All rights reserved. No part of this book m ay
be reproduc ed or transmitted in any form
or by any m eans, electronic or mechanical,
including p hotocopying, recording, or
by any info rmation storage and retrieval
system, wit hout written permission from
FingerTec W orldwide Sdn Bhd. Every
precaution has been made to supply
complete an d accurate information.
Information in this document is subject
to change w ithout prior notice.
Disclaimer
No person s hould rely on the contents of th is
publication without first obtaining advice
from a qual ified professional person.
The company expressly disclaims all and any
liability a nd responsibility to any termina l or
user of thi s book, in respect of anything, and
of the cons equences of anything, done by
any such pe rson in reliance, whether wholly
or partiall y, upon the whole or any part of
the content s of this book.
FING ERTEC WORL DWIDE SDN B HD
Contents
5-6 Preface
EXPERIENCE ADVANCED ACCESS
CONTROL SYSTEM
Welcome to Ingress
10 Useful Features of Ingress
7-16 Chapter 1
INSTALLATION AND CONFIGURATION
Getting Started - Ingress Installation
• System Requirements
• Installing the System
Starting the Ingress Installation
Installing MySQL Server
Installing Microsoft .NET Framework 4.0
Installing OFIS Scanner Driver
Completing Ingress DB Installer
Ingress Startup
Quick Setup Wizard
17-29 Chapter 2
MANAGEMENT OF DEVICE AND DOOR
Devices
• Add Device Manually
• Add Device by Auto Scan
• Configuring Device
• Disable and Delete Device
Door
• Add Standalone Device to Door
• Add Ingressus to Door
• Add Keylock to Door
• Configuring Settings to Doors
• Delete Device/Doors
• Access Group of Door
• Events of Doors
Linkage with IP Camera
Permanent Door Open Close
Time Zone
Permanent Door Open Close
Holiday Time Zone (Ingressus only)
30-35 Chapter 3
SETUP OF ZONES
Antipassback
Fire Alarm
Interlocking
First Card Unlock
Multi Card Open
To Delete Zone/Device/User
Group/Multi Card
Combination Group
36-43 Chapter 4
MANAGEMENT OF USERS
Add Department
Add Users
• To Download Users from Devices
• To Download Users via USB Flash
Disk
• To Create Users Manually Edit User Biodata
• To Edit Users’ Information Manually
• To Import Users’ Biodata from Other
System
Upload users to devices
• Upload users via TCP/IP or RS485
• Upload users via USB flash disk Remove Users
• Remove Current Users
• Remove Device Users Other Operation
• To export users biodata
• To import users’ biodata from Sage
UBS Payroll
(for Malaysia market only)
• To search users by keywords
46-50 Chapter 5
ACCESS LEVELS
Access Levels by Time
• Setup of Time Set
• Setup of Access Group Access Levels by Holiday
• Setup of Holiday Time Set
• Create Holiday List to add Holiday
Time Set
Access Level by Verify Type
51-55 Chapter 6
MONITORING
Monitoring by Door or Zone
• Remote Settings
• Monitoring Settings Real-time Monitoring
Log List
Visual Map
• Add Visual Map and Doors
• Start Monitoring Process
56-92 Chapter 7
ATTENDANCE
Setup of Clocking Schedules
Weekly Schedules
• Clocking Rules
• Range Rules
• General Rules
• Rounding Rules
• Break Rules
• Overtime Rules The Daily schedule
• Clocking Rules
• Range Rules
• General Rules
• Rounding Rules
• Break Rules
• Overtime Rules The Flexi Schedule
• Clocking Rules
• General Rules
• Rounding Rules
• Break Rules
• Overtime rules Setup of Group Duty Roster
• Creating Weekly Group Duty Roster
• Creating Shift Group Duty Roster
• Assign users into group duty roster
• Special working rules User Duty Planner
• Leaves and Remark
• To add types of leave
• To add Remark Attendance Sheet
• View and Edit
• Download data from devices
• Generate attendance data
• Export Attendance Records
• Export to Sage UBS Payroll
(Malaysia market only)
Data Audit List
93-95 Chapter 8
REPORTS
Types of Reports and Usage
Preview, Print or Save Reports
96-103 Chapter 9
SETTINGS IN INGRESS
Database Configuration
System Parameters Settings
Field Customization Management
Company Info
System User
• To create User Roles
• To create login account and assign role
Event
• To configure notifications by alarm
and email
• To configure alarm alerts and color
• To configure email alerts
Network Camere Intergration
• Milestone server
• EpiCamera
Preface
Experience Advanced Access Control System
Welcome to Ingress
Ingress is an advanced access control software developed and designed specifically as a
complete solution to centralize, manage, and monitor FingerTec access control devices
directly, or by connecting them to the Ingressus access controller hardware. Along with
Ingress, you will experience the extensive and elaborate features for configuring access of
a door, as well as the ability to centralize and monitor access activity of an environment
in a real-time manner.
