The trademarks used in this Reference Manual are the property of the trademark holders. The use of these
trademarks in this Reference Manual should not be regarded as infringing upon or affecting the validity of these
trademarks.
Keri Systems, Inc. reserves the right to change, without notice, product offerings or specifications.
No part of this publication may be reproduced in any form without written permission from Keri Systems, Inc.
Doors NetXtreme (DoorsNXT) is versatile in that it will work within a small LAN with a single PC
running the Server, Database and Client or within a Global WAN encompassing dozens of clients
controlling thousands of doors.
Doors NetXtreme operates in a networked client/server environment. There are four basic components
to the DoorsNXT architecture: NXT controller hardware, DoorsNXT server, DoorsNXT database, and
DoorsNXT client (referred throughout this document as the controller, server, database, and client.
NXT controller hardware may be comprised of a combination of 2-door and 4-door NXT controller
hardware, NXT 4x4 modules, Reader Interface Modules (RIM), and card readers (MS, Wiegand, and
NXT).
DoorsNXT Server is the workhorse of Doors NetXtreme. It manages the communication between the
clients and the NXT hardware.
DoorsNXT Database is SQL compliant, client/server software providing access from multiple
concurrent sites with no third-party royalty fees. The database is automatically installed on the same
computer as the server.
DoorsNXT Client provides an interface to configure the NXT hardware, operators, users, and access
control functionality. The client is secured by an operator login. It communicates to the server over
TCP/IP.
Configuration of DoorsNXT will require some general knowledge of TCP/IP Networking and will
require specific knowledge of network details of the system to which DoorsNXT will be installed.
The following information must be known before attempting to install and configure DoorsNXT:
•The MAC address of the NXT hardware to be installed.
•The IP Addresses that will be assigned to the NXT controllers (each controller
own IP Address).
•The Subnet mask to be used for the LAN segment where the controllers will be installed.
•The Gateway address for the Subnet.
must have
its
01945-100 Rev. 4.0Page 3
Doors NetXtremeTM Reference ManualKeri Systems, Inc.
2.0Getting Started
2.1Software Installation
An InstallShield wizard handles the software installation/upgrade process. Installing software is
basically a question and answer process.
1.Load the installation CD into the CD-ROM of the host computer. The AutoRun Menu appears.
2.Click on the Keri product that needs to be installed or updated. Follow the on-screen step-by-step
instructions.
3.Be sure to save the information given in the Notepad program at the end of the installation (see
Figure 1). This information will give you the password and other necessary information to get
DoorsNXT working properly.
Figure 1: DoorsNXT Password
2.2Setup Client
Once the software has been installed. The first Client must be configured.
NOTE: Licensing for the first Client is included. To use additional clients concurrently, contact Keri
Systems for additional licenses.
Figure 2: Windows Explorer - Client Application
1.Open up Windows Explorer and locate the DoorsNXT installation. Click on the folder created for
the first Client. The number of Clients available is determined by the selections made in the
software installation process and will vary depending on installation.
2.Double-click on the DoorsNXT application. DoorsNXT will open to the Connection Settings
window (see Figure 3 on page 5).
Page 401945-100 Rev. 4.0
Keri Systems, Inc.Doors Ne
tXtremeTM Reference Manual
Figure 3: DoorsNXT - Connection Settings
3.In the Client Name field, enter “MASTERCLIENT.”
NOTE:
etc. to help distinguish the clients from each other.
4.In the Client ID field, enter an integer to be assigned
5.In the Server Name field, enter the name of the server.
6.Leave the Connection Timeout field at the default of “10” seconds.
7.Type in the new password in the two fields given. The password was given to you during the
8.Click on the button.
NOTE: Repeat steps 1-7 for each Client.
For multiple clients, you may want to enter “MASTERCLIENT
to the client
and continuing on sequentially with the remaining clients.
installation of DoorsNXT (see Figure 1 on page 4).
,” “CLIENT2,” “CLIENT3,”
. It is recommended to start with 1
01945-100 Rev. 4.0Page 5
Doors NetXtreme
TM
Reference ManualKeri Systems, Inc.
2.3Log On to DoorsNXT
Click on the Connect and Log On tab.
Figure 4: Log On DoorsNXT
1.Enter the Operator Name as shown on Figure 1 on page 4.
2.Enter the Password as shown on Figure 1 on page 4.
3.Click on the button.
4.If everything has been done correctly, you will receive confirmation that you are logged on to the
server.
5.Click on the “Close” button to close the Log On window.
Page 601945-100 Rev. 4.0
Keri Systems, Inc.Doors Ne
2.4Setup System Information Page
Every time the Setup System window is opened, a Setup System Information page window will appear.
This information window states what information is necessary to have on hand prior to begin setup of
the DoorsNXT network (see Figure 5).
tXtremeTM Reference Manual
Figure 5: Setup System Information Page
1.Click on the “OK” button to close this window and the Setup System window will appear.
2.Click on the “CANCEL” button to close this window without also opening the Setup System
window.
3.If more information is needed click on the “Diagnostic Assistance” button to open the NXT Network Connection Troubleshooting Guide (P/N 01508-001). This window will remain open until
either the “OK” or “CANCEL” button is selected.
NOTE: There is no way to stop this window from appearing. Every time the Setup System window is to
be opened, this information window will appear first.
01945-100 Rev. 4.0Page 7
TM
Doors NetXtreme
Reference ManualKeri Systems, Inc.
2.5Tutorials
To assist with basic setup of DoorsNXT, some video tutorials have been created and are available
through the client window.
Figure 6: Tutorials Access
1.All tutorials are available from the Tutorials drop-down menu.
2.If there is a tutorial that applies to a specific window, the “Tutorial” button will be available. Slick
on the button to watch the tutorial available for that particular procedure.
Currently, there are two settings that must be changed upon completion of the installation of DoorsNXT.
•Change the Database Owner Password
•Enter the License Authorization Code (if concurrent cl
Click on Setup > Options and Preferences > Security and Licensing (tab).
ient capabilities are planned)
NOTE: As this
present when entering and viewing security codes.
Figure 7: Setup Security and Client Licensing
1.Enter the Operator Name and Password as shown in “Log On to DoorsNXT” on page 6. When the
correct Operator Name and Password is entered, the side window appears automatically.
2.Click in the Show Codes box.
3.The Server ID is shown. It is recommended that this number be written down and stored in a secure
place for future emergencies.
4.The default Database Owner Password is Keri. Enter a new Owner Password in this field and write
it down along with the Server ID to be stored in a secure place. This password is needed for ALL
DoorsNXT upgrades.
5.If multiple concurrent client capabilities will be needed, contact Keri Systems with the Server
Authorization ID number. Keri Systems will generate an Licensing Authorization Code.
6.Enter the Licensing Authorization Code received from Keri Systems in the field provided. You will
now be able to run multiple clients simultaneously.
7.The Clients field shows how many clients have been licensed. The first client is free and does not
require a License Authorization Code.
8.If there is an expiration date then that date will appear in the “expires” field.
area deals with security issues, it is recommended that only authorized personnel are
9.Click on to save the information, or click on to clear all changes.
use at this time.
NOTE: The Encryption Key is
01945-100 Rev. 4.0Page 9
not in
Doors NetXtreme
TM
Reference ManualKeri Systems, Inc.
3.2Setup User Defined Fields
Setup > Options and Preferences > Setup User Options (tab).
Figure 8: Add User Defined Field
1.Click on the button.
2.Enter a nam
3.Enter the maximum number of characters allowed in the field (the range is from 1-256).
4.Enter a description of the purpose of the User Defined Field.
e for the field (to be used in the Setup Users window).
5.Click on the button to save all changes or click on the button to not
save the fields.
3.3Setup Database Backup Path
Setup > Options and Preferences > Backup Paths (tab).
Figure 9: Setup Database Backup Path
1.Click on the button.
2.Enter the location for the backup file to be used.
