FingerTec Ingress User Manual

Advanced Access Control System
User Guide
Copyright Notice
All rights reserved. No part of this book m ay be reproduc ed or transmitted in any form or by any m eans, electronic or mechanical, including p hotocopying, recording, or by any info rmation storage and retrieval system, wit hout written permission from FingerTec W orldwide Sdn Bhd. Every precaution has been made to supply complete an d accurate information. Information in this document is subject to change w ithout prior notice.
Disclaimer
No person s hould rely on the contents of th is publication without first obtaining advice from a qual ified professional person. The company expressly disclaims all and any liability a nd responsibility to any termina l or user of thi s book, in respect of anything, and of the cons equences of anything, done by any such pe rson in reliance, whether wholly or partiall y, upon the whole or any part of the content s of this book.
FING ERTEC WORL DWIDE SDN B HD
Contents
5-6 Preface
EXPERIENCE ADVANCED ACCESS
CONTROL SYSTEM Welcome to Ingress
10 Useful Features of Ingress
7-16 Chapter 1
INSTALLATION AND CONFIGURATION
Getting Started - Ingress Installation
System Requirements
Installing the System
Starting the Ingress Installation
Installing MySQL Server Installing Microsoft .NET Framework 4.0 Installing OFIS Scanner Driver Completing Ingress DB Installer
Ingress Startup Quick Setup Wizard
17-29 Chapter 2
MANAGEMENT OF DEVICE AND DOOR
Devices
Add Device Manually
Add Device by Auto Scan
Configuring Device
Disable and Delete Device
Door
Add Standalone Device to Door
Add Ingressus to Door
Add Keylock to Door
Configuring Settings to Doors
Delete Device/Doors
Access Group of Door
Events of Doors
Linkage with IP Camera Permanent Door Open Close Time Zone Permanent Door Open Close Holiday Time Zone (Ingressus only)
30-35 Chapter 3
SETUP OF ZONES
Antipassback
Fire Alarm Interlocking First Card Unlock Multi Card Open To Delete Zone/Device/User Group/Multi Card Combination Group
36-43 Chapter 4
MANAGEMENT OF USERS
Add Department Add Users
To Download Users from Devices
To Download Users via USB Flash
Disk
To Create Users Manually Edit User Biodata
To Edit Users’ Information Manually
To Import Users’ Biodata from Other
System
Upload users to devices
Upload users via TCP/IP or RS485
Upload users via USB flash disk Remove Users
Remove Current Users
Remove Device Users Other Operation
To export users biodata
To import users’ biodata from Sage
UBS Payroll
(for Malaysia market only)
To search users by keywords
46-50 Chapter 5
ACCESS LEVELS
Access Levels by Time
Setup of Time Set
Setup of Access Group Access Levels by Holiday
Setup of Holiday Time Set
Create Holiday List to add Holiday
Time Set
Access Level by Verify Type
51-55 Chapter 6
MONITORING
Monitoring by Door or Zone
Remote Settings
Monitoring Settings Real-time Monitoring Log List Visual Map
Add Visual Map and Doors
Start Monitoring Process
56-92 Chapter 7
ATTENDANCE
Setup of Clocking Schedules Weekly Schedules
Clocking Rules
Range Rules
General Rules
Rounding Rules
Break Rules
Overtime Rules The Daily schedule
Clocking Rules
Range Rules
General Rules
Rounding Rules
Break Rules
Overtime Rules The Flexi Schedule
Clocking Rules
General Rules
Rounding Rules
Break Rules
Overtime rules Setup of Group Duty Roster
Creating Weekly Group Duty Roster
Creating Shift Group Duty Roster
Assign users into group duty roster
Special working rules User Duty Planner
Leaves and Remark
To add types of leave
To add Remark Attendance Sheet
View and Edit
Download data from devices
Generate attendance data
Export Attendance Records
Export to Sage UBS Payroll
(Malaysia market only)
Data Audit List
93-95 Chapter 8
REPORTS
Types of Reports and Usage Preview, Print or Save Reports
96-103 Chapter 9
SETTINGS IN INGRESS
Database Configuration System Parameters Settings Field Customization Management Company Info System User
• To create User Roles
• To create login account and assign role
Event
• To configure notifications by alarm
and email
• To configure alarm alerts and color
• To configure email alerts
Network Camere Intergration
• Milestone server
• EpiCamera
Preface
Experience Advanced Access Control System
Welcome to Ingress
Ingress is an advanced access control software developed and designed specifically as a complete solution to centralize, manage, and monitor FingerTec access control devices directly, or by connecting them to the Ingressus access controller hardware. Along with Ingress, you will experience the extensive and elaborate features for configuring access of a door, as well as the ability to centralize and monitor access activity of an environment in a real-time manner.
