FingerTec Ingress User Manual

4.7 (7)

Advanced Access Control System

User Guide

Copyright Notice

All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or

by any information storage and retrieval system, without written permission from FingerTec Worldwide Sdn Bhd. Every precaution has been made to supply complete and accurate information. Information in this document is subject to change without prior notice.

Disclaimer

No person should rely on the contents of this publication without first obtaining advice from a qualified professional person.

The company expressly disclaims all and any liability and responsibility to any terminal or user of this book, in respect of anything, and of the consequences of anything, done by any such person in reliance, whether wholly or partially, upon the whole or any part of the contents of this book.

FINGERTEC WORLDWIDE SDN BHD

Contents

5-6

Preface

30-35

Chapter 3

 

EXPERIENCE ADVANCED ACCESS

 

SETUP OF ZONES

 

CONTROL SYSTEM

 

Antipassback

 

Welcome to Ingress

 

Fire Alarm

 

10 Useful Features of Ingress

 

Interlocking

 

 

 

 

First Card Unlock

7-16

Chapter 1

 

Multi Card Open

 

INSTALLATION AND CONFIGURATION

 

To Delete Zone/Device/User

 

Getting Started - Ingress Installation

 

 

Group/Multi Card

 

System Requirements

 

 

Combination Group

 

Installing the System

 

 

 

 

 

Starting the Ingress Installation

36-43

Chapter 4

 

 

Installing MySQL Server

 

MANAGEMENT OF USERS

 

 

Installing Microsoft .NET Framework 4.0

 

Add Department

 

 

Installing OFIS Scanner Driver

 

Add Users

 

 

Completing Ingress DB Installer

 

To Download Users from Devices

 

Ingress Startup

 

To Download Users via USB Flash

 

Quick Setup Wizard

 

 

Disk

 

 

 

 

To Create Users Manually

17-29

Chapter 2

 

Edit User Biodata

 

MANAGEMENT OF DEVICE AND DOOR

 

To Edit Users’ Information Manually

 

Devices

 

To Import Users’ Biodata from Other

 

Add Device Manually

 

 

System

 

Add Device by Auto Scan

 

Upload users to devices

 

Configuring Device

 

Upload users via TCP/IP or RS485

 

Disable and Delete Device

 

Upload users via USB flash disk

 

Door

 

Remove Users

 

Add Standalone Device to Door

 

Remove Current Users

 

Add Ingressus to Door

 

Remove Device Users

 

Add Keylock to Door

 

Other Operation

 

Configuring Settings to Doors

 

To export users biodata

 

Delete Device/Doors

 

To import users’ biodata from Sage

 

Access Group of Door

 

 

UBS Payroll

 

Events of Doors

 

 

(for Malaysia market only)

 

Linkage with IP Camera

 

To search users by keywords

Permanent Door Open Close

Time Zone

Permanent Door Open Close

Holiday Time Zone (Ingressus only)

46-50 Chapter 5

ACCESS LEVELS

Access Levels by Time

Setup of Time Set

Setup of Access Group

Access Levels by Holiday

Setup of Holiday Time Set

Create Holiday List to add Holiday Time Set

Access Level by Verify Type

51-55 Chapter 6

MONITORING

Monitoring by Door or Zone

Remote Settings

Monitoring Settings

Real-time Monitoring Log List

Visual Map

Add Visual Map and Doors

Start Monitoring Process

56-92 Chapter 7

ATTENDANCE

Setup of Clocking Schedules

Weekly Schedules

Clocking Rules

Range Rules

General Rules

Rounding Rules

Break Rules

Overtime Rules

The Daily schedule

Clocking Rules

Range Rules

General Rules

Rounding Rules

Break Rules

Overtime Rules

The Flexi Schedule

Clocking Rules

General Rules

Rounding Rules

Break Rules

Overtime rules

Setup of Group Duty Roster

Creating Weekly Group Duty Roster

Creating Shift Group Duty Roster

Assign users into group duty roster

Special working rules

User Duty Planner

Leaves and Remark

To add types of leave

To add Remark

Attendance Sheet

View and Edit

Download data from devices

Generate attendance data

Export Attendance Records

Export to Sage UBS Payroll

(Malaysia market only)

