Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.

Slides:



Advertisements
Similar presentations
SK-NET™ Tutorial SK-NET™ is a Windows® based software program designed to monitor and control a network of up to 100 Secura Key SK-ACP 2-door control panels.
Advertisements

17 May Multiple Sites. 17 May Multiple Sites This presentation assumes you are already familiar with Doors and all its standard commands It.
CUT COSTS & INCREASE EFFICIENCY
List of employee personal information.
HWg-Juno HW group is a manufacturer of IP-based sensors from Prague, Czech republic. HWg delivers remote monitoring & control solutions.
SK-NET™ 4.0 Tutorial SK-NET™ is a Windows® based software program designed to monitor and control a network of Secura Key SK-ACP 2-door control panels.
X-Call Version V3.0 User Guide
In This Day and Age, Physical Access Control Is Not An Option; It Is a Necessity
ZKAccess3.5 Introduction
39 Functions of Our device. Contents: BasicSecurityPersonalityExtension Basic 1 Restore factory settings 2 User ID with 9 digits pin 3 English Input.
Click to edit Master subtitle style Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
Enterprise Software Solution Lab Pvt Ltd
Access Control ( Software ) June 25, 2010 Created by Castaly / Andy Chen.
SAC844 Anviz Online Training Lesson 8
ZKTeco”pull”Access Control Function Introduction
SK-NET™ 5.0 Tutorial SK-NET™ is a Windows® based software program designed to monitor and control a network of Secura Key SK-ACP 2-door control panels.
Linkage Connecting system components. Allows configuring automatic actions Triggering outputs based on specific inputs Used for removing human reliance.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
Training.
SETUP AND CONFIGURATIONS WEBLOGIC SERVER. 1.Weblogic Installation 2.Creating domain through configuration wizard 3.Creating domain using existing template.
Confidential Document 1 EverAccess Product Overview By Julian Garcia.
SF-3000 Installation Manual. 2 Back of SF CON400) USB connector - User can use USB memory stick after connect USB connector of key PCB. CON500)
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
Sharepoint Portal Server Basics. Introduction Sharepoint server belongs to Microsoft family of servers Integrated suite of server capabilities Hosted.
ShelterPoint™ Data-Entry Workflows. ShelterPoint v5.2.3.
G4 Control and Management Solution for Data- Centers and Computer Rooms.
10 February Setup Operators. 10 February Open the Setup Operators Window Open the Setup > Operators window via its pull-down menu option.
Working with Drivers and Printers Lesson 6. Skills Matrix Technology SkillObjective DomainObjective # Understanding Drivers and Devices Install and configure.
Access Control Solution Seamless Video Integration GV Series IP Cam GV Series Access Control Controller GeoFinger Series Single Door 4 Doors Elevator Coming.
Introduction To DSX WinDSX DSS (Dallas Security Systems)
STAY CONNECTED TOLLFREEEXPRESS CONTROL PANEL GUIDE.
SoMac Software All about Access Control & Attendance
Truly Powerful. Flexibility, Scalability, Reliability User Friendly Software  Predefined parameters  Scaled down for easy admin  Personalised reporting.
10 February Doors Software Overview. 10 February This presentation is an overview of the basic fundamentals of the Doors software. –Host computer.
What is Sure BDCs? BDC stands for Batch Data Communication and is also known as Batch Input. It is a technique for mass input of data into SAP by simulating.
1 PAC530 | Output Controller. 2 The Output Controller (PAC530) provides the local connection on an RS-485 network between an Access and Alarm Server (PAC500)
© 2010 MediaMind Technologies Inc. | All rights reserved Trafficking Media Plan, Ad Attachments & URL Assignments.
4 May I/O Control. 4 May What is I/O Control? A Doors feature that allows you to program input events to drive output responses – for example:
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
Administrator – Employee Overview September, 2011.
Microsoft Office Outlook 2013 Microsoft Office Outlook 2013 Courseware # 3252 Lesson 6: Organizing Information.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Ceridian Time Solutions Supervisor. IMPORTANT If you are not the manager of an employee but have been assigned the task of approving time for that employee,
AUTOMATED STUDENT ATTENDANCE SYSTEM
Copyright © 2008 FingerTec Worldwide Limited. All rights reserved
Access Control Products
目录 8 in 1 Sensor ◆ 8 in 1 Sensor Unique Features ● Built in PIR motion sensor and light intensity sensor ● Built in 2 Dry Input Ports ● Built in 32 Logics.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring Windows Server 2008 Printing.
Confidential Document 1 EverAccess Product Overview By Rodney Guinto.
Controlsoft have 25 years experience in the development, manufacture and distribution of Access Control Solutions. With over 10,000 systems in daily use.
Access Control Hardware IXP20TOUCH System Controllers iTRT Door Controller 125kHz Antenna Readers FINGKEY Access Plus I mpro provide a wide.
Authored by Frank Hamelly, Microsoft MVP Regional Chapters.
LINCWorks Mesh Networking User Guide. This user guide will give a brief overview of mesh networking followed by step by step instructions for configuring.
Vehicle Management System Adopted successfully with I.D., wireless Vehicle Management Systems (VMS) for Parking, Residential Societies.
BioSecurity3.0 Web-Based Access Control Software.
COSEC ARC IP based Access Control Panel.
2N® Access Unit Touch Keypad
Developing an Excel Application
IP-AK2 Access Control Solution
Cloud Connect Seamlessly
CUT COSTS & INCREASE EFFICIENCY
Wavestore Integrates…
Wavestore Integrates… Paxton Net2 Access Control
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
【Date: 】
Presentation transcript:

Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.

Ingressus is a serial main controller series produced by FingerTec. When you use Ingressus, any readers be it master or slave that is connected to the door does not make access decision. Ingressus will make all access decisions. For example, when a fingerprint template, card ID or password is captured at the terminals, the information and the data is sent and stored in Ingressus. The result of the verification will be sent back to the terminals to decide on a door activity, either to grant access to the user or not. Besides the validation of user data, the Ingressus also decides access according to the time. You can allow access to a group of users for a specific time range, for example from 8am to 4pm only. Ingressus then will deny access to the user before 8am and after 4pm. Ingressus series offers two type of centralized door access control systems: Ingressus I supports up to 2 door locks for one door installation, and Ingressus II supports up to 4 door locks for two doors installation.

3 types of surge protection – Provides 3 types of extra protection i.e. Over Current Protection, Over Voltage Protection and Reversal Protection; extending lifespan of your terminals. Connect with all security devices – Link all security devices under one management, such as CCTV and fire alarms for a total security solution. Readily available IO Ports – Provides readily available ports for alarms, sensors, exit buttons, and other security accessories. Anti Passback Supports various Wiegand and Card terminal formats Data Communication via IP or RS485 – Ingressus offers easy data communication using the most commonly used protocols which are TCP/IP and RS485. Real-Time Door Access Monitoring – With the real-time door status monitoring, door opening and door closing activities can be supervised at all times. SDK for integration with 3rd party software – Integrate Ingressus into your existing access control software or develop your own customized software with our SDK, free of charge. Bundled with Ingress – Powerful door access software. There are also 5 extra features of Ingressus which will be explained in details in the following slides. Fire AlarmInterlockingFirst Card UnlockMulti Card Open

When a user enters a zone and another user follows closely behind him without having to verify his or her identity, the occurrence is known as tailgating. Anti passback is a feature that curbs tailgating problem by tracking the location of a particular user whether he is inside or outside a secured area. You need to create a zone and add Ingressus to the zone before configuring the Anti passback settings. Click Zone (Ingressus Only) > Click Add Zone > Name the Zone (for example, Upper Floor) Zone can also be added by right clicking at Anti Passback at the left panel.

Click Add Device > Select Ingressus from the list > Rename the Ingressus > Click Edit to select the type of anti passback preferred. Antipassback between readers of Door 1 – If a user did not punch out at Door 1, he will be denied access when he wants to enter Door 1 the next time. However, he has free access at Door 2. Antipassback between readers of Door 2 – If a user did not punch out at Door 2, he will be denied access when he wants to enter Door 2 the next time. However, he has free access at Door 1. Antipassback between readers of Door 1 and between readers of Doors 2 respectively – User needs to punch in and out at any door that he uses. Failure to do so will deny entry or exit at any of the door Antipassback between Door 1 and Door 2 – User must punch out from either 1 door first before being able to gain access at another door. Failure to do so will deny entry or exit at any of the door Sync settings to reflect changes into Ingressus.

