This manual is delivered subject to the following conditions and
restrictions:
xThis manual contains proprietary information belonging to
RISCO Group. Such information is supplied solely for the
purpose of assisting explicitly and properly authorized users of
the system.
xNo part of its contents may be used for any other purpose,
disclosed to any person or firm or reproduced by any means,
electronic or mechanical, without the express prior written
permission of RISCO Group.
xThe text and graphics are for the purpose of illustration and
reference only. The specifications on which they are based
are subject to change without notice.
xInformation in this document is subject to change without
notice. Corporate and individual names and data used in
examples herein are fictitious unless otherwise noted.
Copyright 2008 RISCO Group. All rights reserved.
2 Access Control User's Manual
Customer Information
RTTE COMPLIANCE STATEMENT
Hereby, RISCO Group, declares that this equipment is in
compliance with the essential requirements and other relevant
provisions of Directive 1999/5/EC.
RADIO FREQUENCY INTERFERENCE (Ref.: FCC Part 15, Para.
15.105)
This equipment has been tested and found to comply with the
limits for a Class B digital device pu rsuant to Part 15 of the FCC
Rules. These limits are designed to provide reasonable protection
against harmful interference in a residential installation. This
equipment generates, uses, and can radiate radio frequency
energy and, if not installed and used in accordance with the
instructions, may cause harmful interference to radio
communications. However, there is no guarantee that
interference will not occur in a particular installation. If this
equipment does cause harmful interference to radio or televi sion
reception, which can be determined by turning the equipment
off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
1) Reorient or relocate the receiving antenna.
2) Increase the separation between the equipment and the
receiver.
3) Connect the equipment into an outlet on a circuit different
from that to which the receiver is connected.
4) Consult the dealer or an experienced Radio/TV technician
for help.
CHANGES OR MODIFICATIONS (Ref.: FCC Part 15, Para. 15.21 and
15.27)
Changes or modifications to this unit not expressly approved by
RISCO Group, could void the user's authority to operate the
equipment.
Table 6: User Settings.....................................................43
6 Access Control User's Manual
Chapter 1: Introducing the Access Control
Module
The Access Control module, which is integrated with your security
system, is designed for use in small- to medium-size companies.
This module is used wherever there is a need to control which
users should have access to the different doors and areas on the
premises. The doors can be equipped with devices such as
readers, door contacts, door relays, and motion detectors.
The Access Control module enables you to define and control
the access level and time definitions of the users in your security
system, as well as determine the functions that each user can
perform.
The Access Control module provides flexibility by enabling you to
connect up to eig h t Ac cess Control mo d u le s to y o ur security
system. In addition, each module supports two readers, enabling
the security system to control up to 16 doors.
This manual explains the Access Control module programming
options using the installed LCD keypad, as well as the data
preparation process. Alternatively, the Access Control modul e
can also be programmed using the Upload/Download
application (refer to the Upload/Download User's Manual for
further details).
Access Control User's Manual 7
Access Control Terms and Definitions
The following is a list of terms and definitions that relate to the
Access Control module:
xArm/Disarm Users: Users assigned access rights that enable
them to arm and disarm the system. There can be up to 99
arm/disarm users in the system. It is recommended to assign
the same PIN code in the Access Control module as the one
assigned to the user in the security system.
xEnter/Exit Users: Users assigned access rights that enable
them to only open and close doors; not arm/disarm the
system. There can be up to 999 enter/exit users in the system.
xTime Scheduling: Defining specific time windows that
determine when users can access the system.
xAccess Group: A group of users that can access the system
only through specific doors during specific time periods. There
can be up to 16 access groups configured in the system.
xCard Code: An 8-digit code on an access card that is
entered into the system in order to assign access rights to a
user.
xPIN Code (Personal Identification Number): A 4-digit code
that is assigned to a user in order to enable a user to access
the system using an installed keypad. The PIN code can be
used instead of a card or in addition to a card.
xRTE (Request to Exit): A push button or automa tic motion
detector that, when activated, opens a specific door by
sending a signal to the door's relay.
xReader: The Access Control module supports four reader
types: Card only, keypad only, card + keypad, and
card/keypad.
xPartition: A subsystem within the security system that can be
controlled as a separate system.
xEvent Log: Each Access Control module supports up to 1,000
events. The events can be printed from a local printer or
uploaded from the Upload/Download application,
according to specified criteria.
8 Access Control User's Manual
Feature-Specific Limitations
Feature ProSYS 16 ProSYS 40 ProSYS 128
The following table contains the feature-specific limitations of the
system, depending on the installed ProSYS model.
NOTE:
The information and examples in this manual are written from the viewpoint of
the ProSYS 128 model. If you have the ProSYS 16 or the ProSYS 40 model
installed, then the feature-specific limitations in the table below are relevant.