Data Audit List

93-95 Chapter 8

REPORTS

Types of Reports and Usage Preview, Print or Save Reports

96-103 Chapter 9

SETTINGS IN INGRESS

Database Configuration

System Parameters Settings

Field Customization Management

Company Info

System User

To create User Roles

To create login account and assign role

Event

To configure notifications by alarm and email

To configure alarm alerts and color

To configure email alerts

Network Camere Intergration

Milestone server

EpiCamera

Preface

Experience Advanced Access Control System

Welcome to Ingress

Ingress is an advanced access control software developed and designed specifically as a complete solution to centralize, manage, and monitor FingerTec access control devices directly, or by connecting them to the Ingressus access controller hardware. Along with Ingress, you will experience the extensive and elaborate features for configuring access of a door, as well as the ability to centralize and monitor access activity of an environment in a real-time manner.

Ideally suited for self-managed organizations of below 100-door environment, Ingress is also capable of seamlessly integrating its access control functions with alarm monitoring and other intrusion detection devices. Ingress supports all standalone FingerTec access control models that use card, fingerprint and face recognition verification, and multiple devices can be centralized in the Ingressus Network Control Panel for multiple-door monitoring.

10 Useful Features of Ingress

Efficient Centralized Management

Ingress is a server-client based software that supports surveillance from multiple PCs concurrently, while containing useful access monitoring features such as multi-level users, and

user group privileges.

Secure Architecture

The architecture of Ingress keeps data secure and accessible, while providing you with activity logs, audit trails, and advanced devicesearching features in a LAN environment.

User-Friendly & Flexible

User-friendliness is emphasized in Ingress with features such as the Quick-Setup Wizard, drag- and-drop methods, and shortcut icons with ribbon menus to make interaction with the

software effortless.

Enhanced Software Security Features

Ingress provides an optional fingerprint login for system administrators. There is a screenlock function as well as an automatic logout after timeout. The detailed history records and audit trail functions for tracking past configuration changes. There is also a full backup and

restoral of system data.

Access Control Readily Available Reports

There are 13 types of listing & event reports available. The report supports digital watermark imprint, comprehensive event filtering, quick-print and email action. The reports can be exported into 10 formats for example: .XLS,

.TXT, .CSV.

Useful Event Priority & Alerts

You can organize alarm alerts and set alarm priorities to optimize response time into Ingress. There are 62 event types that can be assigned according to the necessity of the priority. Ingress will automatically send email notifications to assigned recipients when an event is detected in the system. You may also customize the sound alert for every priority.

Powerful Access Control Settings

Get most Access Control features from Ingress such as Interlocking, fire alarm linkage, Antipassback, multiple verification settings and

multi-card operation.

Integrated Monitoring

Ingress provides a real-time alarm or event logs to ensure all events are completely documented (including messages and controls) for the entire system. Doors can be controlled remotely, including unlocking doors and disarm-

ing alarms.

Pictorial Map for Instant Activity Visibility

Ingress can display up to a maximum of 9 floor maps for real-time monitoring. The Graphic map is displayed with animated icons for instant visibility of activity. Multiple work stations can be used concurrently to perform

monitoring.

Comprehensive Time Attendance Functions

The weekly schedule comes with 3 pairs of IN/OUT columns for attendance monitoring. You can set up a group or personal duty roster and assign it to the users. Ingress also supports leave and holiday management. At the Attendance Sheet, you can instantly add, edit, or delete attendance records. At the report section, there are 6 types of commonly used time attendance reports, for example: Daily Attendance Listing, Tardiness Report, and On-Leave Listing.

Chapter 1

Installation and Configuration

This chapter guides you on the installation and basic setup of the Ingress.

Before you start using Ingress, you will need to install the software successfully into your computer. Installing the Ingress software is hassle-free as the Ingress installer contains an installation wizard, to guide you step-by-step in setting up the software completely.

