Keri Systems Doors NetXtreme User Manual

Doors NetXtreme
Access Control Software
Reference Manual v4.0
(P/N 01945-100)
© 1998-2008 Keri Systems, Inc. – ALL RIGHTS RESERVED Document Number 01945-100, Revision 4.0 – December 2008
Keri Systems, Doors NetXtreme, and DoorsNXT are trademarks of Keri Systems, Inc.
Windows is a trademark of Microsoft Corporation.
The trademarks used in this Reference Manual are the property of the trademark holders. The use of these trademarks in this Reference Manual should not be regarded as infringing upon or affecting the validity of these trademarks.
Keri Systems, Inc. reserves the right to change, without notice, product offerings or specifications.
No part of this publication may be reproduced in any form without written permission from Keri Systems, Inc.
Keri Systems, Inc. Doors NetXtreme™ Reference Manual
Doors NetXtreme
TM
Reference Manual
Table of Contents
Introduction to Doors NetXtreme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Getting Started. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Software Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Setup Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Log On to DoorsNXT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Setup System Information Page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Tutorials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setup Options and Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Setup Security and Licensing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Setup User Defined Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Setup Database Backup Path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Badging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Create a New Security Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Security Level Rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Create a New Operator. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Setup Geographical Timezones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Location and Subnet Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Firewall and Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
AutoConfig . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Verify Controller Configuration . . . . . . .
Setup System Timezones & Holidays. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
System Timezones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Graveyard Shift Time Zone Example
Holidays Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Create and Assign Property Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Doors/Gates Property Sets . . . . . .
Standard Doors/Gates Properties . . . .
Create a New Doors/Gates Property Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Configure Input Property Sets . .
Configure Output Property Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Create Sites and Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Create New Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Create New Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Assign Property Sets to Controllers . .
Assign Doors/Gates Property Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Assign Inputs Property Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Assign Outputs Property Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Assign Reader Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Create New Trigger (I/O) Action Sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
(Cros
sing Midnight) . . . . . . . . . . . . . . . . . . 23
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
. . . 4
. 4
. 8
.
11
. . . . 12
. .
. . 17
. .
. . 19
. . . 24
01945-100 Rev. 4.0 Table of Contents Page 1
Doors NetXtreme™ Reference Manual Keri Systems, Inc.
. . . . 53
.
. . . . 59
. . .
62
37
41
43
48
52
56
68
Setup Access Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Credential and User Enrollment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Enroll Credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Enroll Credentials - Block Enrollment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Enroll Credentials - Learn Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Enroll Credentials - PIN (Personal
Enroll Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Assign Credentials to Users . . . . . . . . .
IN / OUT Reader. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Enable In/Out Reader. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Create In/Out Reader Property Set. . . . . .
Assign Property Set To In/Out Reader . .
Create In/Out Reader Action Sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Create In/Out Reader Access Group . . . . . . . . . . . . . . .
Update the Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Collect Events From the Network. . . . . . . . . . . . . . . . . .
Flash Upgrade Controllers/Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Reset Controllers Remotely Through DoorsNXT. . . . . . . . .
Operate Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setup Monitor View Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Setup Event Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Show Photo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Enable Show Photo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Show Photo in Setup Users Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
System Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
System Diagnostics - Modules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
System Diagnostics - Inputs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
System Diagnostics - Relays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
System Diagnostics - Doors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Reporting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Run Pre-Designed Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Create/Edit Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Dual Verification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Enable Dual Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Create Dual Verification Property Set . Assign Dual Verification Property Set and R Create Dual Verification Action Sequence Create Dual Verification Access Group. . .
Create Standard Access Group on Dual Verification Door .
Update the Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Enroll Primary and Secondary Credentials
Enroll Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Assign Primary and Secondary Credentials To Users
Identification Number)
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
. . . . . . . . . . . . . . . . . . . . . . . . . 47
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
. . . . . . . . . . . . . . . . . . . . . . . . . 51
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
eader(s) . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
. . . . . . . . . . . . . . . . . . . . . . . . . . . 68
. . . . . . . . . . . . . . . . . . 40
. . . . . . . . . . . . . . . . . . 67
End of Section.
Page 2 Table of Contents 01945-100 Rev. 4.0
Keri Systems, Inc. Doors NetXtremeTM Reference Manual