Ideally suited for self-managed organizations of below 100-door environment, Ingress is also capable of seamlessly integrating its access control functions with alarm monitoring and other intrusion detection devices. Ingress supports all standalone FingerTec access control models that use card, fingerprint and face recognition verification, and multiple devices can be centralized in the Ingressus Network Control Panel for multiple-door moni­toring.
5
10 Useful Features of Ingress
Efficient Centralized Management
Ingress is a server-client based software that supports surveillance from multiple PCs con­currently, while containing useful access mon­itoring features such as multi-level users, and
user group privileges.
Secure Architecture
The architecture of Ingress keeps data secure and accessible, while providing you with ac­tivity logs, audit trails, and advanced device­searching features in a LAN environment.
User-Friendly & Flexible
User-friendliness is emphasized in Ingress with features such as the Quick-Setup Wizard, drag­and-drop methods, and shortcut icons with ribbon menus to make interaction with the
software effortless.
Enhanced Software Security Features
Ingress provides an optional fingerprint login for system administrators. There is a screen­lock function as well as an automatic logout after timeout. The detailed history records and audit trail functions for tracking past configu­ration changes. There is also a full backup and
restoral of system data.
Access Control Readily Available Reports
There are 13 types of listing & event reports available. The report supports digital water­mark imprint, comprehensive event filtering, quick-print and email action. The reports can be exported into 10 formats for example: .XLS,
.TXT, .CSV.
Powerful Access Control Settings
Get most Access Control features from Ingress such as Interlocking, fire alarm linkage, Anti­passback, multiple verification settings and
multi-card operation.
Integrated Monitoring
Ingress provides a real-time alarm or event logs to ensure all events are completely docu­mented (including messages and controls) for the entire system. Doors can be controlled re­motely, including unlocking doors and disarm-
ing alarms.
Pictorial Map for Instant Activity Visibility
Ingress can display up to a maximum of 9 floor maps for real-time monitoring. The Graphic map is displayed with animated icons for in­stant visibility of activity. Multiple work sta­tions can be used concurrently to perform
monitoring.
Comprehensive Time Attendance Functions
The weekly schedule comes with 3 pairs of IN/OUT columns for attendance monitoring. You can set up a group or personal duty roster and assign it to the users. Ingress also supports leave and holiday management. At the At­tendance Sheet, you can instantly add, edit, or delete attendance records. At the report sec­tion, there are 6 types of commonly used time attendance reports, for example: Daily Attend­ance Listing, Tardiness Report, and On-Leave Listing.
Useful Event Priority & Alerts
You can organize alarm alerts and set alarm priorities to optimize response time into In­gress. There are 62 event types that can be assigned according to the necessity of the priority. Ingress will automatically send email notifications to assigned recipients when an event is detected in the system. You may also customize the sound alert for every priority.
6
Chapter 1
Installation and Configuration
This chapter guides you on the installation and basic setup of the Ingress.
Before you start using Ingress, you will need to install the software successfully into your computer. Installing the Ingress software is hassle-free as the Ingress installer contains an installation wizard, to guide you step-by-step in setting up the software completely.
GETTING STARTED - Ingress Installation
System Requirements
Before installing Ingress, please make sure your client and server PCs are up to date with the following requirements:
Feature
Operating system
Processor
Memory
Hard drive
Resolution
Server
• Windows XP
• Windows Vista
• Windows 7,
• Windows Server 2003/2008
• (32 or 64 bits)
Intel® Core® 2 Duo 2.5 GHz or better
3 GB of RAM or better
80 GB
1024 x 768 or higher
Windows 8
Feature
Operating system
Processor
Memory
Hard drive
Resolution
Client
• Windows XP
• Windows Vista
• Windows 7
• Windows Server 2003/2008
• (32 or 64 bits)
Intel® Core® 2 Duo 2.0 GHz or better
2 GB of RAM of better
50 GB
1366 x 768
Installing the System
For Ingress to function properly, you will need to install these components first:
MySQL Server Microsoft .NET Framework 4.0 Full FingerTec Ingress Software OFIS Scanner Driver
STARTING THE INGRESS INSTALLATION
Right click the FingerTec Ingress setup file and select Run as administrator.