Ideally suited for self-managed organizations of below 100-door environment, Ingress is
also capable of seamlessly integrating its access control functions with alarm monitoring
and other intrusion detection devices. Ingress supports all standalone FingerTec access
control models that use card, fingerprint and face recognition verification, and multiple
devices can be centralized in the Ingressus Network Control Panel for multiple-door monitoring.
5
10 Useful Features of Ingress
Efficient Centralized Management
Ingress is a server-client based software that
supports surveillance from multiple PCs concurrently, while containing useful access monitoring features such as multi-level users, and
user group privileges.
Secure Architecture
The architecture of Ingress keeps data secure
and accessible, while providing you with activity logs, audit trails, and advanced devicesearching features in a LAN environment.
User-Friendly & Flexible
User-friendliness is emphasized in Ingress with
features such as the Quick-Setup Wizard, dragand-drop methods, and shortcut icons with
ribbon menus to make interaction with the
software effortless.
Enhanced Software Security Features
Ingress provides an optional fingerprint login
for system administrators. There is a screenlock function as well as an automatic logout
after timeout. The detailed history records and
audit trail functions for tracking past configuration changes. There is also a full backup and
restoral of system data.
Access Control Readily Available Reports
There are 13 types of listing & event reports
available. The report supports digital watermark imprint, comprehensive event filtering,
quick-print and email action. The reports can
be exported into 10 formats for example: .XLS,
.TXT, .CSV.
Powerful Access Control Settings
Get most Access Control features from Ingress
such as Interlocking, fire alarm linkage, Antipassback, multiple verification settings and
multi-card operation.
Integrated Monitoring
Ingress provides a real-time alarm or event
logs to ensure all events are completely documented (including messages and controls) for
the entire system. Doors can be controlled remotely, including unlocking doors and disarm-
ing alarms.
Pictorial Map for Instant Activity Visibility
Ingress can display up to a maximum of 9 floor
maps for real-time monitoring. The Graphic
map is displayed with animated icons for instant visibility of activity. Multiple work stations can be used concurrently to perform
monitoring.
Comprehensive Time Attendance
Functions
The weekly schedule comes with 3 pairs of
IN/OUT columns for attendance monitoring.
You can set up a group or personal duty roster
and assign it to the users. Ingress also supports
leave and holiday management. At the Attendance Sheet, you can instantly add, edit, or
delete attendance records. At the report section, there are 6 types of commonly used time
attendance reports, for example: Daily Attendance Listing, Tardiness Report, and On-Leave
Listing.
Useful Event Priority & Alerts
You can organize alarm alerts and set alarm
priorities to optimize response time into Ingress. There are 62 event types that can be
assigned according to the necessity of the
priority. Ingress will automatically send email
notifications to assigned recipients when an
event is detected in the system. You may also
customize the sound alert for every priority.
6
Chapter 1
Installation and Configuration
This chapter guides you on the installation and basic setup of the Ingress.
Before you start using Ingress, you will need to install the software successfully into your
computer. Installing the Ingress software is hassle-free as the Ingress installer contains an
installation wizard, to guide you step-by-step in setting up the software completely.
