Part of the DSC group, Kantech Systems Inc. embraces the group's corporate philosophy of providing
competitive and innovative products. Established in 1986, Kantech Systems has been designing and
manufacturing integrated access control systems for industrial, government and military applications.
The DSC Group is recognized as a leading international manufacturer of security products. As a group,
we currently supply hundreds of different security products that are distributed in more than 100
countries. We strongly believe in cost effective manufacturing and product innovation. Over one
hundred engineers and technologists contribute to our on going R&D efforts with one goal in mind:
providing high quality, cost effective and innovative products!
DSC group manufacturing facilities are spacious, efficient and equipped with the most advanced
electronic assembly equipment operating on 24 hour production schedule to meet demand, quickly and
efficiently.
ISO-9001 Certified Quality System
The international Organization for Standardization (ISO) is a worldwide federation of national standard
bodies. ISO has developed a series of standards relating to a Quality System known as the ISO family
standards. The ISO-9001 standard defines the highest level for this Quality System and is applicable to
design, development, production, installation and servicing, final inspection and testing.
The system is audited twice a year and certified by outside auditors/registrars. Kantech’s quality system
also extends to its suppliers and customers. A supplier must be initially approved and thereafter, regularly
appraised and rated. Customer feedback is documented and reviewed under formal procedures by
Kantech’s internal Continuing Improvement Committee composed of employees from every department.
Kantech Systems Inc.
3650-A Matte Boulevard
Brossard, Quebec
Canada J4Y 2Z2
Customer Assistance
Tel: 1(450) 444-2040 ext.: 399
Fax: 1(450) 444-2029
Web Site: http://www.kantech.com
Specifications may change at any time without prior notice
FOR Kantech Software Provided With or Without Products or Components
IMPORTANT - READ CAREFULLY: Kantech Software purchased with or without Products and Components is copyrighted and
is purchased under the following license terms:
•This End-User License Agreement (“EULA”) is a legal agreement between You (the company, individual or entity who acquired
the Software and any related Hardware) and Kantech Systems Inc. (“Kantech”), the manufacturer of the integrated security
systems and the developer of the software and any related products or components (“HARDWARE”) which You acquired.
•If the Kantech software product (“SOFTWARE PRODUCT” or “SOFTWARE”) is intended to be accompanied by HARDWARE,
and is NOT accompanied by new HARDWARE, You may not use, copy or install the SOFTWARE PRODUCT. The SOFTWARE
PRODUCT includes computer software, and may include associated media, printed materials, and “on-line” or electronic
documentation.
•Any software provided along with the SOFTWARE PRODUCT that is associated with a separate end-user license agreement
is licensed to You under the terms of that license agreement.
•By installing, copying, downloading, storing, accessing or otherwise using the SOFTWARE PRODUCT, You agree unconditionally to be bound by the terms of this EULA, even if this EULA is deemed to be a modification of any previous arrangement
or contract. If You do not agree to the terms of this EULA, Kantech is unwilling to license the SOFTWARE PRODUCT to You,
and You have no right to use it.
SOFTWARE PRODUCT LICENSE
The SOFTWARE PRODUCT is protected by copyright laws and international copyright treaties, as well as other intellectual
property laws and treaties. The SOFTWARE PRODUCT is licensed, not sold.
1. GRANT OF LICENSE. THIS EULA GRANTS YOU THE FOLLOWING RIGHTS:
(a) Software Installation and Use - For each license You acquire, You may have only one copy of the SOFTWARE PRODUCT
installed.
(b) Storage/Network Use - The SOFTWARE PRODUCT may not be installed, accessed, displayed, run, shared or used concurrently
on or from different computers, including a workstation, terminal or other digital electronic device (“Device”). In other words,
if You have several workstations, You will have to acquire a license for each workstation where the SOFTWARE will be used.
(c) Backup Copy - You may make backup copies of the SOFTWARE PRODUCT, but You may only have one copy per license
installed at any given time. You may use the back-up copy solely for archival purposes. Except as expressly provided in this
EULA, You may not otherwise make copies of the SOFTWARE PRODUCT, including the printed materials accompanying the
SOFTWARE.
2. DESCRIPTION OF OTHER RIGHTS AND LIMITATIONS.
(a) Limitations on Reverse Engineering, Decompilation and Disassembly - You may not reverse engineer, decompile, or
disassemble the SOFTWARE PRODUCT, except and only to the extent that such activity is expressly permitted by applicable
law notwithstanding this limitation. You may not make any changes or modifications to the Software, without the written
permission of an officer of Kantech. You may not remove any proprietary notices, marks or labels from the Software Product.
You shall institute reasonable measures to ensure compliance with the terms and conditions of this EULA.
(b) Separation of Components - The SOFTWARE PRODUCT is licensed as a single product. Its component parts may not be
separated for use on more than one HARDWARE unit.