7
This will prompt the installer to start the Ingress Server – Install Shield Wizard. The Install Shield Wizard will show the required components’ installation status. There are 3 compo­nents to be installed before we can proceed with Ingress installation.
MySQL Server Microsoft .NET Framework 4.0
Click Install to initiate the installation.
INSTALLING MYSQL SERVER
The first component to be installed is the MySQL Server.
At the welcome page, click Next to proceed. At the End-User License Agreement window, select I accept the terms in the License Agreement and click Next to proceed.
At the Choose Setup Type window, choose Typical to proceed.
8
At the Ready to install MySQL Server 5.5 window, click Install to immediately start the installation. When the progress bar completes, you will be prompted with MySQL Enter-
prise window.
At the MySQL Enterprise window, click
Next > Next and Finish to launch the MySQL Instance Server Configuration Wizard.
Once the installation of MySQL Server completes, the program will launch the MySQL
Server Instance Configuration Wizard. You need to click Next 9 times until you reach the security options window. Make sure that on each page before you clicked next, the selec-
tions are as shown as the screenshots below.
9
10
At the Modify Security Settings, enter your new Root Password and enter it once again for reconfirmation. Click
Next > Execute to start the configura-
tion. Once done, click Finish.
INSTALLING MICROSOFT .NET FRAMEWORK 4.0
The next component that the installer needs to install is the Microsoft .NET Framework 4.0. The FingerTec Ingress Setup will detect and determine if the computer has already been installed with the Microsoft .NET Framework 4.0. It will skip the installation if it has been in­stalled. If it has not been installed, the FingerTec Ingress Setup will install it automatically.
Upon completing the installation of the MySQL Server and Microsoft .NET Framework 4.0, the next component to be installed is the Ingress Server. Click Next, select I accept the
terms in the license agreement and click Next to proceed. Choose the installation path
and click Next.
11
Select Complete and click Next. Click
Install to start the Installation and click Finish when the process is complete.
INSTALLING OFIS SCANNER DRIVER
The last component to install is the OFIS Scanner Driver. The Ingress Setup will detect and determine if the computer has already been installed with the OFIS Scanner Driver and skip the installation if has. If it has not, the Ingress Setup will install it automatically.
12
Click Next and click Install to start the installation. Upon completing the in­stallation, you will need to restart the computer for the changes to take effect. Please select No, I will restart the com-
puter later and click Finish to proceed to
the next step.
COMPLETING INGRESS DB INSTALLER
The Ingress Setup will then prompt the In gress D B insta ller wi ndow. I t is very import ant to
test t he server and da tabase connection before you start using Ingress. If you do not perform
this step, you will not be able to log into Ingress. Insert the Password and click Test Con-
nection.
13
Once the server connection is estab­lished, it will open up the option for Da­tabase. Insert the User Name and Pass-
word for the Database and click Update Connection.
After the Database connection is estab­lished, click New Database to create a new database.
Click Finish to complete the installation.
14
Ingress Startup
Once the installation has completed, the Ingress icon will be available at the desk­top. Right click the icon and select Run as
administrator.
The Ingress client will validate the data­base connection from the server. Once the validation has been obtained, insert the Server IP Address and Server Port to establish connection. Click Test to test the connection. When the connection has been established successfully, click
Save to save the Server IP Address and
Server Port into the computer for future references.
Now you will reach the Ingress Login Win­dow. Insert the User Name and Password to log into Ingress. Default User Name: admin , Password: 123. You can change the User Name and Password under In­gress User Accounts. Click Login to log into Ingress. If you wish to reconfigure the server settings, click Server Setting. You can also log into Ingress by using your fingerprint instead of the username login. You will need to enroll your finger­print template(s) under User Account be­fore you can login using this method.