Access Control
2 4 8
Modules
Readers 4 8 16
Partitions 4 4 8
Arm/Disarm Users 00-29 00-59 00-98
Enter/Exit Users 100-349 100-999 100-999
Time Windows 15 25 25
Weekly Programs 10 25 25
Access Groups 8 16 16
Total No. of Inputs 8 16 32
Total No. of Relays 6 12 24
Access Control User's Manual 9
Access Control Workflow
The following workflow illustrates the recommended method for
working with the Access Control module:
Plan and Prepare the
Plan and Prepare the
Access Control Da ta
Access Control Da ta
(Chapter 3)
(Chapter 3)
Create a
Create a
Doors Table
Doors Table
Create a
Create a
Readers Table
Readers Table
Create a Time
Create a Time
Windows Table
Windows Table
Create a Weekly
Create a Weekly
Programs Table
Programs Table
Create an Access
Create an Access
Groups Table
Groups Table
Program the Access
Program the Access
Control Module
Control Module
(Chapter 4)
(Chapter 4)
Access the Access
Access the Access
Control Menu
Control Menu
Configure Door
Configure Door
and Reader
and Reader
Settings
Sett ings
Configure Time
Configure Time
Schedules
S che dules
Configure
Configure
Access Groups
Access Groups
Add Users to
Add Users to
the System
the System
Create a User
Create a User
Settings Table
Settings Table
Configure User
Configure User
Settings
Settings
10 Access Control User's Manual
Chapter 2: Using the Access Control
Module
Entering/Exiting Doors
To enter/exit the system:
Arming/Disarming the System
The Access Control module can be used to allow
entering/exiting doors and for arming/disarming the security
system.
Doors that are defined to operate in automatic mode can be
entered/exited by all users with access cards or access codes.
The access card or code must:
x Used only during its assigned time windows.
x Used only with its assigned doors.
In addition, doors can be programmed to have a fixed status
(Always Open or Always Closed) or can be programmed to
open when a motion detector detects movement. In this case,
users can enter/exit normally without using their access card or
code.
¾
xPresent your card or code to the reader, using the required
method (depending on the reader type). The system verifies
the card or code (indicated by a confirmation LED and
beep) and opens the door.
NOTES:
If a wrong code or an unknown card is entered five times, a false code
announcement is sent to the monitoring station.
Users with Entrance Only cards cannot enter a door if all the door
partitions are armed (refer to Adding Enter/Exit Users, page 29).
The system can be armed/disarmed only by users who have
been assigned with arm/disarm rights. To arm/disarm the system,
the following criteria must be met:
Access Control User's Manual 11
xThe reader must be authorized for the arming/disarming
Arming the System
To arm the system:
Disarming the System
operations.
xThe access card/code must be programmed as an
Arm/Disarm user.
xThe access card/code must be used only during its assigned
time windows.
xThe access card/code must be used only with its assigned
doors.
xThe access card/code must be assigned to the partitions that
are assigned to the door and to the user partition definitions
in the security panel.
NOTES:
Users can perform regular arming or instant arming, depending on the arm code. Ask
your Installer for the appropriate code. The system will arm only the partitions that are
common to the door, user security, and the arm user definitions.
Arming the system can be performed only from readers that
have a keypad and have been authorized for the arming
operation.
¾
xIf the reader is defined as a Keypad Only type, enter your
arm code followed by your PIN code:
ARM CODE + [#] + PIN CODE + [#]
-OR-
xIf the reader is defined as a Keypad + Card type (for higher
security), enter your arm code using the keypad, pass your
access card in the reader, and then enter your PIN code
using the keypad:
ARM CODE + [#] + PASS CARD + PIN CODE + [#]
IMPORTANT:
If you do not succeed in arming the system, refer to the checklist in
Appendix A, Why Your System Does Not Arm, page 37.
Disarming the system can be performed from any type of reader
that has been authorized for the disarming operation.
12 Access Control User's Manual
¾
To disarm the system:
Duress Disarming
To perform duress disarming:
xIf the reader is defined as a Keypad Only or Card Only or
Keypad/Card type, enter your PIN code using the keypad
OR pass your access card in the reader, as required:
PIN CODE + [#] or PASS CARD
-OR-
xIf the reader is defined as a Keypad + Card type, pass your
access card in the reader AND then enter your PIN code
using the keypad:
PASS CARD + PIN CODE + [#]
You can also use the Access Control readers (Keypad Only,
Keypad/Card, and Keypad + Card types) for duress disarming.
This type o f disarmin g sends a quiet alarm to the monitoring
station while you disarm the system under coerciveness.
The duress code is automatically the number following the user's
PIN code (for example: PIN code = 1234; duress code = 1235).
Refer to the ProSYS User's Manual for additional details.
¾
xIf the reader is defined as a Keypad Only or a Keypad/Card
type, enter the next sequential number after your PIN code:
[PIN CODE + 1] + [#]
-OR-
xIf the reader is defined as a Keypad + Card type, pass your
access card in the reader and then enter the next sequential
number after your PIN code:
PASS CARD + [PIN CODE + 1] + [#]
Access Control User's Manual 13
Chapter 3: Planning and Preparing the
Access Control Data
To plan and prepare the Access Control data:
Before programming the Access Control module, you must plan
how you want the system to function, such as which hours entry
will be permitted through the main entrance, who should have
access to specific areas of the premises, and so on. As part of
the planning, it is recommended to prepare the data that will be
used during programming in tables, as described in this section.
¾
1) Create a table that includes the following door data for each
door: number, name, location, mode, and partition. The
table should be based on information from your Installer.
(Refer to the table provided in Table 1: Doors, page 38.)
2) Create a table that includes the following reader data for
each reader: number, associated door, name, type, and
arm/disarm capabilities. The table should be based on
information from your Installer. (Refer to the table provided in
Table 2: Readers, page 39.)
3) Create two time schedule tables, as described below.
The purpose of creating time schedules is to give different
users access to doors at different hours. This consists of
identifying the different types of working hours or other time
divisions in the premises and then deciding what time
schedule will be used.
NOTE:
When you program the time schedules, you must program the time
windows first, and then you can program the weekly programs for each
access group.