GETTING STARTED - Ingress Installation
System Requirements
Before installing Ingress, please make sure your client and server PCs are up to date with the
following requirements:
Feature
Operating
system
Processor
Memory
Hard drive
Resolution
Server
• Windows XP
• Windows Vista
• Windows 7,
• Windows Server 2003/2008
• (32 or 64 bits)
Intel® Core® 2 Duo 2.5 GHz or better
3 GB of RAM or better
80 GB
1024 x 768 or higher
Windows 8
Feature
Operating
system
Processor
Memory
Hard drive
Resolution
Client
• Windows XP
• Windows Vista
• Windows 7
• Windows Server 2003/2008
• (32 or 64 bits)
Intel® Core® 2 Duo 2.0 GHz or better
2 GB of RAM of better
50 GB
1366 x 768
Installing the System
For Ingress to function properly, you will need to install these components first:
MySQL Server
Microsoft .NET Framework 4.0 Full
FingerTec Ingress Software
OFIS Scanner Driver
STARTING THE INGRESS INSTALLATION
Right click the FingerTec Ingress setup file and select Run as administrator.
7
This will prompt the installer to start the Ingress Server – Install Shield Wizard. The Install
Shield Wizard will show the required components’ installation status. There are 3 components to be installed before we can proceed with Ingress installation.
MySQL Server
Microsoft .NET Framework 4.0
Click Install to initiate the installation.
INSTALLING MYSQL SERVER
The first component to be installed is the MySQL Server.
At the welcome page, click Next to proceed. At the End-User License Agreement window,
select I accept the terms in the License Agreement and click Next to proceed.
At the Choose Setup Type window,
choose Typical to proceed.
8
At the Ready to install MySQL Server 5.5 window, click Install to immediately start the
installation. When the progress bar completes, you will be prompted with MySQL Enter-
prise window.
At the MySQL Enterprise window, click
Next > Next and Finish to launch the
MySQL Instance Server Configuration
Wizard.
Once the installation of MySQL Server completes, the program will launch the MySQL
Server Instance Configuration Wizard. You need to click Next 9 times until you reach the
security options window. Make sure that on each page before you clicked next, the selec-
tions are as shown as the screenshots below.
9
10
At the Modify Security Settings, enter
your new Root Password and enter it
once again for reconfirmation. Click
Next > Execute to start the configura-
tion. Once done, click Finish.
INSTALLING MICROSOFT .NET FRAMEWORK 4.0
The next component that the installer needs to install is the Microsoft .NET Framework 4.0.
The FingerTec Ingress Setup will detect and determine if the computer has already been
installed with the Microsoft .NET Framework 4.0. It will skip the installation if it has been installed. If it has not been installed, the FingerTec Ingress Setup will install it automatically.
Upon completing the installation of the MySQL Server and Microsoft .NET Framework 4.0,
the next component to be installed is the Ingress Server. Click Next, select I accept the
terms in the license agreement and click Next to proceed. Choose the installation path
and click Next.
11
Select Complete and click Next. Click
Install to start the Installation and click
Finish when the process is complete.
INSTALLING OFIS SCANNER DRIVER
The last component to install is the OFIS Scanner Driver. The Ingress Setup will detect and
determine if the computer has already been installed with the OFIS Scanner Driver and
skip the installation if has. If it has not, the Ingress Setup will install it automatically.
12
Click Next and click Install to start the
installation. Upon completing the installation, you will need to restart the
computer for the changes to take effect.
Please select No, I will restart the com-
puter later and click Finish to proceed to
the next step.
COMPLETING INGRESS DB INSTALLER
The Ingress Setup will then prompt the In gress D B insta ller wi ndow. I t is very import ant to
test t he server and da tabase connection before you start using Ingress. If you do not perform
this step, you will not be able to log into Ingress. Insert the Password and click Test Con-
nection.
13
Once the server connection is established, it will open up the option for Database. Insert the User Name and Pass-
word for the Database and click Update
Connection.
After the Database connection is established, click New Database to create a
new database.
Click Finish to complete the installation.
14
Ingress Startup
Once the installation has completed, the
Ingress icon will be available at the desktop. Right click the icon and select Run as
administrator.
The Ingress client will validate the database connection from the server. Once
the validation has been obtained, insert
the Server IP Address and Server Port to
establish connection. Click Test to test
the connection. When the connection
has been established successfully, click
Save to save the Server IP Address and
Server Port into the computer for future
references.
Now you will reach the Ingress Login Window. Insert the User Name and Password
to log into Ingress. Default User Name: admin , Password:123. You can change
the User Name and Password under Ingress User Accounts. Click Login to log
into Ingress. If you wish to reconfigure
the server settings, click Server Setting.
You can also log into Ingress by using
your fingerprint instead of the username
login. You will need to enroll your fingerprint template(s) under User Account before you can login using this method.