3.Click on the to save the path or click on the button to undo the
changes.
Page 1001945-100 Rev. 4.0
Keri Systems, Inc.Doors Ne
3.4Badging
Setup > Options and Preferences > Badging (tab).
Figure 10: Enable Badging
Once the badging feature has been enabled, ID Flow by Jolly Technologies may be used to create and
issue badges.
tXtremeTM Reference Manual
01945-100 Rev. 4.0Page 11
Doors NetXtremeTM Reference ManualKeri Systems, Inc.
4.0Operators
The operators are the people who will be performing the work – creating the databases required by the
rsNXT software to do its job and monitoring the system once everything has been downloaded to
Doo
the controllers.
Since the “Administrator” has access rights to every operation, anyone who knows the name and
password will have complete programming access. Keri Systems recommends keeping this
information a closely guarded secret.
4.1Create a New Security Level
DoorsNXT comes with 2 pre-programmed security levels. A DoorsNXT Administrator has all access
rights to every operation. Care should be given before assigning Administrator rights to an operator.
1.In the Setup Operators and Security Levels window/Security Levels tab, click on .
2.Rename the Security Level Name (name is limited to 32 characters in length).
3.Use drop down menu next to “Access:” to choose between none, read only, and read/write for each
security right.
None
The operator does not have operation rights.
Read Only
The operator can view, but not make any changes to this operation.
Read/Write
The operator can view AND change the setup of that operation right.
The following list are the feature security level rights available for assignment to a security level (which
is then assigned to an operator. Each security level must be created and saved, one-at-a-time. Repeat this
process for each security level.
Setup Users
•Read/Write - allows an operator to perform the Setup Users commands: enrolling credentials,
enrolling users, entering data, voiding, deleting, and assigning access groups.
•Read Only - allows an operator to on
•None - does not allow the operator to view
Setup System
•Read/Write - allows an operator to perform the Setup System commands: entering or editing
the parameters by which a door/controller operates.
•Read Only - allows an operator to review
•None - does not allow the operator to view
Setup Timezones and Holidays
Identifies if an operator is allowed to perform the Setup Timezone commands: creating or editing
Timezones and Holiday schedules or is allowed to have Read Only access to review, but not change,
this information.
ly view user information.
or change user information.
, but not change, the system information.
or change system information.
Setup Access Groups
Identifies if an operator is allowed to perform the Setup Access Group commands: creating or editing
access groups (specifically associating timezones with doors) or is allowed to have Read Only access to
review, but not change, this information.
Setup Operators and Security Levels
Identifies if an operator is allowed to create new operators.
Use Filter Level 1-3
Identifies which levels of view filters are available for the operator to use during monitoring (see “Setup
Monitor View Filters” on page 53).
Setup Filters and Events
Identifies if an operator is allowed to manage the Setup Monitor View Filters settings or is allowed to
have Read Only access to review, but not change this information.
Setup Schedules
Identifies if an operator is allowed to manage the Setup Schedules settings or is allowed to have Read
Only access to review, but not change this information.
Setup Options and Preferences
Identifies if an operator is allowed to manage the Options and Preferences settings or is allowed to have
Read Only access to review, but not change this information.
Operate Monitor View
Identifies if an operator is allowed to modify a Monitor window (a window that views events on the
access control network as they happen) or is allowed to have Read Only access to review, but not
change, this information.
01945-100 Rev. 4.0Page 13
Doors NetXtremeTM Reference ManualKeri Systems, Inc.
Update Network
Identifies if an operator is allowed to update the network or is allowed to have Read Only access to
review, but not change this information.
Create Reports
Identifies if an operator is allowed to generate Event Reports (summaries of events that have occurred
on the access control network).
Report Level 1-3
Identifies which reports an operator is allowed to run (see “Run Pre-Designed Report” on page 59).
Manage Network
Identifies if an operator is allowed to manage network settings or is allowed to have Read Only access
to review, but not change this information.
Manage Server
Identifies if an operator is allowed to manage server settings or is allowed to have Read Only access to
review, but not change this information.
Manage Database
Identifies if an operator is allowed to change the Manage Database window or is allowed to have Read
Only access to review, but not change this information.
System Diagnostics
Identifies if an operator is allowed to manage System Diagnostics settings or is allowed to have Read
Only access to review, but not change this information.
Flash Controllers
Identifies if an operator is allowed to flash (update) controllers on the network or is allowed to have
Read Only access to review, but not change this information.
Operate Hardware
Identifies if an operator is allowed to operate hardware (controllers) or is allowed to have Read Only
access to review, but not change this information.
Page 1401945-100 Rev. 4.0
Keri Systems, Inc.Doors Ne
4.2Create a New Operator
Setup > Operators and Security Levels > Operators (tab).
NOTE: As this area deals with security issues, it is recommended that only authorized personnel are
present when entering and viewing operator names and passwords.
tXtremeTM Reference Manual
Figure 12: Setup Operators
1.Click on .
2.Click in the “Show Passwords” box.
3.Rename the Operator Name (name is limited to 32 characters in length).
4.Enter a password that the operator can remember.
NOTE: The operator name and password fields are both case sensitive. That is, the program
differentiates between UPPERCASE and lowercase in all three fields. Please keep this in mind when
creating operator names and passwords.
5.Assign a Security Level by using the drop-down menu. Security Levels should have been created in
“Create a New Security Level” on page 12.
6.Click on to save the new operator or to clear it without saving.
7.To delete an Operator, click on the row to be deleted and click , followed by .
NOTE: At this time it is possible to delete settings that are currently in use elsewhere in the software.
cause the program to not function properly. It is recommended that instead of deleting
will
ng this
Doi
any settings, change the name to “UNUSED.” This will be changed
deletions of functions that are in use elsewhere in the software.
in subsequent versions to not allow
01945-100 Rev. 4.0Page 15
TM
Doors NetXtreme
Reference ManualKeri Systems, Inc.
4.3Setup Geographical Timezones
Click Setup > System > Properties (tab) > Controller (tab).
Figure 13: Setup Geographical Timezone
1.Click “Add New” or “Duplicate.”
2.Enter Prop
3.Select from the drop-down menu the Geographical Timezone.
4.Select from the Daylight Saving Time Schedule in place (if any).
5.Select Auto Monitor Mode: “Y” (checked-default) or “N” (unchecked). “Y” means that events will
be automatically collected from controllers.
6.Click to save the timezone or to clear it without saving.
7.To delete a Geographical Timezone Property Set, click on the row to be deleted and click
NOTE: At this time it is possible to delete settings that are currently in use elsewhere in the software.
ng this
Doi
any settings, change the name to “UNUSED.” This will be changed
deletions of functions that are in use elsewhere in the software.
erty Set Name (this is the name that will be used to select this geographical timezone).
, followed by .
will cause the
program to not function properly. It is recommended that instead of deleting
There are many factors involved in setting up the Network Communication on a DoorsNXT installation.
Some data will need to be provided by a Network Administrator familiar with the network where the
DoorsNXT is to be installed. The main factors to consider when setting up the network are:
•Location of the controllers and Subnet configuration
•Network Security and Firewalls
5.1Location and Subnet Configuration
DoorsNXT can communicate to controllers on the local subnet or networks outside of the local subnet
using the DoorsNXT Proxy. The Subnet Data (below) will differ for each subnet. Each controller is
configured with a Subnet Property that consists of a Subnet Name, Proxy IP Address, Gateway Address,
and Subnet Mask.
By default DoorsNXT is configured with a single Subnet Property: Local Subnet. This subnet
communicates to the LAN connected to the DoorsNXT Server. There is no Proxy IP Address associated
with the Local Subnet since it is not needed. The Local Subnet property cannot be deleted, but it can be
disabled if necessary.
DoorsNXT can have multiple Subnet properties defined. To modify the local subnet property or create a
new Subnet property, go to Setup Controllers > Properties > Subnets...
