Kantech WinPass KT- 300 System Reference Manual

S YSTEM REFERENCE MANUAL &
KT-300 CONTROLLERS
VV
V
VV
DN1237-0003.2.1 © 1997-2000 KANTECH SYSTEMS INC.
erer
er
erer
sion 2sion 2
sion 2sion 2
Part of the DSC group, Kantech Systems Inc. embraces the group's corporate philosophy of providing competitive and innovative products. Established in 1986, Kantech Systems has been designing and manufacturing integrated access control systems for industrial, government and military applications.
The DSC Group is recognized as a leading international manufacturer of security products. As a group, we currently supply hundreds of different security products that are distributed in more than 100 countries. We strongly believe in cost effective manufacturing and product innovation. Over one hundred engineers and technologists contribute to our on going R&D efforts with one goal in mind: providing high quality, cost effective and innovative products!
DSC group manufacturing facilities are spacious, efficient and equipped with the most advanced electronic assembly equipment operating on 24 hour production schedule to meet demand, quickly and efficiently.
ISO-9001 Certified Quality System
The international Organization for Standardization (ISO) is a worldwide federation of national standard bodies. ISO has developed a series of standards relating to a Quality System known as the ISO family standards. The ISO-9001 standard defines the highest level for this Quality System and is applicable to design, development, production, installation and servicing, final inspection and testing.
The system is audited twice a year and certified by outside auditors/registrars. Kantech’s quality system also extends to its suppliers and customers. A supplier must be initially approved and thereafter, regularly appraised and rated. Customer feedback is documented and reviewed under formal procedures by Kantech’s internal Continuing Improvement Committee composed of employees from every depart­ment.
Kantech Systems Inc.
3650-A Matte Boulevard
Brossard, Quebec
Canada J4Y 2Z2
Customer Assistance
Tel: 1(450) 444-2040 ext.: 399
Fax: 1(450) 444-2029
Web Site: http://www.kantech.com
Specifications may change at any time without prior notice
Copyright © 1997 - 2000 Kantech Systems Inc.
All rights reserved
MARCH 2000
END-USER LICENSE AGREEMENT
FOR Kantech Software Provided With or Without Products or Components
IMPORTANT - READ CAREFULLY: Kantech Software purchased with or without Products and Components is copyrighted and is purchased under the following license terms:
This End-User License Agreement (“EULA”) is a legal agreement between You (the company, individual or entity who acquired the Software and any related Hardware) and Kantech Systems Inc. (“Kantech”), the manufacturer of the integrated security systems and the developer of the software and any related products or components (“HARDWARE”) which You acquired.
If the Kantech software product (“SOFTWARE PRODUCT” or “SOFTWARE”) is intended to be accompanied by HARDWARE, and is NOT accompanied by new HARDWARE, You may not use, copy or install the SOFTWARE PRODUCT. The SOFTWARE PRODUCT includes computer software, and may include associated media, printed materials, and “on-line” or electronic documentation.
Any software provided along with the SOFTWARE PRODUCT that is associated with a separate end-user license agreement is licensed to You under the terms of that license agreement.
By installing, copying, downloading, storing, accessing or otherwise using the SOFTWARE PRODUCT, You agree uncondi­tionally to be bound by the terms of this EULA, even if this EULA is deemed to be a modification of any previous arrangement or contract. If You do not agree to the terms of this EULA, Kantech is unwilling to license the SOFTWARE PRODUCT to You, and You have no right to use it.
SOFTWARE PRODUCT LICENSE
The SOFTWARE PRODUCT is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. The SOFTWARE PRODUCT is licensed, not sold.
1. GRANT OF LICENSE. THIS EULA GRANTS YOU THE FOLLOWING RIGHTS:
(a) Software Installation and Use - For each license You acquire, You may have only one copy of the SOFTWARE PRODUCT
installed.
(b) Storage/Network Use - The SOFTWARE PRODUCT may not be installed, accessed, displayed, run, shared or used concurrently
on or from different computers, including a workstation, terminal or other digital electronic device (“Device”). In other words, if You have several workstations, You will have to acquire a license for each workstation where the SOFTWARE will be used.
(c) Backup Copy - You may make backup copies of the SOFTWARE PRODUCT, but You may only have one copy per license
installed at any given time. You may use the back-up copy solely for archival purposes. Except as expressly provided in this EULA, You may not otherwise make copies of the SOFTWARE PRODUCT, including the printed materials accompanying the SOFTWARE.
2. DESCRIPTION OF OTHER RIGHTS AND LIMITATIONS.
(a) Limitations on Reverse Engineering, Decompilation and Disassembly - You may not reverse engineer, decompile, or
disassemble the SOFTWARE PRODUCT, except and only to the extent that such activity is expressly permitted by applicable law notwithstanding this limitation. You may not make any changes or modifications to the Software, without the written permission of an officer of Kantech. You may not remove any proprietary notices, marks or labels from the Software Product. You shall institute reasonable measures to ensure compliance with the terms and conditions of this EULA.
(b) Separation of Components - The SOFTWARE PRODUCT is licensed as a single product. Its component parts may not be
separated for use on more than one HARDWARE unit.
(c) Single INTEGRATED PRODUCT - If You acquired this SOFTWARE with HARDWARE, then the SOFTWARE PRODUCT
is licensed with the HARDWARE as a single integrated product. In this case, the SOFTWARE PRODUCT may only be used with the HARDWARE as set forth in this EULA.
(d) Rental - You may not rent, lease or lend the SOFTWARE PRODUCT. You may not make it available to others or post it on a
server or web site.
(e) Software Product Transfer - You may transfer all of Your rights under this EULA only as part of a permanent sale or transfer
of the HARDWARE, provided You retain no copies, You transfer all of the SOFTWARE PRODUCT (including all component parts, the media and printed materials, any upgrades and this EULA), and provided the recipient agrees to the terms of this EULA. If the SOFTWARE PRODUCT is an upgrade, any transfer must also include all prior versions of the SOFTWARE PRODUCT.
(f) Termination - Without prejudice to any other rights, Kantech may terminate this EULA if You fail to comply with the terms and
conditions of this EULA. In such event, You must destroy all copies of the SOFTWARE PRODUCT and all of its component parts.
(g) Trademarks - This EULA does not grant You any rights in connection with any trademarks or service marks of Kantech or its
suppliers.
3. COPYRIGHT.
All title and intellectual property rights in and to the SOFTWARE PRODUCT (including but not limited to any images, photographs, and text incorporated into the SOFTWARE PRODUCT), the accompanying printed materials, and any copies of the SOFTWARE PRODUCT, are owned by Kantech or its suppliers. You may not copy the printed materials accompanying the SOFTWARE PRODUCT. All title and intellectual property rights in and to the content which may be accessed through use of the SOFTWARE
Continuation from previous page...
PRODUCT are the property of the respective content owner and may be protected by applicable copyright or other intellectual property laws and treaties. This EULA grants You no rights to use such content. All rights not expressly granted under this EULA are reserved by Kantech and its suppliers.
4. EXPORT RESTRICTIONS.
You agree that You will not export or re-export the SOFTWARE PRODUCT to any country, person, or entity subject to Canadian export restrictions.