Congratulations! Now you are about to experience INGRESS, the Advanced Access Control Software, brought to you by FingerTec Worldwide.
15
Quick Setup Wizard
Ingress will start up Quick Setup Wizard during the first login session. The wizard will guide you through all basic and useful settings in Ingress software.
You can skip the wizard in order to configure Ingress software by yourself. You can always run the wizard later from the Main Menu button.
16
Chapter 2
Management of Device and Door
This chapter guides you on how to install and manage FingerTec devices into Ingress and assigning them to doors.
Devices
Devices refer to the FingerTec physical terminals installed to guard every door/entrance. There are 3 types of physical terminals:
Ingressus door controller FingerTec standalone terminal Keylock series (7700 and 8800)
Ingressus door controller can work with slave terminals. It is the master that will store & transfer data, control door and alarm activities. Ingressus door controller can link up to a maximum of 4 slave terminals (R2c, i-Kadex or k-Kadex). Slave terminals only work as cap­turing station for fingerprints, cards or password. The captured data is sent to Ingressus for verification before Ingressus can grant access to users. Ingressus can work with AUX input (e.g.: heat and smoke sensor, PIR motion detector) and output (e.g.: alarm siren, strobe light, IP camera).
FingerTec standalone terminals refer to all FingerTec terminals, for example R2, AC900, Q2i, Face ID series. The terminals have individual processors and memory, to verify and store us­ers’ data. Standalone terminals can be paired with slave terminals as an entry-exit system. Slave terminals capture fingerprints, card or password data then sends them to master for verification.
Keylock series refer to FingerTec biometric mechanical door lock. The Keylock series has integrated processor and memory, to verify/store users’ data. However, it does not commu­nicate with Ingress directly as it only has a USB port for data transfer.
Add Device Manually
You must add each device into the list in Ingress before you can manage any of it. Adding devices to Ingress requires the device to connect to Ingress via network (TCP/IP or RS 485). However, standalone terminals and the Keylock series supports USB flash disk for transfer­ring data and settings with Ingress.
Every device has a unique serial number, which is important for activation in Ingress. Con­tact your local resellers or support@ fingertec.com by providing the serial number of the de­vice in case you fail to activate online.
17
1. Go to Device tab to select Add Device.
2. Select
Device Type and Communication Mode then insert the information accord-
ingly.
Device Name: Name the device for easy future reference. Communication Key: 5-digit numeric secret password to secure the connection between device and
Ingress. Ingress must pair this key with device (under Dev ID) before connection establishes.
Auto Synchronize Device Time: Activate this to allow Ingress to always synchronize the device with
the server date and time.
Settings for TCP/IP connection:
IP Address/URL: Insert the IP address of the device so Ingress can find it on the network to establish con- nection.
For devices installed at remote site, you can insert the URL of the remote server into this column. In­gress can link up with the device via Internet.
Port: Default TCP port (4370) of Ingress server to link up with device via network.
Settings for RS485 connection
Serial port: Define the serial port of the server in use to connect to the RS232/485 data converter. Baud rate: Select the baud rate of RS485 network.
Settings for USB flash disk
Serial number: Serial number of device. Device ID: Make sure you insert the same ID as the one set in the device. Ranges from 1 to 999.
Settings for Keylock
UDisk Path: Define the USB flash disk drive to read the basic info of Keylock
3. Check the box Online next to Device Activation to add the device into Ingress.
If an Internet connection is unavailable, you can activate the device by selecting
Ingress accepts a 12-digits alphanumeric code for offline activation, but this code may onle be retrieved from your local resellers or support@fingertec.com.
Enable Device to establish connection to the device.
4. Click
Note: You must plug in a USB ash disk to Keylock 7700/8800 to download a le name “X_udata”, where X is the Device
ID of the device used (e.g.: 1_udata). The le contains the serial number of the device and other important information. Ingress can only add the Keylock 7700/8800 device into the list after it captures this le from the USB ash disk.
18
Offline.
Add Device by Auto Scan
In case you do not know the specific IP address of the standalone device or Ingress, you can use the Auto Scan function to look for them on the network.
1. Click
Scan Device.
2. Select
Standalone device: Insert range of IP address. Ingressus: Ignore IP address because Ingress can discover the IP address of Ingressus automatically. Keylock: Ingress scans your USB drive which contains the “X_udata” file.
