This manual has been written to help you understand and use the Access Control Installer Station (ACIS)
application. It presents the operational details and functional capabilities of the application.
Intended Audience
This manual is primarily intended for Installers who will use the ACIS application to register and configure
Proxies, Controllers and Doors. Installers can also create and manage Sections, create other installers and
generate section level reports.
Prerequisites for Use
Basic understanding of Access Control System is required. Basic understanding of Windows and GUI operations
is required. Knowledge of Web-based applications is essential. Basic knowledge of configuration of devices and
network addresses is essential.
Organisation of the Manual
The information in this document is organised as follows:
About ACIS introduces ACIS. It provides the software and hardware details required for ACIS.
Getting Started describes how to log on and log off from ACIS. It also provides an overview of the activities that
you need to perform after you set up firmware devices at the client side.
Registering Proxy describes the process to register and configure Proxy.
Registering Controller describes the process to register and configure Controller.
Door Configuration describes the process to configure Doors after controllers are configured.
Performing Built in Test for a Proxy describes how to test the Proxy from ACIS.
Performing Built in Test for a Controller describes how to test the Controller from ACIS.
Downloading Firmware describes the process to upgrade the firmware version.
Adding Locations describes the steps to add, rename and delete the location in ACIS.
Adding Sections describes the process to add new section.
Creating and Editing Installer Profiles tells you how to create new installers and edit the existing ones.
Generating Section Level Reports describes the reports that can be generated in ACIS.
Contact provides the contact details of Risco.
Glossary provides explanation for terms used in this manual.
Index of the terms, concepts and tasks in the manual are provided in this section.
Access Control Installer Station (ACIS) is a Web-based application used by the Installer during the set up of
Access Control System and its configuration.
Each client will have an account. The premises of the client (where access control system is going to be
implemented) would be divided into one or more sections (A section is an area that divides the account into
logical configurable units). Each section is managed independently. When an account is created, a Main Section
and a Main Installer are created. The Main Installer has access to all the sections in the account and can create
new installers. An employee of an installer company would go to the customer site and do the physical setup
and wiring, installation and configuration of the devices.
This application will enable you to configure devices for each section. The devices that you configure from ACIS
are:
•Proxy: Proxy is the communicating device between the Access Control Controller Board and
Risco Server Platform
•ACCB known as Controller takes the access control decisions. You can configure Controller from
ACIS.
•Access Control Input/Output Board: The ACIB is connected to the ACCB, when you configure
doors, relays and sensors, ACIB is configured. You can upgrade the ACIB version from ACIS.
• Doors: You can configure Door settings in ACIS.
• Relays: You can connect Door Lock, Alarm and Devices on the Relay. You can configure the relay
setting from ACIS.
•Sensors: You can connect any type of Sensor to the ACCB. You can configure the sensor setting
from ACIS
•Readers: Readers are devices that read the card or any data and send message to ACIB. You can
configure the reader settings from ACIS.
You have to register and configure Proxy and Controller and configure Doors. You can upgrade the firmware
version. You can create new sections and create installers.
ACIS is available in following languages:
• English
• French
• Italian
• Hebrew
When you log on to ACIS, you need to perform the following tasks in order to start the RAC system:
1. Register a Proxy. You boot up a Proxy using a USB and register it using its unique reference ID.
2. After the Proxy is registered, you need to configure Proxy.
3. After you configure Proxy, you register Controller. A controller is booted through a Proxy. All the
unregistered controllers are available to be registered.
4. After registering, you Configure Controller and create doors as required.
5. After doors are created, you can configure sensors and relays as required. Each door has four relays and
four sensors and two readers. A door can accommodate up to four readers.
6. The relays and sensors that are not connected to any door are external relays and sensors. You configure
external relays and sensors along with controller in the Configure Controller screen.
7. After the proxy is registered and configured, you may perform Built-in Test for Proxy, which provides the
Memory information, CPU Information, Virtual Memory Statistics, Stack Memory, RAM Information, Flash
Information, Active/Backup Proxy Connections and Hardware Information about the Proxy.
8. After the controller is registered and configured, you may perform Built-in Test for Controller, which
provides the Memory information, CPU Information, Virtual Memory Statistics, Stack Memory, RAM
Information, Flash Information, Active/Backup Proxy Connections, Access Authorization Data Count, ACIB
Communication Status and Hardware Information about the Controller.