5. CHOICE OF LAW: THIS SOFTWARE LICENSE AGREEMENT IS GOVERNED BY THE LAWS OF THE PROVINCE
OF ONTARIO, CANADA.
6. ARBITRATION
All disputes arising in connection with this Agreement shall be determined by final and binding arbitration in accordance with the International Commercial Arbitration Act, R.S.O. 1990, c. I.9, or any successor or replacement legislation which may be in force, and the parties agree to be bound by the arbitrator’s decision. The place of arbitration shall be Toronto, Canada.
7. LIMITED WARRANTY (a) NO WARRANTY
KANTECH PROVIDES THE SOFTWARE “AS IS” WITHOUT WARRANTY. KANTECH DOES NOT WARRANT THAT THE SOFTWARE WILL MEET YOUR REQUIREMENTS OR THAT OPERATION OF THE SOFTWARE WILL BE UNINTERRUPTED OR ERROR-FREE.
(b ) CHANGES IN OPERATING ENVIRONMENT
Kantech shall not be responsible for problems caused by changes in the operating characteristics of the HARDWARE, or for problems in the interaction of the SOFTWARE PRODUCT with non-Kantech-SOFTWARE or HARDWARE PRODUCTS.
(c) LIMITATION OF LIABILITY; WARRANTY REFLECTS ALLOCATION OF RISK
IN ANY EVENT, IF ANY STATUTE IMPLIES WARRANTIES OR CONDITIONS NOT STATED IN THIS LICENSE AGREEMENT, KANTECH’S ENTIRE LIABILITY UNDER ANY PROVISION OF THIS LICENSE AGREEMENT SHALL BE LIMITED TO THE GREATER OF THE AMOUNT ACTUALLY PAID BY YOU TO LICENSE THE SOFTWARE PRODUCT AND FIVE CANADIAN DOLLARS (USD$5.00). BECAUSE SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU.
(d ) DISCLAIMER OF WARRANTIES
THIS WARRANTY CONTAINS THE ENTIRE WARRANTY AND SHALL BE IN LIEU OF ANY AND ALL OTHER WARRANTIES, WHETHER EXPRESSED OR IMPLIED (INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE) AND OF ALL OTHER OBLIGATIONS OR LIABILITIES ON THE PART OF KANTECH. KANTECH MAKES NO OTHER WARRANTIES. KANTECH NEITHER ASSUMES NOR AUTHORIZES ANY OTHER PERSON PURPORTING TO ACT ON ITS BEHALF TO MODIFY OR TO CHANGE THIS WARRANTY, NOR TO ASSUME FOR IT ANY OTHER WARRANTY OR LIABILITY CONCERN­ING THIS SOFTWARE PRODUCT.
(e) EXCLUSIVE REMEDY AND LIMITATION OF WARRANTY
UNDER NO CIRCUMSTANCES SHALL KANTECH BE LIABLE FOR ANY SPECIAL, INCIDENTAL, CONSEQUEN­TIAL OR INDIRECT DAMAGES BASED UPON BREACH OF WARRANTY, BREACH OF CONTRACT, NEGLI­GENCE, STRICT LIABILITY, OR ANY OTHER LEGAL THEORY. SUCH DAMAGES INCLUDE, BUT ARE NOT LIMITED TO, LOSS OF PROFITS, LOSS OF THE SOFTWARE PRODUCT OR ANY ASSOCIATED EQUIPMENT, COST OF CAPITAL, COST OF SUBSTITUTE OR REPLACEMENT EQUIPMENT, FACILITIES OR SERVICES, DOWN TIME, PURCHASER?S TIME, THE CLAIMS OF THIRD PARTIES, INCLUDING CUSTOMERS, AND INJURY TO PROPERTY.
WARNING: Kantech recommends that the entire system be completely tested on a regular basis. However, despite frequent testing, and due to, but not limited to, criminal tampering or electrical disruption, it is possible for this SOFTWARE PRODUCT to fail to perform as expected.
Please click on the “I agree” button if You agree to terms of this End User License Agreement. If You do not agree to the terms of this EULA, press the “I Do Not Agree” button as Kantech is unwilling to license the SOFTWARE PRODUCT to You, and You have no right to use it.
TT
ABLE OF CONTENTSABLE OF CONTENTS
T
ABLE OF CONTENTS
TT
ABLE OF CONTENTSABLE OF CONTENTS
SECTION 1 - Introduction to WinPassSECTION 1 - Introduction to WinPass
SECTION 1 - Introduction to WinPass
SECTION 1 - Introduction to WinPassSECTION 1 - Introduction to WinPass
Important Information .............................................................................................. 9
Unique Features....................................................................................................... 9
WinPass Architecture (RS-232)................................................................................ 9
System Specifications ............................................................................................ 10
Part Numbers and Contents ................................................................................... 11
SECTION 2 - WinPass UtilitiesSECTION 2 - WinPass Utilities
SECTION 2 - WinPass Utilities
SECTION 2 - WinPass UtilitiesSECTION 2 - WinPass Utilities
Computer Requirements ................................................................................................................................................. 13
Software Installation....................................................................................................................................................... 13
Using ExpressSetUp ....................................................................................................................................................... 14
Login the System ............................................................................................................................................................ 15
Uninstalling WinPass ..................................................................................................................................................... 16
Backup Procedure........................................................................................................................................................... 16
Upgrade Procedure ......................................................................................................................................................... 16
SECTION 3 - WinPass BasicsSECTION 3 - WinPass Basics
SECTION 3 - WinPass Basics
SECTION 3 - WinPass BasicsSECTION 3 - WinPass Basics
Main Menu ..................................................................................................................................................................... 19
Toolbar Menus ............................................................................................................................................................... 20
File T ools (buttons) ........................................................................................................................................................ 20
Operator Acknowledgment............................................................................................................................................. 21
Customizing the System ................................................................................................................................................. 21
Defining Controllers ....................................................................................................................................................... 21
Defining Schedules......................................................................................................................................................... 21
Defining Doors ............................................................................................................................................................... 21
KT-300 Door Programming Relays ................................................................................................................................. 21
Monitoring Inputs .......................................................................................................................................................... 21
Programming Outputs..................................................................................................................................................... 21
Access Levels ................................................................................................................................................................ 21
Defining Cards................................................................................................................................................................ 22
Security Levels ............................................................................................................................................................... 22
Holidays ......................................................................................................................................................................... 22
Defining Events .............................................................................................................................................................. 22
1212
12
1212
1818
18
1818
88
8
88
SECTION 4 - Defining System UserSECTION 4 - Defining System User
SECTION 4 - Defining System User
SECTION 4 - Defining System UserSECTION 4 - Defining System User
Card Definition ............................................................................................................................................................... 25
SECTION 5 - SECTION 5 -
SECTION 5 -
SECTION 5 - SECTION 5 -
Workstation Configuration ............................................................................................................................................. 29
Controller Definition ....................................................................................................................................................... 31
Door Definition ............................................................................................................................................................... 35
Relay Definition .............................................................................................................................................................. 37
Input Definition .............................................................................................................................................................. 37
Output Definition............................................................................................................................................................ 38
SECTION 6 - SECTION 6 -
SECTION 6 -
SECTION 6 - SECTION 6 -
Schedule Definition ........................................................................................................................................................ 41
Access Level Definition ................................................................................................................................................. 41
Holiday Definition .......................................................................................................................................................... 42
Event Definition.............................................................................................................................................................. 42
Operator Definition ......................................................................................................................................................... 43
Security Level Definition ................................................................................................................................................ 44
Physical Components ConfigurationPhysical Components Configuration
Physical Components Configuration
Physical Components ConfigurationPhysical Components Configuration
Logical Components ConfigurationLogical Components Configuration
Logical Components Configuration
Logical Components ConfigurationLogical Components Configuration
ss
s
ss
2424
24
2424
2828
28
2828
4040
40
4040
WW
inPass Reference ManualinPass Reference Manual
W
inPass Reference Manual
WW
inPass Reference ManualinPass Reference Manual
SECTION 7 - SECTION 7 -
SECTION 7 -
SECTION 7 - SECTION 7 -
Door Operation............................................................................................................................................................... 47
Relay Operation .............................................................................................................................................................. 48
Input Operation .............................................................................................................................................................. 48
Output Operation............................................................................................................................................................ 49
Controller Status............................................................................................................................................................. 49
Card List ......................................................................................................................................................................... 50