GETTING STARTED - Ingress Installation

System Requirements

Before installing Ingress, please make sure your client and server PCs are up to date with the following requirements:

 

Feature

Server

 

Operating

Windows XP

 

system

Windows Vista

 

Windows 7, Windows 8

 

 

 

 

Windows Server 2003/2008

 

 

• (32 or 64 bits)

 

Processor

Intel® Core® 2 Duo 2.5 GHz or better

 

 

 

 

Memory

3 GB of RAM or better

 

Hard drive

80 GB

 

Resolution

1024 x 768 or higher

 

Feature

Client

 

Operating

Windows XP

 

system

Windows Vista

 

Windows 7

 

 

 

 

Windows Server 2003/2008

 

 

• (32 or 64 bits)

 

Processor

Intel® Core® 2 Duo 2.0 GHz or better

 

 

 

 

Memory

2 GB of RAM of better

 

Hard drive

50 GB

 

Resolution

1366 x 768

Installing the System

For Ingress to function properly, you will need to install these components first:

MySQL Server

Microsoft .NET Framework 4.0 Full

FingerTec Ingress Software OFIS Scanner Driver

Starting the Ingress Installation

Right click the FingerTec Ingress setup file and select Run as administrator.

This will prompt the installer to start the Ingress Server – Install Shield Wizard. The Install Shield Wizard will show the required components’ installation status. There are 3 components to be installed before we can proceed with Ingress installation.

MySQL Server

Microsoft .NET Framework 4.0

Click Install to initiate the installation.

Installing MySQL Server

The first component to be installed is the MySQL Server.

At the welcome page, click Next to proceed. At the End-User License Agreement window, select I accept the terms in the License Agreement and click Next to proceed.

At the Choose Setup Type window, choose Typical to proceed.

At the Ready to install MySQL Server 5.5 window, click Install to immediately start the installation. When the progress bar completes, you will be prompted with MySQL Enterprise window.

At the MySQL Enterprise window, click

Next > Next and Finish to launch the

MySQL Instance Server Configuration

Wizard.

Once the installation of MySQL Server completes, the program will launch the MySQL Server Instance Configuration Wizard. You need to click Next 9 times until you reach the security options window. Make sure that on each page before you clicked next, the selections are as shown as the screenshots below.

FingerTec Ingress User Manual

10

At the Modify Security Settings, enter your new Root Password and enter it once again for reconfirmation. Click Next > Execute to start the configuration. Once done, click Finish.

Installing Microsoft .NET Framework 4.0

The next component that the installer needs to install is the Microsoft .NET Framework 4.0. The FingerTec Ingress Setup will detect and determine if the computer has already been installed with the Microsoft .NET Framework 4.0. It will skip the installation if it has been installed. If it has not been installed, the FingerTec Ingress Setup will install it automatically.

Upon completing the installation of the MySQL Server and Microsoft .NET Framework 4.0, the next component to be installed is the Ingress Server. Click Next, select I accept the terms in the license agreement and click Next to proceed. Choose the installation path and click Next.

11

Select Complete and click Next. Click

Install to start the Installation and click

Finish when the process is complete.

Installing OFIS Scanner Driver

The last component to install is the OFIS Scanner Driver. The Ingress Setup will detect and determine if the computer has already been installed with the OFIS Scanner Driver and skip the installation if has. If it has not, the Ingress Setup will install it automatically.

12

Click Next and click Install to start the installation. Upon completing the installation, you will need to restart the computer for the changes to take effect. Please select No, I will restart the computer later and click Finish to proceed to the next step.

Completing Ingress DB Installer

The Ingress Setup will then prompt the Ingress DB installer window. It is very important to test the server and database connection before you start using Ingress. If you do not perform this step, you will not be able to log into Ingress. Insert the Password and click Test Connection.

13

Once the server connection is established, it will open up the option for Database. Insert the User Name and Password for the Database and click Update Connection.

After the Database connection is established, click New Database to create a new database.

Click Finish to complete the installation.

14

Ingress Startup

Once the installation has completed, the Ingress icon will be available at the desktop. Right click the icon and select Run as administrator.

The Ingress client will validate the database connection from the server. Once the validation has been obtained, insert the Server IP Address and Server Port to establish connection. Click Test to test the connection. When the connection has been established successfully, click Save to save the Server IP Address and Server Port into the computer for future references.

Now you will reach the Ingress Login Window. Insert the User Name and Password to log into Ingress. Default User Name: admin , Password: 123. You can change the User Name and Password under Ingress User Accounts. Click Login to log into Ingress. If you wish to reconfigure the server settings, click Server Setting. You can also log into Ingress by using your fingerprint instead of the username login. You will need to enroll your fingerprint template(s) under User Account before you can login using this method.