1.0 Introduction to Doors NetXtreme

Doors NetXtreme (DoorsNXT) is versatile in that it will work within a small LAN with a single PC running the Server, Database and Client or within a Global WAN encompassing dozens of clients controlling thousands of doors.
Doors NetXtreme operates in a networked client/server environment. There are four basic components to the DoorsNXT architecture: NXT controller hardware, DoorsNXT server, DoorsNXT database, and DoorsNXT client (referred throughout this document as the controller, server, database, and client.
NXT controller hardware may be comprised of a combination of 2-door and 4-door NXT controller hardware, NXT 4x4 modules, Reader Interface Modules (RIM), and card readers (MS, Wiegand, and NXT).
DoorsNXT Server is the workhorse of Doors NetXtreme. It manages the communication between the clients and the NXT hardware.
DoorsNXT Database is SQL compliant, client/server software providing access from multiple concurrent sites with no third-party royalty fees. The database is automatically installed on the same computer as the server.
DoorsNXT Client provides an interface to configure the NXT hardware, operators, users, and access control functionality. The client is secured by an operator login. It communicates to the server over TCP/IP.
Configuration of DoorsNXT will require some general knowledge of TCP/IP Networking and will require specific knowledge of network details of the system to which DoorsNXT will be installed.
The following information must be known before attempting to install and configure DoorsNXT:
The MAC address of the NXT hardware to be installed.
The IP Addresses that will be assigned to the NXT controllers (each controller own IP Address).
The Subnet mask to be used for the LAN segment where the controllers will be installed.
The Gateway address for the Subnet.
must have
its
01945-100 Rev. 4.0 Page 3
Doors NetXtremeTM Reference Manual Keri Systems, Inc.

2.0 Getting Started

2.1 Software Installation

An InstallShield wizard handles the software installation/upgrade process. Installing software is basically a question and answer process.
1. Load the installation CD into the CD-ROM of the host computer. The AutoRun Menu appears.
2. Click on the Keri product that needs to be installed or updated. Follow the on-screen step-by-step instructions.
3. Be sure to save the information given in the Notepad program at the end of the installation (see Figure 1). This information will give you the password and other necessary information to get DoorsNXT working properly.
Figure 1: DoorsNXT Password

2.2 Setup Client

Once the software has been installed. The first Client must be configured.
NOTE: Licensing for the first Client is included. To use additional clients concurrently, contact Keri Systems for additional licenses.
Figure 2: Windows Explorer - Client Application
1. Open up Windows Explorer and locate the DoorsNXT installation. Click on the folder created for the first Client. The number of Clients available is determined by the selections made in the software installation process and will vary depending on installation.
2. Double-click on the DoorsNXT application. DoorsNXT will open to the Connection Settings window (see Figure 3 on page 5).
Page 4 01945-100 Rev. 4.0
Keri Systems, Inc. Doors Ne
tXtremeTM Reference Manual
Figure 3: DoorsNXT - Connection Settings
3. In the Client Name field, enter “MASTERCLIENT.”
NOTE: etc. to help distinguish the clients from each other.
4. In the Client ID field, enter an integer to be assigned
5. In the Server Name field, enter the name of the server.
6. Leave the Connection Timeout field at the default of “10” seconds.
7. Type in the new password in the two fields given. The password was given to you during the
8. Click on the button.
NOTE: Repeat steps 1-7 for each Client.
For multiple clients, you may want to enter “MASTERCLIENT
to the client
and continuing on sequentially with the remaining clients.
installation of DoorsNXT (see Figure 1 on page 4).
,” “CLIENT2,” “CLIENT3,”
. It is recommended to start with 1
01945-100 Rev. 4.0 Page 5
Doors NetXtreme
TM
Reference Manual Keri Systems, Inc.