Reload Controller ............................................................................................................................................................ 50
Date & Time.................................................................................................................................................................... 51
Re-Index.......................................................................................................................................................................... 51
SECTION 8 - SECTION 8 -
SECTION 8 -
SECTION 8 - SECTION 8 -
Events Report ................................................................................................................................................................. 53
Card Report..................................................................................................................................................................... 54
SECTION 9 - SECTION 9 -
SECTION 9 -
SECTION 9 - SECTION 9 -
Step 1. Preparing to Install the KT-300 ........................................................................................................................... 58
Step 2. Physical Installation............................................................................................................................................ 58
Step 3. Power Requirements ........................................................................................................................................... 58
Step 4. Earth Grounding.................................................................................................................................................. 58
Step 5. Door Locking Devices ........................................................................................................................................ 59
Step 6. Hooking Up Inputs ............................................................................................................................................. 59
Step 7. Readers and Keypads ......................................................................................................................................... 59
Step 8. Relay Control Outputs ........................................................................................................................................ 60
Step 9. Auxiliary Outputs................................................................................................................................................ 60
Step 10. T amper Protection ............................................................................................................................................. 60
Step 11. Connecting the KT-300 to the RS-485 Bus........................................................................................................ 60
Step 12. Connecting the Master Controller to the Host Computer ................................................................................. 60
Step 13. Powering the KT-300......................................................................................................................................... 61
KT-300 FCC & IC Compliance Notice ............................................................................................................................. 61
KT-300 CE Compliance Notice........................................................................................................................................ 61
KT-300 UL Compliance Notice ....................................................................................................................................... 61
Electrical Specifications .................................................................................................................................................. 61
Troubleshooting Communication Problems ................................................................................................................... 61
KT-300 Controller Maintenance Recommendations ....................................................................................................... 62
Combus Specifications ................................................................................................................................................... 66
Combus Repower (if required) ........................................................................................................................................ 66
KT-PC4108 - 8-Zone Input Expansion Module ............................................................................................................... 67
KT-PC4204 - 4-Relay and Additional Power Supply Module ......................................................................................... 68
KT-PC4216 - 16-Zone Output Expansion Module .......................................................................................................... 69
KT-LCD4501 - LCD Time & Date Display Module ......................................................................................................... 70
PP
P
PP
TT
he Rhe R
T
he R
TT
he Rhe R
KTKT
KT
KTKT
erferf
erf
erferf
-300-300
-300
-300-300
oror
or
oror
ming Manming Man
ming Man
ming Manming Man
ee
porpor
tsts
e
por
ts
ee
porpor
tsts
::
Installa Installa
:
Installa
::
Installa Installa
ual Operual Oper
ual Oper
ual Operual Oper
tion & Configurtion & Configur
tion & Configur
tion & Configurtion & Configur
aa
tionstions
a
tions
aa
tionstions
aa
a
aa
tiontion
tion
tiontion
4646
46
4646
5252
52
5252
5656
56
5656
SECTION 10 - SECTION 10 -
SECTION 10 -
SECTION 10 - SECTION 10 -
SECTION 11 - CompaSECTION 11 - Compa
SECTION 11 - Compa
SECTION 11 - CompaSECTION 11 - Compa
Introduction - Section 1 .................................................................................................................................................. 81
WinPass Architecture (RS-232) ...................................................................................................................................... 81
WinPass Architecture with Optional VC-485 Line Extender ........................................................................................... 81
System Specifications..................................................................................................................................................... 81
Using ExpressSetUp - Section 2 ..................................................................................................................................... 81
Login the System - Section 2 .......................................................................................................................................... 82
Defining Controllers - Section 3...................................................................................................................................... 82
Programming Relays - Section 3 ..................................................................................................................................... 82
Monitoring Inputs - Section 3 ........................................................................................................................................ 82
Programming Outputs - Section 3 ................................................................................................................................... 82
Controller Definition - Section 5 ..................................................................................................................................... 82
Door Definition - Section 5 ............................................................................................................................................. 82
66
6
66
KTKT
-300 Compa-300 Compa
KT
-300 Compa
KTKT
-300 Compa-300 Compa
tibility with KTtibility with KT
tibility with KT
tibility with KTtibility with KT
tibtib
tib
tibtib
le prle pr
le pr
le prle pr
oductsoducts
oducts
oductsoducts
-200-200
-200
-200-200
7272
72
7272
8080
80
8080
DN1237-0003 © 1997-2000 Kantech Systems Inc.
TT
aa
bb
le le
oo
ff
T
a
b
le
TT
aa
bb
le le
Input Definition - Section 5............................................................................................................................................. 82
Output Definition - Section 5 .......................................................................................................................................... 82
Relay Definition - Section 5 ............................................................................................................................................ 82
W orkstation Configuration - Section 5 ........................................................................................................................... 82
Step 1. Preparing Installation of the KT-200 ................................................................................................................... 83
Step 2. Physical Installation............................................................................................................................................ 83
Step 3. Power Requirements ........................................................................................................................................... 83
Step 4. Grounding ........................................................................................................................................................... 84
Step 5. T amper Protection ............................................................................................................................................... 84
Step 6. Hooking Up Inputs ............................................................................................................................................. 84
Step 7. Relays & Auxiliary Outputs ................................................................................................................................ 84
Step 8. Door Locking Devices ........................................................................................................................................ 85
Step 9. Readers and Keypads ......................................................................................................................................... 85
Step 10. Dip Switch Settings........................................................................................................................................... 86
Step 11. Jumper Settings................................................................................................................................................. 86
Step 12. Connecting the KT-200 to the RS-485 Bus........................................................................................................ 87
KT-200 T echnical Specifications .................................................................................................................................... 87
KT-200 Electrical Specifications ..................................................................................................................................... 87
Walk Through Testing.................................................................................................................................................... 88
T ypical Component Connection to KT-200 .................................................................................................................... 88
KT-200 FCC Compliance Notice ..................................................................................................................................... 88
KT-200 CE Compliance Notice ........................................................................................................................................ 88
KT-200 Compatible Products .......................................................................................................................................... 89
Contents Contents
o
f
Contents
oo
ff
Contents Contents
AppendixAppendix
Appendix
AppendixAppendix
Frequently Asked QuestionsFrequently Asked Questions
Frequently Asked Questions
Frequently Asked QuestionsFrequently Asked Questions
Did Did
YY
Did
Y
Did Did
YY
INDEXINDEX
INDEX
INDEXINDEX
ou Knoou Kno
ou Kno
ou Knoou Kno
w ?w ?
w ?
w ?w ?
