0% found this document useful (0 votes)
64 views337 pages

Manual Del Sistema de Seguridad 0

Manual bilateral del acceso sur

Uploaded by

paul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views337 pages

Manual Del Sistema de Seguridad 0

Manual bilateral del acceso sur

Uploaded by

paul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 337

Solar Start

Security System Manual


Document code
16.02 Security System Manual

Revision Date Comments


C 29-10-2021 First issue of document
0 08-11-2021 First issue of document

Table of Contents
SecurOS NVR User Guide .................................................................... 2
AXIS A4120-E Reader with Keypad ................................................ 180
AXIS A82 Network Video Door Station Series ................................ 187
AXIS A1001 & AXIS Entry Manager .............................................. 215
CONTROL PANEL Integra Manual................................................ 287

1/1
METKA EGN Headquarters
99 White Lion Street, Islington, London, N1 9PF, United Kingdom
T: +44 20 80013341 E: [email protected]
www.metka-egn.com
Version 10

Quick User Guide


SecurOS Quick User Guide (QUG - EN, build 75 on 22.07.2021).

© Copyright Intelligent Security Systems, 2021.

Printed in US.

Intelligent Security Systems reserves the right to make changes to both this Manual and to the products it describes. System
specifications are subject to change without notice. Nothing contained within this Manual is intended as any offer, warranty, promise
or contractual condition, and must not be taken as such.

No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system or translated into any human or
computer language in any form by any means without the express written permission of the copyright holder. Unauthorized copying
of this publication may not only infringe copyright but also reduce the ability of Intelligent Security Systems to provide accurate and
up-to-date information to both users and operators.
SecurOS 3 Quick User Guide
Contents

Contents
1 Preface 7
1.1 Scope
........................................................................... 7
1.2 Target
. . . Audience
........................................................................ 7
1.3 Using
. . .This
. . . .Manual
.................................................................... 7
1.4 Getting
. . . .Technical
. . . . . . . . .Support
.............................................................. 7
1.5 SecurOS
. . . . . Editions
. . . . . . . .Naming
. . . . . . .Convention
....................................................... 8
1.6 Design
. . . .Convention
....................................................................... 9
1.7 Design
. . . . .Elements
...................................................................... 10

2 Launching SecurOS and Logging on System 11

3 User Interface 14
3.1 Changing
. . . . . . .User
. . . . .and
. . . Logging
. . . . . . . .Off
.................................................... 15

4 Control Panel 17
4.1 Control
. . . . .Panel
. . . . . Activation
................................................................. 17
4.2 Configuring
. . . . . . . . .Control
. . . . . . .Panel
........................................................... 18
4.3 Desktop
. . . . . .Administration
..................................................................... 20
4.4 Executing
. . . . . . . Macros
.................................................................... 20
4.5 Changing
. . . . . . .Operator
. . . . . . . . Workspace
............................................................ 20
4.6 Getting
. . . . .Help
...................................................................... 21
4.7 Hide
. . .Control
. . . . . . .Panel
................................................................. 22

5 Media Client - Application to Work with Video and Audio 23


5.1 Working
. . . . . .Modes
. . . . . . of
. . Media
. . . . . .Client
....................................................... 24
5.2 Basic
. . . .Techniques
. . . . . . . . . .and
. . . .Operations
. . . . . . . . . .with
. . . .Objects
........................................... 24
5.3 Searching
. . . . . . . and
. . . .Activating
. . . . . . . . . Object
....................................................... 25
5.4 Start/Stop
. . . . . . . Video
. . . . . .Recording
.............................................................. 26
5.5 Arming/Disarming
. . . . . . . . . . . . . . Cameras
............................................................. 27
5.6 Other
. . . .Operations
. . . . . . . . . .with
. . . .Camera
......................................................... 28
5.6.1 Switching
. . . .Camera
. . . . . . .Cell
. . . .to. .Full-Screen
. . . . . . . . . .Mode
.......................................................... 28
5.6.2 Adjusting
. . . .Image
. . . . .Options
............................................................................ 28
5.6.3 Digital.Zoom
.................................................................................... 30
5.6.4 Exporting
. . . .Video
. . . . .Frame
. . . . . .in. .Standard
. . . . . . . .Format
............................................................ 31
5.6.5 Printing
. . Frame
................................................................................... 32
5.6.6 Working. . .with
. . . .Panoramic
. . . . . . . . . Camera
..................................................................... 33
5.6.7 Sending. . Emergency
. . . . . . . . . . Ticket
. . . . . .to. .the
. . . Emergency
. . . . . . . . . . Service
. . . . . . .with
. . . .the
. . .Help
. . . . of
. . .Media
. . . . .Client
.......................... 34
5.6.8 Operations
. . . . .with
. . . .Bookmarks
............................................................................ 36
5.6.8.1 Setting Bookmarks .......................................................................... 36
5.6.8.2 Setting Bookmarks . . . . for
. . .a. Time
. . . . .Interval
............................................................. 37
5.7 Working
. . . . . .in
. .Live
. . . . Video
. . . . . .Buffering
. . . . . . . .Mode
................................................. 37
5.8 Working
. . . . . .with
. . . .Archive
................................................................. 38
5.8.1 Switching
. . . .to
. .Archive
. . . . . . .Mode
........................................................................ 38
5.8.2 Searching
. . . .Records
. . . . . . . .in. .Archive
....................................................................... 39

