This manual is delivered subject to the following conditions and
restrictions:
xThis manual contains proprietary information belonging to
RISCO Group. Such information is supplied solely for the
purpose of assisting explicitly and properly authorized users of
the system.
xNo part of its contents may be used for any other purpose,
disclosed to any person or firm or reproduced by any means,
electronic or mechanical, without the express prior written
permission of RISCO Group.
xThe text and graphics are for the purpose of illustration and
reference only. The specifications on which they are based
are subject to change without notice.
xInformation in this document is subject to change without
notice. Corporate and individual names and data used in
examples herein are fictitious unless otherwise noted.
Copyright 2008 RISCO Group. All rights reserved.
2 Access Control User's Manual
Customer Information
RTTE COMPLIANCE STATEMENT
Hereby, RISCO Group, declares that this equipment is in
compliance with the essential requirements and other relevant
provisions of Directive 1999/5/EC.
RADIO FREQUENCY INTERFERENCE (Ref.: FCC Part 15, Para.
15.105)
This equipment has been tested and found to comply with the
limits for a Class B digital device pu rsuant to Part 15 of the FCC
Rules. These limits are designed to provide reasonable protection
against harmful interference in a residential installation. This
equipment generates, uses, and can radiate radio frequency
energy and, if not installed and used in accordance with the
instructions, may cause harmful interference to radio
communications. However, there is no guarantee that
interference will not occur in a particular installation. If this
equipment does cause harmful interference to radio or televi sion
reception, which can be determined by turning the equipment
off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
1) Reorient or relocate the receiving antenna.
2) Increase the separation between the equipment and the
receiver.
3) Connect the equipment into an outlet on a circuit different
from that to which the receiver is connected.
4) Consult the dealer or an experienced Radio/TV technician
for help.
CHANGES OR MODIFICATIONS (Ref.: FCC Part 15, Para. 15.21 and
15.27)
Changes or modifications to this unit not expressly approved by
RISCO Group, could void the user's authority to operate the
equipment.
Table 6: User Settings.....................................................43
6 Access Control User's Manual
Chapter 1: Introducing the Access Control
Module
The Access Control module, which is integrated with your security
system, is designed for use in small- to medium-size companies.
This module is used wherever there is a need to control which
users should have access to the different doors and areas on the
premises. The doors can be equipped with devices such as
readers, door contacts, door relays, and motion detectors.
The Access Control module enables you to define and control
the access level and time definitions of the users in your security
system, as well as determine the functions that each user can
perform.
The Access Control module provides flexibility by enabling you to
connect up to eig h t Ac cess Control mo d u le s to y o ur security
system. In addition, each module supports two readers, enabling
the security system to control up to 16 doors.
This manual explains the Access Control module programming
options using the installed LCD keypad, as well as the data
preparation process. Alternatively, the Access Control modul e
can also be programmed using the Upload/Download
application (refer to the Upload/Download User's Manual for
further details).
Access Control User's Manual 7
Access Control Terms and Definitions
The following is a list of terms and definitions that relate to the
Access Control module:
xArm/Disarm Users: Users assigned access rights that enable
them to arm and disarm the system. There can be up to 99
arm/disarm users in the system. It is recommended to assign
the same PIN code in the Access Control module as the one
assigned to the user in the security system.
xEnter/Exit Users: Users assigned access rights that enable
them to only open and close doors; not arm/disarm the
system. There can be up to 999 enter/exit users in the system.
xTime Scheduling: Defining specific time windows that
determine when users can access the system.
xAccess Group: A group of users that can access the system
only through specific doors during specific time periods. There
can be up to 16 access groups configured in the system.
xCard Code: An 8-digit code on an access card that is
entered into the system in order to assign access rights to a
user.
xPIN Code (Personal Identification Number): A 4-digit code
that is assigned to a user in order to enable a user to access
the system using an installed keypad. The PIN code can be
used instead of a card or in addition to a card.
xRTE (Request to Exit): A push button or automa tic motion
detector that, when activated, opens a specific door by
sending a signal to the door's relay.
xReader: The Access Control module supports four reader
types: Card only, keypad only, card + keypad, and
card/keypad.
xPartition: A subsystem within the security system that can be
controlled as a separate system.
xEvent Log: Each Access Control module supports up to 1,000
events. The events can be printed from a local printer or
uploaded from the Upload/Download application,
according to specified criteria.