9292
92
9292
9393
93
9393
9494
94
9494
9696
96
9696
DN1237-0003 © 1997-2000 Kantech Systems Inc.
77
7
77
WW
inPass Reference ManualinPass Reference Manual
W
inPass Reference Manual
WW
inPass Reference ManualinPass Reference Manual
SECTION 1SECTION 1
SECTION 1
SECTION 1SECTION 1
Introduction to WinPass
Designed for installations of up to 64 card readers, WinPass bundles all the basic functions of access control in an easy to learn and understand structure. Learning time is reduced to a minimum. Familiar Windows screens are intuitive; on-line context sensitive help is always available throughout the system.
Up to 8,000 card users can be defined in the system. Each card user is assigned an access level that will allow entry at selected doors, only according to predefined schedules. All events are recorded by the system for future review.
Once the system is configured, the computer is required only to monitor/update the system or to print reports. The report generator can provide information sorted and printed according to your needs or displayed using clear graphics.
88
8
88
DN1237-0003 © 1997-2000 Kantech Systems Inc.
SECTION 1SECTION 1
SECTION 1
SECTION 1SECTION 1
Important Information
If you are using KT-200 controllers and more information applies to the KT-200 controller on a specific subject, the phrase “SEE SECTION 11 IF YOU ARE USING KT-200 CONTROLLERS” will be displayed within the subject under the specific paragraph or picture.
The paragraph which has more information about the KT-200 will be identified with an asterisk (*). For example: if a subject has several paragraphs in which some specifications apply to the KT-200, then only the subject title and the specific section applying to the KT-200 will be available in Section 11.
Unique Features
Distributed data and true stand-alone capability:
Memory and processing located at every door. No degraded mode. The computer never makes a decision and is necessary only for maintaining the system's database or downloading buffered events in order to prepare reports.
Compatible with multiple reader technologies:
IoProx , Polaris mag stripe, ShadowProx proximity, XSF, Wiegand, bar code, biometrics, keypads and many others.
Automatic functions:
Unlock doors, activate relays and outputs, monitor inputs, according to schedules or system events. Cards can be added or deleted in seconds ; all events are buffered and can be saved on disk or printed for future reference. WinPass
provides an easy-to-use report generator. The report generator lets the user print or view the desired information from all the events saved to the computer’s hard disk.
Compatible with 2 types of controllers:
For more flexibility and options, WinPass offers the possibility to use 2 types of controllers: KT-200 and KT-300, However types cannot be installed on the same system.
- -
--
Introduction to WinPass Introduction to WinPass
-
-
Introduction to WinPass
- -
--
Introduction to WinPass Introduction to WinPass
both
WinPass Architecture (RS-232)
SEE SECTION 11 IF YOU ARE USING KT-200 CONTROLLERS”
DN1237-0003 © 1997-2000 Kantech Systems Inc.
99
9
99
WW
inPass Reference ManualinPass Reference Manual
W
inPass Reference Manual
WW
inPass Reference ManualinPass Reference Manual
System Specifications
serutaeF snoitacificepS
k821/003-TKgnisu)stigid8(sdracforebmuN
k821/003-TKgnisu)stigid61(sdracforebmuN
k215/003-TKgnisu)stigid61dna8(sdracforebmuN
sedocetisroseilimafdraC
003-TKsrellortnocrooD
sredaerdraC
sdapyeK
)8014CP-TKlanoitpohtiw(stupniderotinoM
stuptuokcolrooD
)4024CP-TKro6124CP-TKlanoitpohtiw(stuptuOdellortnoC
1054DCL-TKdapyeKDCL
smralarooddnasDELredaerrofstuptuoyrailixuA
slevelsseccaresudraC
hcaesenozemit4foseludehcS
syadiloH
snoitatskrowrotarepO
23 46 46
46
46
821 052 001 663
1
enil-ffo/enil-no000,8
enil-ffo000,4dnaenil-no000,8
enil-ffo/enil-no000,8
timiloN
)215(652
)215(46
sdrowssaprotarepometsyS
slevelytirucesrotarepO
segaugnalrotarepotnerrucnoC
sretnirpforebmuN
)k215(k821/003-TKgnisu)reffub(stneveforebmuN
timiloN
.gorp8/dexif1
2
timilswodniW
)000,81-+(000,5-+
SEE SECTION 11 IF YOU ARE USING KT-200 CONTROLLERS”
1010
10
1010
DN1237-0003 © 1997-2000 Kantech Systems Inc.
srebmuNtraPnoitpircseD
SECTION 1SECTION 1
SECTION 1
SECTION 1SECTION 1
Part Numbers and Contents
- -
--
Introduction to WinPass Introduction to WinPass
-
-
Introduction to WinPass
- -
--
Introduction to WinPass Introduction to WinPass
46-SSAPW
01-KLBC
VER/46-SSAP-W
584-CV
rellortnocretsam
edargpuerawtfosssaPniW
)rellortnocretsamdnaCPtsohneewtebecnatsiddnetxeot(
)'001(sretem03elbac01-KLBChtiwlaunamresudnaerawtfosssaPniW
otCPtsohmorflocotorp232-SRnignitacinummocrotcennoc/elbaC)'001(sretem03
rednetxeenilnoitacinummocasadesuebotecafretninoitacinummocnoitcnuf-itluM
DN1237-0003 © 1997-2000 Kantech Systems Inc.
1111
11
1111
WW
inPass Reference ManualinPass Reference Manual
W
inPass Reference Manual
WW
inPass Reference ManualinPass Reference Manual
SECTION 2SECTION 2
SECTION 2
SECTION 2SECTION 2
WinPass Utilities
Within this section, you’ll find:
1) Computer requirements for installation: indicates the minimum system requirements for the installation of the WinPass software.
2) The WinPass installation procedure: explains the software installation procedure.
3) How to use ExpressSetUp program: explains the procedure to use the ExpressSetUp program to define system components.
4) The login procedure: explains how to login to the WinPass software.
5) How to perform a backup: explains how to perform a backup of the system tables.
6) How to uninstall WinPass: explains the procedure to uninstall the WinPass software from your computer.
1212
12
1212
DN1237-0003 © 1997-2000 Kantech Systems Inc.
SECTION 2SECTION 2
SECTION 2
SECTION 2SECTION 2
-- WinPass Utilities -- WinPass Utilities
-- WinPass Utilities
-- WinPass Utilities -- WinPass Utilities
Computer Requirements
· Pentium 90 MHz processor or faster
· 32 MB RAM recommended
· Hard drive with 20 MB free disk space for software installation
· 900,000 events archived per 30 MB of disk space
· Windows 98 operating system
· VGA Monitor
· Dedicated computer not necessary (computer necessary only
for configuration and reporting, computer not required for operation).