(c) Single INTEGRATED PRODUCT - If You acquired this SOFTWARE with HARDWARE, then the SOFTWARE PRODUCT
is licensed with the HARDWARE as a single integrated product. In this case, the SOFTWARE PRODUCT may only be used
with the HARDWARE as set forth in this EULA.
(d) Rental - You may not rent, lease or lend the SOFTWARE PRODUCT. You may not make it available to others or post it on a
server or web site.
(e) Software Product Transfer - You may transfer all of Your rights under this EULA only as part of a permanent sale or transfer
of the HARDWARE, provided You retain no copies, You transfer all of the SOFTWARE PRODUCT (including all component
parts, the media and printed materials, any upgrades and this EULA), and provided the recipient agrees to the terms of this EULA.
If the SOFTWARE PRODUCT is an upgrade, any transfer must also include all prior versions of the SOFTWARE PRODUCT.
(f) Termination - Without prejudice to any other rights, Kantech may terminate this EULA if You fail to comply with the terms and
conditions of this EULA. In such event, You must destroy all copies of the SOFTWARE PRODUCT and all of its component
parts.
(g) Trademarks - This EULA does not grant You any rights in connection with any trademarks or service marks of Kantech or its
suppliers.
3. COPYRIGHT.
All title and intellectual property rights in and to the SOFTWARE PRODUCT (including but not limited to any images, photographs,
and text incorporated into the SOFTWARE PRODUCT), the accompanying printed materials, and any copies of the SOFTWARE
PRODUCT, are owned by Kantech or its suppliers. You may not copy the printed materials accompanying the SOFTWARE
PRODUCT. All title and intellectual property rights in and to the content which may be accessed through use of the SOFTWARE
Continuation from previous page...
PRODUCT are the property of the respective content owner and may be protected by applicable copyright or other intellectual
property laws and treaties. This EULA grants You no rights to use such content. All rights not expressly granted under this EULA
are reserved by Kantech and its suppliers.
4. EXPORT RESTRICTIONS.
You agree that You will not export or re-export the SOFTWARE PRODUCT to any country, person, or entity subject to Canadian
export restrictions.
5. CHOICE OF LAW: THIS SOFTWARE LICENSE AGREEMENT IS GOVERNED BY THE LAWS OF THE PROVINCE
OF ONTARIO, CANADA.
6. ARBITRATION
All disputes arising in connection with this Agreement shall be determined by final and binding arbitration in accordance with the
International Commercial Arbitration Act, R.S.O. 1990, c. I.9, or any successor or replacement legislation which may be in force,
and the parties agree to be bound by the arbitrator’s decision. The place of arbitration shall be Toronto, Canada.
7. LIMITED WARRANTY
(a) NO WARRANTY
KANTECH PROVIDES THE SOFTWARE “AS IS” WITHOUT WARRANTY. KANTECH DOES NOT WARRANT
THAT THE SOFTWARE WILL MEET YOUR REQUIREMENTS OR THAT OPERATION OF THE SOFTWARE WILL
BE UNINTERRUPTED OR ERROR-FREE.
(b ) CHANGES IN OPERATING ENVIRONMENT
Kantech shall not be responsible for problems caused by changes in the operating characteristics of the
HARDWARE, or for problems in the interaction of the SOFTWARE PRODUCT with non-Kantech-SOFTWARE or
HARDWARE PRODUCTS.
(c) LIMITATION OF LIABILITY; WARRANTY REFLECTS ALLOCATION OF RISK
IN ANY EVENT, IF ANY STATUTE IMPLIES WARRANTIES OR CONDITIONS NOT STATED IN THIS LICENSE
AGREEMENT, KANTECH’S ENTIRE LIABILITY UNDER ANY PROVISION OF THIS LICENSE AGREEMENT
SHALL BE LIMITED TO THE GREATER OF THE AMOUNT ACTUALLY PAID BY YOU TO LICENSE THE
SOFTWARE PRODUCT AND FIVE CANADIAN DOLLARS (USD$5.00). BECAUSE SOME JURISDICTIONS DO
NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL
DAMAGES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU.
(d ) DISCLAIMER OF WARRANTIES
THIS WARRANTY CONTAINS THE ENTIRE WARRANTY AND SHALL BE IN LIEU OF ANY AND ALL OTHER
WARRANTIES, WHETHER EXPRESSED OR IMPLIED (INCLUDING ALL IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE) AND OF ALL OTHER OBLIGATIONS OR
LIABILITIES ON THE PART OF KANTECH. KANTECH MAKES NO OTHER WARRANTIES. KANTECH NEITHER
ASSUMES NOR AUTHORIZES ANY OTHER PERSON PURPORTING TO ACT ON ITS BEHALF TO MODIFY OR
TO CHANGE THIS WARRANTY, NOR TO ASSUME FOR IT ANY OTHER WARRANTY OR LIABILITY CONCERNING THIS SOFTWARE PRODUCT.