www.issivs.com
SecurOS 4 Quick User Guide
Contents

5.8.3 Navigating
. . . . .Through
. . . . . . .Archive
......................................................................... 41
5.8.4 Playing. .Back
. . . . Records
............................................................................... 42
5.8.5 Fast Playback
. . . . . . . of
. . Last
....N . . Minutes
...................................................................... 43
5.8.6 Working. . .with
. . . .Group
. . . . . Archive
......................................................................... 44
5.8.7 Archive. .Export
................................................................................... 46
5.8.7.1 Record Saving. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
5.8.7.2 Group Archive .Export ......................................................................... 51
5.8.7.3 Digital Signature .......................................................................... 54
5.8.8 Searching
. . . .Alarms
. . . . . . and
. . . .Bookmarks,
. . . . . . . . . . .Smart
. . . . .Search
....................................................... 58
5.8.8.1 Searching Alarms . . . and
. . . .Bookmarks
................................................................... 59
5.8.8.2 Smart Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
5.8.9 Forensic
. . .Search
.................................................................................. 64
5.9 Working
. . . . . .with
. . . .Long-Term
. . . . . . . . . .Archive
....................................................... 67
5.10 Working
. . . . . . .with
. . . .Audio
................................................................ 68
5.10.1 Working
. . . .with
. . . .Live
. . . .Audio
......................................................................... 69
5.10.2 Start/Stop
. . . . .Audio
. . . . . Recording
........................................................................... 69
5.10.3 Working
. . . .with
. . . .Audio
. . . . .Records
........................................................................ 69
5.10.4 Working
. . . .with
. . . .a.Camera's
. . . . . . . . Speaker
.................................................................... 70
5.11 Controlling
. . . . . . . . . PTZ
. . . . Cameras
.............................................................. 71
5.11.1 Mouse. .Controls
................................................................................... 71
5.11.2 PTZ Control
. . . . . . .Panel
.............................................................................. 73
5.11.3 Joystick
. . . Control
.................................................................................. 74
5.11.4 Working
. . . .with
. . . .Presets
. . . . . . and
. . . .Tours
................................................................... 75
5.11.5 Shared
. . and
. . . .Exclusive
. . . . . . . . .PTZ
. . . .Control
.................................................................. 85
5.11.5.1 PTZ Control Request .......................................................................... 87
5.12 Working
. . . . . . .with
. . . .Other
. . . . . Camera
. . . . . . . .Devices
................................................... 88
5.12.1 Start/Stop
. . . . .Wiper
................................................................................ 89
5.12.2 Start/Stop
. . . . .Washing
................................................................................ 89
5.12.3 Turning
. . .Light
. . . . .On/Off
............................................................................. 90
5.13 Customizing
. . . . . . . . . . .Media
. . . . . Client
. . . . . .Appearance
..................................................... 91
5.13.1 Selecting
. . . . Layout
................................................................................. 91
5.13.2 Placing
. . .Cameras
. . . . . . . .on
. . Page
........................................................................ 91
5.13.3 Customizing
. . . . . . .Additional
. . . . . . . . .Panels
..................................................................... 93
5.14 Using
. . . . .Views
...................................................................... 94
5.14.1 Choosing
. . . . .View
. . . . in
. . Media
. . . . . .Client
.................................................................... 95
5.14.2 Temporarily
. . . . . . Changing
. . . . . . . . .View
...................................................................... 96
5.14.3 Setting
. . Up
. . . Views
. . . . . .Quick
. . . . . Access
. . . . . . .Panel
.............................................................. 97
5.14.4 Sequential
. . . . . Switching
. . . . . . . . . of
. . Views
..................................................................... 97
5.15 Object
. . . . . Controls
...................................................................... 98
5.15.1 Camera. . .Cell
. . . .Controls
.............................................................................. 98
5.15.2 Microphone
. . . . . . . .Cell
. . . Controls
.......................................................................... 102
5.16 Object
. . . . . . State
. . . . . Indicators
................................................................ 103
5.16.1 Camera
. . . .State
. . . . .Indicators
............................................................................ 103
5.16.2 Microphone
. . . . . . . .State
. . . . Indicators
......................................................................... 104

6 Map Window - Application for Working with the Graphic Scheme


of the Object 105
6.1 Switching
. . . . . . . . Map
. . . . Levels
............................................................... 106
6.2 Searching
. . . . . . . . Objects
. . . . . . . .on
. . Map
......................................................... 106
6.3 Displaying
. . . . . . . . .Objects
. . . . . . .on
. . .Map
........................................................ 108
6.3.1 Object
. .Icons
................................................................................... 109
6.4 Scaling
. . . . . .and
. . . .Moving
. . . . . . .Map
.......................................................... 113
6.5 Moving
. . . . . .Camera
. . . . . . . from
. . . . .Map
. . . .Window
. . . . . . . to
. . .Media
. . . . . Client
. . . . . .Cell
................................ 114

www.issivs.com
SecurOS 5 Quick User Guide
Contents

6.6 Jump
. . . . .to. .Viewing
. . . . . . .Video
. . . . . .in. .the
. . .Media
. . . . . Client
............................................. 115
6.7 Start/Stop
. . . . . . . . Video
. . . . . .Recording,
. . . . . . . . . .Arm/Disarm
. . . . . . . . . . Cameras
......................................... 115
6.8 Controlling
. . . . . . . . . Sensor
. . . . . . .and
. . . .Relay
. . . . .Objects
.................................................. 116

7 Event Viewer - Application for Viewing Information about System


Events 117
7.1 Acknowledgment
. . . . . . . . . . . . . . .of. .Alarm
.......................................................... 119
7.2 Events
. . . . . .Filtering
..................................................................... 119
7.3 Searching
. . . . . . . . Events
................................................................... 119
7.4 Viewing
. . . . . . .Event
. . . . .in
. .the
. . . Media
. . . . . .Client
.................................................... 120
7.5 Sending
. . . . . . .Emergency
. . . . . . . . . .Ticket
. . . . . .to
. .the
. . . Emergency
. . . . . . . . . . Service
. . . . . . . with
. . . . the
. . . .Help
. . . .of
. . Event
. . . . . .Viewer
.......... 121
7.6 Customizing
. . . . . . . . . . .Filters
................................................................ 123
7.7 Customizing
. . . . . . . . . . .Operator
. . . . . . . .GUI
........................................................ 126

8 Subsystem for Working with SIP Devices 128


8.1 SIP:
. . . GUI
. . . .-.Application
. . . . . . . . . . for
. . . Working
. . . . . . . .with
. . . .SIP
. . . .Devices
...................................... 128
8.1.1 General
. . .Description
.................................................................................. 129
8.1.2 Changing
. . . . .Operator
. . . . . . . .State
........................................................................ 132
8.1.3 Searching
. . . . .SIP
. . . Device
. . . . . . .in. .the
. . .List
................................................................. 132
8.1.4 Calling
. . SIP
. . . .Device
............................................................................... 133
8.1.5 Receiving
. . . . .Call
. . . .from
. . . .SIP
. . . Device
..................................................................... 134
8.1.6 Jump. to. . Viewing
. . . . . . . .Video
. . . . .in
. .the
. . .Media
. . . . . .Client
.......................................................... 135
8.2 Calling
. . . . . .SIP
. . .Device
. . . . . . from
. . . . .Media
. . . . . .Client
................................................. 136
8.3 Working
. . . . . . .with
. . . .SIP
. . . Devices
. . . . . . . .from
. . . . Map
. . . . Window
............................................. 136

9 Using CCTV Keyboards and Joysticks 139


9.1 AXIS
. . . .T8310
....................................................................... 139
9.1.1 Working
. . . .with
. . . .AXIS
. . . . T8312
. . . . . .Keypad
................................................................... 140
9.1.2 Working
. . . .with
. . . .AXIS
. . . . T8311
. . . . . .Joystick
................................................................... 142
9.1.3 Working
. . . .with
. . . .AXIS
. . . . T8313
. . . . . .Jogdial
................................................................... 143
9.2 Bosch
. . . . . Intuikey
...................................................................... 144
9.2.1 Selecting
. . . . Active
. . . . . .Camera
........................................................................... 147
9.2.2 PTZ Control
. . . . . . .of. .Active
. . . . . Camera
....................................................................... 148
9.2.3 Arming/Disarming
. . . . . . . . . . . .Cameras
......................................................................... 149
9.2.4 Recording
. . . . . Control
................................................................................ 149
9.2.5 Other. Operations
.................................................................................... 149
9.3 Bosch
. . . . . KBD-Universal
. . . . . . . . . . . . . XF
......................................................... 150
9.3.1 Selecting
. . . . Active
. . . . . .Camera
........................................................................... 151
9.3.2 PTZ Control
. . . . . . .of. .Active
. . . . . Camera
....................................................................... 153
9.3.3 Recording
. . . . . Control
. . . . . . .and
. . . .Working
. . . . . . . with
. . . . Archive
.......................................................... 154
9.3.4 Other. Operations
. . . . . . . . . .with
. . . .Camera
...................................................................... 155
9.4 Hanwha
. . . . . . .SPC-7000
.................................................................... 156
9.4.1 Selecting
. . . . Active
. . . . . .Camera
........................................................................... 157
9.4.2 PTZ Control
. . . . . . .of. .Active
. . . . . Camera
....................................................................... 159
9.4.3 Recording
. . . . . Control
. . . . . . .and
. . . .Working
. . . . . . . with
. . . . Archive
.......................................................... 160
9.4.4 Other. Operations
.................................................................................... 161
9.5 Hikvision
. . . . . . . .DS-1100KI
................................................................... 161
9.5.1 Selecting
. . . . Active
. . . . . .Camera
........................................................................... 163
9.5.2 PTZ Control
. . . . . . .of. .Active
. . . . . Camera
....................................................................... 165
9.6 Panasonic
. . . . . . . . .WV-CU950
.................................................................. 166
9.6.1 Selecting
. . . . Active
. . . . . .Camera
........................................................................... 168

www.issivs.com
SecurOS 6 Quick User Guide
Contents

9.6.2 PTZ Control


. . . . . . .of. .Active
. . . . . Camera
....................................................................... 171
9.6.3 Arming/Disarming
. . . . . . . . . . . .Cameras
......................................................................... 172
9.6.4 Recording
. . . . . Control
. . . . . . .and
. . . .Working
. . . . . . . With
. . . . .Archive
......................................................... 172
9.6.5 Other. Operations
.................................................................................... 173

10 Keyboard Shortcuts 175


10.1 Event
. . . . . .Protocol
. . . . . . . Window
.............................................................. 175
10.2 Media
. . . . . .Client
. . . . . Window
................................................................ 176
10.3 Map
. . . . Window
....................................................................... 177

www.issivs.com
SecurOS 7 Quick User Guide
Preface

1 Preface
This section contains general information about the document, the means of its design and use, as well
as how to get additional technical support for the product.

1.1 Scope
This document describes SecurOS's basic features of the user interface on an Operator Workstation, as
well as procedures to perform common security tasks. It contains illustrated examples of working with
the system.

It is assumed that the user has already deployed the security network physically and installed the
SecurOS software on all servers of this network.

1.2 Target Audience


This guide has been designed particularly for SecurOS operators. It is assumed that the user has basic
knowledge of using a mouse and keyboard.