Congratulations! Now you are about to experience INGRESS, the Advanced Access Control Software, brought to you by FingerTec Worldwide.

15

Quick Setup Wizard

Ingress will start up Quick Setup Wizard during the first login session. The wizard will guide you through all basic and useful settings in Ingress software.

You can skip the wizard in order to configure Ingress software by yourself. You can always run the wizard later from the Main Menu button.

16

Chapter 2

Management of Device and Door

This chapter guides you on how to install and manage FingerTec devices into Ingress and assigning them to doors.

Devices

Devices refer to the FingerTec physical terminals installed to guard every door/entrance. There are 3 types of physical terminals:

Ingressus door controller

FingerTec standalone terminal

Keylock series (7700 and 8800)

Ingressus door controller can work with slave terminals. It is the master that will store & transfer data, control door and alarm activities. Ingressus door controller can link up to a maximum of 4 slave terminals (R2c, i-Kadex or k-Kadex). Slave terminals only work as capturing station for fingerprints, cards or password. The captured data is sent to Ingressus for verification before Ingressus can grant access to users. Ingressus can work with AUX input (e.g.: heat and smoke sensor, PIR motion detector) and output (e.g.: alarm siren, strobe light, IP camera).

FingerTec standalone terminals refer to all FingerTec terminals, for example R2, AC900, Q2i, Face ID series. The terminals have individual processors and memory, to verify and store users’ data. Standalone terminals can be paired with slave terminals as an entry-exit system. Slave terminals capture fingerprints, card or password data then sends them to master for verification.

Keylock series refer to FingerTec biometric mechanical door lock. The Keylock series has integrated processor and memory, to verify/store users’ data. However, it does not communicate with Ingress directly as it only has a USB port for data transfer.

Add Device Manually

You must add each device into the list in Ingress before you can manage any of it. Adding devices to Ingress requires the device to connect to Ingress via network (TCP/IP or RS 485). However, standalone terminals and the Keylock series supports USB flash disk for transferring data and settings with Ingress.

Every device has a unique serial number, which is important for activation in Ingress. Contact your local resellers or support@fingertec.com by providing the serial number of the device in case you fail to activate online.

17

1.Go to Device tab to select Add Device.

2.Select Device Type and Communication Mode then insert the information accordingly.

Device Name: Name the device for easy future reference.

Communication Key: 5-digit numeric secret password to secure the connection between device and Ingress. Ingress must pair this key with device (under Dev ID) before connection establishes.

Auto Synchronize Device Time: Activate this to allow Ingress to always synchronize the device with the server date and time.

Settings for TCP/IP connection:

IP Address/URL: Insert the IP address of the device so Ingress can find it on the network to establish connection.

For devices installed at remote site, you can insert the URL of the remote server into this column. Ingress can link up with the device via Internet.

Port: Default TCP port (4370) of Ingress server to link up with device via network.

Settings for RS485 connection

Serial port: Define the serial port of the server in use to connect to the RS232/485 data converter. Baud rate: Select the baud rate of RS485 network.

Settings for USB flash disk

Serial number: Serial number of device.

Device ID: Make sure you insert the same ID as the one set in the device. Ranges from 1 to 999.

Settings for Keylock

UDisk Path: Define the USB flash disk drive to read the basic info of Keylock

3.Check the box Online next to Device Activation to add the device into Ingress.

If an Internet connection is unavailable, you can activate the device by selecting Offline. Ingress accepts a 12-digits alphanumeric code for offline activation, but this code may onle be retrieved from your local resellers or support@fingertec.com.

4.Click Enable Device to establish connection to the device.

Note: You must plug in a USB flash disk to Keylock 7700/8800 to download a file name “X_udata”, where X is the Device ID of the device used (e.g.: 1_udata). The file contains the serial number of the device and other important information. Ingress can only add the Keylock 7700/8800 device into the list after it captures this file from the USB flash disk.

18

Add Device by Auto Scan

In case you do not know the specific IP address of the standalone device or Ingress, you can use the Auto Scan function to look for them on the network.

1.Click Scan Device.