Create a table that includes the following time window
data: number, program name, and one or two start and
stop times, as required. (Refer to the table provided in
Table 3: Time Windows, page 40.)
14 Access Control User's Manual
Create a table that includes the following weekly
program data: number, program name, and assigned
Time Window numbers for each day of the week and for
a holiday. (Refer to the table provided in Table 4: Weekly Programs, page 41.)
4) Create a table that includes the following access group data
for each group: number, name, allowed doors, and assigned
weekly program. The purpose of creating access groups is to
identify the different departments or sections in the company
and decide which group can enter which department at
what time. (Refer to the table provided in Table 5: Access Groups,
page 42.)
5) Create a table that includes the following user data for each
user: number, name, access card code number, PIN code,
and assigned access group. This table enables you to easily
keep track of your user information. (Refer to the table
provided in Table 6: User Settings, page 43.)
Access Control User's Manual 15
Chapter 4: Programming the Access
Control Module
66
66
66
66
66
66
66
This chapter provides detailed instructions for programming the
functions of the Access Control module, as well as describes the
related quick key combinations.
NOTE:
The programming instructions described in this chapter are based on the same
concepts as those described in the ProSYS User's Manual.
This chapter includes the following sections:
88
CODECODE
88
CODECODE
##
Accessing the Access Control Menu, page 17
##11
Configuring Door and Reader Settings, page
17
88
CODECODE
88
CODECODE
88
CODECODE
88
CODECODE
88
CODECODE
##22
Configuring Time Schedules, page 20
##33
Configuring Access Groups, page 24
##44
Adding Users to the System, page 25
##55
Configuring User Settings, page 33
##66
Opening Doors, page 36
Some of the Access Control programming options have been
pre-programmed by the Installer (refer to the ProSYS Installation and Programming Manual). In addition, a detailed description of
how to use the keypad is provided in the ProSYS User's Manual.
IMPORTANT:
Ensure that your security system is disarmed before you program any of the
Access Control functions and also that all the Access Control modules are
connected to the Main Panel.
16 Access Control User's Manual
Accessing the Access Control Menu
66
88
To access the Access CControl menu:
Configuring Door and Reader Settings
66
Defining the Door Mode
66
CODECODE
All functions in this manual are performed from the Access
Control menu.
¾
1) From the initial keypad display, enter the [] User Functions
mode and select [8] Access Control.
The following option is displayed:
INSERT CODE:
_ _ _ _
2) Enter the current Master Code or the Manager Code and
press
The first option of the Access Control menu is displayed, as
shown in the next section. You can now program the
required Access Control options, as described in the
subsequent sections of this manual.
.
##
88
CODECODE
Configuring the Access Control settings consists of defining the
door mode for each door and the reader type for each reader
in the system, as described in the following sections:
x Defining the Door Mode, below
x Defining the Reader Type, page 19
The door mode option enables you to determine the status of
the electric strike on each door. For example, during a weekend
period, you may want a specific door to be closed at all times to
prevent people from entering the premises.
When performing this procedure, use the data that you
prepared in Table 1: Doors, page 38.
Access Control User's Manual 17
##11
88
CODECODE
##1111
¾
To define the door mode:
1)
ACCESS CONTROL:
ACCESS CONTROL:
1) SETTINGS
1) SETTINGS
2)
3)
SETTINGS:
SETTINGS:
1) DOOR MODE
1) DOOR MODE
SELECT A DOOR:
SELECT A DOOR:
01) DOOR 01
01) DOOR 01
From the Access Control menu, select
[1] Settings.
Select [1] Door Mode.
Select the appropriate door number
and then press
. The first door
mode option is displayed.
4)
DOOR MODE:
1) AUTOMATIC
Define the door mode (status of the
door electric strike) by selecting the
appropriate option number:
[1] Automatic: Sets the door relay to automatic mode.
This enables access to any user with access rights when
introducing a card or code to the reader.
NOTE:
This is the default door mode, which is generally used for everyday purposes.
[2] Always Open: Sets the door relay to always open
mode. This option keeps the door open at all times and is
used when you want to keep the door open but do not
want an alarm to occur, for example, when
merchandise is being delivered.
[3] Always Closed: Sets the door relay to always closed
mode. This option keeps the door closed at all times and
is used to prevent people from using the door, for
example, during a weekend period.
18 Access Control User's Manual
Defining the Reader Type
66
To define the reader type:
88
CODECODE
##1122
The reader type option enables you to define the access type
and level of security for each reader. This consists of defining
which type of reader is installed on each door and defining
whether or not the system can be armed and/or disarmed from
the reader. For example, you may have two readers at the
entrance of your premises, but you only want the system to be
armed from the inside reader and disarmed from the outside
reader.
NOTES:
The reader type depends on the installed reader.
The system enables you to have different reader technologies throughout your
premises, but each Access Control module can support only one technology.
When performing this procedure, use the data that you
prepared in Table 2: Readers, page 39.
¾
1)
ACCESS CONTROL:
ACCESS CONTROL:
1) SETTINGS
1) SETTINGS
2)
3)
4)
SETTINGS:
SETTINGS:
1) DOOR MODE
1) DOOR MODE
SELECT A READER:
SELECT A READER:
01) READER 01
01) READER 01
READER TYPE
READER TYPE
1) CARD ONLY
1) CARD ONLY
From the Access Control menu,
select
[1] Settings.
Select [2] Reader Type.
Select the appropriate reader
number and then press
.