Congratulations! Now you are about to experience INGRESS, the Advanced Access Control
Software, brought to you by FingerTec Worldwide.
15
Quick Setup Wizard
Ingress will start up Quick Setup Wizard during the first login
session. The wizard will guide you through all basic and useful
settings in Ingress software.
You can skip the wizard in order to configure Ingress software
by yourself. You can always run the wizard later from the Main
Menu button.
16
Chapter 2
Management of Device and Door
This chapter guides you on how to install and manage FingerTec devices into Ingress and
assigning them to doors.
Devices
Devices refer to the FingerTec physical terminals installed to guard every door/entrance.
There are 3 types of physical terminals:
Ingressus door controller
FingerTec standalone terminal
Keylock series (7700 and 8800)
Ingressus door controller can work with slave terminals. It is the master that will store &
transfer data, control door and alarm activities. Ingressus door controller can link up to a
maximum of 4 slave terminals (R2c, i-Kadex or k-Kadex). Slave terminals only work as capturing station for fingerprints, cards or password. The captured data is sent to Ingressus for
verification before Ingressus can grant access to users. Ingressus can work with AUX input
(e.g.: heat and smoke sensor, PIR motion detector) and output (e.g.: alarm siren, strobe light,
IP camera).
FingerTec standalone terminals refer to all FingerTec terminals, for example R2, AC900, Q2i,
Face ID series. The terminals have individual processors and memory, to verify and store users’ data. Standalone terminals can be paired with slave terminals as an entry-exit system.
Slave terminals capture fingerprints, card or password data then sends them to master for
verification.
Keylock series refer to FingerTec biometric mechanical door lock. The Keylock series has
integrated processor and memory, to verify/store users’ data. However, it does not communicate with Ingress directly as it only has a USB port for data transfer.
Add Device Manually
You must add each device into the list in Ingress before you can manage any of it. Adding
devices to Ingress requires the device to connect to Ingress via network (TCP/IP or RS 485).
However, standalone terminals and the Keylock series supports USB flash disk for transferring data and settings with Ingress.
Every device has a unique serial number, which is important for activation in Ingress. Contact your local resellers or support@ fingertec.com by providing the serial number of the device in case you fail to activate online.
17
1. Go to Device tab to select Add Device.
2. Select
DeviceType and Communication
Mode then insert the information accord-
ingly.
Device Name: Name the device for easy future reference.
Communication Key: 5-digit numeric secret password to secure the connection between device and
Ingress. Ingress must pair this key with device (under Dev ID) before connection establishes.
Auto Synchronize Device Time: Activate this to allow Ingress to always synchronize the device with
the server date and time.
Settings for TCP/IP connection:
IP Address/URL: Insert the IP address of the device so Ingress can find it on the network to establish con-
nection.
For devices installed at remote site, you can insert the URL of the remote server into this column. Ingress can link up with the device via Internet.
Port: Default TCP port (4370) of Ingress server to link up with device via network.
Settings for RS485 connection
Serial port: Define the serial port of the server in use to connect to the RS232/485 data converter.
Baud rate: Select the baud rate of RS485 network.
Settings for USB flash disk
Serial number: Serial number of device.
Device ID: Make sure you insert the same ID as the one set in the device. Ranges from 1 to 999.
Settings for Keylock
UDisk Path: Define the USB flash disk drive to read the basic info of Keylock
3. Check the box Online next to Device Activation to add the device into Ingress.
If an Internet connection is unavailable, you can activate the device by selecting
Ingress accepts a 12-digits alphanumeric code for offline activation, but this code may onle
be retrieved from your local resellers or support@fingertec.com.
Enable Device to establish connection to the device.
4. Click
Note: You must plug in a USB ash disk to Keylock 7700/8800 to download a le name “X_udata”, where X is the Device
ID of the device used (e.g.: 1_udata). The le contains the serial number of the device and other important information.
Ingress can only add the Keylock 7700/8800 device into the list after it captures this le from the USB ash disk.
18
Offline.
Add Device by Auto Scan
In case you do not know the specific IP address of the standalone device or Ingress, you can
use the Auto Scan function to look for them on the network.
1. Click
Scan Device.