(e) EXCLUSIVE REMEDY AND LIMITATION OF WARRANTY
UNDER NO CIRCUMSTANCES SHALL KANTECH BE LIABLE FOR ANY SPECIAL, INCIDENTAL, CONSEQUENTIAL OR INDIRECT DAMAGES BASED UPON BREACH OF WARRANTY, BREACH OF CONTRACT, NEGLIGENCE, STRICT LIABILITY, OR ANY OTHER LEGAL THEORY. SUCH DAMAGES INCLUDE, BUT ARE NOT
LIMITED TO, LOSS OF PROFITS, LOSS OF THE SOFTWARE PRODUCT OR ANY ASSOCIATED EQUIPMENT,
COST OF CAPITAL, COST OF SUBSTITUTE OR REPLACEMENT EQUIPMENT, FACILITIES OR SERVICES,
DOWN TIME, PURCHASER?S TIME, THE CLAIMS OF THIRD PARTIES, INCLUDING CUSTOMERS, AND
INJURY TO PROPERTY.
WARNING: Kantech recommends that the entire system be completely tested on a regular basis. However, despite
frequent testing, and due to, but not limited to, criminal tampering or electrical disruption, it is possible for this
SOFTWARE PRODUCT to fail to perform as expected.
Please click on the “I agree” button if You agree to terms of this End User License Agreement. If You do not agree
to the terms of this EULA, press the “I Do Not Agree” button as Kantech is unwilling to license the SOFTWARE
PRODUCT to You, and You have no right to use it.
TT
ABLE OF CONTENTSABLE OF CONTENTS
T
ABLE OF CONTENTS
TT
ABLE OF CONTENTSABLE OF CONTENTS
SECTION 1 - Introduction to WinPassSECTION 1 - Introduction to WinPass
SECTION 1 - Introduction to WinPass
SECTION 1 - Introduction to WinPassSECTION 1 - Introduction to WinPass
Important Information .............................................................................................. 9
Using ExpressSetUp ....................................................................................................................................................... 14
Login the System ............................................................................................................................................................ 15
Main Menu ..................................................................................................................................................................... 19
Customizing the System ................................................................................................................................................. 21
Door Definition ............................................................................................................................................................... 35
Door Operation............................................................................................................................................................... 47
Card List ......................................................................................................................................................................... 50
Date & Time.................................................................................................................................................................... 51
Step 1. Preparing to Install the KT-300 ........................................................................................................................... 58
Step 10. T amper Protection ............................................................................................................................................. 60
Step 11. Connecting the KT-300 to the RS-485 Bus........................................................................................................ 60
Step 12. Connecting the Master Controller to the Host Computer ................................................................................. 60
Step 13. Powering the KT-300......................................................................................................................................... 61
KT-300 FCC & IC Compliance Notice ............................................................................................................................. 61
KT-300 CE Compliance Notice........................................................................................................................................ 61
KT-300 UL Compliance Notice ....................................................................................................................................... 61
Troubleshooting Communication Problems ................................................................................................................... 61
KT-LCD4501 - LCD Time & Date Display Module ......................................................................................................... 70
WinPass Architecture with Optional VC-485 Line Extender ........................................................................................... 81
System Specifications..................................................................................................................................................... 81
Using ExpressSetUp - Section 2 ..................................................................................................................................... 81
Login the System - Section 2 .......................................................................................................................................... 82
W orkstation Configuration - Section 5 ........................................................................................................................... 82
Step 1. Preparing Installation of the KT-200 ................................................................................................................... 83
Step 12. Connecting the KT-200 to the RS-485 Bus........................................................................................................ 87
KT-200 T echnical Specifications .................................................................................................................................... 87
Walk Through Testing.................................................................................................................................................... 88
T ypical Component Connection to KT-200 .................................................................................................................... 88
Designed for installations of up to 64 card readers, WinPass bundles all the basic functions
of access control in an easy to learn and understand structure. Learning time is reduced to a
minimum. Familiar Windows screens are intuitive; on-line context sensitive help is always
available throughout the system.
Up to 8,000 card users can be defined in the system. Each card user is assigned an access
level that will allow entry at selected doors, only according to predefined schedules. All events
are recorded by the system for future review.
Once the system is configured, the computer is required only to monitor/update the system
or to print reports. The report generator can provide information sorted and printed according
to your needs or displayed using clear graphics.
If you are using KT-200 controllers and more information applies to the KT-200 controller on a specific subject, the phrase “SEESECTION
11 IFYOUAREUSING KT-200 CONTROLLERS” will be displayed within the subject under the specific paragraph or picture.
The paragraph which has more information about the KT-200 will be identified with an asterisk (*). For example: if a subject has several
paragraphs in which some specifications apply to the KT-200, then only the subject title and the specific section applying to the
KT-200 will be available in Section 11.
Unique Features
Distributed data and true stand-alone capability:
Memory and processing located at every door. No degraded mode. The computer never makes a decision and is necessary only for
maintaining the system's database or downloading buffered events in order to prepare reports.