Define the reader type (depending
on the installed reader type) by
selecting the appropriate option:
[1] Card Only: Enables door access by using an
access card in the reader. After selecting this option,
select [Y] Yes or [N]No to define the disarm rights. (This option only
allows users to disarm the system.)
Access Control User's Manual 19
[2] Keypad Only: Enables door access by entering a
Configuring Time Schedules
66
Defining Time Windows
66
code using the installed keypad. After selecting this
option, select [Y] Yes or [N] No to define the arm rights
and then, at the next option, select [Y] Yes or [N] No to
define the disarm rights.
[3] Keypad + Card: Enables door access by using an
access card in the reader in addition to entering a
code using the installed keypad. After selecting this
option, select [Y] Yes or [N] No to define the arm rights
and then, at the next option, select [Y] Yes or [N] No to
define the disarm rights. (This option is used for higher
security.)
[4] Keypad/Card: Enables door access either using an
access card in the reader or by entering a code using
the installed keypad. After selecting this option, select
[Y] Yes or [N]No to defin e the disarm rights. (This
option only allows users to disarm the system.)
You can configure the time schedules by
which users can access the system. This
1
1
Define Time
Define Time
Windows
Windows
88
CODECODE
##22
consists of first defining daily time windows, as
described below, and then defining the
2
2
Define Weekly
Define Weekly
Programs
Programs
weekly programs that are based on the
required schedules of the users, as described
on page 22.
NOTE:
The time windows in the weekly programs that are defined for holidays will work
during the holiday dates that are defined in Quick Keys [6][6][2] in the ProSYS User's Manual.
88
CODECODE
##2211
The time window option enables you to create daily time
windows that determine when users can access the system. You
can define up to 25 time windows, which consists of assigning a
logical name and two time intervals to each time window. You
must define time windows for each group of users, as you will use
20 Access Control User's Manual
these time windows to later build the weekly programs for each
Time
Window
Program Name Start
Time 1
Stop
Time 1
Start
Time 2
Stop
Time 2
To define a time window:
group.
The following example shows different time windows defined to
allow access to different groups only during certain time periods:
1 Markt Personnel 08:00 12:00 12:30 19:00
2 Cleaning Day 08:00 12:00 12:30 16:00
3 Cleaning Night 15:00 19:00 19:30 23:00
4 Half Day Work 08:00 14:00 14:00 14:00
NOTE:
The time intervals that you define for the time windows must be in ascending
order. For example, the system will not enable you to enter the start time 17:00
before the end time 08:00 for a specific time window.
When performing this procedure, use the data that you
prepared in Table 3: Time Windows, page 40.
¾
1)
ACCESS CONTROL:
ACCESS CONTROL:
1) SETTINGS
1) SETTINGS
2)
TIME SCHEDULE:
TIME SCHEDULE:
1) TIME WINDOW
1) TIME WINDOW
3)
SELECT PROGRAM:
SELECT PROGRAM:
01) T. WINDOW 01
01) T. WINDOW 01
From the Access Control menu,
select [2] Time Schedule.
Select [1] Time Window.
Enter a program number (1-25) and
press
.
4)
TIME WINDOW 01
TIME WINDOW 01
START1 00:00
START1 00:00
Enter the s tart time of the first tim e
interval in HH:MM format and press
.
5)
TIME WINDOW 01
TIME WINDOW 01
STOP1 00:00
STOP1 00:00
Enter the stop time of the first time
interval in HH:MM format and press
.
6)
TIME WINDOW 01
TIME WINDOW 01
START2 00:00
START2 00:00
Enter the start time of the second
time interval in HH:MM format and
press
.
Access Control User's Manual 21
7)
Defining Weekly Programs
66
ID Name Mon Tue Wed Thu Fri Sat Sun Hol
TIME WINDOW 01
TIME WINDOW 01
STOP2 00:00
STOP2 00:00
Enter the stop time of the second
time interval and press
.
8)
T. WINDOW LABELT. WINDOW LABEL
9)
TIME WINDOW 01
TIME WINDOW 01
IS DEFINED
IS DEFINED
Enter a logical name for the time
window and press
.
This message indicates that the time
window has been defined
successfully.
88
CODECODE
##2222
The weekly program option enables you to define weekly
programs for each group of users. Each weekly program is
comprised of seven separate time windows and one holiday
time window that you select, which then determine the days and
time intervals during which each group has access to the system.
The time window that you select for the holiday time window
determines how the permissions for the assigned access group
will act once the system goes into holiday mode.
NOTES:
Before defining weekly programs, you must first define the time windows, as
described in the previous section.
Weekly programs are required when you define access groups, as described in
Configuring Access Groups, page 24.
You can define up to 25 weekly programs. For example, you can
create a weekly program named Markt Weekly that consists of
the Markt Personnel time window for Monday through Thursday;
the Half Day Work time window for Friday; and the Never time
window for weekends and holidays, as shown in the table below.
Markt
1
Weekly
Cleaning
2
Night
x Time Window 1: Markt Personnel
x Time Window 2: Half Day Work
x Time Window 00: Never
1 1 1 1 2 00 00 00
3 3 3 3 2 00 00 00
When performing this procedure, use the data that you
prepared in Table 4: Weekly Programs, page 41.