2.Select Device Type:

Standalone device: Insert range of IP address.

Ingressus: Ignore IP address because Ingress can discover the IP address of Ingressus automatically. Keylock: Ingress scans your USB drive which contains the “X_udata” file.

3.Click Scan to start.

4.Device is discovered and published on the list.

5.Select the devices to add into Ingress.

6.Continue to activate the device (refer to Chapter 2 • Add Device Monually).

Configuring Device

Download all settings and info from devices when connection is established. You can start to personalize the settings of each device and synchronize new settings and info to devices by uploading them. Due to the different nature of all 3 types of devices, Ingress hides some pages/options when not applicable with a device.

1.Click to select device.

2.Click Download Device Settings.

3.Wait for the download process to finish.

4.Start to configure:

19

Information: This is the page to display all information of the device. No amendments are allowed. You can know the storage status of the device at the Record section.

Network: You can change types of communication mode in this page, for example change from TCP/IP to RS485. You can update the TCP/IP settings (e.g.: change to new IP address) or RS485 settings (e.g.: change baud rate to 9600bps). All new settings will take effect after you upload the new settings to the device.

Biometric: This page is only effective when connecting to devices that support fingerprint or face recognition. Amend these settings accordingly after you click the Edit button:

Only 1:1 verification: Set to No by default so users can gain access immediately after verifying their finger or face. Change this to Yes if you want users to insert their ID before fingerprint/face verification.

Fingerprint algorithm: VX 10.0 is the latest fingerprint matching algorithm supported by the device. Only change to VX 9.0 if your environment is using the older algorithm. This option is not applicable to Ingressus because it only supports VX 10.0.

Face/Fingerprint 1:1 Threshold: The level of matching security if you want users to insert user ID before fingerprint/face verification. For fingerprint, the range is from 0 to 50, where 50 is the highest. For face, it ranges from 0 to 99 where 99 is the highest. The default values are 15 for fingerprint and 70 for face.

Face/Fingerprint 1:N Threshold: The level of matching security if you allow users to verify by fingerprint/face without inserting user ID. The default values are 45 for fingerprint and 75 for face.

Power: You can configure the duration (in minutes) for device to wait before going into idle mode. Idle time (in minutes): Time duration to wait before going into idle mode.

Idle action: Select either Sleep or Power Off.

Power on time: Check the box and insert time to turn on the device. Power off time: Check the box and insert time to shut down the device.

Access control: You can configure the device for basic access control settings.

Save Transaction log: Set to Yes by default. The device saves IN-OUT records of users. In case you only want the device to control access without referring to its records, select No. The device will not keep any INOUT records.

Save False Log: Set to Yes by default. The device saves records even though users fail to verify. You can assess the level of fail verifications happening at this device and adjust the biometric settings to improve the verification process. Select No and the device will not store this record.

Master Record State: You must define the device as Master or Slave If two standalone devices are installed to control one door. Normally the standalone device controlling entry is set as Master, and at the exit is the Slave. Ignore if you are installing slave device with a standalone device. This is important if you are using Antipassback function. The Master device stores all entry-exit records to justify Antipassback status.

Antipassback: Feature that forces users to verify every time he/she comes in or leaves a zone. In case he/she is tailgating another user without verification to access a zone, the device will block his/her verification to gain access again. You can select any of the following settings to suit your environment.

20

In: Activate this to force users to verify when leaving a zone. Users can skip verification when coming into the zone.

Out: Activate this to force users to verify when coming into a zone. Users can skip verification when leaving the zone.

In/Out: Activate this to force users to verify both when coming in and leaving a zone.

None & Save: Select this setting so the device does not block users to access when Antipassback take effect. Device will instead only keeps track of Antipassback records with the user ID, where you can download the records into Ingress to view and analyze.

None: Disable Antipassback at the device. Other settings:

Power off Device: To shutdown device remotely. All devices do not have a physical power off button to avoid unauthorized shutdown. You can only shutdown the device by clicking this button.

Reboot Device: To restart device remotely. If the device is working abnormally, try to restart it.

Synchronize Date and Time: Synchronize date and time of device immediately. It is recommended to do this during first installation.

Download Device Settings: Download all settings/parameters from device. Activate Device: Activate device to be added into Ingress.