3. Click Scan to start.
4. Device is discovered and published on the list.
5.
6. Continue to activate the device
Device Type:
Select the devices to add into Ingress.
(refe r to Chapter 2 • Add Device Mon ually).
Conguring Device
Download all settings and info from devices when connection is established. You can start to personalize the settings of each device and synchronize new settings and info to devices by uploading them. Due to the different nature of all 3 types of devices, Ingress hides some pages/options when not applicable with a device.
1. Click to select device.
Download Device Settings.
2. Click
3. Wait for the download process to finish.
4. Start to configure:
19
Information: This is the page to display all information of the device. No amendments are allowed. You
can know the storage status of the device at the Record section.
Network: You can change types of communication mode in this page, for example change from TCP/IP to
RS485. You can update the TCP/IP settings (e.g.: change to new IP address) or RS485 settings (e.g.: change baud rate to 9600bps). All new settings will take effect after you upload the new settings to the device.
Biometric: This page is only effective when connecting to devices that support fingerprint or face recog-
nition. Amend these settings accordingly after you click the Edit button:
Only 1:1 verification: Set to No by default so users can gain access immediately after verifying their finger or face. Change this to Yes if you want users to insert their ID before fingerprint/face verification.
Fingerprint algorithm: VX 10.0 is the latest fingerprint matching algorithm supported by the device. Only change to VX 9.0 if your environment is using the older algorithm. This option is not applicable to Ingres­sus because it only supports VX 10.0.
Face/Fingerprint 1:1 Threshold: The level of matching security if you want users to insert user ID before finger­print/face verification. For fingerprint, the range is from 0 to 50, where 50 is the highest. For face, it ranges from 0 to 99 where 99 is the highest. The default values are 15 for fingerprint and 70 for face.
Face/Fingerprint 1:N Threshold: The level of matching security if you allow users to verify by fingerprint/face without inserting user ID. The default values are 45 for fingerprint and 75 for face.
Power: You can configure the duration (in minutes) for device to wait before going into idle mode.
Idle time (in minutes): Time duration to wait before going into idle mode. Idle action: Select either Sleep or Power Off. Power on time: Check the box and insert time to turn on the device. Power off time: Check the box and insert time to shut down the device.
Access control: You can configure the device for basic access control settings.
Save Transaction log: Set to Yes by default. The device saves IN-OUT records of users. In case you only want the device to control access without referring to its records, select No. The device will not keep any IN­OUT records.
Save False Log: Set to Yes by default. The device saves records even though users fail to verify. You can as- sess the level of fail verifications happening at this device and adjust the biometric settings to improve the verification process. Select No and the device will not store this record.
Master Record State: You must define the device as Master or Slave If two standalone devices are installed to control one door. Normally the standalone device controlling entry is set as Master, and at the exit is the Slave. Ignore if you are installing slave device with a standalone device. This is important if you are using Antipassback function. The Master device stores all entry-exit records to justify Antipassback status.
Antipassback: Feature that forces users to verify every time he/she comes in or leaves a zone. In case he/she is tailgating another user without verification to access a zone, the device will block his/her verification to gain access again. You can select any of the following settings to suit your environment.
20
In: Activate this to force users to verify when leaving a zone. Users can skip verification when coming
into the zone.
Out: Activate this to force users to verify when coming into a zone. Users can skip verification when
leaving the zone.
In/Out: Activate this to force users to verify both when coming in and leaving a zone.
None & Save: Select this setting so the device does not block users to access when Antipassback take
effect. Device will instead only keeps track of Antipassback records with the user ID, where you can download the records into Ingress to view and analyze.
None: Disable Antipassback at the device.
Other settings:
Power off Device: To shutdown device remotely. All devices do not have a physical power off button to avoid unauthorized shutdown. You can only shutdown the device by clicking this button.
Reboot Device: To restart device remotely. If the device is working abnormally, try to restart it.
Synchronize Date and Time: Synchronize date and time of device immediately. It is recommended to do this
during first installation.
Download Device Settings: Download all settings/parameters from device.
Activate Device: Activate device to be added into Ingress.
Clear All Device Data: To clear the storage of device back to initial stage. You cannot retrieve any data after
this.