2. Select
Standalone device:Insert range of IP address.Ingressus: Ignore IP address because Ingress can discover the IP address of Ingressus automatically. Keylock: Ingress scans your USB drive which contains the “X_udata” file.
3. Click Scan to start.
4. Device is discovered and published on the list.
5.
6. Continue to activate the device
Device Type:
Select the devices to add into Ingress.
(refe r to Chapter 2 • Add Device Mon ually).
Conguring Device
Download all settings and info from devices when connection is established. You can start
to personalize the settings of each device and synchronize new settings and info to devices
by uploading them. Due to the different nature of all 3 types of devices, Ingress hides some
pages/options when not applicable with a device.
1. Click to select device.
Download Device Settings.
2. Click
3. Wait for the download process to finish.
4. Start to configure:
19
Information: This is the page to display all information of the device. No amendments are allowed. You
can know the storage status of the device at the Record section.
Network: You can change types of communication mode in this page, for example change from TCP/IP to
RS485. You can update the TCP/IP settings (e.g.: change to new IP address) or RS485 settings (e.g.: change
baud rate to 9600bps). All new settings will take effect after you upload the new settings to the device.
Biometric: This page is only effective when connecting to devices that support fingerprint or face recog-
nition. Amend these settings accordingly after you click the Edit button:
Only 1:1 verification: Set to No by default so users can gain access immediately after verifying their finger or
face. Change this to Yes if you want users to insert their ID before fingerprint/face verification.
Fingerprint algorithm: VX 10.0 is the latest fingerprint matching algorithm supported by the device. Only
change to VX 9.0 if your environment is using the older algorithm. This option is not applicable to Ingressus because it only supports VX 10.0.
Face/Fingerprint 1:1 Threshold: The level of matching security if you want users to insert user ID before fingerprint/face verification. For fingerprint, the range is from 0 to 50, where 50 is the highest. For face, it ranges
from 0 to 99 where 99 is the highest. The default values are 15 for fingerprint and 70 for face.
Face/Fingerprint 1:N Threshold: The level of matching security if you allow users to verify by fingerprint/face
without inserting user ID. The default values are 45 for fingerprint and 75 for face.
Power: You can configure the duration (in minutes) for device to wait before going into idle mode.
Idle time (in minutes): Time duration to wait before going into idle mode.
Idle action: Select either Sleep or Power Off.
Power on time: Check the box and insert time to turn on the device.
Power off time: Check the box and insert time to shut down the device.
Access control: You can configure the device for basic access control settings.
Save Transaction log: Set to Yes by default. The device saves IN-OUT records of users. In case you only want
the device to control access without referring to its records, select No. The device will not keep any INOUT records.
Save False Log: Set to Yes by default. The device saves records even though users fail to verify. You can as-
sess the level of fail verifications happening at this device and adjust the biometric settings to improve
the verification process. Select No and the device will not store this record.
Master Record State: You must define the device as Master or Slave If two standalone devices are installed to
control one door. Normally the standalone device controlling entry is set as Master, and at the exit is the
Slave. Ignore if you are installing slave device with a standalone device. This is important if you are using
Antipassback function. The Master device stores all entry-exit records to justify Antipassback status.
Antipassback: Feature that forces users to verify every time he/she comes in or leaves a zone. In case he/she
is tailgating another user without verification to access a zone, the device will block his/her verification to
gain access again. You can select any of the following settings to suit your environment.
20
In: Activate this to force users to verify when leaving a zone. Users can skip verification when coming
into the zone.
Out: Activate this to force users to verify when coming into a zone. Users can skip verification when
leaving the zone.
In/Out: Activate this to force users to verify both when coming in and leaving a zone.
None & Save: Select this setting so the device does not block users to access when Antipassback take
effect. Device will instead only keeps track of Antipassback records with the user ID, where you can
download the records into Ingress to view and analyze.
None: Disable Antipassback at the device.
Other settings:
Power off Device: To shutdown device remotely. All devices do not have a physical power off button to
avoid unauthorized shutdown. You can only shutdown the device by clicking this button.
Reboot Device: To restart device remotely. If the device is working abnormally, try to restart it.
Synchronize Date and Time: Synchronize date and time of device immediately. It is recommended to do this
during first installation.
Download Device Settings: Download all settings/parameters from device.
Activate Device: Activate device to be added into Ingress.