Figure 14: Setup Networking
1.Click on .
2.Rename the Subnet Name, if desired, to something that will make it easy to understand what is
included in that particular Subnet.
3.“Use In Find” allows a subnet to be viewed during autoconfiguration.
4.If there is to be a Proxy IP, enter the address. A Proxy IP is a software agent that performs a
function or operation on behalf of another application. For DoorsNXT, the Proxy IP is a software
service running on a computer attached to a remote subnet.
5.Enter the Gateway IP Address. The Gateway is the IP address of a router used to transport TCP/IP
data packets to network subnets that are outside of the local subnet.
01945-100 Rev. 4.0Page 17
Doors NetXtreme
6.Enter the Subnet Mask IP Address. The Subnet Mask is a method of splitting IP networks into
NOTE: Once a Subnet property is created, controllers located on that Subnet will be assigned the
app
7.Click to save the changes or to clear it without saving.
TM
Reference ManualKeri Systems, Inc.
subgroups. The “mask” separates the portions of the IP address significant to the network from the
bits that are significant to the subnet. The subnet mask has the same format that is used by IP
addresses. An IP address of 192.168.100.1 with a subnet mask of 255.255.255.0 will only be able
to communicate locally to other IP addresses in the range of 192.168.100.1-254. Communications
to IP addresses outside of that subnet will be routed to the gateway.
ro
priate subnet data after an autoconfig is performed.
8.To delet
NOTE: At this time it is possible to delete settings that are currently in use elsewhere in the software.
Doing this
any settings, change the name to “UNUSED.” This will be changed
deletions of functions that are in use elsewhere in the software.
e a Subnet, click on the row to be deleted and click , followed by .
will cause the
program to not function properly. It is recommended that instead of deleting
5.2Firewall and Network Security
The DoorsNXT server and controllers use specific ports to communicate to each other. These ports must
be allowed access to pass through routers and firewalls in order to allow proper communication. This
includes the software-based firewall applications, such as Windows Firewall, installed on any computer
running DoorsNXT software or services (server, client, and proxy).
in subsequent versions to not allow
Figure 15: Setup Ports
1.The designated default ports should be left as is, unless instructed to change them by technical
support.
2.If instructed to change the ports, be sure to click to save the new port number, or click
to clear it without saving.
Page 1801945-100 Rev. 4.0
Keri Systems, Inc.Doors Ne
6.0AutoConfig
Click on Setup > System > Configure Controllers (tab).
Figure 16: Autoconfig - Part One
tXtremeTM Reference Manual
1.Click . The button will change to .Click on it to begin the Autoconfig
process.
2.All available controllers will appear.
3.The Find Status column will show the status of the controller.
4.In the “Take Ownership” column, deselect any controllers you do not want to configure at this time.
5.The IP Assigned column will show if an IP Address has already been assigned to this controller.
6.“Replace With” is used when replacing one controller with another (for further details, see the
“Replacing An NXT Controller” Application Note.)
7.“Keep Current Record” allows previously assigned parameters should be kept when an autoconfig
is performed that changes a portion of the system. “Keep Current Record” allows for certain areas
to be kept “as is” while adding additional hardware.
01945-100 Rev. 4.0Page 19
Doors NetXtreme
Figure 17: Autoconfig - Part Two
8.The controller’s address is displayed.
9.The Property Te
NOTE: If the Autoconfig detects a change in the configuration, a new template will be created
automatically
to be used, it must be selected. Before changing the Property Template, it is recommended that the
configuration is Verified (see “Verify Controller Configuration” on page 21).
TM
Reference ManualKeri Systems, Inc.
mplate is displayed.
. However, this new template will not
be assigned to the controller. If the new template is
10. The Type of controller (NXT4D, NXT2D) is displayed.
1.
Enter the IP address to be used in the “Current IP Address” field. This is the starting IP address
1
from which the controllers will be assigned individual IP addresses during autoconfiguration.
12. The “Change IP To:” column is used when changing the IP Address of a controller.
13. The Subnet Name being used for the configuration (as set up in “Firewall and Network Security”
on page 18) is displayed. After being assigned during autoconfiguration, it cannot be changed.
14. The Ethernet Address is displayed.
15. The Geographical Timezone currently in use is displayed.
16. Click .
17. Click . (This may take up to 3 minutes as the controllers are assigned IP addresses.)
18. To verify the IP address has been assigned, the IP Assigned column should change from “No” to
“Yes.”
NOTE: If the IP address is outside of the subnet of th
e DoorsNXT server
, autoconfiguration will FAIL.
19. Click .
20. Close the window.
Page 2001945-100 Rev. 4.0
Keri Systems, Inc.Doors Ne
6.1Verify Controller Configuration
Once the controller has been configured, that configuration can be verified.
Click on Setup > System > Configure Controllers (tab).
Figure 18: Verify Controllers
tXtremeTM Reference Manual
1.Click on .
2.After completion of the verification process, the results are shown in the message box.
3.Click on the to reveal the configuration of a particular controller.
01945-100 Rev. 4.0Page 21
Doors NetXtremeTM Reference ManualKeri Systems, Inc.
7.0Setup System Timezones & Holidays
7.1System Timezones
Click on Setup > Timezones and Holidays > Timezones (tab).
Figure 19: Setup Timezones
There are two predefined timezones: Always and Never
timezone always allows access regardless of time-of-day or day-of-the-week. The Never timezone
never allows access regardless of time-of-day or day-of-the-week.
1.Click .
2.Rename the Timezone to something that will make it easy to understand what is included in that
particular timezone.
3.From the drop-down menu select “Always,” “Never,” or “Use Times” for each day of the week
(and up to 6 holidays).
4.Enter the start time for each day of the week (and up to 6 holidays).
5.Enter the stop time for each day of the week (and up to 6 holidays).
NOTE: Time selections may be made by typing in the time (using a 24-hour clock format), or by rightclicking in the
name
.
NOTE: At this time it is possible to delete settings that are currently in use elsewhere in the software.
ng this
Doi
any settings, change the name to “UNUSED.” This will be changed
deletions of functions that are in use elsewhere in the software.
field and s
Makes a copy of an existing timezone and renames it adding “-copy” to the duplicated
Removes the highlighted timezone.
will cause the
electing “Pick Time” then selecting the desired time from the list.
program to not function properly. It is recommended that instead of deleting
. These timezones are not editable. The Always
in subsequent versions to not allow
Page 2201945-100 Rev. 4.0
Keri Systems, Inc.Doors Ne
tXtremeTM Reference Manual
7.1.1Graveyard Shift Time Zone Example (Crossing Midnight)
This time zone example is designed for a graveyard shift employee, eligible to work from 11:30 P.M. to
7:30 A.M. Monday/Tuesday through Friday/Saturday.
The graveyard shift time zone is unique in that it starts in one day-of-the-week and ends in the next dayof-the-week. To accommodate this, the time zone uses both the Start1/Stop1 and Start2/Stop2 cells to
cover the split in access times Tuesday through Friday.
•Monday – 11:30 to Tuesday – 07:30 hours (11:30 P.M. to 7:30 A.M.)
•Tuesday – 11:30 to Wednesday – 07:30 hours (11:30 P.M. to 7:30 A.M.)
•Wednesday – 11:30 to Thursday – 07:30 hours (11:30 P.M. to 7:30 A.M.)
•Thursday – 11:30 to Friday – 07:30 hours (11:30 P.M. to 7:30 A.M.)
•Friday – 11:30 to Saturday – 07:30 hours (11:30 P.M. to 7:30 A.M.)
Figure 20: Graveyard Shift Time Zone Example
01945-100 Rev. 4.0Page 23
Doors NetXtreme
TM
Reference ManualKeri Systems, Inc.