8 Access Control User's Manual
Feature-Specific Limitations
Feature ProSYS 16 ProSYS 40 ProSYS 128
The following table contains the feature-specific limitations of the
system, depending on the installed ProSYS model.
NOTE:
The information and examples in this manual are written from the viewpoint of
the ProSYS 128 model. If you have the ProSYS 16 or the ProSYS 40 model
installed, then the feature-specific limitations in the table below are relevant.
Access Control
2 4 8
Modules
Readers 4 8 16
Partitions 4 4 8
Arm/Disarm Users 00-29 00-59 00-98
Enter/Exit Users 100-349 100-999 100-999
Time Windows 15 25 25
Weekly Programs 10 25 25
Access Groups 8 16 16
Total No. of Inputs 8 16 32
Total No. of Relays 6 12 24
Access Control User's Manual 9
Access Control Workflow
The following workflow illustrates the recommended method for
working with the Access Control module:
Plan and Prepare the
Plan and Prepare the
Access Control Da ta
Access Control Da ta
(Chapter 3)
(Chapter 3)
Create a
Create a
Doors Table
Doors Table
Create a
Create a
Readers Table
Readers Table
Create a Time
Create a Time
Windows Table
Windows Table
Create a Weekly
Create a Weekly
Programs Table
Programs Table
Create an Access
Create an Access
Groups Table
Groups Table
Program the Access
Program the Access
Control Module
Control Module
(Chapter 4)
(Chapter 4)
Access the Access
Access the Access
Control Menu
Control Menu
Configure Door
Configure Door
and Reader
and Reader
Settings
Sett ings
Configure Time
Configure Time
Schedules
S che dules
Configure
Configure
Access Groups
Access Groups
Add Users to
Add Users to
the System
the System
Create a User
Create a User
Settings Table
Settings Table
Configure User
Configure User
Settings
Settings
10 Access Control User's Manual
Chapter 2: Using the Access Control
Module
Entering/Exiting Doors
To enter/exit the system:
Arming/Disarming the System
The Access Control module can be used to allow
entering/exiting doors and for arming/disarming the security
system.
Doors that are defined to operate in automatic mode can be
entered/exited by all users with access cards or access codes.
The access card or code must:
x Used only during its assigned time windows.
x Used only with its assigned doors.
In addition, doors can be programmed to have a fixed status
(Always Open or Always Closed) or can be programmed to
open when a motion detector detects movement. In this case,
users can enter/exit normally without using their access card or
code.
¾
xPresent your card or code to the reader, using the required
method (depending on the reader type). The system verifies
the card or code (indicated by a confirmation LED and
beep) and opens the door.
NOTES:
If a wrong code or an unknown card is entered five times, a false code
announcement is sent to the monitoring station.
Users with Entrance Only cards cannot enter a door if all the door
partitions are armed (refer to Adding Enter/Exit Users, page 29).
The system can be armed/disarmed only by users who have
been assigned with arm/disarm rights. To arm/disarm the system,
the following criteria must be met:
Access Control User's Manual 11
xThe reader must be authorized for the arming/disarming
Arming the System
To arm the system:
Disarming the System
operations.
xThe access card/code must be programmed as an
Arm/Disarm user.
xThe access card/code must be used only during its assigned
time windows.
xThe access card/code must be used only with its assigned
doors.
xThe access card/code must be assigned to the partitions that
are assigned to the door and to the user partition definitions
in the security panel.
NOTES:
Users can perform regular arming or instant arming, depending on the arm code. Ask
your Installer for the appropriate code. The system will arm only the partitions that are
common to the door, user security, and the arm user definitions.