This manual is recommended to be read after a simple configuration of SecurOS, to get acquainted with
the product's basic functionalities.

1.3 Using This Manual


This document is organized in such a way that the user can use both its printed and electronic versions.
In the latter case one can use Adobe Reader's Bookmarks feature as well as cross-reference hyperlinks
to navigate through content.

1.4 Getting Technical Support

If you have any questions after reading this manual, please address them to your system administrator
or supervisor.

For any further information you can contact the Intelligent Security Systems Technical Support Team:

Note. To get a quick response to a request use the Technical Support Portal, which www address is listed
below.

in USA:
phone: +1 732 855 1111 (Monday to Friday, 8:30am - 6pm EST);
e-mail: [email protected]
www: https:/ / support.issivs.com

www.issivs.com
SecurOS 8 Quick User Guide
Preface

in Russia:
phone: +7 (495) 645 21 21 (Monday to Thursday, 9am - 6pm MST; Friday 9am - 5pm MST);
www: https:/ / help.iss.ru

Note. See the https:/ / help.iss.ru/ user/ manual for the Portal User Guide.

in Brazil:
phone: +55 11 2262 2894 (Monday to Friday, 9am - 6pm BRT);
e-mail: [email protected]
www: https:/ / support.issivs.com
in Mexico:
phone: +52 1 551330 0181 (Monday to Friday, 9am - 6pm CDT);
e-mail: [email protected]
www: https:/ / support.issivs.com
in Colombia/ Ecuador:
phone: +57 300 442 2808 (Monday to Friday, 9am - 6pm COT/ECT);
e-mail: [email protected]
www: https:/ / support.issivs.com
in Chile:
phone: +56 9 6573 2993 (Monday to Friday, 9am - 6pm CLT);
e-mail: [email protected]
www: https:/ / support.issivs.com
in Ukraine:
phone: +380 (44) 299 08 10 (Monday to Friday, 9am - 6pm EET);
e-mail: [email protected]
www: https:/ / support.issivs.com
in Peru/ Bolivia:
phone: +51 997 111 678 (Monday to Friday, 9am - 6pm PET/BOT);
e-mail: [email protected]
www: https:/ / support.issivs.com
in Argentina:
phone: +54 91152528779 (Monday to Friday, 9am - 6pm ART);
e-mail: [email protected]
www: https:/ / support.issivs.com

1.5 SecurOS Editions Naming Convention


This document represents a common manual for several editions of the "SecurOS integrated video
management platform" that differ in functional capabilities:

www.issivs.com
SecurOS 9 Quick User Guide
Preface

Edition Supported OS

SecurOS Monitoring & Control Center


Windows
SecurOS Datacenter

SecurOS Enterprise Windows/Linux

SecurOS Premium

SecurOS Prof essional


Windows
SecurOS Xpress

SecurOS Lite

For product designation regardless of its edition the SecurOS general term is used in the framework of
the given document.

Sections that describe the functionality available for some editions are marked by a special footnote as
in the example below:

For Windows OS the functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium, SecurOS Prof essional, SecurOS Xpress, SecurOS Lite.

For Linux OS the functionality is available in SecurOS Enterprise edition.

Sections that describe the functionalities not available or partially available for Linux OS are marked
with the following footnote:

On Linux platform (available only for SecurOS Enterprise edition) the functionality is not supported / limited.

1.6 Design Convention


For representation of various terms and titles the following fonts and formatting tools are used in this
document.

Font Description

Used in writing workstation names, utilities or screens, windows


bold type and dialog boxes as well as the names of their elements (GUI
elements).

italic type Used to mark out the SecurOS objects.

bold italic type Used to mark out the elements of homogeneous lists.

Used to mark out macro text and programming code, file names and
monospace their paths. Also it is used to specify the necessary options, to mark
out values specified by the user from the keyboard (manually).

Used to mark out the cross-references within the document and


green
links to the external available ones.

www.issivs.com
SecurOS 10 Quick User Guide
Preface

1.7 Design Elements


Warning! Serves to alert the user to information which is necessary for the correct perception of the text set
out below. Typically, this information has a warning character.

Note. Note text in topic body.

Additional Information
Used to display additional information. These type of elements contain, for example, the description of options for
executing a task or reference to additional literature.

www.issivs.com
SecurOS 11 Quick User Guide
Launching SecurOS and Logging on System

2 Launching SecurOS and Logging on


System
SecurOS software consists of two components — Server part (further will be referred as Server) and
Client application (further as Client). To work with SecurOS operator uses Client.

Additional Information
Server receives and processes video, allows to connect different security devices and intelligent program Modules.
This component starts automatically on each Video Server after software installation is finished. When Server is
started, SecurOS user cannot stop it with the help of available SecurOS administrative tools.

Client is installed, as a rule, on separate Computer which role is Operator Workstation, but can be also started on any
Video Server within SecurOS network. Using Client one can work with SecurOS objects — Cameras, Maps etc. with the
help of SecurOS interface objects (Media Client, Map Window etc.). Using Client one can also administrate the system,
if user has required rights.

To start Client one can use Start menu (Programs SecurOS SecurOS, see Figure 1).

Figure 1. Start menu (Programs)

Additional Information
Client can also be launched with the help of Server Control Agent utility (see SecurOS Administration Guide),
by means of SecurOS shortcuts in the Start menu, on the Windows Desktop or in the Windows taskbar.

www.issivs.com
SecurOS 12 Quick User Guide
Launching SecurOS and Logging on System

Start and logging on procedure differs a little depending on role of the Computer, where Client is
installed. Details are described in the following section below:
Local Start on Video Server.
Remote Start on Operator Workstation.