8.0Holidays Tab
Holidays are treated as if they are just another day of the week. This allows holidays to have access time
periods applied to them. Six holiday schedules are available for definition. This allows certain holidays
to have different access times than others do. For example, on holidays such as Presidents’ Day or
Martin Luther King’s birthday government offices are closed but many businesses remain open; on
holidays such as Christmas or Thanksgiving virtually all business and government offices are closed.
An access control network might need to assign holiday access times differently to cover these two
types of holidays.
Before defining holiday schedules, take some time and map out all the holiday possibilities for the site.
Consider the relative importance of the holiday and determine if multiple holiday schedules are
required.
NOTE: Certain holiday dates change from year-to-year (i.e. Easter or Thanksgiving). Operators should
and update the holiday schedules prior to the beginning of a new year to ensure proper holiday
eview
r
coverage.
Figure 21: Setup Holidays
1.Rename “HOLIDAY1” to a name that will make it easy to understand which holidays are included.
2.Click . An empty line appears in the holiday schedule.
3.Use the drop-down calendar to select the date of the holiday. Take care to make sure the correct
month, day, and year have been selected.
4.Designate the holiday as one that reoccurs year after year. This is only for those holidays that take
place on the same date each year (i.e. New Year’s Day, Christmas Day, etc.).
5.Enter the commonly used name of the holiday.
6.Select whether each holiday date should automatically expire at the end of the year.
7.Click to save the holiday schedule or to clear it without saving.
DoorsNXT utilizes p
template that may then be assigned to a number of individual buses, controllers, readers, operators, etc.
roperty sets to allow for common attributes and/or functions to be created into a
9.1Doors/Gates Property Sets
A property set is a configuration of standard settings that determine the default behavior of the system.
DoorsNXT automatically receives information from the controller that will determine the template
assigned that most closely resembles the wiring of the system. There are four basic templates that may
be assigned. If the wiring of the system does not match one of the four basic templates, a new template
(with a number following) will be generated.
NOTE: Take care not to change this once the
determine what changes may be made to the system and changing the template will make some options
either available or unavailable incorrectly.
Standard 4 Door/Standard 2 Door =
NXT 4x4 module attached.
Extended 4 Door/Extended 2 Door = access control with readers and the NXT 4x4 modules attached
to all Buses.
There may be times when it is necessary to change the template. Care should be taken when doing this.
NOTE: If the Autoconfig detects a change in the configuration, a new template will be created
automatically
to be used, it must be selected. Before changing the Property Template, it is recommended that the
configuration is Verified (see “Verify Controller Configuration” on page 21).
. However, this new template will not
access co
system has detected
ntrol with readers attached to all Buses, without the
be assigned to the controller. If the new template is
the configuration. The template will
Figure 22: Select Template and Timezone
1.Change the controller Name to something that will make it easy to identify throughout the system
and in reports.
2.The basic template of the system may be changed using the drop-down menu available. Care
should be taken before assigning a different template. Only do this when you are sure it is
necessary.
3.Assign the geographical timezone for the physical location of the controller from the drop-down
menu. Only timezones that have been created elsewhere will be available for selection. See “Setup
Geographical Timezones” on page 16.
01945-100 Rev. 4.0Page 25
Doors NetXtremeTM Reference ManualKeri Systems, Inc.
9.1.1Standard Doors/Gates Properties
Click on Setup > System > Properties (tab) > Doors/Gates.
Each door must be assigned a property set. There are 4 standard property sets that cannot be modified.
However, if these do not fit the necessary requirements, new property sets may be created.
Use the following table to determine whether one of the standard property sets may be used.
Standard 4
Door
Door TypeStandardStandardStandardStandard
Auto Unlock/Lock TimezoneNeverNeverNeverNever
Unlock Time10101010
Extended Unlock Time20202020
Open Time10101010
Extended Open Time20202020
First Person InNot UsedNot UsedNot UsedNot Used
Request To Exit (RTE) 1Momentary
Unlock
Request To Exit (RTE) 2Not UsedNot UsedNot UsedNot Used
Door Lock Relay ActiveEnergizedEnergizedEnergizedEnergized
Door Forced Relay ActiveNot UsedNot UsedEnergizedEnergized
Door Held Relay ActiveNot UsedNot UsedEnergizedEnergized
If one of the standard property sets does not fill the required settings, a new property set will need to be
created.
Figure 23: Door Properties Setup
tXtremeTM Reference Manual
1.Click or highlight an existing property set and click .
When
2.
3.Rename the “Property Set Name” to something that will be easy to understand.
4.Scroll through the list and change the following fields as needed for the specific property set.
Door Type - Door types allow an operator to identify the type of door being used. There are two door
types.
Auto Unlock/Lock Timezone - The unlock/lock time zone allows
a door for the automatic unlocking and locking of that door based on the timezone.
Unlock Time - The door unlock time is the number of seconds the controller holds the door lock relay
in the unlocked position to allow entrance or exit. A timer with this unlock value begins counting once
the card is presented to the reader. When the timer ends or the door closes, whichever occurs first, the
door lock relay resets to the locked position; the default time is 5 seconds (the door lock also resets
when the door is opened if a door status switch is attached to the door and is wired to the controller).
NOTE: The door unlock time is not in addition to the door open time. The door unlock time begins when
a card is presented to the reader and ends when the time specified has expired or the door closes,
whichever occurs first.
Extended Unlock Time - Used in connection with access groups, it allows an extended number of
seconds the controller holds the door lock relay in the unlocked position to allow entrance or exit.
changes have been made to a property set, asterisks appear in the “Modified” column and
will remain there until the changes have been applied to the system.
•Standard – a standard door (default setting)
•Gate – an electric gate (such as a gate controlling a parking lot)
an operator to
assign a time zone to
Open Time - The door open time is the number of seconds a door can be held open for entrance or exit
before the controller generates a door held alarm. The default time is 20 seconds.
NOTE: The door open time is not in addition to the door unlock time. The door open time begins when
or i
the do
01945-100 Rev. 4.0Page 27
s opened and ends when the time specified has expired.
Doors NetXtremeTM Reference ManualKeri Systems, Inc.
Extended Open Time - Used in connection with access groups, it allows certain access groups an
extended number of seconds a door can be held open for entrance or exit before the controller generates
a door held alarm.
First Person In - The First Person In (FPI) function allows an operator to determine if a door should be
automatically unlocked when the unlock/lock time zone begins or if the door should not automatically
unlock until after a person presenting a valid card arrives. This feature is used whenever there is a
concern that employees may be delayed in arriving to a secured site (perhaps due to inclement weather).
Request To Exit (RTE) 1 - The Request to Exit (RTE) input accepts a signal from a normally open
input device such as a push button. There are four door configuration options for RTE 1: Not Used,
Momentary Unlock, Continuous Unlock, and Do Not Unlock.
Exit is not allowed through that door via
•Not Used – There is no request to exit function at all
RTE.
•Momentary Unlock – The request to exit is recorded, the door held open timer
door unlock relay unlocks the door to allow exit.
•Continuous Unlock (CRTE) – (This feature is not supported
recorded and any assigned Auto Unlock/Lock (AUL) time zone is Suspended for a given door.
Then, while the CRTE input is active, the door is unlocked. When CRTE becomes inactive, the
door will assume its AUL time zone configuration state.
•Do Not Unlock – The request to exit is recorded and the door held open timer starts, but the
r mu
doo
or similar device).
st manually be opened for exit (typically the door has a manual door strike, crash bar
.
starts, and the
at this time.) The request to exit is
t su
Request To Exit (RTE) 2 - No
Door Lock Relay Active - Select relay to energize or de-energize if this alarm condition occurs.
Door Forced Relay Active - Select relay to energize or de-energize if this alarm condition occurs.
Door Held Relay Active - Select relay to energize or de-energize if this alarm condition occurs.
Alarm Shunt Relay Active - Select relay to energize or de-energize if this alarm condition occurs.
Door Switch Contact Type - Select normally open or normally closed.
Door Switch Circuit Type - Select the supervised state of the switch.