Clear All Log: To delete the transaction logs stored in device. Recommended to do this after you finish downloading logs from device.
Clear Admin Privilege: To clear admin lock in device. Any users can access into the Main Menu by pressing the Menu button. Only do this before you want to assign a new administrator at the device.
Upload Device Settings: To upload all new settings/parameters device to start to take effect.
Operation logs: Device records every operation done by administrators into a log file. This is a hidden
file that you cannot view at the device. You must download the operation logs into Ingress to view it.
Press Download OP Log to download from device.
Insert the date range to narrow down your search.
Event: Device records abnormal activities (e.g.: door force open, alarm trigger, fail verification, etc.) as
events. These records are automatically downloaded into Ingress. You can narrow your search to view by date and time.
5. Click Upload Device Settings to upload new settings to devices.
Disable and Delete Device
Delete or remove the device from list if it is no longer in use, or wrongly added to Ingress. In case you want to suspend a device from Ingress (to stop data transfer with the device), dis­able it from the list.
To de lete a device:
1. Click to select the device from list.
2. Click Delete Device.
3. Click Yes to confirm to delete the device.
21
To di sable a device:
1. Click to select the device from list.
2. Click Disable Device.
3. Click Yes to confirm to suspend the device.
Doors
Adding devices into Ingress is to prepare the list of devices installed in the environment. Now you can start to pair the devices to doors accordingly. You must assign devices to guard every door. Pairing multiple devices to a specific door allows you to update the same access settings (e.g.: door unlocks time) to both entry and exit devices.
For installations with Ingressus II (2-doors door controller), you can pair devices with 2 doors. You can configure different access settings for each door even though they are connected to the same Ingressus II controller.
Types of device
Standalone devices
Ingressus I
Ingressus II
Keylock
Quantities of devices/slaves
2 devices
2 slave terminals
4 slave terminals
1
Quantities of door
1
1
2
1
Ingress can work with video surveillance software. You can connect to Milestone server or EpiCamera to stream video from your IP camera for live view or playback. It is recommended to pair the IP camera with the door/entrance installed with device to monitor users’ move­ment. In case of abnormal door activities (e.g.: door force open, device dismantled illegally) Ingress will trigger alarms to alert administrators. You can playback the video at that moment to know what is going on at the door, or even export the photo or video easily for further investigation.
Add Standalone Device to Door
1. Click Door at the left panel.
2. Click
Add Door.
3. Rename the door, for example Main entrance.
4. Add description to the door for easy reference.
22
5. Click Add Device.
6. Select
7. Select the device to be added to this door.
8. Repeat steps (5) to (7) to add 2nd standalone device to this door.
Note: Select Slave Device in the Add Device window if you are connecting a slave device (R2c, i-Kadex or k-Kadex) with
the standalone device. Name the slave device according to its model.
Standalone Device.
Add Ingressus to Door
Ingress automatically creates door(s) after you add Ingressus into the system. System creates 1 door if Ingressus I is added as device, 2 doors if Ingressus II is added. You will find the IP address of In­gressus display at the left panel.
In Ingressus II, you will send 2 lines of the same IP address to indi­cate 2 doors. Under each door, there is an in and out device (slave devices). Refer to Ingressus installation guide to understand how to define door and IN-OUT slave devices. This is all controlled by the wiring between Ingressus and slave devices.
Right click at the IP address of In­gress to rename, for example In­gressus II – R&D office. Rename the slave device by their models for easy reference.
23
Add Keylock to Door
Ingress automatically creates a door named Keylock 7700/8800 after you add the device into the system. Ingress adds the device to the door imme­diately. You can rename the device for easy reference.
Conguring Settings to Doors
You can configure access settings in Ingress and upload to both devices paired with the door. This ensures both standalone devices apply the same access settings during opera­tion. If you are using a standalone device with a slave to guard the door, settings will only be sent to the standalone device.
Ingress treats Ingressus II as 2 different doors even though it is from one device. You can configure access settings for each door individually. Ingressus II can store and apply the settings to doors accordingly.
Ignore this if you are installing with the Keylock series. Due to the lack of communication cable, Ingress cannot upload any settings to Keylock. Thus you do not need to configure anything in Ingress.
1. Click to select a
2. Press
Edit at the right panel.
door.