9. You can upgrade Proxy, ACCB, ACIB, and Reader versions using Firmware Download.
After these tasks are performed, there are some generic tasks that you can do as per your requirement:
You can add a Template Proxy. A Template Proxy is not an actual device but created in case you want to
configure the Proxy settings and keep it ready till the time an actual device is available. When you obtain the
Real Proxy, you can replace the Template Proxy with the Real Proxy. Similarly, you can add and configure a
Template Controller and replace it with the real controller whenever required.
You can transfer proxies between sections provided there are no devices connected to a Proxy. You can transfer
controller between sections. The default configurations for the controller are applied. The doors created for the
controller in the original section are deleted.
You can create new sections in the account. The Main Installer can create other installers and assign sections to
them. Only the main installer has access to all the sections in the account. You can view the section level reports
for Proxy Configuration, Controller Configuration, Door Configurations and other system parameters in ACIS.
The procedures to perform each of these tasks are explained in this manual.
ACIS is a Web-based application. This section describes how to logon to ACIS, log off from ACIS and perform all
tasks in the application. The ACIS user is known as Installer. When a new account is created (for a company that
has bought the RAC System), the operator specifies the installer company that will install the Risco Access
Control (RAC) system at the client side. The installer has a company reference ID and is assigned accounts where
he can install RAC system. The installer manually installs the hardware devices at the client site and then uses
ACIS Web application to configure them with the system.
2.1 Before Using ACIS
Before using ACIS, ensure that you have verified the following:
• You have the correct URL where ACIS is deployed.
• You have the correct user name, password and your installer company reference number to log on to
ACIS.
•To register the devices, you need to have the hardware devices and their details (such as proxy
reference number) with you.
•The devices must be boot up to be able to configure through ACIS.
2.2 Logging on to ACIS
When the operator creates an installer company successfully, then a system-generated email with the User
Name, OTP Device ID and Company reference ID is sent to installer’s email address. The Operator creates a main
installer. The main installer can create other installers.
To log on to ACIS:
1. Enter the URL of the ACIS application in your browser. The URL is in the format:
2. Select the language in which you want to be logged on to ACIS application from the Language drop-
down list. By default, Default language is selected. The languages available are:
• English
• French
• Italian
• Hebrew
Select any language and the labels and text on the user interface appears in the selected language.
Note: If you do not select any language, ACIS is displayed in the default language of the computer.
3. Enter the User Name and Password. When the operator creates a new account an assigns it to an installer
company, the main installer is created and the User Name, One Time Password (OTP) Device ID and
Company Reference ID is sent to the main installer by a system-generated email.
4. Enter the Installer Company Reference Number.
5. Click Login. The ACIS home page appears. When you logon to ACIS for the first time, only main section is
Note: The fields marked with an asterisk (*) are mandatory. At any point in time, you can click Cancel to
exit the application.
The Account Name and sections to which you have access to are displayed on the screen. You can select any
other Account Name to which you have access to from the Account Name drop-down list.
After you register and configure devices for each section, the details such as the total number of proxies, ACCB’s
and doors in the section appear on the Manage Account dashboard under the particular section name. In
addition, if there are any disconnect proxies or controllers, the information in also displayed on the dashboard.
2.3 Logging Off from ACIS
Click the Logout link at the upper-left corner of the home page to log out from ACIS.
2.4 Overview of the Activities in ACIS
When you log on to ACIS, you need to perform the following tasks in order to start the RAC system:
You have to set up the firmware and then configure the firmware with the RSP. The devices that are setup are
Proxy, Controllers, ACIB, Relays, Sensors and Readers. Refer to the Glossary for the explanation of each of the
devices.
Each reader is connected to an Access Control Input-Output Board (ACIB). Up to four readers can be connected
to one ACIB. The ACIB is connected to the Access Control Controller board (ACCB) and up to two ACIB’s can be
connected to the board. ACCB stores the actual configurations. All the access decisions are taken by ACCB. ACCB
communicates with the Risco Service platform (RSP) through a Proxy. Proxy provides a communication channel
between the ACCB/ACIB and the RSP. This includes proxy to RSP (like events) and RSP to ACCB (configuration
updates) communication
Each section must have at least one primary proxy and can have one standby Proxy. The standby proxy serves as
a backup device in case of failure of the primary proxy, hence, it is recommended to have one stand by Proxy.