22 Access Control User's Manual
¾
To define a weekly program:
1)
ACCESS CONTROL:
ACCESS CONTROL:
1) SETTINGS
1) SETTINGS
2)
TIME SCHEDULE:
TIME SCHEDULE:
1) TIME WINDOW
1) TIME WINDOW
3)
SELECT PROGRAM:
SELECT PROGRAM:
01) WEEKLY 01
01) WEEKLY 01
4)
5)
CHOOSE DAY
CHOOSE DAY
1) SUNDAY
1) SUNDAY
SET TIME WINDOW
SET TIME WINDOW
01) T. WINDOW 01
01) T. WINDOW 01
From the Access Control menu,
select
[2] Time Schedule.
Select [2] Weekly Prog.
Enter a weekly program number (1-
25) and press
.
Select [1] Sunday and press
Assign a time window for Sunday
by scrolling through the list of
defined daily time windows and
then pressing
at the
appropriate one.
NOTE:
In addition to the list of time windows that have been defined in the
system, the [99] Always (default) and [00] Never options are available.
6)
CHOOSE DAY
CHOOSE DAY
2) MONDAY
2) MONDAY
NOTE:
You can press [] at any time during the programming to exit the weekly
programming option and save the changes that were defined.
The option for the next day is
displayed automatically.
.
7) Repeat steps 4 to 6 for the other days of the week (as
well as for the [8] Holiday option), by selecting the
appropriate option number and then pressing Enter
after each one.
8)
ENTER PROG LABEL
ENTER PROG LABEL
WEEKLY 01
WEEKLY 01
Enter a logical name for the weekly
program, for example, Markt
Weekly
(up to 12 characters), and press
Enter.
9)
WEEKLY PROG 01
WEEKLY PROG 01
IS DEFINED
IS DEFINED
This message indicates that the
weekly program has been defined
successfully.
Access Control User's Manual 23
Configuring Access Groups
66
To configure an access group:
W
W
88
CODECODE
##33
After defining the door mode, reader type, and the time
schedules, you can configure access groups. Each access group
represents the doors that groups of users can access during
specific time periods.
You can configure up to 16 access groups in the system, which
consists of assigning a logical name to the access group and
then assigning up to 16 doors, each with its own weekly program,
to the access group. Afterwards, you will assign each individual
user to the appropriate access group, as described in Assigning Users to Access Groups, page 34.
For example, you can configure an access group named Markt Personnel that represents a group of users that have access to
doors 1, 7 and 8, according to the weekly program named Markt Weekly that you defined earlier. Then you can configure another
access group named Cleaning Personnel that represents a
group of users that only has access to doors 7 and 8 and only
during the time periods defined in the weekly program named
Cleaning Night (i.e., Mon-Fri, 17:00 to 19:00).
NOTE:
Changes that you make to access group definitions directly affect the users
assigned to the groups.
When performing this procedure, use the data that you
prepared in Table 5: Access Groups, page 42.
¾
1)
ACCESS CONTROL:
ACCESS CONTROL:
1) SETTINGS
1) SETTINGS
2)
SELECT GROUP:
SELECT GROUP:
01) GROUP 01
01) GROUP 01
3)
4)
EEKLY PROGRAM:
EEKLY PROGRAM:
01) WEEKLY 1
01) WEEKLY 1
GROUP 1
GROUP 1
1) DOOR 01
1) DOOR 01
From the Access Control menu,
select
[3] Group Access.
Enter a group number (1-16).
Select a door number for the
selected group and press
Select a weekly program (1-25) for
the selected door and press
.
.
24 Access Control User's Manual
NOTE:
Adding Users to the System
66
When a Code Entry Fails
In addition to the list of weekly programs that have been defined in the
system, the [99] Always (default) and [00] Never options are available.
5) Repeat steps 3 and 4 to define additional doors and
their associated weekly programs to the access
group, as required.
6)
ENTER GROUP NAME
After you have selected weekly
programs for the available doors, this
option is displayed. Enter a logical
name for the group and press
.
7)
ACCESS GROUP 01
ACCESS GROUP 01
IS DEFINED
IS DEFINED
This message indicates that the
access group has been defined
successfully.
88
CODECODE
##44
The record users option enables you to add two types of users to
the system, as follows:
x Adding Arm/Disarm Users, page 26
x Adding Enter/Exit Users, page 29
NOTE:
This option is only enabled when the Access Control module is connected to the
security system.
When performing these procedures, use the data that you
prepared in Table 6: User Settings, page 43.
When adding both types of users to the system, if the user
number has already been used, a message is displayed,
providing you with the option to overwrite the user data. In
addition, if the card code has already been used in the system,
a message is displayed, indicating that the card code exists,
followed by three beeps.
Access Control User's Manual 25
Adding Arm/Disarm Users
66
By Entering a Card Code
66
88
CODECODE
##4411
The record users option enables you to add up to the maximum
number of users that are currently defined in your security system
with arm/disarm access rights in the following ways:
x By Entering a Card Code, below
x By Passing a Card in a Reader, page 29
When adding arm/disarm users, you must also select any
partition which each user is allowed to arm/disarm. For example,
you can assign only partitions 1, 2, and 3 to allow the user
arm/disarm rights to the Marketing Department and the kitchen
facilities, but prevent arm/disarm rights to the other areas where
the management offices are located (thus creating a "walking
path").
NOTES:
Arm/disarm users can only arm the system from readers for which you
configured arm/disarm capabilities in the reader type definitions (refer to
Defining the Reader Type, page 19).
The system will arm only the partitions that are common to the door, user
security, and the arm user definitions.
88
CODECODE
##441111
You can add arm/disarm users to the system by manually
entering the 8-digit code on each user's access card using an
installed keypad. This, in effect, enables you to add users by
remote programming.