3. Change the settings accordingly.
General configuration for standalone device and Ingressus
Permanent Door Open/Close Time Zone: Select to follow time range settings to allow free access (without verification at the device) to the zone. Only to be used for zones with open access to public during specific time range. Requires setup of Permanent Door Open Close Time Zone. Leave this blank to ignore this feature.
Lock Open Duration: Change to set duration for door lock and unlock during successful verification.
24
Door Sensor Type: Select the type of door sensor installed at the device. The most common type is NC (nor­mally close). Door sensor is a must-have component if you want to monitor door activities. It responds to standalone device or Ingress all the time to report door status.
Configurations to apply to door with standalone device only
Full Access Device: Important setup if you apply Time Zone settings to the door. Select exit device to become full access device. Full access device ignores time zone settings. Users can verify at the device to leave the zone anytime.
Entry Device: Defines if the device is used for In or Out transactions. For example, all records from an In de­vice will be recorded as In while records from the other device at the same door will be recorded as Out.
Alarm Delay: Change to set the duration before triggering alarm during emergency. Set to 0 for the device to trigger alarm immediately during emergency.
Error Times To Alarm: To set the maximum times of failed verification before device triggers alarm. This is to alert the unauthorized person to not tamper with the device.
Duress Alarm 1:1 Trigger Duress Alarm 1:N Trigger Duress Alarm Password Trigger
During emergency users can verify at the device to trigger duress alarm to alert others. For example, robbers force user to verify to unlock the door to access into the zone. User can verify at device to trigger alarm to alert the users inside the zone.
Activate one of the above options as the duress alarm trigger method. If you are using fingerprint verifi­cation to gain access during normal days, activate Duress Alarm Password Trigger. The device will then trigger the alarm when you insert your password. Refer to the device’s user guide for details on how to enroll fingerprint or password to trigger duress alarm.
Duress Alarm Delay: Change to set duration before alarm is triggered during duress scenario. Set 0 and device will trigger alarm immediately during duress scenario.
Door Sensor Type: Select the type of door sensor installed at the device. The most general type is NC. Door sensor is an important component to monitor door activities. In case of door force open or door remain open, the door sensor reports it to the device. You can see the status of door under the Monitoring page in Ingress. Select None if you did not install door sensor, but you can no longer monitor the activities from this door.
Configurations to apply to door with Ingress only
Permanent Door Open/Close Holiday Time Zone: Select to follow time range settings to allow free access (without verification at the device) to the zone during holiday. Requires setup of Holiday list and Permanent Door Open Close Holiday Time Zone. Leave this blank to ignore this feature.
Punch Interval: Set the time duration between 1st and 2nd verification from the same user, for example 10s. Ingressus will not grant access to the user if he/she verifies twice within 10s from any slave devices.
Verify Mode: To select combination of verification to gain access.
Duress Password: Same as Duress Alarm Password Trigger.
Emergency Password: During emergency, users can enter an emergency password to unlock any door (con-
trolled by Ingressus) at anytime. Time zone or access control settings will not affect it. This is normally done by the administrator.
Door sensor delay: Set the time duration before Ingressus triggers the alarm if door remains open.
Close and Reverse State: Activate this if you want EM lock or dropbolt to lock immediately once door closes.
You must install door sensor together with the door lock. When the door sensor touches each other, In­gressus receives the signal and activates the door lock system immediately. This overrides the Door Open
Duration settings and can avoid unauthorized access or tailgating incident.
4. Save settings.
5.
Upload new settings to devices.
25
Delete Device/Doors
You can delete the devices or doors in case any of them are no longer in use. Make sure you identify the devices and doors before you proceed to delete them.
1. Click to select the device/door display at the left panel to delete.
2. Click
Delete Device or Remove Door to proceed.
3. Click
Yes to confirm to delete.
Access Group of Door
You can limit access according to time range of every user via each door. For example all users can access via the main entrance but only Admin staff can access into the Admin department during office hours. Refer to Access Level for more details.
Here, you can only view the access time range set to each door. You can only change them under the Access Level tab.
Events of Doors
Each device uploads activities (e.g.: door force opened) to Ingress automatically. You can view these records according to date and time.
26
1. Press Edit.
2. Define the date range/
3. Press
Get Log.