Clear All Device Data: To clear the storage of device back to initial stage. You cannot retrieve any data after this.

Clear All Log: To delete the transaction logs stored in device. Recommended to do this after you finish downloading logs from device.

Clear Admin Privilege: To clear admin lock in device. Any users can access into the Main Menu by pressing the Menu button. Only do this before you want to assign a new administrator at the device.

Upload Device Settings: To upload all new settings/parameters device to start to take effect.

Operation logs: Device records every operation done by administrators into a log file. This is a hidden file that you cannot view at the device. You must download the operation logs into Ingress to view it.

Press Download OP Log to download from device. Insert the date range to narrow down your search.

Event: Device records abnormal activities (e.g.: door force open, alarm trigger, fail verification, etc.) as events. These records are automatically downloaded into Ingress. You can narrow your search to view by date and time.

5. Click Upload Device Settings to upload new settings to devices.

Disable and Delete Device

Delete or remove the device from list if it is no longer in use, or wrongly added to Ingress. In case you want to suspend a device from Ingress (to stop data transfer with the device), disable it from the list.

To delete a device:

1.Click to select the device from list.

2.Click Delete Device.

3.Click Yes to confirm to delete the device.

21

To disable a device:

1.Click to select the device from list.

2.Click Disable Device.

3.Click Yes to confirm to suspend the device.

Doors

Adding devices into Ingress is to prepare the list of devices installed in the environment. Now you can start to pair the devices to doors accordingly. You must assign devices to guard every door. Pairing multiple devices to a specific door allows you to update the same access settings (e.g.: door unlocks time) to both entry and exit devices.

For installations with Ingressus II (2-doors door controller), you can pair devices with 2 doors. You can configure different access settings for each door even though they are connected to the same Ingressus II controller.

Types of device

Quantities of devices/slaves

Quantities of door

Standalone devices

2 devices

1

Ingressus I

2 slave terminals

1

Ingressus II

4 slave terminals

2

Keylock

1

1

Ingress can work with video surveillance software. You can connect to Milestone server or EpiCamera to stream video from your IP camera for live view or playback. It is recommended to pair the IP camera with the door/entrance installed with device to monitor users’ movement. In case of abnormal door activities (e.g.: door force open, device dismantled illegally) Ingress will trigger alarms to alert administrators. You can playback the video at that moment to know what is going on at the door, or even export the photo or video easily for further investigation.

Add Standalone Device to Door

1.Click Door at the left panel.

2.Click Add Door.

3.Rename the door, for example Main entrance.

4.Add description to the door for easy reference.

22

5.Click Add Device.

6.Select Standalone Device.

7.Select the device to be added to this door.

8.Repeat steps (5) to (7) to add 2nd standalone device to this door.

Note: Select Slave Device in the Add Device window if you are connecting a slave device (R2c, i-Kadex or k-Kadex) with the standalone device. Name the slave device according to its model.

Add Ingressus to Door

Ingress automatically creates door(s) after you add Ingressus into the system. System creates 1 door if Ingressus I is added as device, 2 doors if Ingressus II is added. You will find the IP address of Ingressus display at the left panel.

In Ingressus II, you will send 2 lines of the same IP address to indicate 2 doors. Under each door, there is an in and out device (slave devices). Refer to Ingressus installation guide to understand how to define door and IN-OUT slave devices. This is all controlled by the wiring between Ingressus and slave devices.

Right click at the IP address of Ingress to rename, for example Ingressus II – R&D office. Rename the slave device by their models for easy reference.

23

Add Keylock to Door

Ingress automatically creates a door named Keylock 7700/8800 after you add the device into the system. Ingress adds the device to the door immediately. You can rename the device for easy reference.

Configuring Settings to Doors

You can configure access settings in Ingress and upload to both devices paired with the door. This ensures both standalone devices apply the same access settings during operation. If you are using a standalone device with a slave to guard the door, settings will only be sent to the standalone device.

Ingress treats Ingressus II as 2 different doors even though it is from one device. You can configure access settings for each door individually. Ingressus II can store and apply the settings to doors accordingly.

Ignore this if you are installing with the Keylock series. Due to the lack of communication cable, Ingress cannot upload any settings to Keylock. Thus you do not need to configure anything in Ingress.