Compatible with multiple reader technologies:
IoProx , Polaris mag stripe, ShadowProx proximity, XSF, Wiegand, bar code, biometrics, keypads and many others.
Automatic functions:
Unlock doors, activate relays and outputs, monitor inputs, according to schedules or system events.
Cards can be added or deleted in seconds ; all events are buffered and can be saved on disk or printed for future reference. WinPass
provides an easy-to-use report generator.
The report generator lets the user print or view the desired information from all the events saved to the computer’s hard disk.
Compatible with 2 types of controllers:
For more flexibility and options, WinPass offers the possibility to use 2 types of controllers: KT-200 and KT-300, However
types cannot be installed on the same system.
· Hard drive with 20 MB free disk space for software installation
· 900,000 events archived per 30 MB of disk space
· Windows 98 operating system
· VGA Monitor
· Dedicated computer not necessary (computer necessary only
for configuration and reporting, computer not required for
operation).
Software Installation
1 ) Insert diskette #1 in drive A:,
2 ) From the Windows Taskbar, click on Start and then select Run.
The system will display:
5) The WinPass installation procedure will start and ask to
provide registration information such as the site name, the
company name and the product serial number (can be found
on diskette #1),
Note: To stop or cancel the installation, click on Cancel at any
time during installation.
6) You will be asked to confirm the registration information
entered in Step 5,
3) From the Run window, type A:\setup and click on OK. The
system will display the end-user license agreement. Read this
license completely,
4 ) To activate the “I agree” button, scroll to the end of the display.
Click on “I agree” to continue the installation or “I do not
agree” to cancel the installation,
7 ) Click on Yes to continue or No to modify the information,
8 ) You will be asked to confirm the installation path,
9 ) Click on Next to install WinPass in the displayed folder or click
on Browse to select another folder,
1 0 ) The setup will check your computer for the minimum system
requirements and a warning message will be displayed if your
computer does not meet these requirements,
1 1)You will be asked to confirm the program folder,
1 2)Click on Next to continue, or type a new folder name or select
one from the displayed list,
1 3 ) Once the setup is complete, you will be prompted to view the
ReadMe file and run ExpressSetUp. Make your selections (it
is recommended to view the ReadMe file and run ExpressSetUp
before starting the program), click on Finish to complete the
installation.
WinPass is now installed on your computer. To save installation and configuration time, we strongly recommend thatyou use ExpressSetUp so that the system is fully functional
and ready to test the hardware and wiring.
1 ) When you use ExpressSetUp, the system will display the login
window. Enter your login name and password (default:
WINPASS (not case sensitive) and click on OK to continue,
2 ) Enter the number of readers required and specify the controller
type and click on OK to continue,
Using ExpressSetUp
ExpressSetUp configures the system. Usually, if you do not
require special options, the system will be ready to be used after
you define the schedules, user access levels and cards.
1414
14
1414
3 ) You can modify the door names. Select (check box) the doors
(readers) on which Anti-Passback is required (see Controller
Definition Section for more on Anti-Passback). Specify the
type of Anti-Passback (soft or hard). Click on OK to continue
the installation, *
4) By default, the reader type is Polaris 2 with Polaris cards, to
select a different reader, click on the requested reader type and
click on OK to continue the installation. Some readers offer the
possibility the 16-digit card driver format,
SECTION 2SECTION 2
SECTION 2
SECTION 2SECTION 2
configured, the controller configurations including the AntiPassback option, REB-8, number of readers, reader types and
communication ports will be set to default. Other information
contained in the database (event tables) and user (cards) information will not be modified.
ExpressSetUp associates the door contact for the first door of a
controller to input 1 and the second door contact to input 3. The
request-to-exit button or detector (REX) is associated to input 2
for door 1 and to input 4 for door 2. *
“SEESECTION 11 IFYOUAREUSING KT-200 CONTROLLERS”
After answering the question, the system will define the necessary
door controllers, the readers, the door contacts, the request-toexit detectors, etc. so you have a working system.
7) Once the system has finished the installation, the following
screen will be displayed:
-- WinPass Utilities -- WinPass Utilities
-- WinPass Utilities
-- WinPass Utilities -- WinPass Utilities
5 ) Select the COM port and baud rate and click on OK to continue
the installation. The default settings are COM Port 2 and 9600
baud rate.
Note: The KT-300 controller selects its communication speed
automatically. It can go up to 115,200 baud.
6 ) Once you have entered the baud rate, the system will display
the following question:
ExpressSetUp may be used at the initial installation or you may run
ExpressSetUp later. Whether it is the first time or not, the following
warning message will appear: This operation will modify all
controllers’ data. Do you want to continue?
Click on YES if this is a first installation.
Warning: If you are running ExpressSetUp once the system is
8 ) Click on “serial number” button and enter the serial number of
the KT-300 controller (8 digits). The serial number allows
communication between controllers and the computer. Click
on OK to continue the installation.