Each Proxy can have only one Stand by Proxy.
You have to register a proxy for a section and then only then it will be functional. In case the authentication of
users is through LDAP, then proxy will connect and authenticate through the onsite LDAP server, GSM, WN,
PSTN and other networks.
A proxy uses LAN/WAN first to communicate with the RSP Server. In case LAN/WAN is not available, then a proxy
will first connect to a dial-up (PSTN) connection and if that is not available, to a GSM connection.
You can perform the following actions:
• Register Proxy
• Add Template Proxy
• Transfer Proxy
• Replace Proxy
3.1 Register Proxy
Whenever you create a section, you need to register the proxy to it. For each section in the account, you can
have multiple proxies. Proxies need to be registered and assigned to the sections in order for them to
communicate with the RSP. When we select an account, all the sections in the account are displayed. Each
section displays the total number of proxies, controllers and doors assigned to the section. The number of
disconnected devices are displayed too.
After the successful registration, the Proxy Name appears in the Tree View in the bottom left corner of the
screen. The tree view displays all the Proxies, Controllers and Doors connected to the section. The registered
Proxy Name appears in the tree view.
After you register and configure devices for each section, the details such as the total number of proxies, ACCB’s
and doors in the section appear on the Manage Account dashboard under the particular section name.
After you register a proxy, you need to configure it.
3.2 Configure Proxy
To configure Proxy:
1. Click the Proxy Name that appears in the tree view. The Configure Proxy screen appears.
The Proxy Name, Firmware Version No., IP Address, MAC Address are displayed by default. IP Address and
MAC Address fields are non-editable. The Static and DHCP option buttons are read-only. The static function
makes the IP address constant. The IP is configured from the configuration file. If the DHCP option button is
selected, the proxy will extract the IP address from the DHCP Server.
2. Enter the following details in the fields:
Table 1: Configure Proxy
Field Name Description
Proxy Name
IP Address
Provide a name to the Proxy. This is the only mandatory
field on this screen. When you register Proxy, the Proxy
name is displayed in this field. You can change it if
necessary.
The IP address of the proxy is displayed. This is a read-only
field.
In computer networking, a Media Access Control address
(MAC address) is a unique identifier assigned to most
network adapters or network interface cards (NICs) by the
manufacturer for identification and used in the Media
Access Control protocol sub layer.
When the device is running on battery, the percentage of
battery strength available is displayed in this field.
Select the time zone from the drop-down list. By default,
the Proxy time zone is that of the Section.
The Intranet IP address is displayed. This is a read-only field.
Click
a list of locations in the Account appears. Select a location.
The Location is auto-populated.
The Static and DHCP option buttons are read-only. The
static function makes the IP address constant. The IP is
configured from the CFG file.
If the DHCP option button is selected, the IP Address might
change every time the Proxy boots up.
to select the location. The Location window, with
Is Standby Proxy
Active Proxy
NTP Details
Select this check box to mark this proxy as a back-up proxy.
Select the active proxy with which you want to pair this
proxy as back-up from the drop-down list.
The Network Time Protocol (NTP) is used for automatic
time synchronization. NTP is for synchronizing the time
between the proxy and the server. It also synchronizes time
between ACCB’s.
name
Select the Is External NTP check box to enable and enter
the NTP details.
Click the IP Address or the DNS Name option button.
You can select only one option.
Note: In case you do not have an external NTP Server,
then the proxy will use DCC server as NTP
server. However, the NTP server service must
configured and running on the machine where
DCC is installed.
User Manual for ACIS Version
GSM
Dial Up
Proxy can use the Global System for Mobile
communications to communicate with the RSP server. To
do that, the GSM services need to be enabled.
The User Name, Password and Access Point Name are
reflected based on the configuration file. If the
configuration file has no data, then these fields will be
blank.
Enter the GSM details in these fields.
Note: When you enter the credentials, please ensure
that you have connected the GSM modem to the
proxy. Leave blank in case there you are not
using GSM modem.
Proxy can use the Dial up or Public Switched Telephone
Network (PSTN) to communicate with the RSP server
The User Name, Password and Access Point Name are
reflected based on the configuration file. If the
configuration file has no data, then these fields will be
blank.
Enter the Dial Up details in these fields.
Note: When you enter the credentials, please ensure
that you have connected the PSTN modem to the
proxy. Leave blank in case there you are not
using PSTN modem.