Software Installation
1 ) Insert diskette #1 in drive A:, 2 ) From the Windows Taskbar, click on Start and then select Run.
The system will display:
5) The WinPass installation procedure will start and ask to provide registration information such as the site name, the company name and the product serial number (can be found on diskette #1),
Note: To stop or cancel the installation, click on Cancel at any time during installation.
6) You will be asked to confirm the registration information entered in Step 5,
3) From the Run window, type A:\setup and click on OK. The system will display the end-user license agreement. Read this license completely,
4 ) To activate the “I agree” button, scroll to the end of the display.
Click on “I agree” to continue the installation or “I do not agree” to cancel the installation,
7 ) Click on Yes to continue or No to modify the information, 8 ) You will be asked to confirm the installation path,
9 ) Click on Next to install WinPass in the displayed folder or click
on Browse to select another folder,
1 0 ) The setup will check your computer for the minimum system
requirements and a warning message will be displayed if your computer does not meet these requirements,
DN1237-0003 © 1997-2000 Kantech Systems Inc.
1313
13
1313
WW
inPass Reference ManualinPass Reference Manual
W
inPass Reference Manual
WW
inPass Reference ManualinPass Reference Manual
1 1)You will be asked to confirm the program folder,
1 2)Click on Next to continue, or type a new folder name or select
one from the displayed list,
1 3 ) Once the setup is complete, you will be prompted to view the
ReadMe file and run ExpressSetUp. Make your selections (it is recommended to view the ReadMe file and run ExpressSetUp before starting the program), click on Finish to complete the installation.
WinPass is now installed on your computer. To save instal­lation and configuration time, we strongly recommend that you use ExpressSetUp so that the system is fully functional and ready to test the hardware and wiring.
1 ) When you use ExpressSetUp, the system will display the login
window. Enter your login name and password (default: WINPASS (not case sensitive) and click on OK to continue,
2 ) Enter the number of readers required and specify the controller
type and click on OK to continue,
Using ExpressSetUp
ExpressSetUp configures the system. Usually, if you do not require special options, the system will be ready to be used after you define the schedules, user access levels and cards.
1414
14
1414
3 ) You can modify the door names. Select (check box) the doors
(readers) on which Anti-Passback is required (see Controller Definition Section for more on Anti-Passback). Specify the type of Anti-Passback (soft or hard). Click on OK to continue the installation, *
SEE SECTION 11 IF YOU ARE USING KT-200 CONTROLLERS”
DN1237-0003 © 1997-2000 Kantech Systems Inc.
4) By default, the reader type is Polaris 2 with Polaris cards, to select a different reader, click on the requested reader type and click on OK to continue the installation. Some readers offer the possibility the 16-digit card driver format,
SECTION 2SECTION 2
SECTION 2
SECTION 2SECTION 2
configured, the controller configurations including the Anti­Passback option, REB-8, number of readers, reader types and communication ports will be set to default. Other information contained in the database (event tables) and user (cards) informa­tion will not be modified.
ExpressSetUp associates the door contact for the first door of a controller to input 1 and the second door contact to input 3. The request-to-exit button or detector (REX) is associated to input 2 for door 1 and to input 4 for door 2. *
SEE SECTION 11 IF YOU ARE USING KT-200 CONTROLLERS”
After answering the question, the system will define the necessary door controllers, the readers, the door contacts, the request-to­exit detectors, etc. so you have a working system.
7) Once the system has finished the installation, the following screen will be displayed:
-- WinPass Utilities -- WinPass Utilities
-- WinPass Utilities
-- WinPass Utilities -- WinPass Utilities
5 ) Select the COM port and baud rate and click on OK to continue
the installation. The default settings are COM Port 2 and 9600 baud rate.
Note: The KT-300 controller selects its communication speed automatically. It can go up to 115,200 baud.
6 ) Once you have entered the baud rate, the system will display
the following question:
ExpressSetUp may be used at the initial installation or you may run ExpressSetUp later. Whether it is the first time or not, the following warning message will appear: This operation will modify all
controllers’ data. Do you want to continue?
Click on YES if this is a first installation. Warning: If you are running ExpressSetUp once the system is
8 ) Click on “serial number” button and enter the serial number of
the KT-300 controller (8 digits). The serial number allows communication between controllers and the computer. Click on OK to continue the installation.
Login the System
This section describes the login procedure. 1 ) Click on the login button , the system will display:
2 ) Enter “WINPASS” as login name,
3) Enter “WINPASS” as password,
4 ) Click on the OK button.
Note: Remember to change this default password once the system
DN1237-0003 © 1997-2000 Kantech Systems Inc.
1515
15
1515
WW
inPass Reference ManualinPass Reference Manual
W
inPass Reference Manual
WW
inPass Reference ManualinPass Reference Manual
is functional.
Once registered, you will be prompted to confirm the date and time in order to synchronize the date and time between the controllers and the computer.
The system should now be functional. Should communication problems be present, click on Configure Workstation (see Work­station Configuration in section 5) to verify the COM port and baud rate settings *.
SEE SECTION 11 IF YOU ARE USING KT-200 CONTROLLERS
Uninstalling WinPassUninstalling WinPass
Uninstalling WinPass
Uninstalling WinPassUninstalling WinPass
This section describes the procedure to remove the WinPass software from your computer.
From the Control Panel, select Add/Remove Programs, select WinPass and click on Add/Remove. Once the procedure is com­pleted, a screen will be displayed informing you that the removal is completed but some files must be removed manually from your hard drive. To remove these files, you must:
1 ) Click on My Computer, 2 ) Select C\: drive or the other drive where WinPass was installed,
3) Select the WinPass directory, 4 ) Click on file and select Delete, 5 ) Winpass folder and directory will now be removed. Warning: This option will delete all events and data. 1 ) Click on My Computer, 2 ) Select C\: drive, 3 ) Select Windows folder, 4 ) Delete the file named “winpass.ini”. Note: If you are having trouble locating the file, you may find it
quickly by using Windows Explorer’s find feature.
Backup Procedure
Performing a regular file backup safeguards them against loss if your hard disk fails or you accidentally overwrite or delete data.
Depending on what and how you want to backup your files, there are several options offered with Windows. Some of the available options are as follows:
1 ) Backing up selected files and folders,
2) Defining a set of files to be backed up, 3 ) Backing up a predefined set of files,
4) Backing up only files that have changed,
5) Backing up files quickly using drag and drop. Below are the instructions for backing up selected files and folders
(option 1). The instructions for the other options may be found in the Windows Help menu.
From the Taskbar, click on Start and select Programs. Point to Accessories and then from System Tools, click on Backup.
1 ) Click the Backup tab, 2 ) Click the plus sign (+) next to the drive that contains the folders
or files you want to backup,
3 ) To select all the files in the folder, click the box next to it. To
select only certain files, click the icon for the folder that contains the files, and then click the box next to each file on the right side of the window,
4) Click Next Step, click the destination where you want the backed up files to be stored, and then click Start Backup,
5) Enter a name for the backup set.
Upgrade Procedure
To upgrade your system, follow the installation procedure.
1616
16
1616
DN1237-0003 © 1997-2000 Kantech Systems Inc.