Login the System
This section describes the login procedure.
1 ) Click on the login button , the system will display:
2 ) Enter “WINPASS” as login name,
3) Enter “WINPASS” as password,
4 ) Click on the OK button.
Note: Remember to change this default password once the system
Once registered, you will be prompted to confirm the date and time
in order to synchronize the date and time between the controllers
and the computer.
The system should now be functional. Should communication
problems be present, click on Configure Workstation (see Workstation Configuration in section 5) to verify the COM port and
baud rate settings *.
SEESECTION 11 IFYOUAREUSING KT-200 CONTROLLERS”
“
Uninstalling WinPassUninstalling WinPass
Uninstalling WinPass
Uninstalling WinPassUninstalling WinPass
This section describes the procedure to remove the WinPass
software from your computer.
From the Control Panel, select Add/Remove Programs, select
WinPass and click on Add/Remove. Once the procedure is completed, a screen will be displayed informing you that the removal
is completed but some files must be removed manually from your
hard drive. To remove these files, you must:
1 ) Click on My Computer,
2 ) Select C\: drive or the other drive where WinPass was installed,
3) Select the WinPass directory,
4 ) Click on file and select Delete,
5 ) Winpass folder and directory will now be removed.
Warning: This option will delete all events and data.
1 ) Click on My Computer,
2 ) Select C\: drive,
3 ) Select Windows folder,
4 ) Delete the file named “winpass.ini”.
Note: If you are having trouble locating the file, you may find it
quickly by using Windows Explorer’s find feature.
Backup Procedure
Performing a regular file backup safeguards them against loss if
your hard disk fails or you accidentally overwrite or delete data.
Depending on what and how you want to backup your files, there
are several options offered with Windows. Some of the available
options are as follows:
1 ) Backing up selected files and folders,
2) Defining a set of files to be backed up,
3 ) Backing up a predefined set of files,
4) Backing up only files that have changed,
5) Backing up files quickly using drag and drop.
Below are the instructions for backing up selected files and folders
(option 1). The instructions for the other options may be found in
the Windows Help menu.
From the Taskbar, click on Start and select Programs. Point to
Accessories and then from System Tools, click on Backup.
1 ) Click the Backup tab,
2 ) Click the plus sign (+) next to the drive that contains the folders
or files you want to backup,
3 ) To select all the files in the folder, click the box next to it. To
select only certain files, click the icon for the folder that
contains the files, and then click the box next to each file on
the right side of the window,
4) Click Next Step, click the destination where you want the
backed up files to be stored, and then click Start Backup,
5) Enter a name for the backup set.
Upgrade Procedure
To upgrade your system, follow the installation procedure.
The description in brackets [ Main,] indicates the active menu.
2) WinPass:
The first caption is the program name.
3) All events TAB:
This tab lists all the system events as defined in each of the
event’s display schedule.
4) Acknowledged events TAB:
This tab contains all the events which have been acknowledged
by the operator. For example: “Door forced open” event has been
defined to be acknowledged by the operator. This option is set
under the event definition menu.
5) Devices events TAB:
This tab contains all events related to components such as:
controllers, doors, relays, inputs and outputs.
6) Operator events TAB:
This tab contains events generated by the operator’s activities
such as: programmation, manual modifications, relay activation,
reader disable, etc.
7) Operator:
Displays the name of the operator currently logged on.
8) Version:
Displays the version of the software.
9) Last event:
Displays the last recorded event.
10) Last alarm:
Displays the last acknowledged alarm event.
11) On-line help:
The HELP button provides context-sensitive help. For example,
by clicking on HELP in Door Definition, the help topics provided
will be related to the Door Definition menu.
12) Filtered events TAB:
This tab contains all the events which match the character string
found at the top of that table.
13) Access events TAB
This tab contains all the events generated during door access
by users.
This option repositions the cursor on the most recent event in the
current table (tab). It also activates the automatic positioning.
Since this requires use of a background task, the tables are
momentarily locked during this operation and cannot be
accessed.
It is possible to view the search progress on the taskbar
and in the progress window.
15) Find next:
This option allows you to search using the Find option from the
actual cursor position (see Find option).
16) Find:
This option allows you to search events tables using one or more
keywords. The system searches from the most recent to the oldest
event. The tables will be locked
accessed during this period, because the system is using a
background task to complete the search.
It is possible to view the search progress on the taskbar or
in the progress window.
during a search and cannot be
The Definition toolbar
Lets you define schedules, access levels, holidays, event display
and color, system operator password and operator security levels.
Operation toolbar
Lets you perform manual operations on doors, relays, inputs and
outputs. You can also view the various components status, create
a card list, reload controllers, change the date and time of your
system and re-index the tables.