Clear All Device Data: To clear the storage of device back to initial stage. You cannot retrieve any data after
this.
Clear All Log: To delete the transaction logs stored in device. Recommended to do this after you finish
downloading logs from device.
Clear Admin Privilege: To clear admin lock in device. Any users can access into the Main Menu by pressing
the Menu button. Only do this before you want to assign a new administrator at the device.
Upload Device Settings: To upload all new settings/parameters device to start to take effect.
Operation logs: Device records every operation done by administrators into a log file. This is a hidden
file that you cannot view at the device. You must download the operation logs into Ingress to view it.
Press Download OP Log to download from device.
Insert the date range to narrow down your search.
Event: Device records abnormal activities (e.g.: door force open, alarm trigger, fail verification, etc.) as
events. These records are automatically downloaded into Ingress. You can narrow your search to view
by date and time.
5. Click Upload Device Settings to upload new settings to devices.
Disable and Delete Device
Delete or remove the device from list if it is no longer in use, or wrongly added to Ingress. In
case you want to suspend a device from Ingress (to stop data transfer with the device), disable it from the list.
To de lete a device:
1. Click to select the device from list.
2. Click Delete Device.
3. Click Yes to confirm to delete the device.
21
To di sable a device:
1. Click to select the device from list.
2. Click Disable Device.
3. Click Yes to confirm to suspend the device.
Doors
Adding devices into Ingress is to prepare the list of devices installed in the environment.
Now you can start to pair the devices to doors accordingly. You must assign devices to guard
every door. Pairing multiple devices to a specific door allows you to update the same access
settings (e.g.: door unlocks time) to both entry and exit devices.
For installations with Ingressus II (2-doors door controller), you can pair devices with 2 doors.
You can configure different access settings for each door even though they are connected to
the same Ingressus II controller.
Types of device
Standalone devices
Ingressus I
Ingressus II
Keylock
Quantities of devices/slaves
2 devices
2 slave terminals
4 slave terminals
1
Quantities of door
1
1
2
1
Ingress can work with video surveillance software. You can connect to Milestone server or
EpiCamera to stream video from your IP camera for live view or playback. It is recommended
to pair the IP camera with the door/entrance installed with device to monitor users’ movement. In case of abnormal door activities (e.g.: door force open, device dismantled illegally)
Ingress will trigger alarms to alert administrators. You can playback the video at that moment
to know what is going on at the door, or even export the photo or video easily for further
investigation.
Add Standalone Device to Door
1. Click Door at the left panel.
2. Click
Add Door.
3. Rename the door, for
example Main entrance.
4. Add description to the
door for easy reference.
22
5. Click Add Device.
6. Select
7. Select the device to be added to this door.
8. Repeat steps (5) to (7) to add 2nd standalone device to this door.
Note: Select Slave Device in the Add Device window if you are connecting a slave device (R2c, i-Kadex or k-Kadex) with
the standalone device. Name the slave device according to its model.
Standalone Device.
Add Ingressus to Door
Ingress automatically creates door(s) after you add Ingressus into
the system. System creates 1 door if Ingressus I is added as device,
2 doors if Ingressus II is added. You will find the IP address of Ingressus display at the left panel.
In Ingressus II, you will send 2 lines of the same IP address to indicate 2 doors. Under each door, there is an in and out device (slave
devices). Refer to Ingressus installation guide to understand how
to define door and IN-OUT slave devices. This is all controlled by
the wiring between Ingressus and slave devices.
Right click at the IP address of Ingress to rename, for example Ingressus II – R&D office. Rename the
slave device by their models for
easy reference.
23
Add Keylock to Door
Ingress automatically creates a door named Keylock 7700/8800 after you
add the device into the system. Ingress adds the device to the door immediately. You can rename the device for easy reference.
Conguring Settings to Doors
You can configure access settings in Ingress and upload to both devices paired with the
door. This ensures both standalone devices apply the same access settings during operation. If you are using a standalone device with a slave to guard the door, settings will only
be sent to the standalone device.
Ingress treats Ingressus II as 2 different doors even though it is from one device. You can
configure access settings for each door individually. Ingressus II can store and apply the
settings to doors accordingly.
Ignore this if you are installing with the Keylock series. Due to the lack of communication
cable, Ingress cannot upload any settings to Keylock. Thus you do not need to configure
anything in Ingress.