Enable System Log
Select this check box to enable system log for this proxy. By
default, the check box is enabled and the installer cannot
edit it, but can only select the type of log as required.
Note: There are three levels, Critical, Debug and Info.
Critical is enabled by default. If the user selects
Debug, then the debug info along with the critical
will be logged. If user selects Info, all three levels
of the messages will be logged.
3. Click Apply. The system displays a message, “Proxy configured successfully”.
or
•Click Apply and Close. The changes are reflected and the window is closed. The home page appears.
If we delete a Proxy with controllers which has a back up Proxy, then all the controllers are attached to the
backup proxy. It is not possible to restore a deleted Proxy, although it is possible to reboot the Proxy and register
it again.
To delete a Proxy:
1. Click the name of the Proxy in the tree view. The Configure Proxy screen appears.
2. Click Delete, if there is a Standby proxy then the controllers attach themselves to the Standby proxy. If not,
then the system displays a message, “The Proxy does not have a backup. Do you still want to delete?”
3. Click OK. The Proxy is deleted.
3.4 Add a Template Proxy
A Template Proxy is added when there is no physical device present, but is expected to be available. You can
replace the Template Proxy by the Actual Proxy when the device is available. The configuration and the settings
done on the Template Proxy get applied to the replaced Proxy.
With the help of Template Proxy, you can configure the proxy before actually installing the hardware.
To add a Template Proxy:
1. Click AddTemplate Proxy. The Add Template Proxy screen appears.
Enter the IP Address of the Proxy. You also need to choose if the IP Address is of
the type Static or DHCP
When the device is running on battery, the percentage of battery strength
available is displayed in this field.
Provide the MAC Address.
In computer networking, a Media Access Control address (MAC address) is a
unique identifier assigned to most network adapters or network interface cards
(NICs) by the manufacturer for identification and used in the Media Access
Control protocol sub layer.
to select the location. The Location window, with a list of locations in
User Manual for ACIS Version
Static
DHCP
Active Proxy
NTP Details
GSM
The Static and DHP option buttons are read-only. The static function makes the
IP address constant. The IP is configured from the CFG file.
If the DHCP option button is selected, the IP Address might change every time
the Proxy boots up
You cannot configure Active Back-Up Pair for a Template Proxy
The Network Time Protocol (NTP) is used for automatic time synchronization.
NTP is for synchronizing the time between the proxy and the server. It also
synchronizes time between ACCB’s.
name
Select the Is External NTP check box to enable and enter the NTP details.
Click the IP Address or the DNS Name option button.
You can select only one option.
Proxy can use the Global System for Mobile communications to communicate
with the RSP server. To do that, the GSM services need to be enabled.
The User Name, Password and Access Point Name are reflected based on the
configuration file. If the configuration file has no data, then these fields will be
blank.
Enter the GSM details in these fields.
Note: When you enter the credentials, please ensure that you have
connected the GSM modem to the proxy. Leave blank in case there
you are not using GSM modem.
Proxy can use the Dial up or Public Switched Telephone Network to
communicate with the RSP server
The User Name, Password and Access Point Name are reflected based on the
configuration file. If the configuration file has no data, then these fields will be
blank.
Enter the Dial Up details in these fields.
Note: When you enter the credentials, please ensure that you have
connected the PSTN modem to the proxy. Leave blank in case there
you are not using PSTN modem.
Select this check box to enable system log for this proxy. By default, the check
box is enabled and the installer cannot edit it, but can only select the type of log
as required.
Note: There are three levels, Critical, Debug and Info. Critical is enabled
by default. If the user selects Debug, then the debug info along with
the critical will be logged. If user selects Info, all three levels of the
Field Name Description
messages will be logged.
User Manual for ACIS Version
Figure 13: Template Proxy Created Successfully
3. Click Apply. The message appears, “Proxy Created Successfully”. The Proxy is visible on the tree view on
the bottom left corner of the screen.
Or
•Click Apply and Close. The Template Proxy is created and the window is closed. The home page appears.
You can create multiple Template Proxies for a given section.
3.5 Replace Proxy
If a proxy is malfunctioning, then you can replace the old Proxy with a new Proxy. In addition, when you create a
Template Proxy, you can replace the Template Proxy with the Actual Proxy. When a Proxy is replaced, all
configuration made to the earlier Proxy is transferred to the New Proxy by default. The old Proxy is deleted from
the system.