Local Start on Video Server


To start the Client at the Video Server:
1. In the Authorization window select the corresponding option:
Auto login — if selected the pre-configured user account will be used automatically.

Warning! The ability to log in automatically must be configured by the system administrator.

Specified user — fill the User and the Password fields manually.
2. Click the Login button (see figure 2).

Figure 2. Authorization window. Local connection

Remote Start on Operator Workstation


If the Client is being started on a remote Computer with the Operator Workstation role, then the IP
address or domain name of the Video Server you want to connect to must be additionally specified in
the Connect to field (see Figure 3).

www.issivs.com
SecurOS 13 Quick User Guide
Launching SecurOS and Logging on System

Figure 3. Authorization window. Remote connection

To get the Video Server's IP address contact the system administrator. If Automatically value is selected
from the list, then Client will try to connect to that Video Server, the last connection with which was
successful.

Additional Information
1. To get a User/Password of the personal account, contact the system administrator.
2. The option to log in automatically can be configured by the system administrator.

Note. If login attempts with the wrong login information are performed, the Authorization Error window
will be displayed. If the incorrect data is entered 3 times in a row, the system will enter a 30-second waiting
mode, then the next login attempt will be given.

www.issivs.com
SecurOS 14 Quick User Guide
User Interface

3 User Interface
After logging on system, the SecurOS Desktop is displayed on the operator's monitor. Like OS Desktop,
on this SecurOS Desktop several applications to work with SecurOS are located. With their help the
operator has the ability to work with video received from the camera, to control PTZ cameras, to work
with the video recordings, etc.

The system can have several independent Desktops, on which various applications are located.
Applications that belong only one Desktop can be used simultaneously. Number of Desktops and
applications, located on these desktops, are determined by the system administrator.

Example. For example, the administrator has set two operator Desktops. The first Desktop includes only one
application — Media Client (see Figure 4), the second Desktop consists of the Media Client and Map Window
applications (see Figure 5).

Figure 4. Desktop 1

www.issivs.com
SecurOS 15 Quick User Guide
User Interface

Figure 5. Desktop 2

Operator can work with the following main SecurOS applications:

Control Panel — application to manage Desktops, change SecurOS user and perform some other
operations.
Media Client — main application to work with video and audio. It allows you to monitor what is
happening in the protected area in real time, to make a records and work with these saved records.
Map Window — application, that represents a user interface to display the graphic plan of the
protected area with security devices placed on it. Any of these security devices can be controlled
with the help of the Map Window in the same way, as with the help of the Media Client.
Event Viewer — application, that allows to monitor the occurrence of special events within the
system. Usually, such event require quick actions of the operator.

Each of the applications is described in detail in the corresponding section, which can be accessed by
reference.

3.1 Changing User and Logging Off


The SecurOS Control Panel is used to change the user and close Client application (see Control Panel for
details).

Note. Logging off from one user is done to give control to another user. When the new user logs in, Client
starts with the settings defined by the new user's User Rights Policy. Change user or shutdown does not stop
the Server.

To change the user or close Client application do the following:


1. Call the SecurOS Control Panel by pressing the Ctrl key and holding it, then move the mouse pointer
to the top edge of the display.

2. Click on the Change user/Shutdown system button ( , see figure 6).

www.issivs.com
SecurOS 16 Quick User Guide
User Interface

Figure 6. Change user/ Shutdown system menu options

3. From the drop-down list select the command:


Log of f user — the system will close the session of the current user and will display the
Authorization window. A new user can log into the system with new user name and password
values.
Shutdown — the system will close the session of the current user, and will stop and unload Client
on this Computer.

Additional Information
Log off and system shutdown operations can also be done by the commands of the SecurOS icon in the notification
field of the Windows task bar (system tray). One can log off system in Authorization window by clicking on
Shutdown button (see Launching SecurOS and Logging on System).

Warning! In all these cases the command/button Shutdown may be unavailable for the User depending on
the user rights, configured by the system administrator.

www.issivs.com
SecurOS 17 Quick User Guide
Control Panel

4 Control Panel
The Control Panel is designed to do the following:
Desktop Administration;
Executing Macro;
Changing Operator Workspace;
Getting Help;
Hide Control Panel;
Choosing Signature Certificate;
Changing User and Logging Off.

Its appearance is shown in Figure 7.

Figure 7. SecurOS Control Panel

Only active Desktops and Macros are displayed on the Control Panel. The number of displayed Desktops
and Macros is defined by the system settings and changes dynamically. If the max value is exceeded, all
additional objects are hidden and can be activated from the appropriate menu:

— for the Desktops;

— for the Macros.

4.1 Control Panel Activation


By default, after logging on the system, the Control Panel is displayed on the OS desktop. If there are
several physical monitors connected to the operator's computer, panel is displayed on the first of them.

When working with system, the panel can be completely or partially hidden (see Figure 8) depending
on its settings (see Setting Up Control Panel).

www.issivs.com
SecurOS 18 Quick User Guide
Control Panel

Figure 8. Partially hidden Control Panel

If Control Panel is not displayed on the desktop, press the Ctrl key, then move mouse pointer so it
touches the top of the screen. If panel is displayed partially, click on the button.

Additional Information
The Control Panel can also be activated by clicking on the application icon in the Windows taskbar (system tray), or
by means of the Show the Control Panel command from the application icon context menu.

4.2 Configuring Control Panel


SecurOS Control Panel can work in two modes of displaying and hiding — Automatic and Manual. Setup
procedure allows to set such operation mode that is more convenient for the current user.