2.3 Log On to DoorsNXT

Click on the Connect and Log On tab.
Figure 4: Log On DoorsNXT
1. Enter the Operator Name as shown on Figure 1 on page 4.
2. Enter the Password as shown on Figure 1 on page 4.
3. Click on the button.
4. If everything has been done correctly, you will receive confirmation that you are logged on to the server.
5. Click on the “Close” button to close the Log On window.
Page 6 01945-100 Rev. 4.0
Keri Systems, Inc. Doors Ne

2.4 Setup System Information Page

Every time the Setup System window is opened, a Setup System Information page window will appear. This information window states what information is necessary to have on hand prior to begin setup of the DoorsNXT network (see Figure 5).
tXtremeTM Reference Manual
Figure 5: Setup System Information Page
1. Click on the “OK” button to close this window and the Setup System window will appear.
2. Click on the “CANCEL” button to close this window without also opening the Setup System window.
3. If more information is needed click on the “Diagnostic Assistance” button to open the NXT Network Connection Troubleshooting Guide (P/N 01508-001). This window will remain open until either the “OK” or “CANCEL” button is selected.
NOTE: There is no way to stop this window from appearing. Every time the Setup System window is to be opened, this information window will appear first.
01945-100 Rev. 4.0 Page 7
TM
Doors NetXtreme
Reference Manual Keri Systems, Inc.

2.5 Tutorials

To assist with basic setup of DoorsNXT, some video tutorials have been created and are available through the client window.
Figure 6: Tutorials Access
1. All tutorials are available from the Tutorials drop-down menu.
2. If there is a tutorial that applies to a specific window, the “Tutorial” button will be available. Slick on the button to watch the tutorial available for that particular procedure.
Page 8 01945-100 Rev. 4.0
Keri Systems, Inc. Doors NetXtremeTM Reference Manual

3.0 Setup Options and Preferences

3.1 Setup Security and Licensing

Currently, there are two settings that must be changed upon completion of the installation of DoorsNXT.
Change the Database Owner Password
Enter the License Authorization Code (if concurrent cl
Click on Setup > Options and Preferences > Security and Licensing (tab).
ient capabilities are planned)
NOTE: As this present when entering and viewing security codes.
Figure 7: Setup Security and Client Licensing
1. Enter the Operator Name and Password as shown in “Log On to DoorsNXT” on page 6. When the correct Operator Name and Password is entered, the side window appears automatically.
2. Click in the Show Codes box.
3. The Server ID is shown. It is recommended that this number be written down and stored in a secure place for future emergencies.
4. The default Database Owner Password is Keri. Enter a new Owner Password in this field and write it down along with the Server ID to be stored in a secure place. This password is needed for ALL DoorsNXT upgrades.
5. If multiple concurrent client capabilities will be needed, contact Keri Systems with the Server Authorization ID number. Keri Systems will generate an Licensing Authorization Code.
6. Enter the Licensing Authorization Code received from Keri Systems in the field provided. You will now be able to run multiple clients simultaneously.
7. The Clients field shows how many clients have been licensed. The first client is free and does not require a License Authorization Code.
8. If there is an expiration date then that date will appear in the “expires” field.
area deals with security issues, it is recommended that only authorized personnel are
9. Click on to save the information, or click on to clear all changes.
use at this time.
NOTE: The Encryption Key is
01945-100 Rev. 4.0 Page 9
not in
Doors NetXtreme
TM
Reference Manual Keri Systems, Inc.

3.2 Setup User Defined Fields

Setup > Options and Preferences > Setup User Options (tab).
Figure 8: Add User Defined Field
1. Click on the button.
2. Enter a nam
3. Enter the maximum number of characters allowed in the field (the range is from 1-256).
4. Enter a description of the purpose of the User Defined Field.
e for the field (to be used in the Setup Users window).
5. Click on the button to save all changes or click on the button to not save the fields.

3.3 Setup Database Backup Path

Setup > Options and Preferences > Backup Paths (tab).
Figure 9: Setup Database Backup Path
1. Click on the button.
2. Enter the location for the backup file to be used.
3. Click on the to save the path or click on the button to undo the changes.
Page 10 01945-100 Rev. 4.0
Keri Systems, Inc. Doors Ne

3.4 Badging

Setup > Options and Preferences > Badging (tab).
Figure 10: Enable Badging
Once the badging feature has been enabled, ID Flow by Jolly Technologies may be used to create and issue badges.
tXtremeTM Reference Manual
01945-100 Rev. 4.0 Page 11
Doors NetXtremeTM Reference Manual Keri Systems, Inc.