Arming the system can be performed only from readers that
have a keypad and have been authorized for the arming
operation.
¾
xIf the reader is defined as a Keypad Only type, enter your
arm code followed by your PIN code:
ARM CODE + [#] + PIN CODE + [#]
-OR-
xIf the reader is defined as a Keypad + Card type (for higher
security), enter your arm code using the keypad, pass your
access card in the reader, and then enter your PIN code
using the keypad:
ARM CODE + [#] + PASS CARD + PIN CODE + [#]
IMPORTANT:
If you do not succeed in arming the system, refer to the checklist in
Appendix A, Why Your System Does Not Arm, page 37.
Disarming the system can be performed from any type of reader
that has been authorized for the disarming operation.
12 Access Control User's Manual
¾
To disarm the system:
Duress Disarming
To perform duress disarming:
xIf the reader is defined as a Keypad Only or Card Only or
Keypad/Card type, enter your PIN code using the keypad
OR pass your access card in the reader, as required:
PIN CODE + [#] or PASS CARD
-OR-
xIf the reader is defined as a Keypad + Card type, pass your
access card in the reader AND then enter your PIN code
using the keypad:
PASS CARD + PIN CODE + [#]
You can also use the Access Control readers (Keypad Only,
Keypad/Card, and Keypad + Card types) for duress disarming.
This type o f disarmin g sends a quiet alarm to the monitoring
station while you disarm the system under coerciveness.
The duress code is automatically the number following the user's
PIN code (for example: PIN code = 1234; duress code = 1235).
Refer to the ProSYS User's Manual for additional details.
¾
xIf the reader is defined as a Keypad Only or a Keypad/Card
type, enter the next sequential number after your PIN code:
[PIN CODE + 1] + [#]
-OR-
xIf the reader is defined as a Keypad + Card type, pass your
access card in the reader and then enter the next sequential
number after your PIN code:
PASS CARD + [PIN CODE + 1] + [#]
Access Control User's Manual 13
Chapter 3: Planning and Preparing the
Access Control Data
To plan and prepare the Access Control data:
Before programming the Access Control module, you must plan
how you want the system to function, such as which hours entry
will be permitted through the main entrance, who should have
access to specific areas of the premises, and so on. As part of
the planning, it is recommended to prepare the data that will be
used during programming in tables, as described in this section.
¾
1) Create a table that includes the following door data for each
door: number, name, location, mode, and partition. The
table should be based on information from your Installer.
(Refer to the table provided in Table 1: Doors, page 38.)
2) Create a table that includes the following reader data for
each reader: number, associated door, name, type, and
arm/disarm capabilities. The table should be based on
information from your Installer. (Refer to the table provided in
Table 2: Readers, page 39.)
3) Create two time schedule tables, as described below.
The purpose of creating time schedules is to give different
users access to doors at different hours. This consists of
identifying the different types of working hours or other time
divisions in the premises and then deciding what time
schedule will be used.
NOTE:
When you program the time schedules, you must program the time
windows first, and then you can program the weekly programs for each
access group.
Create a table that includes the following time window
data: number, program name, and one or two start and
stop times, as required. (Refer to the table provided in
Table 3: Time Windows, page 40.)
14 Access Control User's Manual
Create a table that includes the following weekly
program data: number, program name, and assigned
Time Window numbers for each day of the week and for
a holiday. (Refer to the table provided in Table 4: Weekly Programs, page 41.)
4) Create a table that includes the following access group data
for each group: number, name, allowed doors, and assigned
weekly program. The purpose of creating access groups is to
identify the different departments or sections in the company
and decide which group can enter which department at
what time. (Refer to the table provided in Table 5: Access Groups,
page 42.)
5) Create a table that includes the following user data for each
user: number, name, access card code number, PIN code,
and assigned access group. This table enables you to easily
keep track of your user information. (Refer to the table
provided in Table 6: User Settings, page 43.)
Access Control User's Manual 15
Loading...
+ 33 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.