SECTION 2SECTION 2
SECTION 2
SECTION 2SECTION 2
-- WinPass Utilities -- WinPass Utilities
-- WinPass Utilities
-- WinPass Utilities -- WinPass Utilities
DN1237-0003 © 1997-2000 Kantech Systems Inc.
1717
17
1717
WW
inPass Reference ManualinPass Reference Manual
W
inPass Reference Manual
WW
inPass Reference ManualinPass Reference Manual
SECTION 3SECTION 3
SECTION 3
SECTION 3SECTION 3
WinPass Basics
Within this section, you will find:
1) The complete description of all the features contained in the main menu of the WinPass software,
2) A complete description of all the toolbars included in the WinPass software,
3) A complete description of all the common buttons (file tools) used throughout the system,
4) A preview of the system’s features and capacities
1818
18
1818
DN1237-0003 © 1997-2000 Kantech Systems Inc.
Main Menu
SECTION 3SECTION 3
SECTION 3
SECTION 3SECTION 3
-- WinPass Basics -- WinPass Basics
-- WinPass Basics
-- WinPass Basics -- WinPass Basics
1) Active menu or Sub-menu:
The description in brackets [ Main,] indicates the active menu.
2) WinPass:
The first caption is the program name.
3) All events TAB:
This tab lists all the system events as defined in each of the event’s display schedule.
4) Acknowledged events TAB:
This tab contains all the events which have been acknowledged by the operator. For example: “Door forced open” event has been defined to be acknowledged by the operator. This option is set under the event definition menu.
5) Devices events TAB:
This tab contains all events related to components such as: controllers, doors, relays, inputs and outputs.
6) Operator events TAB:
This tab contains events generated by the operator’s activities such as: programmation, manual modifications, relay activation, reader disable, etc.
7) Operator:
Displays the name of the operator currently logged on.
8) Version:
Displays the version of the software.
9) Last event:
Displays the last recorded event.
10) Last alarm:
Displays the last acknowledged alarm event.
11) On-line help:
The HELP button provides context-sensitive help. For example, by clicking on HELP in Door Definition, the help topics provided will be related to the Door Definition menu.
12) Filtered events TAB:
This tab contains all the events which match the character string found at the top of that table.
13) Access events TAB
This tab contains all the events generated during door access by users.
DN1237-0003 © 1997-2000 Kantech Systems Inc.
1919
19
1919
WW
inPass Reference ManualinPass Reference Manual
W
inPass Reference Manual
WW
inPass Reference ManualinPass Reference Manual
14) Go to last:
This option repositions the cursor on the most recent event in the current table (tab). It also activates the automatic positioning. Since this requires use of a background task, the tables are momentarily locked during this operation and cannot be accessed.
It is possible to view the search progress on the taskbar and in the progress window.
15) Find next:
This option allows you to search using the Find option from the actual cursor position (see Find option).
16) Find:
This option allows you to search events tables using one or more keywords. The system searches from the most recent to the oldest event. The tables will be locked accessed during this period, because the system is using a background task to complete the search.
It is possible to view the search progress on the taskbar or in the progress window.
during a search and cannot be
The Definition toolbar
Lets you define schedules, access levels, holidays, event display and color, system operator password and operator security levels.
Operation toolbar
Lets you perform manual operations on doors, relays, inputs and outputs. You can also view the various components status, create a card list, reload controllers, change the date and time of your system and re-index the tables.
File Tools (buttons)
12 3 4 5
17) More info:
By double-clicking on an event, you can view additional details concerning that event. For instance, in an access event, an additional screen displaying the cardholder’s picture (if pictures are assigned in User Definition) is displayed. The “More Info” button is refreshed each time a new event is generated.
18) Date and time:
This section displays the system’s date and time.
Toolbar Menus
Toolbar menus are used throughout the system to perform various actions or operations in the system.
The Main toolbar:
After operator login, the main menu bar provides access to the sub-menus and enables the operator to access help, logout or exit the system.
The Configuration toolbar
Lets you define how the components work and relate to each other. You can define workstations, controllers, doors, relays, inputs and auxiliary outputs.
2020
20
2020
6 7 8
1) The LINK button:
This option is used to display the relationships between the component being edited and other components of the system. When used, it will display a screen containing two windows, the first one representing the category and the second one represent­ing a component. By clicking on a category, you can view all components which are linked and may be affected by editing the selected record.
2) The NEW button:
This option is used to add a record to file. It will clear the actual screen and leave a blank new page for the new information. Once saved, the system controllers will be updated with the new information.
3) The DELETE button:
This option is used to remove a record from the database. Once this option is activated, WinPass verifies the links between the components, will warn the operator of these links and will require a confirmation. Once the deletion is confirmed, the system control­lers will be updated as necessary.
4) The SAVE button:
This option is used after a new record has been created or after a record has been modified. Once pressed, the system controllers
DN1237-0003 © 1997-2000 Kantech Systems Inc.
SECTION 3SECTION 3
SECTION 3
SECTION 3SECTION 3
-- WinPass Basics -- WinPass Basics
-- WinPass Basics
-- WinPass Basics -- WinPass Basics
are updated with the necessary changes.
5) The CANCEL button:
This option is used to cancel all changes made to a record since the last SAVE. After pressing CANCEL, the system will prompt the operator to confirm: Do you want to save? Click NO and none of the changes will be kept on records.
6) The EXIT button:
This option is used to close the current window.
7) The HELP button:
This option is used to provide the operator context-sensitive help.
8) The MORE button:
This option (if displayed) is used to view additional configuration parameters of a selected component.
Operator Acknowledgment
Operators can be required to acknowledge certain events such as alarms or card trace type of events. Events that require operator acknowledgment have to be defined under the Event Definition menu. When the operator is required to acknowledge an event, the computer's audible warning will sound and an alarm screen will be displayed on-screen:
Defining Schedules
It is possible to use the same schedule for different uses, but it is recommended to create a distinct schedule for each requirement. It is then much easier to modify a particular application's schedule without affecting other applications (refer to schedule definition,
in section 6).
Defining Doors
Properly defining access doors when designing an effective access control system plays a crucial role in the system’s integrity. Door types such as entry, exit, access, and the individual door schedules will be found in “Door Definition”. All door timings including door open times, door unlock times, door contact inputs will also be found in “Door Definition”.
KT-300 Door Programming Relays
Each KT-300 door controller is equipped with two open collector outputs. These controlled outputs are not to be confused with the door strike outputs. The controlled outputs may be programmed to activate or deactivate to follow certain inputs. Also, the activation/deactivation times may be user defined and schedules may be defined for individual relays. * If relays are required, see the system specifications of section 1.
SEE SECTION 11 IF YOU ARE USING KT-200 CONTROLLERS
The alarm event description will be displayed with time and date and the associated device. From the “Event Definition” menu, select all events which will require operator acknowledgement. The “Acknowledged Events” tab stores events that have been previously acknowledged by an operator.