Request To Exit 1 Contact Type - Select normally open or normally closed.
Request To Exit 1 Input Circuit Type - Select the supervised state of the switch.
Request To Exit 2 Contact Type - Select normally open or normally closed.
Request To Exit 2 Input Circuit Type - Select the supervised state of the switch.
Latch Integrity Contact Type - Not supported at this time.
Latch Integrity Circuit Type - Not supported at this time.
pported at this time.
Page 2801945-100 Rev. 4.0
Keri Systems, Inc.Doors Ne
9.1.3Configure Input Property Sets
Click on Setup > System > Properties (tab) > Inputs.
Figure 24: Input Property Sets
1.Click “Add New” button or “Duplicate” button.
2.Rename
3.Set Input Mode: Not Used, Normally Open, Normally Closed.
Click on Setup > System > Configure Controllers > Doors/Gates (tab).
Figure 28: Configure Controllers
1.Click on the to reveal all doors on the controller.
2.Use the drop-down menu to
3.Each individual aspect of the property set may be changed to match the specifically desired
configuration. Use the scroll-down buttons to select from available options.
4.Check the configuration for all aspects and make changes as appropriate.
5.Click on the “Apply Changes” button to save the configuration, or click on the “Undo Changes”
button to clear all changes made.
NOTE: The option to assign a different site will not appear until a new site has been created. See
“Create New Site” on page 30.
assign a Doors/Gates Property Set to each door.
01945-100 Rev. 4.0Page 31
Doors NetXtreme
TM
Reference ManualKeri Systems, Inc.
9.2.2Assign Inputs Property Set
Click on Setup > System > Configure Controllers > Inputs (tab).
Figure 29: Assign Inputs Property Set
1.Click on the to reveal all doors on the controller.
2.Verify the Inputs tab has been selected to insure that all inputs in the system are visible.
3.To change the property set of an input, use the drop-down menu and select from the input property
sets designed earlier. Inputs that are in use by the system and unable to be changed are shown in
grey with “In Use By Door” shown.
4.Click on the “Apply Changes” button to save the configuration, or click on the “Undo Changes”
button to clear all changes made.
Page 3201945-100 Rev. 4.0
Keri Systems, Inc.Doors Ne
9.2.3Assign Outputs Property Set
Click on Setup > System > Configure Controllers > Outputs (tab).
tXtremeTM Reference Manual
Figure 30: Assign Outputs Property Set
1.Click on the to reveal all doors on the controller.
2.Verify the Outputs tab has been selected to insure that all outputs in the system are visible.
3.To change the property set of an output, use the drop-down menu and select from the output
property sets designed earlier. Outputs that are in use by the system and unable to be changed are
shown in grey with “In Use By Door” shown.
4.Click on the “Apply Changes” button to save configuration, or click on the “Undo Changes” to
clear all changes made.
01945-100 Rev. 4.0Page 33
TM
Doors NetXtreme
Reference ManualKeri Systems, Inc.
9.2.4Assign Reader Type
Click on Setup > System > Configure Controllers > Readers (tab).
Figure 31: Assign Reader Type
1.Click on the to reveal all doors on the controller.
2.Verify
3.The following readers are supported:
the Readers tab has been selected to insure that all readers in the system are visible.
•Keri NXT readers
Rea
•Keri MS readers (with use of a
•Wiegand readers (with use of a Reader Interface Module)
Non 26-bit Wiegand (with use of a Reader Interface Module
•
der Interface Module)
)
Page 3401945-100 Rev. 4.0
Keri Systems, Inc.Doors Ne
9.3Create New Trigger (I/O) Action Sequence
Setup > System > Program System (tab).
tXtremeTM Reference Manual
Figure 32: Create New Trigger Sequence
1.Click on the to reveal all trigger sources, action sequences, and action sources.
NOTE: If an expected
and verify the expected input has been assig
2.Click on the “Add New Sequence” button.
3.A new section will appear at the
4.Name the action sequence something that will be easily recognizable throughout the system and in
reports.
5.From the list of Trigger Sources (inputs) “drag and drop” the desired source to the Trigger column
in the new sequence.
NOTE: To “drag and drop” a trigger source or action sequence, press and hold down the mouse button
to be placed in the sequence and while continuing to press the mouse button down, move the
he item
on t
mouse until the item is over the box it is to be placed in. Insert the item into the box by releasing the
mouse button (see Figure 33 on page 36).
01945-100 Rev. 4.0Page 35
trigger source
is not listed, return to “Assign Inputs Property Set” on page 32
ned a property set and the changes have been applied.
bottom of the action sequence listing.
Doors NetXtreme
Figure 33: Example of Drag and Drop
TM
Reference ManualKeri Systems, Inc.
6.To use two or more trigger sources, “drag and drop the” ‘and’ or the ‘or
’ to the area between the
trigger sources listed in the sequence.
NOTE:
Once a trigger source (input) has been used, it cannot be used in any other sequence.
7.From the list of Action Sources (outputs) “drag and drop” the desired source to the Actions column
in the new sequence.
8.Click on the “Apply Changes” button to save the action sequence or click on the “Undo Changes”
button to clear all changes made.
Page 3601945-100 Rev. 4.0
Keri Systems, Inc.Doors Ne
10.0Setup Access Group
Setup > Access Groups.
tXtremeTM Reference Manual
NOTE: If a user has multiple access groups assigned. The one granting the least restrictive acce
will be used.
ss
Figure 34: Setup Access Groups
1.Verify the “Show All” option is selected.
2.Click on the “Add Access Group” button or “Duplicate Access Group” button.
3.Name the Access Group something that will be easily recognizable throughout the system and in
reports.
4.Select the doors that are to be included in the access group.
5.From the drop-down menu, select the timezone to be applied to each door.
6.From the drop-down menu, select any action sequences that should be applied to the particular door
(action sequences must be created in “Create New Trigger (I/O) Action Sequence” on page 35,
before they will appear in the drop-down menu).
7.Apply Changes or Undo Changes.
01945-100 Rev. 4.0Page 37
Doors NetXtremeTM Reference ManualKeri Systems, Inc.
11.0Credential and User Enrollment
Credentials and Users are enrolled separately. Once they are enrolled, credentials may be assigned to
individual users. More than one credential may be assigned to an individual user.
11.1Enroll Credentials
11.1.1Enroll Credentials - Block Enrollment
Click on Setup > Users > Credentials (tab).
Figure 35: Enroll Credentials - Block Enrollment
1.Click on the “Create Credentials” button.
2.Clic
3.From the drop-down menu select the credential format.
4.If Dual Verification has been enabled, the “Type” column will appear. Use the drop-down menu to
5.Enter the digits of the first sequentially numbered credential to be enrolled.
6.Enter the digits of the last sequentially numbered credential to be enrolled.
NOTE: Block enrollment may only be performed using sequentially numbered credentials. If there is
any ga
numbering and enrolled separately.
7.If there is a Facility Code required, enter that number in the field.
8.Click on the “Create Block” button.
9.The credentials are enrolled and visible for verification.
10. Click on the “Apply Changes” button.
Page 3801945-100 Rev. 4.0
k on the “Start New Set” button.
select whether the credential is to be a primary or secondary credential.
p in the numberin
g, then the credentials should be broken up into groups without any gap in the
Keri Systems, Inc.Doors Ne
11.1.2Enroll Credentials - Learn Mode
To enroll credentials through the “Learn Mode” method means that credentials are presented at the
reader rather than inputting the information by hand.
NOTE: Before beginning the “Learn Mode” process, perform an update on the controller (see “Update
the Network” on page 48).
NOTE: In order to make use of the “Learn Mode” method, DoorsNXT must be connected to the net. To
connect to the net, click on Manage > Network. The box next to “Net” will state whether DoorsNXT is
“connected” or “not connected” to the net. If it is not connected, click on the “Connecting to Net”
button.
tXtremeTM Reference Manual
Figure 36: Enroll Credentials - Learn Mode
1.Click on the “Create Credentials” button.