File Tools (buttons)
12345
17) More info:
By double-clicking on an event, you can view additional details
concerning that event. For instance, in an access event, an
additional screen displaying the cardholder’s picture (if pictures
are assigned in User Definition) is displayed. The “More Info”
button is refreshed each time a new event is generated.
18) Date and time:
This section displays the system’s date and time.
Toolbar Menus
Toolbar menus are used throughout the system to perform various
actions or operations in the system.
The Main toolbar:
After operator login, the main menu bar provides access to the
sub-menus and enables the operator to access help, logout or exit
the system.
The Configuration toolbar
Lets you define how the components work and relate to each other.
You can define workstations, controllers, doors, relays, inputs
and auxiliary outputs.
2020
20
2020
6 7 8
1) The LINK button:
This option is used to display the relationships between the
component being edited and other components of the system.
When used, it will display a screen containing two windows, the
first one representing the category and the second one representing a component. By clicking on a category, you can view all
components which are linked and may be affected by editing the
selected record.
2) The NEW button:
This option is used to add a record to file. It will clear the actual
screen and leave a blank new page for the new information. Once
saved, the system controllers will be updated with the new
information.
3) The DELETE button:
This option is used to remove a record from the database. Once
this option is activated, WinPass verifies the links between the
components, will warn the operator of these links and will require
a confirmation. Once the deletion is confirmed, the system controllers will be updated as necessary.
4) The SAVE button:
This option is used after a new record has been created or after a
record has been modified. Once pressed, the system controllers
This option is used to cancel all changes made to a record since
the last SAVE. After pressing CANCEL, the system will prompt
the operator to confirm: Do you want to save? Click NO and none
of the changes will be kept on records.
6) The EXIT button:
This option is used to close the current window.
7) The HELP button:
This option is used to provide the operator context-sensitive help.
8) The MORE button:
This option (if displayed) is used to view additional configuration
parameters of a selected component.
Operator Acknowledgment
Operators can be required to acknowledge certain events such
as alarms or card trace type of events. Events that require operator
acknowledgment have to be defined under the Event Definition
menu. When the operator is required to acknowledge an event, the
computer's audible warning will sound and an alarm screen will be
displayed on-screen:
Defining Schedules
It is possible to use the same schedule for different uses, but it is
recommended to create a distinct schedule for each requirement.
It is then much easier to modify a particular application's schedule
without affecting other applications (refer to schedule definition,
in section 6).
Defining Doors
Properly defining access doors when designing an effective
access control system plays a crucial role in the system’s integrity.
Door types such as entry, exit, access, and the individual door
schedules will be found in “Door Definition”. All door timings
including door open times, door unlock times, door contact inputs
will also be found in “Door Definition”.
KT-300 Door Programming Relays
Each KT-300 door controller is equipped with two open collector
outputs. These controlled outputs are not to be confused with the
door strike outputs. The controlled outputs may be programmed
to activate or deactivate to follow certain inputs. Also, the
activation/deactivation times may be user defined and schedules
may be defined for individual relays. * If relays are required, see
the system specifications of section 1.
SEESECTION 11 IFYOUAREUSING KT-200 CONTROLLERS
The alarm event description will be displayed with time and date
and the associated device. From the “Event Definition” menu,
select all events which will require operator acknowledgement.
The “Acknowledged Events” tab stores events that have been
previously acknowledged by an operator.
Customizing the System
Follow this sequence to customize WinPass:
1 ) Define Controllers
WinPass is designed to communicate with the door controllers via
one of the 4 host COM ports.* The controllers are identified by
their serial number (refer to controller definition in section 5).
“SEESECTION 11 IFYOUAREUSING KT-200 CONTROLLERS”
Monitoring Inputs
WinPass may control 8 inputs per KT-300. When an expansion
module is added inputs are increased to 16.* If additional inputs
are required, see the system specifications in section 1.
SEESECTION 11 IFYOUAREUSING KT-200 CONTROLLERS
Programming Outputs
In addition to having two form “C” controlled outputs on each KT300, four open-collector auxiliary outputs have also been provided. These outputs are typically used to activate the reader’s
LED on an access granted and the piezo alarm buzzer on a T.REX
request-to-exit detector door alarm (please refer to output defini-
tion in section 5).*
SEESECTION 11 IFYOUAREUSING KT-200 CONTROLLERS
Access Levels
Up to 250 access levels may be defined in WinPass. Access levels
determine to which doors and at what time cardholders will have
access. For example, office employees may have access at door
1 “Front door” only from 7:00AM to 5:00PM on weekdays (please
WinPass will control a maximum of 8,000 cards per system (see
System Specifications for more details on cards and controller
types). Cards may be easily programmed in “Card definition”. All
user definable fields, PIN codes, access levels, valid card times will
be found in “Card Definition” (please refer to Card Definition in
section 4).
Security Levels
Operators in “Operator definition” must be assigned a security
level. This security level determines which menus the operator will
have access to and what level of database functions the operator
will use (ex. View, Modify, Delete or Print). There are 8 programmable security levels and one (1) pre-defined (please refer to
security level definition in section 6).