This option is recommended when using RISCO Group cards that
contain 8-digit numbers on the face of the cards. If you are using
cards other than RISCO Group cards or cards with less than 8
digits, it is recommend ed to add the users by passing the card s,
as described in By Passing a Card in a Reader, page 31.
26 Access Control User's Manual
¾
To add an arm/disarm user by entering a card code:
By Passing a Card in a Reader
66
1)
ACCESS CONTROL:
ACCESS CONTROL:
1) SETTINGS
1) SETTINGS
2)
3)
4)
5)
6)
RECORD USERS
1) ARM CARDS
ARM CARDS 00-98
ARM CARDS 00-98
1) BY CARD CODE
1) BY CARD CODE
SELECT USER:
SELECT USER:
00 (00-98)
00 (00-98)
USER 00 12345678
USER 00 12345678
PAR: Y.......
PAR: Y.......
U:00 CARD CODE
U:00 CARD CODE
........
........
7)
U:00 INSERTION
CONFIRMED
From the Access Control menu,
select
[4] Record Users.
Select [1] Arm Cards.
Select [1] By Card Code.
Enter a user number between 00-98
and press
. The first available
user number is displayed as the
default.
Assign between 1 and 8 partitions to
the user by pressing [Y] Yes or [N] No,
as required, and then press
Enter the 8-digit card code of the
access card that you want to assign
to the user and press
.
This message indicates that the
arm/disarm user has been added to
the system successfully.
.
88
CODECODE
##441122
You can add arm/disarm users to the system by passing each
user's access card in a reader. This option is recommended when
you have access cards without numbers printed on them or
when the cards have less than eight digits printed on them.
Access Control User's Manual 27
¾
To add an arm/disarm user by passing a card in a reader:
1)
ACCESS CONTROL:
ACCESS CONTROL:
1) SETTINGS
1) SETTINGS
2)
3)
4)
5)
6)
RECORD USERS
1) ARM CARDS
ARM CARDS 00-98
ARM CARDS 00-98
1) BY CARD CODE
1) BY CARD CODE
GET INSTALLATION
GET INSTALLATION
READER:
READER:
SELECT USER:
SELECT USER:
00 (00-98)
00 (00-98)
USER 00 12345678
USER 00 12345678
PAR: Y.......
PAR: Y.......
From the Access Control menu,
select
[4] Record Users.
Select [1] Arm Cards.
Select [2] Pass Card. The green
reader LED flashes for 12 seconds
while the reader waits for the card. If
you do not pass a card, the reader
emits an error beep.
Select the reader number that you
want to use to pass the card and
press
Enter.
Enter a user number between 00-98
and press
.
Assign between 1 and 8 partitions to
the selected user by pressing [Y] Yes
or
[N] No, as required, and press
.
7)
PASS THE CARD IN
THE DOOR READER
8)
U:00 INSERTION
CONFIRMED
Physically pass the card in the
installed reader and wait for the
confirmation beep.
This message indicates that the
arm/disarm user has been added to
the system successfully.
28 Access Control User's Manual
Adding Enter/Exit Users
66
By Entering Card Codes for a Group
66
To enter card codes for a group of enter/exit users:
88
CODECODE
##4422
You can add up to 999 users that have only enter/exit access
rights to the system in the following ways:
x By Entering Card Codes for a Group, below
x By Entering Card Codes One-by-One, page 30
x By Passing a Card in a Reader, page 31
NOTE:
Enter/exit users can only open doors; not arm/disarm the system.
If you have different categories of users, it is recommended to
assign a different block of numbers to each access group. This
makes it easier to allocate each category to the required time
schedule. For example, you can assign user numbers 100-199 to
Access Group 1, 200-299 to Access Group 2, and so on.
88
CODECODE
You can add a group of enter/exit users by assigning a batch of
cards in ascending order. For example, you can add a group of
100 cards with sequential user numbers by only entering the first
card code, and the system enters the remaining information
automatically.
NOTE:
When entering card codes for a group, if the system detects a problem, the
process will stop automatically.
##44221111
¾
1)
ACCESS CONTROL:
ACCESS CONTROL:
1) SETTINGS
1) SETTINGS
2)
3)
RECORD USERS
1) ARM CARDS
EN. CARDS 100-999
1) BY CARD CODE
From the Access Control menu,
select
[4] Record Users.
Select [2] Entrance Card.
Select [1] By Card Code.
Access Control User's Manual 29
4)
By Entering Card Codes One by One
66
CODE ALLOCATION
1) BY GROUP
5)
FIRST USER NO.
FIRST USER NO.
100 100-999
100 100-999
Select [1] By Group.
Enter a user number between 100999 and press
. The first
available user number is displayed
as the default.
6)
NUMBER OF USERS
IN GROUP:001
7)
FIRST CARD CODE
FIRST CARD CODE
........
........
Enter the number of users that are in
the group that you want to add to
the system and press
.
Enter the 8-digit card code number
of
the access card that you want to
assign
to the first user in the group and
press
. The system automatically
assigns a sequential card code
number to each user in the group.
8)
GROUP INSERTION
CONFIRMED
This message indicates that the
group of enter/exit users has been
added to the system successfully.
88
CODECODE
You can add a group of enter/exit users one at a time, if
required. This option is used when assigning a batch of cards that
are not sequential or when assigning a batch of cards from a
remote keypad that is not located near a reader.