4.0 Operators

The operators are the people who will be performing the work – creating the databases required by the
rsNXT software to do its job and monitoring the system once everything has been downloaded to
Doo
the controllers.
Since the “Administrator” has access rights to every operation, anyone who knows the name and password will have complete programming access. Keri Systems recommends keeping this information a closely guarded secret.

4.1 Create a New Security Level

DoorsNXT comes with 2 pre-programmed security levels. A DoorsNXT Administrator has all access rights to every operation. Care should be given before assigning Administrator rights to an operator.
1. In the Setup Operators and Security Levels window/Security Levels tab, click on .
2. Rename the Security Level Name (name is limited to 32 characters in length).
3. Use drop down menu next to “Access:” to choose between none, read only, and read/write for each security right.
None
The operator does not have operation rights.
Read Only
The operator can view, but not make any changes to this operation.
Read/Write
The operator can view AND change the setup of that operation right.
4. Click on .
Figure 11: Setup Security Level
Page 12 01945-100 Rev. 4.0
Keri Systems, Inc. Doors NetXtremeTM Reference Manual

4.1.1 Security Level Rights

The following list are the feature security level rights available for assignment to a security level (which is then assigned to an operator. Each security level must be created and saved, one-at-a-time. Repeat this process for each security level.
Setup Users
Read/Write - allows an operator to perform the Setup Users commands: enrolling credentials,
enrolling users, entering data, voiding, deleting, and assigning access groups.
Read Only - allows an operator to on
None - does not allow the operator to view
Setup System
Read/Write - allows an operator to perform the Setup System commands: entering or editing
the parameters by which a door/controller operates.
Read Only - allows an operator to review
None - does not allow the operator to view
Setup Timezones and Holidays
Identifies if an operator is allowed to perform the Setup Timezone commands: creating or editing Timezones and Holiday schedules or is allowed to have Read Only access to review, but not change, this information.
ly view user information.
or change user information.
, but not change, the system information.
or change system information.
Setup Access Groups
Identifies if an operator is allowed to perform the Setup Access Group commands: creating or editing access groups (specifically associating timezones with doors) or is allowed to have Read Only access to review, but not change, this information.
Setup Operators and Security Levels
Identifies if an operator is allowed to create new operators.
Use Filter Level 1-3
Identifies which levels of view filters are available for the operator to use during monitoring (see “Setup Monitor View Filters” on page 53).
Setup Filters and Events
Identifies if an operator is allowed to manage the Setup Monitor View Filters settings or is allowed to have Read Only access to review, but not change this information.
Setup Schedules
Identifies if an operator is allowed to manage the Setup Schedules settings or is allowed to have Read Only access to review, but not change this information.
Setup Options and Preferences
Identifies if an operator is allowed to manage the Options and Preferences settings or is allowed to have Read Only access to review, but not change this information.
Operate Monitor View
Identifies if an operator is allowed to modify a Monitor window (a window that views events on the access control network as they happen) or is allowed to have Read Only access to review, but not change, this information.
01945-100 Rev. 4.0 Page 13
Doors NetXtremeTM Reference Manual Keri Systems, Inc.
Update Network
Identifies if an operator is allowed to update the network or is allowed to have Read Only access to review, but not change this information.
Create Reports
Identifies if an operator is allowed to generate Event Reports (summaries of events that have occurred on the access control network).
Report Level 1-3
Identifies which reports an operator is allowed to run (see “Run Pre-Designed Report” on page 59).
Manage Network
Identifies if an operator is allowed to manage network settings or is allowed to have Read Only access to review, but not change this information.
Manage Server
Identifies if an operator is allowed to manage server settings or is allowed to have Read Only access to review, but not change this information.
Manage Database
Identifies if an operator is allowed to change the Manage Database window or is allowed to have Read Only access to review, but not change this information.
System Diagnostics
Identifies if an operator is allowed to manage System Diagnostics settings or is allowed to have Read Only access to review, but not change this information.
Flash Controllers
Identifies if an operator is allowed to flash (update) controllers on the network or is allowed to have Read Only access to review, but not change this information.
Operate Hardware
Identifies if an operator is allowed to operate hardware (controllers) or is allowed to have Read Only access to review, but not change this information.
Page 14 01945-100 Rev. 4.0
Keri Systems, Inc. Doors Ne

4.2 Create a New Operator

Setup > Operators and Security Levels > Operators (tab).
NOTE: As this area deals with security issues, it is recommended that only authorized personnel are present when entering and viewing operator names and passwords.
tXtremeTM Reference Manual
Figure 12: Setup Operators
1. Click on .
2. Click in the “Show Passwords” box.
3. Rename the Operator Name (name is limited to 32 characters in length).
4. Enter a password that the operator can remember.
NOTE: The operator name and password fields are both case sensitive. That is, the program differentiates between UPPERCASE and lowercase in all three fields. Please keep this in mind when creating operator names and passwords.
5. Assign a Security Level by using the drop-down menu. Security Levels should have been created in “Create a New Security Level” on page 12.
6. Click on to save the new operator or to clear it without saving.
7. To delete an Operator, click on the row to be deleted and click , followed by .
NOTE: At this time it is possible to delete settings that are currently in use elsewhere in the software.
cause the program to not function properly. It is recommended that instead of deleting
will
ng this
Doi any settings, change the name to “UNUSED.” This will be changed deletions of functions that are in use elsewhere in the software.
in subsequent versions to not allow
01945-100 Rev. 4.0 Page 15
TM
Doors NetXtreme
Reference Manual Keri Systems, Inc.

4.3 Setup Geographical Timezones

Click Setup > System > Properties (tab) > Controller (tab).
Figure 13: Setup Geographical Timezone
1. Click “Add New” or “Duplicate.”
2. Enter Prop
3. Select from the drop-down menu the Geographical Timezone.
4. Select from the Daylight Saving Time Schedule in place (if any).
5. Select Auto Monitor Mode: “Y” (checked-default) or “N” (unchecked). “Y” means that events will be automatically collected from controllers.
6. Click to save the timezone or to clear it without saving.
7. To delete a Geographical Timezone Property Set, click on the row to be deleted and click
NOTE: At this time it is possible to delete settings that are currently in use elsewhere in the software.
ng this
Doi any settings, change the name to “UNUSED.” This will be changed deletions of functions that are in use elsewhere in the software.
erty Set Name (this is the name that will be used to select this geographical timezone).
, followed by .
will cause the
program to not function properly. It is recommended that instead of deleting
in subsequent versions to not allow
Page 16 01945-100 Rev. 4.0
Keri Systems, Inc. Doors NetXtremeTM Reference Manual

5.0 Networking

There are many factors involved in setting up the Network Communication on a DoorsNXT installation. Some data will need to be provided by a Network Administrator familiar with the network where the DoorsNXT is to be installed. The main factors to consider when setting up the network are:
Location of the controllers and Subnet configuration
Network Security and Firewalls

5.1 Location and Subnet Configuration

DoorsNXT can communicate to controllers on the local subnet or networks outside of the local subnet using the DoorsNXT Proxy. The Subnet Data (below) will differ for each subnet. Each controller is configured with a Subnet Property that consists of a Subnet Name, Proxy IP Address, Gateway Address, and Subnet Mask.
By default DoorsNXT is configured with a single Subnet Property: Local Subnet. This subnet communicates to the LAN connected to the DoorsNXT Server. There is no Proxy IP Address associated with the Local Subnet since it is not needed. The Local Subnet property cannot be deleted, but it can be disabled if necessary.
DoorsNXT can have multiple Subnet properties defined. To modify the local subnet property or create a new Subnet property, go to Setup Controllers > Properties > Subnets...
Figure 14: Setup Networking
1. Click on .
2. Rename the Subnet Name, if desired, to something that will make it easy to understand what is included in that particular Subnet.
3. “Use In Find” allows a subnet to be viewed during autoconfiguration.
4. If there is to be a Proxy IP, enter the address. A Proxy IP is a software agent that performs a function or operation on behalf of another application. For DoorsNXT, the Proxy IP is a software service running on a computer attached to a remote subnet.
5. Enter the Gateway IP Address. The Gateway is the IP address of a router used to transport TCP/IP data packets to network subnets that are outside of the local subnet.
01945-100 Rev. 4.0 Page 17
Doors NetXtreme
6. Enter the Subnet Mask IP Address. The Subnet Mask is a method of splitting IP networks into
NOTE: Once a Subnet property is created, controllers located on that Subnet will be assigned the app
7. Click to save the changes or to clear it without saving.
TM
Reference Manual Keri Systems, Inc.
subgroups. The “mask” separates the portions of the IP address significant to the network from the bits that are significant to the subnet. The subnet mask has the same format that is used by IP addresses. An IP address of 192.168.100.1 with a subnet mask of 255.255.255.0 will only be able to communicate locally to other IP addresses in the range of 192.168.100.1-254. Communications to IP addresses outside of that subnet will be routed to the gateway.
ro
priate subnet data after an autoconfig is performed.
8. To delet
NOTE: At this time it is possible to delete settings that are currently in use elsewhere in the software. Doing this any settings, change the name to “UNUSED.” This will be changed deletions of functions that are in use elsewhere in the software.
e a Subnet, click on the row to be deleted and click , followed by .
will cause the
program to not function properly. It is recommended that instead of deleting