1. Click to select a
2. Press
Edit at the right panel.
door.
3. Change the settings accordingly.
General configuration for standalone device and Ingressus
Permanent Door Open/Close Time Zone: Select to follow time range settings to allow free access (without
verification at the device) to the zone. Only to be used for zones with open access to public during
specific time range. Requires setup of Permanent Door Open Close Time Zone. Leave this blank to
ignore this feature.
Lock Open Duration: Change to set duration for door lock and unlock during successful verification.
24
Door Sensor Type: Select the type of door sensor installed at the device. The most common type is NC (normally close). Door sensor is a must-have component if you want to monitor door activities. It responds to
standalone device or Ingress all the time to report door status.
Configurations to apply to door with standalone device only
Full Access Device: Important setup if you apply Time Zone settings to the door. Select exit device to become
full access device. Full access device ignores time zone settings. Users can verify at the device to leave
the zone anytime.
Entry Device: Defines if the device is used for In or Out transactions. For example, all records from an In device will be recorded as In while records from the other device at the same door will be recorded as Out.
Alarm Delay: Change to set the duration before triggering alarm during emergency. Set to 0 for the device
to trigger alarm immediately during emergency.
Error Times To Alarm: To set the maximum times of failed verification before device triggers alarm. This is to
alert the unauthorized person to not tamper with the device.
During emergency users can verify at the device to trigger duress alarm to alert others. For example,
robbers force user to verify to unlock the door to access into the zone. User can verify at device to trigger
alarm to alert the users inside the zone.
Activate one of the above options as the duress alarm trigger method. If you are using fingerprint verification to gain access during normal days, activate Duress Alarm Password Trigger. The device will then
trigger the alarm when you insert your password. Refer to the device’s user guide for details on how to
enroll fingerprint or password to trigger duress alarm.
Duress Alarm Delay: Change to set duration before alarm is triggered during duress scenario. Set 0 and device
will trigger alarm immediately during duress scenario.
Door Sensor Type: Select the type of door sensor installed at the device. The most general type is NC. Door
sensor is an important component to monitor door activities. In case of door force open or door remain
open, the door sensor reports it to the device. You can see the status of door under the Monitoring page
in Ingress. Select None if you did not install door sensor, but you can no longer monitor the activities
from this door.
Configurations to apply to door with Ingress only
Permanent Door Open/Close Holiday Time Zone: Select to follow time range settings to allow free access (without
verification at the device) to the zone during holiday. Requires setup of Holiday list and Permanent Door
Open Close Holiday Time Zone. Leave this blank to ignore this feature.
Punch Interval: Set the time duration between 1st and 2nd verification from the same user, for example 10s.
Ingressus will not grant access to the user if he/she verifies twice within 10s from any slave devices.
Verify Mode: To select combination of verification to gain access.
Duress Password: Same as Duress Alarm Password Trigger.
Emergency Password: During emergency, users can enter an emergency password to unlock any door (con-
trolled by Ingressus) at anytime. Time zone or access control settings will not affect it. This is normally
done by the administrator.
Door sensor delay: Set the time duration before Ingressus triggers the alarm if door remains open.
Close and Reverse State: Activate this if you want EM lock or dropbolt to lock immediately once door closes.
You must install door sensor together with the door lock. When the door sensor touches each other, Ingressus receives the signal and activates the door lock system immediately. This overrides the Door Open
Duration settings and can avoid unauthorized access or tailgating incident.
4. Save settings.
5.
Upload new settings to devices.
25
Delete Device/Doors
You can delete the devices or doors in case any of them are no longer in use. Make sure you
identify the devices and doors before you proceed to delete them.
1. Click to select the device/door display at the left panel to delete.
2. Click
Delete Device or Remove Door to proceed.
3. Click
Yes to confirm to delete.
Access Group of Door
You can limit access according to time range of every user via each door. For example all
users can access via the main entrance but only Admin staff can access into the Admin
department during office hours. Refer to Access Level for more details.
Here, you can only view the access time range set to each door. You can only change them
under the Access Level tab.
Events of Doors
Each device uploads activities (e.g.: door force opened) to Ingress automatically. You can
view these records according to date and time.
26
1. Press Edit.
2. Define the date range/
3. Press
Get Log.