##44221122
If the code on the access card is less than 8 digits, it is
recommended to swipe the card instead of entering zeros for
the remaining digits. Refer to By Passing a Card in a Reader,
page 31.
30 Access Control User's Manual
¾
To enter card codes for a group of enter/exit users one by one:
By Passing a Card in a Reader
66
1)
ACCESS CONTROL:
ACCESS CONTROL:
1) SETTINGS
1) SETTINGS
2)
3)
4)
5)
6)
7)
RECORD USERS
1) ARM CARDS
EN. CARDS 100-999
1) BY CARD CODE
CODE ALLOCATION
1) BY GROUP
SELECT USER:
SELECT USER:
100 100-999
100 100-999
U:100 CARD CODE
U:100 CARD CODE
........
........
U: 100 INSERTION
CONFIRMED
From the Access Control menu,
select
[4] Record Users.
Select [2] Entrance Card.
Select [1] By Card Code.
Select [2] One by One.
Enter a user number between 100999 and press
. The first
available user number is displayed
as the default.
Enter the 8-digit card code of the
access card that you want to assign
to the first user and press
.
This message indicates that the first
enter/exit user has been added to
the system successfully, and then the
Select User option is redisplayed.
8) Repeat steps 5 to 7 to add the remain ing enter/exit
users in the group, as required.
88
CODECODE
##442222
You can add enter/exit users by passing each user's card in a
reader without returning to the keypad. This option is used in the
following circumstances:
xWhen you have access cards without numbers printed on
them.
x When the cards have less than eight digits printed on them.
x When you have a batch of cards without sequential
numbering.
Access Control User's Manual 31
¾
To add an enter/exit user by passing a card in a reader:
1)
ACCESS CONTROL:
ACCESS CONTROL:
1) SETTINGS
1) SETTINGS
2)
3)
4)
RECORD USERS
1) ARM CARDS
EN. CARDS 100-999
1) BY CARD CODE
GET INSTALLATION
READER: 01
From the Access Control menu,
select
[4] Record Users.
Select [2] Entrance Card.
Select [2] Pass Card.
Enter the reader number that you
want
to use to pass the card and press
Enter.
5)
FIRST USER NO.
FIRST USER NO.
100 100-999
100 100-999
Enter a user number between 100999 and press
. The first
available user number is displayed
as the default.
6)
PASS THE CARD IN
THE DOOR READER
7)
U:100 INSERTION
CONFIRMED
NOTE:
If you are performing this procedure on a remote reader, you will not see
the message shown above.
Physically pass the card in the
installed reader and wait for the
confirmation beep.
This message indicates that the
enter/exit user has been added to
the system successfully.
8) Repeat step 6 to record additional cards, as required.
9) In order to stop the recording process, pass a card
You can define settings for users of the system, including
assigning PIN (Personal Identification Number) codes, assigning
users to specific access groups, and deleting users, as described
in the following sections:
x Assigning PIN Codes, below
x Assigning Users to Access Groups, page 34
x DeletingUsers, page 35
88
CODECODE
The PIN code option enables you to assign one PIN code to each
individual user, which is required if your system has readers with
keypads installed. The system automatically assigns a duress
code to each user's PIN code, which is one number after the
user's
PIN code (for example: PIN code = 1234; automatic duress
code = 1235). Therefore, you cannot assign sequential PIN codes
to users in the system. You must use every other number, for
example, 1234, 1236, 1238, and so on.
NOTES:
The PIN CODE must be defined after assigning a card to a user or else it will be
erased.
For users 00-98 it is recommended to use the same PIN code that was used in
your security system.
If you enter a sequential number by mistake, the following message is
displayed: PIN CODE FAILED
##5511
¾
1)
ACCESS CONTROL:
ACCESS CONTROL:
1) SETTINGS
1) SETTINGS
2)
USER SETTINGS
1) PIN CODE
From the Access Control menu,
select
[5] User Settings.
Select [1] PIN Code.
Access Control User's Manual 33
3)
Assigning Users to Access Groups
66
To assign users to access groups:
4)
CHOOSE USER:
CHOOSE USER:
...
...
ENTER PIN CODE:
ENTER PIN CODE:
....
....
5)
PIN CODE
CONFIRMED
Enter the user's number and press
Enter.
Enter the user's PIN code and press
Enter.
This message indicates that the PIN
code has been assigned
successfully.
88
CODECODE
You can assign individual users or groups of users to the
appropriate access groups, which is performed by defining a
user range and then allocating the range to the access group.
Each user that you assign to a group will have access to the
system, depending on the parameters that you selected when
configuring the assigned access group (refer to Configuring Access Groups, page 24).
NOTE:
Each user in the system can be assigned to only one access group.
¾
1)
ACCESS CONTROL:
ACCESS CONTROL:
1) SETTINGS
1) SETTINGS
2)
USER SETTINGS
1) PIN CODE
3)
ENTER USERS:
ENTER USERS:
FROM:... TO:...
FROM:... TO:...
From the Access Control menu,
select
[5] User Settings.
Select [2] Assign Group.
Enter the first and last user numbers
in the range of users that you want
to add to the access group and
press
Enter.
NOTE:
When entering a range of users, the number entered in the From field
must always be lower than or equal to the number entered in the To field.
##5522
4)
ASSIGN TO GROUP:
ASSIGN TO GROUP:
01) GROUP 01
01) GROUP 01
Enter a group number (01-16).
34 Access Control User's Manual
5)
Deleting Users
66
To delete a user from the system:
GROUP ALLOCATION
CONFIRMED
The following message is displayed,
confirming that the group
assignment was successful.