5.2 Firewall and Network Security

The DoorsNXT server and controllers use specific ports to communicate to each other. These ports must be allowed access to pass through routers and firewalls in order to allow proper communication. This includes the software-based firewall applications, such as Windows Firewall, installed on any computer running DoorsNXT software or services (server, client, and proxy).
in subsequent versions to not allow
Figure 15: Setup Ports
1. The designated default ports should be left as is, unless instructed to change them by technical support.
2. If instructed to change the ports, be sure to click to save the new port number, or click
to clear it without saving.
Page 18 01945-100 Rev. 4.0
Keri Systems, Inc. Doors Ne

6.0 AutoConfig

Click on Setup > System > Configure Controllers (tab).
Figure 16: Autoconfig - Part One
tXtremeTM Reference Manual
1. Click . The button will change to .Click on it to begin the Autoconfig process.
2. All available controllers will appear.
3. The Find Status column will show the status of the controller.
4. In the “Take Ownership” column, deselect any controllers you do not want to configure at this time.
5. The IP Assigned column will show if an IP Address has already been assigned to this controller.
6. “Replace With” is used when replacing one controller with another (for further details, see the “Replacing An NXT Controller” Application Note.)
7. “Keep Current Record” allows previously assigned parameters should be kept when an autoconfig is performed that changes a portion of the system. “Keep Current Record” allows for certain areas to be kept “as is” while adding additional hardware.
01945-100 Rev. 4.0 Page 19
Doors NetXtreme
Figure 17: Autoconfig - Part Two
8. The controller’s address is displayed.
9. The Property Te
NOTE: If the Autoconfig detects a change in the configuration, a new template will be created automatically to be used, it must be selected. Before changing the Property Template, it is recommended that the configuration is Verified (see “Verify Controller Configuration” on page 21).
TM
Reference Manual Keri Systems, Inc.
mplate is displayed.
. However, this new template will not
be assigned to the controller. If the new template is
10. The Type of controller (NXT4D, NXT2D) is displayed.
1.
Enter the IP address to be used in the “Current IP Address” field. This is the starting IP address
1
from which the controllers will be assigned individual IP addresses during autoconfiguration.
12. The “Change IP To:” column is used when changing the IP Address of a controller.
13. The Subnet Name being used for the configuration (as set up in “Firewall and Network Security” on page 18) is displayed. After being assigned during autoconfiguration, it cannot be changed.
14. The Ethernet Address is displayed.
15. The Geographical Timezone currently in use is displayed.
16. Click .
17. Click . (This may take up to 3 minutes as the controllers are assigned IP addresses.)
18. To verify the IP address has been assigned, the IP Assigned column should change from “No” to “Yes.”
NOTE: If the IP address is outside of the subnet of th
e DoorsNXT server
, autoconfiguration will FAIL.
19. Click .
20. Close the window.
Page 20 01945-100 Rev. 4.0
Keri Systems, Inc. Doors Ne

6.1 Verify Controller Configuration

Once the controller has been configured, that configuration can be verified.
Click on Setup > System > Configure Controllers (tab).
Figure 18: Verify Controllers
tXtremeTM Reference Manual
1. Click on .
2. After completion of the verification process, the results are shown in the message box.
3. Click on the to reveal the configuration of a particular controller.
01945-100 Rev. 4.0 Page 21
Loading...
+ 51 hidden pages