Fire alarm settings is a feature in Ingressus to alert users in case of fire. To use this feature, you need to install Aux input component such as smoke/heat detector first. Proceed to configure the setting in Ingress for the doors to unlock immediately once the component has been installed. You must create a zone and add Ingressus to the zone prior before configuring the Fire Alarm settings. Click Zone (Ingressus Only) > Click Add Zone > Name the Zone (for example, All Doors) Zone can also be added by right clicking at Fire Alarm at the left panel.

Click Add Device > Select Ingressus from the list > Rename the Ingressus > Click Edit to configure Fire Alarm Settings. Trigger Condition: Define the actions to trigger fire alarm in Ingressus. Select from the drop down list. You can either use sensors (connected to Aux ports at Ingressus) or key command from slave terminals i.e.: password verification or duress fingerprint verification. Input Point Address: Define types of input to Ingressus to trigger the fire alarm. Select Any if you are using slave terminal or Auxiliary input Port 1 and 2 as input. Output Point Address: Define the actions from Ingressus, either Lock or Auxiliary Output. Tick the Lock 1 and 2 checkbox if you want to control the doors during fire alarm. Select Auxuliary 1 and 2 if you are connecting any sensors to Aux ports. Action Type: Define Close, Open or Normal Open to doors from Ingressus. Close – This is the default action type. When close is selected, this feature will be deactivated. Open – Once this action is selected, you can set the duration for the door to stay open or for the auxiliary device to stay on. For example, if 20s is entered at delay section,doors will stay open for 20 seconds and auxiliary device will goes on for 20 seconds before shutting down automatically. Normally Open – Doors and auxiliary device will stay on until device is rebooted via Ingressus (devices > Others tab > Reboot device) to set the settings back to default.

Sync settings to reflect changes in Ingressus.

Interlocking is also refer to as mantrap, whereby, Ingressus must detect either door closes tightly before it allows user to unlock another door. Door sensors must be installed at each door for monitoring purposes. This setting is only available with Ingressus II. You must create a zone and add Ingressus to the zone prior before configuring the Interlocking settings. Click Zone (Ingressus Only) > Click Add Zone > Name the Zone (for example, server Room) Zone can also be added by right clicking at Interlocking at the left panel.

Click Add Device > Select Ingressus from the list > Rename the Ingressus > Click Edit to configure Interlocking Settings. There is only 1 setting for this feature. Tick the checkbox for Interlocking between Door 1 and Door 2 to activate the feature. Sync settings to reflect changes in Ingressus.

It is recommended to set first card unlock for restricted area. You can set who is the 1st person that must verify at the door before the rest of the employee can gain entry. This is to ensure that the person in charge is present to monitor activities at the restricted area. Click Zone (Ingressus Only) > Click Add Zone > Name the Zone (for example, R&D Office) Zone can also be added by right clicking at First Card Unlock at the left panel.

Click Add Device > Select Ingressus from the list > Rename the Ingressus > Click Edit to configure First Card Unlock. Sync settings to reflect changes in Ingressus. Select the Time Set that are allowed to access from the drop down list > Click Add Personnel to define the user which will be the First Card Unlock person. Click Add Door to define which Ingressus are to follow this rule.

User Group can also be added by right clicking at Multi-Card Open at the left panel. This feature serves as security purposes when unlocking door. You must have at least 2 users to verify at the same time at a door in order to gain access. You can set up to 5 maximum users to unlock a door. Click Zone (Ingressus Only) > Click Add User Group > Name the Group (for example, R&D Group)

Click Edit at the right panel > Select which users to be added into the group > Click Save to save the settings. Click on Multi Card Combination Group from the left panel > Click Add Combination group from the ribbon on top > Rename the Combination Group (for example, Restricted Area – Level 1).

Click Edit to configure Multi Card Combination Group > Click at the drop down list of ‘No. of User Select’ to select how many users is needed to verify before the door can be unlocked. Click Add Door to select the Ingressus that will follow this rule > Click Save to save settings.

Zone/device/user group/multi card combination group can also be deleted by right clicking at the specific item. In any case that any of the above is invalid or has been wrongly added into the list, you may delete it from the list following the steps below. Select Zone/device/user group/multi card combination group from left panel > Click the corresponding delete button > Select yes to confirm.