88
CODECODE
##5533
The user delete option enables you to remove individual users or
groups of users from the system. This can be required, for
example, when a user's card has been stolen or when a specific
user no longer works at your premises and therefore no longer
requires access.
¾
1)
ACCESS CONTROL:
ACCESS CONTROL:
1) SETTINGS
1) SETTINGS
2)
USER SETTINGS
1) PIN CODE
3)
ENTER USERS:
ENTER USERS:
FROM:... TO:...
FROM:... TO:...
NOTE:
When entering a range of users, the number entered in the From field
must always be lower than or equal to the number entered in the To field.
4)
***DELETE***
***DELETE***
ARE YOU SURE? N
ARE YOU SURE? N
From the Access Control menu,
select
[5] User Settings.
Select [3] Delete Users.
Enter the first and last user numbers
in the range of users that you want
to delete and press
.
Select [Y] Yes or [N] No in the
confirmation message, as required,
and press
.
5)
USER DELETED
This message indicates that the user
has been deleted successfully.
Access Control User's Manual 35
Opening Doors
66
To open a door:
88
CODECODE
##66
You can use the security system to remotely open any door from
any keypad that has previously been defined in the system.
NOTE:
Only authority levels of the Grand Master or the Manager can perform this
procedure.
¾
1)
ACCESS CONTROL:
ACCESS CONTROL:
1) SETTINGS
1) SETTINGS
2)
SELECT A DOOR:
01) DOOR 01
3)
DOOR 01 IS
OPENED
From the Access Control menu,
select
select [6] Open Door.
Select the appropriate door number
and then press
.
The selected door is opened and this
confirmation message is displayed.
36 Access Control User's Manual
Appendix A: Why Your System Does Not
Arm
If you do not succeed in arming the system, check that all the
following criteria are met:
The partitions you want to arm are in Ready mode.
REMEMBER:
Only the common partitions of the access user, the door partition
definitions, and the security user partition definitions will be armed.
The user is defined as an Arm/Disarm user.
The user is defined to the correct access group.
REMEMBER:
In order to define an access group, you must first define a weekly program
and assign it to a door.
The use of the card/code is in the authorized access time
window.
The correct arm code has been entered. (Ask your Installer
for the default code, if required.)
The correct PIN code has been entered.
The reader is authorized for the arming operation.
Access Control User's Manual 37
Appendix B: Planning and Preparation
Tables
Table 1: Doors
Door
No.
Name
Door
Location
Door
Mode
Door
Partition
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Door Modes: Automatic, Always Open, and Always Closed
he time intervals that you define for the time windows must be in ascending order.
or example, the system will not enable you to enter the start time 17:00 before the
nd time 08:00 for a specific time window.
40 Access Control User's Manual
Table 4: Weekly Programs
Hol
Sat
Fri
Thu
Wed
Tues
Mon
Time Window Allocation
Sun
Program Name
Access Control User's Manual 41
Table 5: Access Groups
No. Group Name Access Doors Weekly Program
1 Marketing
NOTE:
The table above shows an example of how you can set up the information for each
access group with up to 16 access doors. Duplicate this table, as required, for the
additional access groups in your system.
42 Access Control User's Manual
Table 6: User Settings
User
No.
User Name
Card
Code #
PIN # Access Group
Access Control User's Manual 43
Notes
44 Access Control User's Manual
Notes
Access Control User's Manual 45
46 Access Control User's Manual
RISCO Group Limited Warranty
RISCO Group and its subsidiaries and affiliates ("Seller") warrants its products
to be free from defects in materials and workmanship under normal use for
24 months from the date of production. Because Seller does not install or
connect the product and because the product may be used in conjunction
with products not manufactured by the Seller, Seller can no t guarantee the
performance of the security system which uses this product. Sellers obligation
and liability under this warranty is expressly limited to repairing and
replacing, at Sellers option, within a reasonable time after the date of
delivery, any product not meeting the specifications. Seller makes no other
warranty, expressed or implied, and makes no warranty of merchantability
or of fitness for any particular purpose.
In no case shall seller be liable for any consequential or incidental damages
for breach of this or any other warranty, expressed or implied, or upon any
other basis of liability whatsoever.
Sellers obligation under this warranty shall not include any transportati on
charges or costs of installation or any liability for direct, indirect, or
consequential damages or delay.
Seller does not represent that its product may not be compromised or
circumvented; that the product will prevent any persona; injury or property
loss by burglary, robbery, fire or otherwise; or that the product will in all cases
provide adequate warning or protection. Buyer understands that a properly
installed and maintained alarm may only reduce the risk of burglary, robbery
or fire without warning, but is not insurance or a guaranty that such will not
occur or that there will be no personal injury or property loss as a result.
Consequently seller shall have no liability for any personal injury, property
damage or loss based on a claim that the product fails to give warning.
However, if seller is held liable, whether directly or indirectly, for any loss or
damage arising from under this limited warranty or otherwise, regardless of
cause or origin, sellers maximum liability shall not exce ed the purchase price
of the product, which shall be complete and exclusive remedy against
seller.
No employee or representative of Seller is authorized to change this
warranty in any way or grant any other warranty.
WARNING: This product should be tested at least once a week.
Access Control User's Manual 47
Contacting RISCO Group
RISCO Group is committed to customer service and product
support. You can contact us through our website
(www.riscogroup.com) or at the following telephone and fax
numbers: