portions of the Directive R&TTE
1999/5/EC
• IC, Industry Canada license-exempt RSS standard(s)
• NCC, Taiwan
• RoHS2, Reduction of Hazardous Substances
• REACH, Registration, Evaluation, Authorisation and
Restriction of Chemicals
Identiv, Inc. (NASDAQ: INVE) is the leading global player in physical security and secure identication. Identiv’s products, software, systems, and services address the markets for physical
and logical access control and a wide range of RFID-enabled applications. Customers in the government, enterprise, consumer, education, healthcare, and transportation sectors rely
on Identiv’s access and identication solutions. Identiv’s mission is to secure the connected physical world: from perimeter to desktop access, and from the world of physical things to
the Internet of Everything.
uTrust TS Readers
uTrust TS Readers comply with the following certications
for electrical, emissions, and environmental compliance:
• FCC, Part 15, class B digital device
• UL 294, Destructive Attack Level 4, Line Security
Level 1, Endurance Level 1
• CE, compliance with the essential requirements and
other relevant portions of the Directive R&TTE
1999/5/EC
• IC, Industry Canada license-exempt RSS standard(s)
• C-Tick, Australia and New Zealand
• RoHS2, Reduction of Hazardous Substances
• REACH, Registration, Evaluation, Authorisation and
Restriction of Chemicals
uTrust TS Readers (continued)
COMMODITY
Physical Access Door Reader
ENCRYPTION
Symmetric key algorithms for mutual authentication
and RSA Asymmetric key algorithms to decrypt
signatures. Physical access processed through mutual
authentication
ECCN
EAR99
Identiv has ofces worldwide. Addresses and phone numbers are listed at identiv.com/contact. For more information, visit identiv.com or email sales@identiv.com. Technical data is
subject to change without notice.
Copyright © 2016 Identiv, Inc. | All rights reserved. This document is Identiv public information.
© 2016 Idenitv, Inc. All rights reserved.
Loading...