Holidays
Up to 366 holidays may be defined in WinPass. Each holiday may
be defined in 1 of 4 classes (HO1-HO4). Once a holiday has been
defined, the holiday is selected in the “Schedule Definition” to
permit different valid access times during each holiday type
(please refer to holiday definition in section 6).
Defining Events
The term “Event” is used to describe activities or alarms detected
or generated by the system. There are many different system
events such as Access granted, Input in alarm, Card modified by
operator, etc.
The Event Definition capacity is a powerful feature of the system.
For each event, it is possible to determine how the event should
be displayed or printed. These dispatches can also be limited by
schedules that will allow, for example, to print or display some
events only during a particular period of time such as after regular
hours.
Each event related to a device can be individually associated to
a corresponding set of actions such as display, acknowledge or
print.
For example: the “Door open to long” event is defined for each
individual door of the system. This also permits a different action
or response on a door to door basis.
Critical alarm events should be set to require an acknowledgment
from the operator (please refer to event definition in section 6).
This section is used to create new cards in the system. When creating cards, you can use the Group
feature to define multiple cards at a time, you can also use the Assign Picture feature to assign
pictures to cardholders ; these pictures will be displayed on the Event Monitoring screen when the
cardholder presents its card at a reader.
This screen is used to define new cards, modify or delete existing
cards, assign pictures to cardholders, define multiple cards (group
feature) and obtain a card ID number.
A card number usually consists of two elements: the family or site
code and the card’s own identification number. The card family
code usually has a hexadecimal value between 00 and FF. The
card’s identification number is usually in decimal format. When
entering the card number, type all preceding zero(s) for numbers
shorter than 5 digits. Decimal format range is between 00000 and
65535.
-- Defining System User -- Defining System User
-- Defining System User
-- Defining System User -- Defining System User
2 ) Select a dedicated reader. It allows you to select a reader with
which cards will be attributed in the system.
3 ) As you swipe a card, you can enter the user’s definition in the
fields.
4) You can proceed with step 3 as often as needed.
5 ) When you are done, press the CLOSE button and the system
will automatically save all the cards you have previously
entered.
Field Definition
ss
s
ss
You can use the “up/down arrows” feature - (if you want to scroll
through the defined cards to select one), or you can use the
“More” feature to specify additional information such as: trace the
card, if the user must use a pin number at the keypad, etc. (lets you
enter more information concerning a cardholder).
“Get Card ID” button
You can use the “Get Card ID” button (if you want to define a card
but don’t know its number). To define many cards, use the Group
feature.
To use this feature, click on the “New” button, the sytem will
display a blank new screen. Swipe the card at a reader connected
to the controller. The card number will be displayed:
Click the “GET ID” button to return to the card definition screen
so you may continue to enter the information in the fields.
Note: Only non-existant card numbers will be captured.
“Group” button
You can use the “Group” feature to select a reader at which cards
will be passed (if you have many cards to be defined):
1 ) Click on the GROUP button, the system will display:
Last name / First name
Enter the cardholder’s name, up to 30 characters for each or less.
It is recommended not to use commas as field separators for
importing purposes.
User definable 1, 2 & 3
These user definable fields are 30 characters long and can be used
to store additional information regarding the cardholder. Common
use for these fields are: employee number, department, address,
telephone number, etc...
Access level
Select an access level to which the user will be assigned. Access
levels are usually defined before entering a new card. The access
levels determine which doors according to a specified schedule
the cardholder will be permitted access to.
Card status
The usual setting is “valid”. Setting the card status to invalid, lost,
stolen, status #4 or status #5 , will disable the card and the system
will deny access to this card. The system will also generate the
appropriate event such as “access denied-invalid”, “lost”, etc.
When a card is lost, it is better to set it to “lost” than deleting the
card from the system. This way, all the data concerning the user
can be kept within the system and if anyone ever attempts to use
the card, the card will be denied access and the event will identify
the actual card’s previous owner. The system automatically sets
card status to “expired” or “pending” according to the card’s
validity dates.
Picture selection
This feature lets you assign a picture to the cardholder. Follow
these steps to assign a picture:
1 ) Double-click on the picture area,
2 ) Select a picture from the pick list,
3) Click on the ARROW button to return to the card definition
screen.
Note: By default, all pictures must be selected from the
\WinPASS\picture directory. This path may be modified by specifying the location of the picture files in the workstation configuration menu option.
Find button (search a cardholder)
1 ) From the Card Definition screen, click on the Find button,
“More” button
This button opens an additional screen. From the displayed
screen, you can select various options.
Field Definition
Beginning date / Expiring date
Period of time during which the card will be valid. WinPass will,
by default, set each new card to be valid (effective immediately).
If there is a date entered in the expiring fields, the expiry date must
be greater than the beginning date.