Customizing the System
Follow this sequence to customize WinPass: 1 ) Define Controllers
2 ) Define Schedules 3 ) Define Doors 4 ) Define Relays
5) Define Inputs - Outputs
6) Define Access Levels 7 ) Define Cards 8 ) Define (operator) Security Levels 9 ) Define Operators 10 ) Define Holidays 1 1)Define Events
Defining Controllers
WinPass is designed to communicate with the door controllers via one of the 4 host COM ports.* The controllers are identified by their serial number (refer to controller definition in section 5).
SEE SECTION 11 IF YOU ARE USING KT-200 CONTROLLERS”
Monitoring Inputs
WinPass may control 8 inputs per KT-300. When an expansion module is added inputs are increased to 16.* If additional inputs are required, see the system specifications in section 1.
SEE SECTION 11 IF YOU ARE USING KT-200 CONTROLLERS
Programming Outputs
In addition to having two form “C” controlled outputs on each KT­300, four open-collector auxiliary outputs have also been pro­vided. These outputs are typically used to activate the reader’s LED on an access granted and the piezo alarm buzzer on a T.REX request-to-exit detector door alarm (please refer to output defini-
tion in section 5).*
SEE SECTION 11 IF YOU ARE USING KT-200 CONTROLLERS
Access Levels
Up to 250 access levels may be defined in WinPass. Access levels determine to which doors and at what time cardholders will have access. For example, office employees may have access at door 1 “Front door” only from 7:00AM to 5:00PM on weekdays (please
refer to access level definition in section 6).
DN1237-0003 © 1997-2000 Kantech Systems Inc.
2121
21
2121
WW
inPass Reference ManualinPass Reference Manual
W
inPass Reference Manual
WW
inPass Reference ManualinPass Reference Manual
Defining Cards
WinPass will control a maximum of 8,000 cards per system (see System Specifications for more details on cards and controller types). Cards may be easily programmed in “Card definition”. All user definable fields, PIN codes, access levels, valid card times will be found in “Card Definition” (please refer to Card Definition in
section 4).
Security Levels
Operators in “Operator definition” must be assigned a security level. This security level determines which menus the operator will have access to and what level of database functions the operator will use (ex. View, Modify, Delete or Print). There are 8 program­mable security levels and one (1) pre-defined (please refer to
security level definition in section 6).
Holidays
Up to 366 holidays may be defined in WinPass. Each holiday may be defined in 1 of 4 classes (HO1-HO4). Once a holiday has been defined, the holiday is selected in the “Schedule Definition” to permit different valid access times during each holiday type
(please refer to holiday definition in section 6).
Defining Events
The term “Event” is used to describe activities or alarms detected or generated by the system. There are many different system events such as Access granted, Input in alarm, Card modified by operator, etc.
The Event Definition capacity is a powerful feature of the system. For each event, it is possible to determine how the event should be displayed or printed. These dispatches can also be limited by schedules that will allow, for example, to print or display some events only during a particular period of time such as after regular hours.
Each event related to a device can be individually associated to a corresponding set of actions such as display, acknowledge or print.
For example: the “Door open to long” event is defined for each individual door of the system. This also permits a different action or response on a door to door basis.
Critical alarm events should be set to require an acknowledgment from the operator (please refer to event definition in section 6).
2222
22
2222
DN1237-0003 © 1997-2000 Kantech Systems Inc.
SECTION 3SECTION 3
SECTION 3
SECTION 3SECTION 3
-- WinPass Basics -- WinPass Basics
-- WinPass Basics
-- WinPass Basics -- WinPass Basics
DN1237-0003 © 1997-2000 Kantech Systems Inc.
2323
23
2323
WW
inPass Reference ManualinPass Reference Manual
W
inPass Reference Manual
WW
inPass Reference ManualinPass Reference Manual
SECTION 4SECTION 4
SECTION 4
SECTION 4SECTION 4
Defining System Users
This section is used to create new cards in the system. When creating cards, you can use the Group feature to define multiple cards at a time, you can also use the Assign Picture feature to assign pictures to cardholders ; these pictures will be displayed on the Event Monitoring screen when the cardholder presents its card at a reader.
2424
24
2424
DN1237-0003 © 1997-2000 Kantech Systems Inc.
SECTION 4SECTION 4
SECTION 4
SECTION 4SECTION 4
Card Definition
This screen is used to define new cards, modify or delete existing cards, assign pictures to cardholders, define multiple cards (group feature) and obtain a card ID number.
A card number usually consists of two elements: the family or site code and the card’s own identification number. The card family code usually has a hexadecimal value between 00 and FF. The card’s identification number is usually in decimal format. When entering the card number, type all preceding zero(s) for numbers shorter than 5 digits. Decimal format range is between 00000 and
65535.
-- Defining System User -- Defining System User
-- Defining System User
-- Defining System User -- Defining System User
2 ) Select a dedicated reader. It allows you to select a reader with
which cards will be attributed in the system.
3 ) As you swipe a card, you can enter the user’s definition in the
fields.
4) You can proceed with step 3 as often as needed. 5 ) When you are done, press the CLOSE button and the system
will automatically save all the cards you have previously entered.
Field Definition
ss
s
ss
You can use the “up/down arrows” feature - (if you want to scroll through the defined cards to select one), or you can use the “More” feature to specify additional information such as: trace the card, if the user must use a pin number at the keypad, etc. (lets you enter more information concerning a cardholder).
“Get Card ID” button
You can use the “Get Card ID” button (if you want to define a card but don’t know its number). To define many cards, use the Group feature.
To use this feature, click on the “New” button, the sytem will display a blank new screen. Swipe the card at a reader connected to the controller. The card number will be displayed:
Click the “GET ID” button to return to the card definition screen so you may continue to enter the information in the fields.
Note: Only non-existant card numbers will be captured. “Group” button
You can use the “Group” feature to select a reader at which cards will be passed (if you have many cards to be defined):
1 ) Click on the GROUP button, the system will display:
Last name / First name
Enter the cardholder’s name, up to 30 characters for each or less. It is recommended not to use commas as field separators for importing purposes.
User definable 1, 2 & 3
These user definable fields are 30 characters long and can be used to store additional information regarding the cardholder. Common use for these fields are: employee number, department, address, telephone number, etc...
Access level
Select an access level to which the user will be assigned. Access levels are usually defined before entering a new card. The access levels determine which doors according to a specified schedule the cardholder will be permitted access to.
Card status
The usual setting is “valid”. Setting the card status to invalid, lost, stolen, status #4 or status #5 , will disable the card and the system will deny access to this card. The system will also generate the appropriate event such as “access denied-invalid”, “lost”, etc.
When a card is lost, it is better to set it to “lost” than deleting the card from the system. This way, all the data concerning the user can be kept within the system and if anyone ever attempts to use the card, the card will be denied access and the event will identify the actual card’s previous owner. The system automatically sets card status to “expired” or “pending” according to the card’s validity dates.
Picture selection
This feature lets you assign a picture to the cardholder. Follow these steps to assign a picture:
1 ) Double-click on the picture area, 2 ) Select a picture from the pick list,
3) Click on the ARROW button to return to the card definition screen.
DN1237-0003 © 1997-2000 Kantech Systems Inc.
2525
25
2525
WW
inPass Reference ManualinPass Reference Manual
W
inPass Reference Manual
WW
inPass Reference ManualinPass Reference Manual
Note: By default, all pictures must be selected from the \WinPASS\picture directory. This path may be modified by speci­fying the location of the picture files in the workstation configu­ration menu option.