To setup Control Panel operation mode do the following:


1. If the Control Panel is not displayed on the Desktop, see the Control Panel Activation section.

2. Click on the (Change user/ Shutdown system) button and select the Configure Control
Panel command from the drop-down list (see Figure 9).

Figure 9. Control Panel settings window activation

3. In the Control Panel settings window (see Figure 10) do the following:

www.issivs.com
SecurOS 19 Quick User Guide
Control Panel

Figure 10. SecurOS Control Panel Settings window

Specify operation mode:


Minimize panel automatically — after the Control Panel is activated (see the Control Panel
Activation section) it will be displayed permanently until the mouse pointer is placed over it.
Otherwise the Panel will be minimized in a second. To display panel with the help of CTRL key
tick the Additionally hold Ctrl to show panel checkbox.
Minimize panel manually — after the Panel is activated (see the Control Panel Activation
section) it will be displayed permanently. To minimize panel in this mode select one of the
following methods:

click on the button (Minimize the Control Panel);


press and hold the CTRL key, then move mouse pointer over the Panel.
Select physical Display where panel will be displayed.
If it is required to minimize the Panel on start, select the Minimize the Control Panel when
program starts up (not selected by default).

Note. To get a quick access to the Control Panel in any modes, press and hold the CTRL key on your keyboard
while moving the mouse pointer to the top edge of the screen.

4. To save new settings and apply them within the system click on the OK button.

www.issivs.com
SecurOS 20 Quick User Guide
Control Panel

4.3 Desktop Administration


By default, after logging into the system, the operator Desktop defined in the system settings (by the
administrator) is displayed.

For switching between Desktops (or for Desktop activation if all Desktops are hidden) click on the

corresponding Desktop button, or select the Desktop from the menu (see Control Panel).

To hide current Desktop click on the (Hide Desktop) button on the Control Panel

4.4 Executing Macros


To start Macro click on the corresponding button on the Control Panel, or select required command from

the menu (see Figure 11).

Figure 11. Executing macro

4.5 Changing Operator Workspace


Operator Workspace is a set of earlier prepared SecurOS application, with which the operator can work.
These applications can be located on the SecurOS Desktops (Media Client, Map Window etc.) or be
independent (Health Monitor etc.).

Note. List of Operator Workspaces available to specific user is defined by system administrator.

Each Operator Workspace is intended to solve specific set of tasks. To swith between Operator Workspaces

click on the button on the Control Panel, then select Change Operator Workspace and
workspace, that must be loaded (see Figure 12). The current Operator Workspace is checked.

www.issivs.com
SecurOS 21 Quick User Guide
Control Panel

Figure 12. Changing Operator Workspace

The new workspace will be applied immediately after the changing. Operator Workspace selected by the
operator in the last time will be automatically loaded when restarting operator interface.

Note. Local environment may be available in the Operator Workspaces list. It is created specifically for the
current computer and is not available on other Operator Workstations.

4.6 Getting Help

To get help click on the (Change user/Shutdown system) button on the Control Panel, select
Help (F1), then select a Manual to open (see Figure 13).

Figure 13. Getting help

To quickly get help on working with some applications, for example, Media Client, make the window of
the desired application active, then press the F1 key.

www.issivs.com
SecurOS 22 Quick User Guide
Control Panel

4.7 Hide Control Panel


The Control Panel hide method depends on panel current settings (see Setting Up Control Panel):

In Automatic hide mode, the panel hides itself if the mouse pointer is no longer on top of the panel.

In the Manual hide mode, click on the (Minimize the Control Panel) button to hide panel.

Note. The Control Panel can also be minimized by clicking it's icon in the Windows Taskbar notification area
(system tray), on the Windows Taskbar or with the help of application icon context menu in the system tray.

www.issivs.com
SecurOS 23 Quick User Guide
Media Client - Application to Work with Video and Audio

5 Media Client - Application to Work with


Video and Audio
The appearance of the Media Client is shown in Figure 14.

Figure 14. Media Client

Video from separate cameras is displayed in cells of which the central area (called Working area) of the
Media Client consists. The image from each camera is displayed in a separate cell that contains control
elements intended for performance of typical operations with a Camera. Along the edges of the Working
area, there are toolbars serving for performance of other operations.
Layout Bar — is used to select layout for the Working area (see Selecting Layout section);
Views Quick Access Panel — is intended for fast switching between Views (see Setting Up Views
Quick Access Panel);
Camera Control Bar — is used to control the Media Client's camera pages (see Selecting Layout
section);
Devices Panel — contains all Cameras and independent Microphones, selected to work with the given
Media Client. Is used to search and display current states of the cameras and microphones
(see Searching and Activating Object and Object State Indicators sections);
Views Panel — contains Views List, selected to work with the given Media Client. Also is used to

www.issivs.com
SecurOS 24 Quick User Guide
Media Client - Application to Work with Video and Audio

search a View (see Using Views);


PTZ Control Panel — is used to control PTZ cameras (see PTZ Control Panel section);
Export Panel — is used to export video and audio sequences (see Saving Record section);
Microphone Panel — contains all independent Microphones, selected to work with the given Media
Client. This panel of the Media Client is used to work with Microphones (see Working with Audio
section) and to display their current states (see Searching and Activating Object and Object State
Indicators sections);
Microphone Control Bar — is used to manage Microphone list (see Searching and Activating Object
section);
Archive Panel — is used to display and playback video and audio archive records (see Working with
Archive and Working with Group Archive sections);
Status Bar — is used to display selected object state indicators (see Camera Cell Controls and
Microphone Cell Controls sections).

Warning! Controls are available on the Operator Workstation if this is specified in the Media Client settings by
the system administrator.