2 ) Enter a keyword(s) to search in the KEY field (case sensitive),
3) Click on the Find Now button to initiate the search,
4) Once the search is done, WinPass will display the user’s
profile. If no match was found, the current profile will be
displayed.
Trace Card
When selected, this parameter will generate a “Card traced” event
each time the card is used. This is useful to keep track of a particular
card.
Anti-Passback
Determines whether Anti-Passback control will be enforced for
that cardholder.
Must use PIN
Setting this value to YES means that the user must enter a PIN
number after a valid swipe in order to be granted access to a door
equipped with a keypad.
PIN Value
Every time a new user is entered, the system will automatically
generate a PIN number automatically. You may modify the PIN
number by entering a number with 5 digits from 00000 to 65535.
Click on the up arrow to return to the Card Definition menu.
This feature is used to define the workstation’s parameters.
Field Definition
Time:
Enable time change
Click here to activate the time change mode. Set the dates for
automatic time change.
Automatic logout delay
The Automatic logout delay is the predetermined time set after
which the system automatically logs out the operator who is
inactive. The time is entered in hours, minutes and seconds. This
feature provides additional security to prevent access to the
system by an unauthorized person.
Card format
The card format setting determines how the card numbers will be
represented throughout WinPass. Usually displays 8 digits, but
some readers offer the 16-digit format.
ButtonsButtons
Buttons
ButtonsButtons
“Port Settings” button
Select the baud rate speed that will be used to poll the door
controllers. There are four choices: 1200, 2400, 9600 and 19200.
Setting a lower poll rate on the controllers may correct some
communication problems due to induction or faulty cabling.
Daylight savings time
The Daylight savings time date change can be entered here and
the system will automatically, at 2:00 am, advance the time to 3:00
am on the first Sunday of April.
Standard time
The Standard time date change can be entered here and the system
will automatically, at 2:00 am, set back the time to 1:00 am on the
last Sunday of October.
Note : It is very important to enter the correct year.
General:
Keypad time-out delay
The keypad time-out delay is set in seconds for a maximum of 127
seconds which represents the time allowed for a user to begin
entering his or her personal identification number (PIN) at a
keypad.
Keypad inter-digit delay
The keypad inter-digit delay is set in seconds, up to two minutes.
It represents the maximum delay permitted between each selection
of a keypad key by a user.
Note: To select the COM port on which the controllers are
connected to the host computer, refer to Section 5 under controller definition menu under “More” button.
Note: When selecting the baud rate in the software, the KT-300
will automatically adjust to the selected rate.*
“SEESECTION 11 IFYOUAREUSING KT-200 CONTROLLERS”
2929
29
2929
WW
inPass Reference ManualinPass Reference Manual
W
inPass Reference Manual
WW
inPass Reference ManualinPass Reference Manual
“Printer” button
This printer is used to print events as they occur and recorded by
the system. This is normally used to print events which are of high
importance. The events to print must be defined with a printing
schedule (see Section 6 - Event Definition). You cannot use a
Network printer as a log printer.
Field Definition
Printer Port Selection
Select the LPT Port to which your printer is connected. The default
setting is LPT2.
Number of lines per page
This option is used by the “Log Printer” only. It is used to
determine the number of events to be printed on a page and/or
page breaks. The default value is 60.
“Directory” button
Enter the ON/OFF flash time of the outputs that are programmed
in the auxiliary output definition relative to each event.
“Duress function” button
The manual activation of a silent alarm by entering at the keypad/
reader a code different from the normal arm/disarm code. The
duress feature has to be implemented on an integrated reader/
keypad.
The chosen code will have to be entered after the NIP once the
access is granted or access denied or both (according to the
duress option chosen) in order to produce either a silent alarm
which is designed to allow a person to call for help without
arousing suspicion.
Field Definition
Log directory
This field allows you to select the directory in which the daily event
files of the system will be stored. Events are saved in a daily file
on disk and labeled according to the following format:
YYYYMMDD representing the date (i.e: 20000301.dbf, for March
1st, 2000 events).
Picture directory
This field allows you to select the directory in which the photo files
(bmp, gif, pcx, tif, etc.) will be selected from when assigning
pictures to cardholders in the card definition menu. The default
directory is C:\WINPASS\PICTURE.
“Output timer” button
A list of events is provided by the system. These events control
the time from which the auxiliary outputs (LED & BUZ = light and
buzzer) for the door readers will remain ON or OFF (toggle). Select
the delays at which the output will remain on then go off when its
associated event occurs.
See “Output Definition” menu -- Section 5 to set the status (steady,
flash, steady timed, flash timed and none) of the outputs.
A choice of using the function on access granted or access denied
or both will be offered. Select which code is to be used from 0 to
9 and #.
Note: “*” is not available with POL/-2KP because there are 2
wires contact for the “*” button.
“Firmware” button
This button is used to select the directory in which the firmware
file for the KT-300 is located. To update the controller’s firmware,
use the Reload function from the Operation menu.