2.From the drop-down menu, select the reader to be used for presentation of credentials.
3.Click on the “Start Learn Mode” button. If Dual Verification has been enabled and secondary
credentials are to be enrolled, click on the “Start Secondary ID Learn Mode” button.
4.Use the drop-down menu to select the type of Format for the credential.
5.If Dual Verification has been enabled, the “Type” column will appear. Use the drop-down menu to
select whether the credential is to be a primary or secondary credential.
6.Click on the “ + ” to expand the visible information.
7.Present the credentials to the selected reader. As each credential is presented to the reader, it is
listed.
8.Once all credentials have been presented, click on the “Stop Learn Mode” button.
9.Click on the “Apply Changes” button.
NOTE: When using “Learn Mode” to enroll both primary and secondary credentials, the process must
rately for each. Go through all the steps to enroll the primary credentials. Click on the
e sepa
be don
“Apply Changes” button, then go through all the steps to enroll the secondary credentials.
To enroll PINs a keypad must be connected to the controller. When a PIN is used as a secondary
credential, it does not need to be unique. Multiple users may be assigned the same secondary credential.
However, for greater security, unique PINs is recommended.
Figure 37: Enroll PIN
1.Click on the “Create Credentials” button.
2.From
3.Click on the “Start Learn Mode” button. If Dual Verification has been enabled and secondary
4.If Dual Verification has been enabled, the “Type” column will appear. Depending on the button
5.Click on the “ + ” to expand the visible information.
6.Enter each PIN individually. As each credential is presented to the reader, it is listed.
NOTE: The number of PIN digits shown in this window applies only to keypads in 8 bit burst mode. If a
iegan
W
7.Once all PINs have been entered, click
8.Click on the “Apply Changes” button.
NOTE: When using “Learn Mode” to enroll both primary and secondary credentials, the process must
be don
“Apply Changes” button, then go through all the steps to enroll the secondary credentials.
the drop-down menu, select the reader to be used for presentation of credentials. When
enrolling PINs, make sure the reader selected has a keypad.
credentials are to be enrolled, click on the “Start Secondary ID Learn Mode” button.
clicked in step 3, the type of credential (primary or secondary) is automatically entered.
d keypad is in use, PINs are limited to 1 - 65534.
on the “Stop Learn Mode”
e sepa
rately for each. Go through all the steps to enroll the primary credentials. Click on the
button.
Page 4001945-100 Rev. 4.0
Keri Systems, Inc.Doors Ne
11.2Enroll Users
Click on Setup > Users > Users (tab).
Figure 38: Enroll Users
tXtremeTM Reference Manual
1.Select the number of users to be added.
2.Click on the “Add” button.
3.Enter the first and last name of each user in the fields provided.
4.Select from the drop-down menu the Access Group and Group (if any) to be applied to each user.
Select or de-select each user as “Active” (default has Active selected).
5.This field is for assigning credentials to each user and is explained in “Assign Credentials to Users”
on page 42.
6.Click on the “Apply Changes” button or “Undo Changes” button.
01945-100 Rev. 4.0Page 41
Doors NetXtreme
TM
Reference ManualKeri Systems, Inc.
11.3Assign Credentials to Users
Click on Setup > Users > Users (tab).
Figure 39: Assign Credentials to Users
1.In the columns on the left of the screen, select the user to be assigned a previously enrolled
credential by clicking on the name so that the entire row is highlighted.
2.In the columns on the right of the screen, select the credential(s) to be assigned to the highlighted
user by clicking on it so that the entire row is highlighted. To assign more than one credential per
user, hold down the control (Ctrl) key while clicking on additional credentials so that multiple lines
are highlighted.
3.In the middle of the screen, click on the “Assign Credentials to Existing Users” button. The
credentials are assigned to the selected user.
4.Click on the “Apply Changes” button or “Undo Changes” button.
2.Click in the box next to “In/Out Doors Enabled.”
3.If an 8 Bit Burst keypad is in use, the number of PIN digits to be used may be set as well. (The
range available is from 1-15 digits.)
4.Click on the “Apply All Changes” button.
01945-100 Rev. 4.0Page 43
Doors NetXtreme
TM
Reference ManualKeri Systems, Inc.
12.2Create In/Out Reader Property Set
Click on Setup > System. Select the Properties tab and click on the Doors/Gates button. A new property
set will need to be created for In/Out Reader.
Figure 41: Create In/Out Reader Property Set
1.Click on the Add New button.
2.Give the property set a name that will make it easy to identify. Using the phrase “in/out reader” in
the set name is recommended.
3.Select the Door Type (standard or gate).
4.From the drop-down menu in the Direction column, select the direction for the reader.
5.Go through the remaining columns to assign the options as desired.
6.Click on the “Apply Changes” button.
Page 4401945-100 Rev. 4.0
Keri Systems, Inc.Doors Ne
12.3Assign Property Set To In/Out Reader
Click on Setup > System.
Figure 42: Assign Property Set To In/Out Reader
1.Click on the “Configure Controllers” tab.
2.Clic
3.Select the “Doors/Gates” tab.
4.Select the bus that has the In/Out Reader(s) attached.
k on the “+” to expand the controller information.
tXtremeTM Reference Manual
NOTE: It is very important to do the following steps in the order specified. Failure to do so may cause
er col
oth
5.In the Properties column, select the In/Out Reader property set created previously.
6.In the Reader column, use the drop-down menu to select “unassigned” on a different bus (this will
7.The Reader B column appears (if this column is not visible then In/Out Reader has not been
8.Go through the remaining columns to assign the options as desired.
9.Click on the “Apply Changes” button.
umns that need to be set to not appear.
be used as the “out” reader).
enabled). Use the drop-down menu to select the reader that was unassigned in the Reader column.
This will be the “out” reader.
01945-100 Rev. 4.0Page 45
Doors NetXtreme
TM
Reference ManualKeri Systems, Inc.
12.4Create In/Out Reader Action Sequence
Click on Setup > System.
Figure 43: Create In/Out Reader Action Sequence
1.Click on the “Program System” tab.
2.Clic
3.Click on the “Add New Sequence” button.
4.Give the action sequence a name that will make it easy to identify. Using the direction of the reader
5.From the list of Trigger Sources (inputs) “drag and drop” the trigger source to the Trigger column
6.From the list of Action Sources (outputs) “drag and drop” the desired action to the Actions column
NOTE: Repeat steps 3-6 for every In/Out Reader door.
NOTE: For an example of how to “drag and drop” see Figure 33 on page 36.
7.Click on the “Apply Changes” button.
k on the “+” to expand the controller information.
in the sequence name is recommended.
in the new sequence.
in the new sequence.
Page 4601945-100 Rev. 4.0
Keri Systems, Inc.Doors Ne
12.5Create In/Out Reader Access Group
Click on Setup > Access Groups.
tXtremeTM Reference Manual
Figure 44: Create In/Out Reader Access Group
1.Click on the “Add Access Group” button.
2.Give the
the sequence name is recommended.
3.Select the door(s) to be used as an In/Out Reader by clicking in the small box.
4.Using the drop-down menu, select the Timezone for the first reader.
5.Using the drop-down menu, select the desired directional Action Sequence (i.e. in).
6.Using the drop-down menu, select the Timezone for the second reader.
7.Using the drop-down menu, select the desired directional Action Sequence (i.e. out).
8.Click on the “Apply Changes” button.
NOTE: See the section “Enroll Users” on page 41 for instructions on assigning access groups to users.
access group a name that will make it easy to identify. Using the direction of the reader in
01945-100 Rev. 4.0Page 47
Doors NetXtreme
TM
Reference ManualKeri Systems, Inc.
13.0Update the Network
The DoorsNXT software needs to download operating parameters to all controllers on the access control
network.
Click on the button.