1.Click to select a door.

2.Press Edit at the right panel.

3.Change the settings accordingly.

General configuration for standalone device and Ingressus

Permanent Door Open/Close Time Zone: Select to follow time range settings to allow free access (without verification at the device) to the zone. Only to be used for zones with open access to public during specific time range. Requires setup of Permanent Door Open Close Time Zone. Leave this blank to ignore this feature.

Lock Open Duration: Change to set duration for door lock and unlock during successful verification.

24

Door Sensor Type: Select the type of door sensor installed at the device. The most common type is NC (normally close). Door sensor is a must-have component if you want to monitor door activities. It responds to standalone device or Ingress all the time to report door status.

Configurations to apply to door with standalone device only

Full Access Device: Important setup if you apply Time Zone settings to the door. Select exit device to become full access device. Full access device ignores time zone settings. Users can verify at the device to leave the zone anytime.

Entry Device: Defines if the device is used for In or Out transactions. For example, all records from an In device will be recorded as In while records from the other device at the same door will be recorded as Out.

Alarm Delay: Change to set the duration before triggering alarm during emergency. Set to 0 for the device to trigger alarm immediately during emergency.

Error Times To Alarm: To set the maximum times of failed verification before device triggers alarm. This is to alert the unauthorized person to not tamper with the device.

Duress Alarm 1:1 Trigger Duress Alarm 1:N Trigger Duress Alarm Password Trigger

During emergency users can verify at the device to trigger duress alarm to alert others. For example, robbers force user to verify to unlock the door to access into the zone. User can verify at device to trigger alarm to alert the users inside the zone.

Activate one of the above options as the duress alarm trigger method. If you are using fingerprint verification to gain access during normal days, activate Duress Alarm Password Trigger. The device will then trigger the alarm when you insert your password. Refer to the device’s user guide for details on how to enroll fingerprint or password to trigger duress alarm.

Duress Alarm Delay: Change to set duration before alarm is triggered during duress scenario. Set 0 and device will trigger alarm immediately during duress scenario.

Door Sensor Type: Select the type of door sensor installed at the device. The most general type is NC. Door sensor is an important component to monitor door activities. In case of door force open or door remain open, the door sensor reports it to the device. You can see the status of door under the Monitoring page in Ingress. Select None if you did not install door sensor, but you can no longer monitor the activities from this door.

Configurations to apply to door with Ingress only

Permanent Door Open/Close Holiday Time Zone: Select to follow time range settings to allow free access (without verification at the device) to the zone during holiday. Requires setup of Holiday list and Permanent Door Open Close Holiday Time Zone. Leave this blank to ignore this feature.

Punch Interval: Set the time duration between 1st and 2nd verification from the same user, for example 10s. Ingressus will not grant access to the user if he/she verifies twice within 10s from any slave devices.

Verify Mode: To select combination of verification to gain access. Duress Password: Same as Duress Alarm Password Trigger.

Emergency Password: During emergency, users can enter an emergency password to unlock any door (controlled by Ingressus) at anytime. Time zone or access control settings will not affect it. This is normally done by the administrator.

Door sensor delay: Set the time duration before Ingressus triggers the alarm if door remains open.

Close and Reverse State: Activate this if you want EM lock or dropbolt to lock immediately once door closes. You must install door sensor together with the door lock. When the door sensor touches each other, Ingressus receives the signal and activates the door lock system immediately. This overrides the Door Open

Duration settings and can avoid unauthorized access or tailgating incident.

4.Save settings.

5.Upload new settings to devices.

25

Delete Device/Doors

You can delete the devices or doors in case any of them are no longer in use. Make sure you identify the devices and doors before you proceed to delete them.

1.Click to select the device/door display at the left panel to delete.

2.Click Delete Device or Remove Door to proceed.

3.Click Yes to confirm to delete.

Access Group of Door

You can limit access according to time range of every user via each door. For example all users can access via the main entrance but only Admin staff can access into the Admin department during office hours. Refer to Access Level for more details.

Here, you can only view the access time range set to each door. You can only change them under the Access Level tab.

Events of Doors

Each device uploads activities (e.g.: door force opened) to Ingress automatically. You can view these records according to date and time.