5.1 Working Modes of Media Client


Media Client can work in one of the following modes:
Normal — the most commonly used mode. In this mode all Media Client operations are available.
Operations availability for an operator depends on the settings defined by the system administrator
and the user rights.
Live only — designed to work only with live video and audio. For the rest it is similar to the
Normal mode.
Alarming — designed to work only with alarming Cameras. The Camera is considered to be alarming
if it is armed (see Arming/ Disarming Cameras) and a movement was detected in the frame. Such
Cameras appear in the Media Client automatically and disappear when the alarm is over. Layout of
the Media Client automatically changes depending on the number of the alarming Cameras. Layout
is being switched to a smaller one within 1 minute after the count of alarming Cameras decrease.
This mode does not allow operator to control Cameras and work with video archive.
Active — designed to work with only one active Camera in 1x1 layout. Image from the Camera
selected (activated) in other Media Client or Map Window will be automatically duplicated for
current Media Client. If the Camera was deactivated its image continues to be displayed on the Media
Client until other Camera is selected. For the rest it is similar to the Normal mode.
View only — designed for passive Cameras live/archive monitoring with no sound. Controlling
Media Client is still available from outside, for example, with VB/ JScript program.

5.2 Basic Techniques and Operations with Objects


When working with objects in the Media Client (see Media Client - Application to Work with Video
and Audio) the following methods and operations are available:
Activation — to activate an object click it by the left mouse button. The activated object will be
displayed on the Media Client; all operations predefined for this object will be available to the
operator.

www.issivs.com
SecurOS 25 Quick User Guide
Media Client - Application to Work with Video and Audio

Note. Under certain system settings use double-click to activate a Camera or Microphone from the Media Client
Devices Panel.

Calling context menu — to open the context menu right click on an object. The context menu
duplicates object control commands and can contain additional commands that can not be executed
with the help of the standard object controls.
Drag-and-drop method — to drag-and-drop an object, left click and drag the object to the
required position. Using this method one can place cameras in the Working area, sort Lists, add objects
to the Archive Panel etc.

5.3 Searching and Activating Object


All objects - Cameras or independent Microphones, selected to work with the given Media Client, are
displayed in the Devices Panel. List of the independent Microphones is displayed separately on the
Microphone Panel.

To search a Camera / Microphone by its name in the Devices Panel, type in the Search text box
(see Figure 15) any character (or character set) that is part of an object name.

Figure 15. Searching object by name

Note. Cameras and Microphones, that are located on the displayed video page of the Working area/Microphone
Panel page, are marked in the Devices Panel with the icon. If a Camera is configured with a linked/connected
Microphone, it is marked with the icon.

To search for an object in the Devices Panel in manual mode use the scroll bar to the left of the list.

To activate a found object click on it. Depending on the system settings (see Basic Techniques and
Operations with Objects), use a single or double click. The system will display the activated object on
the appropriate page of the Working area or Microphone Panel.

All independent Microphones of SecurOS that are configured to work with the given Media Client are
also displayed on the Microphone Panel (see Figure 16).

www.issivs.com
SecurOS 26 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 16. Microphone Panel

To search for a microphone in manual mode use the and page scroll buttons.

5.4 Start/Stop Video Recording


To start/stop video recording do the following:
1. Activate the camera for which it is necessary to start/stop recording. The camera control buttons will
be displayed in the activated cell (see Figure 17).

Figure 17. Control elements and indicators

2. To start/stop recording click the Start/ Stop Record button. When switching to the corresponding

www.issivs.com
SecurOS 27 Quick User Guide
Media Client - Application to Work with Video and Audio

mode, the recording indicators state mode and the Start/ Stop Record button change:
/ (Recording indicator) — the recording is turned on/off (see Figure 17).

/ (Start/ Stop Record button) — the recording is turned on/off (see Figure 17).

Note. Start/Stop record also can be done from the camera cell context menu that is called by right-clicking a
cell.

Depending on the system settings, there may be cases when recording is permanent or impossible. In
these cases the Start/ Stop Record button looks as follow:

— continuous record that cannot be turned off;


button is hidden — video recording is prohibited by system settings;

— video recording is unavailable by any reason.

5.5 Arming/Disarming Cameras


Additional Information
When arming a camera, motion detection will be enabled for that camera's Zone(s). When motion is detected, the
camera cell frame and title will be highlighted by contrast yellow frame around (see Figure 18). If the system is
configured to record on alarm, the camera will start recording video automatically and stop when the alarm
(motion detection) ends.

Figure 18. Arm camera cell

To arm/disarm a camera perform the following steps:


1. Activate the necessary camera by clicking on it. The camera control buttons will be displayed in the
activated cell (see Figure 19).

www.issivs.com
SecurOS 28 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 19. Control elements and indicators

2. To arm/disarm a camera click the Arm/ Disarm button. When switching to the corresponding mode
the arming indicator's state mode changes:
/ / (arm indicator in the staus bar) — camera is armed (recording is in progress)/camera is
armed (no recording is in progress)/disarmed (see Figure 19).

/ (Arm/ Disarm button) — the camera is armed/disarmed (see Figure 19).

Note. Also one can Arm/Disarm the camera with the help of camera cell context menu that is opened by
right-clicking.

5.6 Other Operations with Camera


This section describes other operations that can be performed with the help of the Camera cell controls.

5.6.1 Switching Camera Cell to Full-Screen Mode

To maximize a Camera cell so that it would take up the entire Working area of the Media Client, double
click any area within the cell. To minimize cell double click it again.