Figure 45: Update Window
1.To begin the update, use the drop-down menu to select which controllers should be updated.
NOTE: If a controller has not been assigned an IP address it will
Also, if there is only one controller on the network you may only select the “all” option.
2.Select either the “Complete Update”
NOTE: The “Minimum Update” command uploads from the server to the access control network only
the changes made to
Update” command uploads from the server to the access control network
information.
3.The status of the update will be shown in the window.
the DoorsNXT databases since the last update was performed. The “Complete
or “Minim
um Update” button.
not show in the drop-down menu.
ALL DoorsNXT database
Page 4801945-100 Rev. 4.0
Keri Systems, Inc.Doors Ne
14.0Collect Events From the Network
Collecting events from all controllers clears the controller buffers and stores the events in an event file
on the hard disk. Event data can then be processed into report formats.
Click on the button.
tXtremeTM Reference Manual
Figure 46: Collect Events Window
1.To collect events, use the drop-down menu to select from which controller(s) events should be
collected.
2.Select the “Collect Events” button.
3.The status of the collection will be shown in the window.
01945-100 Rev. 4.0Page 49
Doors NetXtreme
TM
Reference ManualKeri Systems, Inc.
15.0Flash Upgrade Controllers/Devices
Click on Manage > Flash Controllers/Devices.
Figure 47: Flash Upgrade Controllers/Devices
1.Click on the “+” to expand the controller information.
2.Click on the “Get Current Version” button.
3.The current versions of all connected hardware will appear.
4.Use the drop-down menu to select from the available upgrades.
5.A check in the box under “Include” means that all connected hardware will be included in the
upgrade. It is recommended to leave it checked. The flash upgrade will automatically skip any
hardware that is already current.
6.Click on the “Start Flash” button.
7.The Flash Status window will show the progress of the upgrade. This may take a few minutes.
Page 5001945-100 Rev. 4.0
Keri Systems, Inc.Doors Ne
tXtremeTM Reference Manual
16.0Reset Controllers Remotely Through DoorsNXT
A controller reset may be performed through the DoorsNXT software. Go to Setup > Setup Options and
Preferences.
Figure 48: Reset Controllers
1.Enter the Operator Name and Password as shown in “Log
correct Operator Name and Password is entered, the side window appears automatically.
2.Use the drop-down menu to select the controller(s) to be reset remotely.
NOTE: If a controller has not been assigned an IP address it will
Also, if there is only one controller on the network you may only select the “all” option.
3.A basic reset will perform a power cycle on the controller. To perform a basic reset, click on the
“Basic Reset” button.
4.A memory reset will erase all data memory from the controller (leaving IP informtion). To perform
a memory reset, click on the “Memory Reset” button.
5.A factory default restores the controller to how it was received from the factory (with all data and
IP information erased). To reset the controller to the factory default, click on the “Factory Defaults”
button.
On to DoorsNXT” on page 6. When the
not show in the drop-down menu.
01945-100 Rev. 4.0Page 51
Doors NetXtreme
TM
Reference ManualKeri Systems, Inc.
17.0Operate Hardware
The Operate Hardware commands allow an operator to manually override programmed door controls.
Figure 49: Operate Hardware
1.Select to view the available output points (doors, gates, elevators, and/or general outputs) as icons
or as a list.
2.Select the type of output point to view (doors, gates, elevators, or general outputs).
3.Select the group or site to be viewed.
4.Select the specific individual output points or click on the “Select All” or “Deselect All” buttons.
5.To lock (doors, gates, or elevators) or deactivate (general outputs) click on the “Lock or
Deactivate” button. To unlock (doors, gates, or elevators) or activate (general outputs) click on the
“Unlock or Activate” button.
6.To perform a timed Unlock/Activation, select from the drop-down menu the amount of time for the
unlock/activation (choices are shown in seconds). Once the time has been selected, click on the
“Timed Unlock or Timed Activate” button.
7.All performed events will appear in this window.
Click on Setup > View Filters and Event Messages > View Filters (tab).
Figure 50: View Filters
1.Click “Add New” or “Duplicate.”
2.Rename the view filter. Be sure to choose a name that will make it easy to identify.
3.Select the filter level.
4.Select the poll time (1-60 seconds).
5.Use the Message Type and Message Text columns to determine which messages should be
displayed in the monitor view.
6.Click on the green check mark button to deselect any messages that should NOT be displayed
(default is set for all messages to display).
7.From the drop-down menu, select the site(s) that should be included (default is for all sites to be
included).
8.Click to save the view filter as set up or to clear it without saving.
01945-100 Rev. 4.0Page 53
TM
Doors NetXtreme
Reference ManualKeri Systems, Inc.
18.2Setup Event Messages
Click on Setup > View Filters and Event Messages > Event Messages (tab).
Figure 51: Event Messages
1.Set the Priority.
2.The Message Te
report and alert viewing easier to understand.
3.Select from the drop-down menu which controllers are to save the event (the default is for all
controllers to save all access, credential, controller, and input/output types of events).
4.Designate by clicking in the empty box (until it turns green with a black check) whether a sound
alert should be generated for each event. Alarm sounds will repeat until acknowledged by the
operator (default is for all sound alerts to be off).
NOTE: The sound alert played is the Windows Exclamation sound, which can be set in the Control
> Soun
Panel
alert acknowledgement is done by clicking on the
5.Click to save the event messages as set up or to clear it without saving.
xt string may be renamed to make it more descriptive to the operator, making
ds window. If the server/client does not have a sound card, the PC’s speaker beeps. Sound
1.Select the desired report and click on the to reveal any parameters that will need to be specified.
2.Using the drop-down menu, select the “From” and “To” dates and enter them in the appropriate
fields.
3.Using a 24-hour clock to determine the time, enter the “From” and “To” times in the appropriate
fields.
4.These fields may not be edited in the “Run Reports category. To make any changes to these fields,
edit them in the “Create Reports” window (see “Create/Edit Reports” on page 61).
5.To save the date parameters set (perhaps to be used in the future), click on the button to
keep everything as set or click on the button to clear all fields.
6.Once everything has been set up properly, click on the button. The default for predesigned reports is to print to screen.
01945-100 Rev. 4.0Page 59
Doors NetXtreme
Figure 60: Print To Screen
TM
Reference ManualKeri Systems, Inc.
7.The window will show all report information that fits the
criteria selected.
8.If the report contains more than one page, the buttons at the top may be used to go through the
report.
NOTE: Once this window is closed, the report will need to be run again in order to see the information.
a p
rinted copy or a saved file copy is desired, edit the report as described in “Create/Edit Reports” on
If
page 61 to use one of the alternate forms of output.
Page 6001945-100 Rev. 4.0
Keri Systems, Inc.Doors Ne
20.2Create/Edit Reports
Reports > Create.
tXtremeTM Reference Manual
Figure 61: Create/Edit Reports
1.To create a new report, click on the button or the button to use a predesigned report as the base for a new report.
2.Select the desired report and click on the to display all the parameters.
3.If the report name and description needs to be changed, enter that information in the “Report
Name” and “Report Description” columns.
4.Enter in the “From” and “To” information as desired.
5.Use the available drop-down menus to make any specific selections necessary for the particular
report. If the fields needed do not have a drop down menu, use the “Report Template” drop-down
menu to select a different template to use as a base.
6.Use the drop-down menu to change the report level (if necessary).
7.Use the drop-down menu to select the type of output (choices are “To Screen” or “Select At Run”).
8.If the report can be scheduled to run automatically, make sure there is a green button with a check
mark. To disable this option, click on the button and it will disappear.
9.Click on the button to keep everything as set or click on the button to clear
all fields.
10. Once the report has been created or edited, return to “Run Pre-Designed Report” on page 59 to run
the report.
01945-100 Rev. 4.0Page 61
Doors NetXtremeTM Reference ManualKeri Systems, Inc.