Interval.
Linkage with IP Camera
Ingress can link up with the MileStone server or EpiCamera to stream the video. You can have live view from your IP camera in Ingress without logging-in to MileStone or EpiCam­era. You can pair the IP camera to relevant door(s) so you can monitor IN-OUT movement easily.
Before you start to pair the IP camera to a door, go to System Settings to configure connec­tion details of your Milestone server or EpiCamera under Network Camera Integration.
1. Select
2. Click
3. Select
4. Select the
5. The IP camera will be displayed at the left panel under
6. Select the
Door at the left panel.
Add Camera.
MileStone or EpiCamera.
IP camera to be paired with the door.
the selected door.
IP camera and click Show Live View to
stream video.
In case of abnormal door activities (e.g.: door force open), Ingress records the event imme­diately under Monitoring. You can playback the video during the abnormal door activities by clicking at the alert message. More details under Monitoring.
1. Select the
2. Click
3. Yes to confirm to delete.
IP camera from left panel.
Remove Camera.
27
Permanent Door Open Close Time Zone
You can set a specific time range to allow free access for certain entrance. For example, sales office is open for customers to visit during office hours (9am to 5pm). Users do not need to verify to gain access from 9am to 5pm. This is called Permanent Door Open Close Time Zone, designed to control access for zones with high traffic flow without compromising the security purpose.
Steps to setup Permanent Door Open Close Time Zone:
1. Click Permanent Door Open Close Time Zone.
2. Click
Add Time Zone.
3.
Name the Time Zone, e.g.: Office hour – Free Access 9am to 4pm.
4. Press
Edit.
5. Define the
• You can click the Copy button to copy the settings from the previous day.
• Click
6. Press Save to save settings.
Steps to assign Permanent Door Open Close Time Zone to Door:
1. Select Door from the left panel.
2. Select
3. Press
4. Select the time zone under
5. Press
6.
Upload settings to devices.
Start and End time for each day.
to dene time range by scroll bar.
Details.
Edit.
Permanent Door Open Close Time Zone.
Save.
To remove the Permanent Door Close Time Zone from list:
1. Select the Time Zone from left panel.
2. Click
Remove Time Zone.
3.
Yes to confirm to delete.
28
Permanent Door Open Close Holiday Time Zone (Ingressus only)
You can apply Permanent Door Close Time Zone during holidays. Ingress applies the time zone settings to the date listed under Holiday Settings. This is only effective to doors installed with Ingressus.
Steps to setup Permanent Door Open Close Time Zone:
1. Click Permanent Door Open Close Time Zone.
2. Click
Add Holiday Time Zone.
3.
Name the Time Zone, e.g.: Holiday Access – Morning only.
4. Press
Edit.
5. Define the
6. Press
Steps to assign Permanent Door Open Close Holiday Time Zone to Ingressus:
1. Select Ingressus from the left panel.
2. Select
3. Press
4. Select the time zone under
5. Press
6.
Upload settings to Ingressus.
To remove the Permanent Door Close Time Zone from list:
1. Select the Holiday Time Zone from left panel.
2. Click
3.
Yes to confirm to delete.
Start and End time.
Save to save settings.
Details.
Edit.
Permanent Door Open Close Holiday Time Zone.
Save.
Remove Holiday Time Zone.
29
Chapter 3
Setup of Zones
This chapter guides you on setting up zone installations using Ingressus.
This chapter is only applicable for Ingressus. Skip this chapter if you are not installing any Ingressus controllers in your environment. You can set up zone installations with Ingressus to perform more secure access control settings.
There are a total of 5 types of zones, which are:
Antipassback Fire alarm Interlocking First Card Unlock Multi Card Open
Antipassback
Apply Antipassback to force all users to verify every time when coming in or leaving the work place. Ingressus blocks user access if the user missed his/her previous verification record. This is an important feature to stop users from tailgating others during access. In­gress can collect the full IN-OUT records of every user.
Antipassback from the left panel.
1. Click
2. Click
Add Zone.
3.
Name the Zone, e.g.: Ground Floor.
4. Click
Add Device.
5.
Select Ingressus from the list.
6.
Name the Ingressus controller.
7. Press Edit at the Basic Information panel.
30
Loading...
+ 74 hidden pages