Find button (search a cardholder)
1 ) From the Card Definition screen, click on the Find button,
“More” button
This button opens an additional screen. From the displayed screen, you can select various options.
Field Definition
Beginning date / Expiring date
Period of time during which the card will be valid. WinPass will, by default, set each new card to be valid (effective immediately). If there is a date entered in the expiring fields, the expiry date must be greater than the beginning date.
2 ) Enter a keyword(s) to search in the KEY field (case sensitive),
3) Click on the Find Now button to initiate the search,
4) Once the search is done, WinPass will display the user’s profile. If no match was found, the current profile will be displayed.
Trace Card
When selected, this parameter will generate a “Card traced” event each time the card is used. This is useful to keep track of a particular card.
Anti-Passback
Determines whether Anti-Passback control will be enforced for that cardholder.
Must use PIN
Setting this value to YES means that the user must enter a PIN number after a valid swipe in order to be granted access to a door equipped with a keypad.
PIN Value
Every time a new user is entered, the system will automatically generate a PIN number automatically. You may modify the PIN number by entering a number with 5 digits from 00000 to 65535.
Click on the up arrow to return to the Card Definition menu.
2626
26
2626
DN1237-0003 © 1997-2000 Kantech Systems Inc.
SECTION 4SECTION 4
SECTION 4
SECTION 4SECTION 4
-- Defining System User -- Defining System User
-- Defining System User
-- Defining System User -- Defining System User
ss
s
ss
DN1237-0003 © 1997-2000 Kantech Systems Inc.
2727
27
2727
WW
inPass Reference ManualinPass Reference Manual
W
inPass Reference Manual
WW
inPass Reference ManualinPass Reference Manual
SECTION 5SECTION 5
SECTION 5
SECTION 5SECTION 5
Physical Components
Configuration
This section is used to configure the physical components of the WinPass system. It is used to define:
1) The workstation parameters: card format, port settings, log printer, duress function, time
changes, keypad delays, etc.,
2) The controller parameters: type, serial number, reader/keypad type, Anti-Passback, assign
expansion modules, set dip switches, communication port, tamper & AC schedules, etc.,
3) The door parameters: door type (entry/exit), reader or keypad, locked state, unlock
schedule, keypad schedule, activate relays on door events, interlock schedule, REX schedule, etc.,
4) The relay parameters: normal state, activating schedule, activation period, etc.,
5) The input parameters: normal condition, shunt delay, relay activated by input, monitoring
schedule, etc.,
6) The output parameters: normal state, flash time, select how events will trigger the outputs,
etc.
2828
28
2828
DN1237-0003 © 1997-2000 Kantech Systems Inc.
SECTION 5SECTION 5
SECTION 5
SECTION 5SECTION 5
THE CONFIGURATION MENU TOOLBAR
-- Physical Components Configuration -- Physical Components Configuration
-- Physical Components Configuration
-- Physical Components Configuration -- Physical Components Configuration
Workstation Configuration
This feature is used to define the workstation’s parameters.
Field Definition
Time: Enable time change
Click here to activate the time change mode. Set the dates for automatic time change.
Automatic logout delay
The Automatic logout delay is the predetermined time set after which the system automatically logs out the operator who is inactive. The time is entered in hours, minutes and seconds. This feature provides additional security to prevent access to the system by an unauthorized person.
Card format
The card format setting determines how the card numbers will be represented throughout WinPass. Usually displays 8 digits, but some readers offer the 16-digit format.
ButtonsButtons
Buttons
ButtonsButtons
“Port Settings” button
Select the baud rate speed that will be used to poll the door controllers. There are four choices: 1200, 2400, 9600 and 19200. Setting a lower poll rate on the controllers may correct some communication problems due to induction or faulty cabling.
Daylight savings time
The Daylight savings time date change can be entered here and the system will automatically, at 2:00 am, advance the time to 3:00 am on the first Sunday of April.
Standard time
The Standard time date change can be entered here and the system will automatically, at 2:00 am, set back the time to 1:00 am on the last Sunday of October.
Note : It is very important to enter the correct year.
General: Keypad time-out delay
The keypad time-out delay is set in seconds for a maximum of 127 seconds which represents the time allowed for a user to begin entering his or her personal identification number (PIN) at a keypad.
Keypad inter-digit delay
The keypad inter-digit delay is set in seconds, up to two minutes. It represents the maximum delay permitted between each selection of a keypad key by a user.
DN1237-0003 © 1997-2000 Kantech Systems Inc.
Note: To select the COM port on which the controllers are connected to the host computer, refer to Section 5 under control­ler definition menu under “More” button.
Note: When selecting the baud rate in the software, the KT-300 will automatically adjust to the selected rate.*
SEE SECTION 11 IF YOU ARE USING KT-200 CONTROLLERS”
2929
29
2929
WW
inPass Reference ManualinPass Reference Manual
W
inPass Reference Manual
WW
inPass Reference ManualinPass Reference Manual
“Printer” button
This printer is used to print events as they occur and recorded by the system. This is normally used to print events which are of high importance. The events to print must be defined with a printing schedule (see Section 6 - Event Definition). You cannot use a Network printer as a log printer.
Field Definition
Printer Port Selection
Select the LPT Port to which your printer is connected. The default setting is LPT2.
Number of lines per page
This option is used by the “Log Printer” only. It is used to determine the number of events to be printed on a page and/or page breaks. The default value is 60.
“Directory” button
Enter the ON/OFF flash time of the outputs that are programmed in the auxiliary output definition relative to each event.
“Duress function” button
The manual activation of a silent alarm by entering at the keypad/ reader a code different from the normal arm/disarm code. The duress feature has to be implemented on an integrated reader/ keypad.
The chosen code will have to be entered after the NIP once the access is granted or access denied or both (according to the duress option chosen) in order to produce either a silent alarm which is designed to allow a person to call for help without arousing suspicion.
Field Definition
Log directory
This field allows you to select the directory in which the daily event files of the system will be stored. Events are saved in a daily file on disk and labeled according to the following format: YYYYMMDD representing the date (i.e: 20000301.dbf, for March 1st, 2000 events).
Picture directory
This field allows you to select the directory in which the photo files (bmp, gif, pcx, tif, etc.) will be selected from when assigning pictures to cardholders in the card definition menu. The default directory is C:\WINPASS\PICTURE.
“Output timer” button
A list of events is provided by the system. These events control the time from which the auxiliary outputs (LED & BUZ = light and buzzer) for the door readers will remain ON or OFF (toggle). Select the delays at which the output will remain on then go off when its associated event occurs.
See “Output Definition” menu -- Section 5 to set the status (steady, flash, steady timed, flash timed and none) of the outputs.
A choice of using the function on access granted or access denied or both will be offered. Select which code is to be used from 0 to 9 and #.
Note: “*” is not available with POL/-2KP because there are 2 wires contact for the “*” button.
“Firmware” button
This button is used to select the directory in which the firmware file for the KT-300 is located. To update the controller’s firmware, use the Reload function from the Operation menu.
3030
30
3030
DN1237-0003 © 1997-2000 Kantech Systems Inc.
Loading...
+ 69 hidden pages