Interval.
Linkage with IP Camera
Ingress can link up with the MileStone server or EpiCamera to stream the video. You can
have live view from your IP camera in Ingress without logging-in to MileStone or EpiCamera. You can pair the IP camera to relevant door(s) so you can monitor IN-OUT movement
easily.
Before you start to pair the IP camera to a door, go to System Settings to configure connection details of your Milestone server or EpiCamera under Network Camera Integration.
1. Select
2. Click
3. Select
4. Select the
5. The IP camera will be displayed at the left panel under
6. Select the
Door at the left panel.
Add Camera.
MileStone or EpiCamera.
IP camera to be paired with the door.
the selected door.
IP camera and click Show Live View to
stream video.
In case of abnormal door activities (e.g.: door force open), Ingress records the event immediately under Monitoring. You can playback the video during the abnormal door activities
by clicking at the alert message. More details under Monitoring.
1. Select the
2. Click
3. Yes to confirm to delete.
IP camera from left panel.
Remove Camera.
27
Permanent Door Open Close Time Zone
You can set a specific time range to allow free access for certain entrance. For example, sales
office is open for customers to visit during office hours (9am to 5pm). Users do not need
to verify to gain access from 9am to 5pm. This is called Permanent Door Open Close Time
Zone, designed to control access for zones with high traffic flow without compromising the
security purpose.
Steps to setup Permanent Door Open Close Time Zone:
1. Click Permanent Door Open Close Time Zone.
2. Click
Add Time Zone.
3.
Name the Time Zone, e.g.: Office hour – Free Access 9am to 4pm.
4. Press
Edit.
5. Define the
• You can click the Copy button to copy the settings from the previous day.
• Click
6. Press Save to save settings.
Steps to assign Permanent Door Open Close Time Zone to Door:
1. Select Door from the left panel.
2. Select
3. Press
4. Select the time zone under
5. Press
6.
Upload settings to devices.
Start and End time for each day.
to dene time range by scroll bar.
Details.
Edit.
Permanent Door Open Close Time Zone.
Save.
To remove the Permanent Door Close Time Zone from list:
1. Select the Time Zone from left panel.
2. Click
Remove Time Zone.
3.
Yes to confirm to delete.
28
Permanent Door Open Close Holiday Time Zone
(Ingressus only)
You can apply Permanent Door Close Time Zone during holidays. Ingress applies the
time zone settings to the date listed under Holiday Settings. This is only effective to
doors installed with Ingressus.
Steps to setup Permanent Door Open Close Time Zone:
1. Click Permanent Door Open Close Time Zone.
2. Click
Add Holiday Time Zone.
3.
Name the Time Zone, e.g.: Holiday Access – Morning only.
4. Press
Edit.
5. Define the
6. Press
Steps to assign Permanent Door Open Close Holiday Time Zone to Ingressus:
1. Select Ingressus from the left panel.
2. Select
3. Press
4. Select the time zone under
5. Press
6.
Upload settings to Ingressus.
To remove the Permanent Door Close Time Zone from list:
1. Select the Holiday Time Zone from left panel.
2. Click
3.
Yes to confirm to delete.
Start and End time.
Save to save settings.
Details.
Edit.
Permanent Door Open Close Holiday Time Zone.
Save.
Remove Holiday Time Zone.
29
Chapter 3
Setup of Zones
This chapter guides you on setting up zone installations using Ingressus.
This chapter is only applicable for Ingressus. Skip this chapter if you are not installing any
Ingressus controllers in your environment. You can set up zone installations with Ingressus
to perform more secure access control settings.
There are a total of 5 types of zones, which are:
Antipassback
Fire alarm
Interlocking
First Card Unlock
Multi Card Open
Antipassback
Apply Antipassback to force all users to verify every time when coming in or leaving the
work place. Ingressus blocks user access if the user missed his/her previous verification
record. This is an important feature to stop users from tailgating others during access. Ingress can collect the full IN-OUT records of every user.
Antipassback from the left panel.
1. Click
2. Click
Add Zone.
3.
Name the Zone, e.g.: Ground Floor.
4. Click
Add Device.
5.
Select Ingressus from the list.
6.
Name the Ingressus controller.
7. Press Edit at the Basic Information panel.
30
Loading...
+ 74 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.