26

1.Press Edit.

2.Define the date range/Interval.

3.Press Get Log.

Linkage with IP Camera

Ingress can link up with the MileStone server or EpiCamera to stream the video. You can have live view from your IP camera in Ingress without logging-in to MileStone or EpiCamera. You can pair the IP camera to relevant door(s) so you can monitor IN-OUT movement easily.

Before you start to pair the IP camera to a door, go to System Settings to configure connection details of your Milestone server or EpiCamera under Network Camera Integration.

1.Select Door at the left panel.

2.Click Add Camera.

3.Select MileStone or EpiCamera.

4.Select the IP camera to be paired with the door.

5.The IP camera will be displayed at the left panel under the selected door.

6.Select the IP camera and click Show Live View to stream video.

In case of abnormal door activities (e.g.: door force open), Ingress records the event immediately under Monitoring. You can playback the video during the abnormal door activities by clicking at the alert message. More details under Monitoring.

1.Select the IP camera from left panel.

2.Click Remove Camera.

3.Yes to confirm to delete.

27

Permanent Door Open Close Time Zone

You can set a specific time range to allow free access for certain entrance. For example, sales office is open for customers to visit during office hours (9am to 5pm). Users do not need to verify to gain access from 9am to 5pm. This is called Permanent Door Open Close Time Zone, designed to control access for zones with high traffic flow without compromising the security purpose.

Steps to setup Permanent Door Open Close Time Zone:

1.Click Permanent Door Open Close Time Zone.

2.Click Add Time Zone.

3.Name the Time Zone, e.g.: Office hour – Free Access 9am to 4pm.

4.Press Edit.

5.Define the Start and End time for each day.

You can click the Copy button to copy the settings from the previous day.

Click to define time range by scroll bar.

6.Press Save to save settings.

Steps to assign Permanent Door Open Close Time Zone to Door:

1.Select Door from the left panel.

2.Select Details.

3.Press Edit.

4.Select the time zone under Permanent Door Open Close Time Zone.

5.Press Save.

6.Upload settings to devices.

To remove the Permanent Door Close Time Zone from list:

1.Select the Time Zone from left panel.

2.Click Remove Time Zone.

3.Yes to confirm to delete.

28

Permanent Door Open Close Holiday Time Zone (Ingressus only)

You can apply Permanent Door Close Time Zone during holidays. Ingress applies the time zone settings to the date listed under Holiday Settings. This is only effective to doors installed with Ingressus.

Steps to setup Permanent Door Open Close Time Zone:

1.Click Permanent Door Open Close Time Zone.

2.Click Add Holiday Time Zone.

3.Name the Time Zone, e.g.: Holiday Access – Morning only.

4.Press Edit.

5.Define the Start and End time.

6.Press Save to save settings.

Steps to assign Permanent Door Open Close Holiday Time Zone to Ingressus:

1.Select Ingressus from the left panel.

2.Select Details.

3.Press Edit.

4.Select the time zone under Permanent Door Open Close Holiday Time Zone.

5.Press Save.

6.Upload settings to Ingressus.

To remove the Permanent Door Close Time Zone from list:

1.Select the Holiday Time Zone from left panel.

2.Click Remove Holiday Time Zone.

3.Yes to confirm to delete.

29

Chapter 3

Setup of Zones

This chapter guides you on setting up zone installations using Ingressus.

This chapter is only applicable for Ingressus. Skip this chapter if you are not installing any Ingressus controllers in your environment. You can set up zone installations with Ingressus to perform more secure access control settings.

There are a total of 5 types of zones, which are:

Antipassback

Fire alarm

Interlocking

First Card Unlock

Multi Card Open

Antipassback

Apply Antipassback to force all users to verify every time when coming in or leaving the work place. Ingressus blocks user access if the user missed his/her previous verification record. This is an important feature to stop users from tailgating others during access. Ingress can collect the full IN-OUT records of every user.

1.Click Antipassback from the left panel.

2.Click Add Zone.

3.Name the Zone, e.g.: Ground Floor.

4.Click Add Device.

5.Select Ingressus from the list.

6.Name the Ingressus controller.

7.Press Edit at the Basic Information panel.

30

Loading...
+ 74 hidden pages