21.0Dual Verification
The Dual Verification feature, when enab
secure area. The first credential required is called the Primary ID with the second credential called the
Secondary ID. For example, the Primary ID may be an access card with the Secondary ID a Personal
Identification Number (PIN) used in connection with a keypad.
NOTE: For proper setup of the Wiegand Combo Reader, refer to the
Installation Guide (P/N 02501-001).
21.1Enable Dual Verification
Click on Setup > Options and Preferences.
led, requires one or more credentials to gain access into a
Reader Interface Module
Figure 62: Enable Dual Verification
1.Select the “Setup User Options” tab.
2.Clic
3.To set a limit for the number of PIN entries allowed, click in the box next to “Excessive PIN
4.Set the maximum number of attempts allowed. (The range available is from 1-30.)
5.Set the number of minutes the Primary Credential associated with the failed PIN is to be locked out
6.If an 8 Bit Burst keypad is in use, the number of PIN digits to be used may be set as well. (The
NOTE: If a PIN contains fewer digits than what is required, then a leading zero needs to be added at the
begi
digits and the PIN assigned to a user is “62” then the user needs to enter “00062” or else the entry will
fail. This may also be accomplished by entering “ # ” after the PIN instead of adding the zeros (i.e.
“62#”).
7.Click on the “Apply All Changes” button.
Page 6201945-100 Rev. 4.0
k in the box next to “Dual Verification ON.” More options for Dual Verification will appear.
Attempts ON.” Additional options for the Excessive PIN attempts will appear.
once the maximum number of attempts has been reached. (The range available is from 1-60
minutes.)
range available is from 1-15 numbers.)
nning for each di
git needed to meet the required number. For example, if the PIN is set up for 5
Keri Systems, Inc.Doors Ne
21.2Create Dual Verification Property Set
Click on Setup > System. Select the Properties tab and click on the Doors/Gates button. A new property
set will need to be created for Dual Verification.
Figure 63:Create Dual Verification Property Set
1.Click on the Add New button.
2.Give the property set a name that will make it easy to identify. Using the phrase “dual verification”
in the set name is recommended.
3.Select the Door Type (standard or gate).
4.Select “YES” from the drop-down menu in the Dual Verification column. Go through the following
columns and set them as desired until reaching the “Dual Verification Required Timezone” column.
5.Dual Verification reader(s) may have separate timezones assigned (for example, if Dual
Verification is only to be used after business hours). In the “Dual Verification Required Timezone”
column, select from the drop-down menu the timezone to be used.
6.In the “Dual Verification Wait Time” column, select from the drop-down menu the length of time
the reader will wait for the secondary credential to be entered before timing out (the range available
is from 1-60 seconds). Continue through the remaining columns to assign the options as desired.
7.Click on the “Apply Changes” button.
tXtremeTM Reference Manual
01945-100 Rev. 4.0Page 63
Doors NetXtreme
TM
Reference ManualKeri Systems, Inc.
21.3Assign Dual Verification Property Set and Reader(s)
Click on Setup > System.
Figure 64: Assign Dual Verification Property Set and Reader(s)
1.Click on the “Configure Controllers” tab.
2.Clic
3.Select the “Doors/Gates” tab.
4.Select the bus that has the Dual Verification reader(s) attached.
NOTE: It is very important to do the following steps in the order specified. Failure to do so may cause
oth
5.In the Reader column, use the drop-down menu to select “unassigned” for all readers on all busses.
6.In the Properties column, select the Dual Verification property set created previously. Return to the
7.The Secondary Reader column appears (if this column is not visible then Dual Verification has not
8.Click on the “Apply Changes” button.
k on the “+” to expand the controller information.
er col
umns that need to be set to not appear.
Reader column and use the drop-down menu to select the appropriate reader on the controller and
bus to be used for Dual Verification.
been enabled). This column is only to be used when 2 separate readers are to be used for Dual
Verification. One of the readers on another bus must be unassigned using the drop-down menu,
then assign that reader to the bus with Dual Verification. If a combo reader/keypad is in use, then
the Secondary Column must have the same reader assigned as is in the Reader column.
4.Give the action sequence a name that will make it easy to identify. Using the phrase “Dual
5.From the list of Trigger Sources (inputs) “drag and drop” the Dual Verification source to the
6.From the list of Action Sources (outputs) “drag and drop” the desired action to the Actions column
NOTE: Repeat steps 3-6 for every Dual Verification door.
NOTE: For an example of how to “drag and drop” see Figure 33 on page 36.
7.Click on the “Apply Changes” button.
k on the “+” to expand the controller information.
Verification” in the sequence name is recommended.
Trigger column in the new sequence.
in the new sequence.
01945-100 Rev. 4.0Page 65
Doors NetXtreme
TM
Reference ManualKeri Systems, Inc.
21.5Create Dual Verification Access Group
Click on Setup > Access Groups.
Figure 66: Create Dual Verification Access Group
1.Click on the “Add Access Group” button.
2.Give the access group a name that will make it easy to identify. Using the phrase “Dual
Verification” in the name is recommended.
3.Select the door(s) to be used with Dual Verification by clicking in the small box.
4.Using the drop-down menu, select the Timezone to be used for this door in this access group.
5.Using the drop-down menu, select the Dual Verification Action Sequence.
6.Click on the “Apply Changes” button.
Page 6601945-100 Rev. 4.0
Keri Systems, Inc.Doors Ne
tXtremeTM Reference Manual
21.5.1Create Standard Access Group on Dual Verification Door
A door may be used for both Dual Verification and Standard Access. This is done by creating 2 separate
access groups that use the same reader. One group is set up to use Dual Verification (as shown in the
“Create Dual Verification Access Group” section). Another group is set up to use Standard Access.
Whether an individual needs to present two credentials or is exempt from entering a secondary
credential will be determined by the access group assigned to them.
Figure 67: Create Standard Access Group on Dual Verification Door
1.Click on the “Add Access Group” button.
2.Give
3.Select the door(s) to be used by clicking in the small box.
4.Using the drop-down menu, instead of selecting the Dual Verification Action Sequence, select a
5.Click on the “Apply Changes” button.
the access group a name that will make it easy to identify.
Standard Access Action Sequence.
21.6Update the Network
Once all the previous setup has been performed a network update must be performed before
enrolling credentials and users. If an update is not performed, then all options for enrolling
credentials and users may not be available.
01945-100 Rev. 4.0Page 67
Doors NetXtremeTM Reference ManualKeri Systems, Inc.
21.7Enroll Primary and Secondary Credentials
Enroll primary and secondary credentials as instructed in “Enroll Credentials” on page 38.
NOTE: Secondary Credentials do not need to be unique. Multiple users may be assigned the same
secondary credent
ial.
21.8Enroll Users
Enroll users as instructed in “Enroll Users” on page 41.
21.9Assign Primary and Secondary Credentials To Users
Figure 68: Assign Primary and Secondary Credentials To Users
1.Select All users to display.
2.Click on the “Load” button. All users should will regardless of their assigned access groups, etc.
3.If the credentials are not visible, click on the “Show/Hide Credentials.”
4.Highlight the users to be assigned the secondary credentials by clicking on the row. To select more
than one user, hold down the “Ctrl” key and select each row to be included.
5.Assign the “Dual Verification” access group to the user.
NOTE: Users may be assigned more than one access group.
6.Click on either the “Primary Credentials” or “Secondary Credentials” tab.
7.Highlight the credentials to be used by clicking on the row. To select more than one credential, hold
down the “Ctrl” key and select each row to be included.
8.If the Secondary IDs are not showing, click in the box next “Show Secondary IDs” to show the
secondary IDs.
9.To assign Primary credentials, click on the “Assign Credentials To Existing Users” button. To
assign Secondary credentials, click on the “Assign Secondary Credentials To Existing Users”
button. The credentials are assigned to the selected users.
10. Click on the “Apply Changes” button. Perform an update to send this information to the controller.