5.6.2 Adjusting Image Options

Warning! Option if available, if Hardware acceleration checkbox is selected in the Media Client object settings
(see SecurOS Administration Guide).

Operator can change the following parameters of the image in the camera cell:
Brightness;

www.issivs.com
SecurOS 29 Quick User Guide
Media Client - Application to Work with Video and Audio

Contrast;
Hue;
Saturation.

For each camera one can set its own image settings. These settings will be applied to given camera on
any Media Client of this Computer.

Warning!
1. Image settings are saved only for Windows user.
2. When exporting video fragment, exporting and printing frame specified image settings are not taken
into account.

To adjust image settings do the following:


1. Select the Color adjustment command in the camera cell context menu (see Figure 20).

Figure 20. Camera cell context menu

2. The system will display the Color adjustment window (see Figure 21).

Figure 21. Color adjustment window

Specify required values using sliders or specify them manually in corresponding fields.

www.issivs.com
SecurOS 30 Quick User Guide
Media Client - Application to Work with Video and Audio

5.6.3 Digital Zoom

It is possible to digitally zoom any area of the camera cell up to 16 times, both in live and archive mode.

To zoom a camera image do the following:


1. Activate the necessary camera cell.

2. Click the button (Zoom).


3. Use the mouse wheel or Zoom scale (see figure 22) to zoom in/zoom out.

Warning! For a small Camera cell size the Zoom scale is not displayed in the cell. To display the zoom scale,
increase the camera cell size (for example, select a different layout or expand the camera cell size to full
screen).

Figure 22. Scaled frame indicator and Zoom scale

To zoom in/out with the help of the Zoom scale use one of the following methods:
Move scale slider in appropriate direction;

Click the or the button;


Click on the scale above or below the scale's slider.

When changing zoom in the Camera cell the blue indicator of zoomed frame will be displayed instead
of Zoom button (see Figure 22).

4. To move the scaled image click, hold and move it around with the mouse.

To leave the digital zoom mode click the (Zoom) button again.

www.issivs.com
SecurOS 31 Quick User Guide
Media Client - Application to Work with Video and Audio

Notes:
1. In the digital zoom mode, depending on the settings specified by the system administrator, the
camera can be switched to a higher resolution stream. If such a camera is activated and scaled, then
the digital zoom mode for all other scaled cameras of the Media Client will be automatically switched
off and the image in their cells will come from the default stream. If streams are not switched, then
the images of several cameras can be scaled.
2. The current zoom value is saved when you change the Camera mode (Live/Archive).
3. When turning the digital zoom mode off, the current scale of the image is kept in the camera cell.

Warning!
1. The zoom mode does not affect motion detection. Even though the moving object is not seen when
zoomed in, it will still be detected and handled.
2. The zoom mode does not affect archive recording. The native frame format of the video stream will
not be changed when recording.

5.6.4 Exporting Video Frame in Standard Format

When playing back a recorded video sequence, any frame can be saved/exported to a standard image
format. One can save/export a frame both in live and archive mode. Frame exporting is done for the
image displayed in the camera cell at the moment of the operation.

To save/export a frame click the Export frame button in the camera cell (see Figure 23).

Figure 23. Export frame button

The system will display a window with information about the saved frame (see Figure 24).

Figure 24. Information about frame

www.issivs.com
SecurOS 32 Quick User Guide
Media Client - Application to Work with Video and Audio

To browse export directory click the Open directory button.

Note. The frame will be saved in JPG format into the directory specified by the system administrator in a file
named <camera_name> (DD-MM-YYYY_HH-MM-SS.XXX).jpg.

Saved frame can contain additional information, if such feature is specified by system administrator.
Additional information will be displayed in the footer of the frame in the following format:

<Frame date in OS format> <Frame time in OS format, including milliseconds>


| [<ICamera ID>] <Camera Name>

For example, 3/2/2018 10:45:45.333 | [4] Camera 4.

If there are subtitles over the frame, it will be also placed on the saved image.

5.6.5 Printing Frame

Any frame can be printed when playing back the video record. One can print a frame both in live and
archive mode.

Warning! The ability to print frames is determined by the system administrator.

The frame, that is displayed in the camera cell at the moment of command execution, will be printed.

To print a frame call Camera's cell context menu, select the Frame print command (see Figure 25).

Figure 25. Print frame command of the context menu

System will display the standard printing settings window. Specify print settings (orientation, frame
position etc.), then click the Print button.

The following information will be printed in the page header:


Camera's Name and ID.
Frame date and time in the following format: <Date in OS format><space><Time in OS
format, including milliseconds>.

www.issivs.com
SecurOS 33 Quick User Guide
Media Client - Application to Work with Video and Audio

5.6.6 Working with Panoramic Camera

Panoramic cameras are designed to provide a 360° field of view, allowing for a wide area coverage of
the surveillance area. In the event of an alarm situation in any part of the field of view, the operator can
zoom the camera to the specific area of interest and get a view similar to the conventional video
surveillance camera. Thus, one panoramic camera can be used instead of many cameras with a
directional field of view.

An example of an image obtained by a panoramic camera in the General view mode is illustrated in
Figure 26.

Figure 26. Panoramic camera

Dewarped mode allows to get the dewarped image of the surveillance area. To switch the camera to the

dewarped mode click the button (Dewarped camera mode). The button will change to the

following: . In this mode one can control the camera position with one of the methods available
within SecurOS (see Controlling PTZ Cameras).

Note. For the panoramic camera the following controls are available on the PTZ Panel: Zoom, Speed and
navigation buttons.

www.issivs.com
SecurOS 34 Quick User Guide
Media Client - Application to Work with Video and Audio

Recording and playing back archive of the panoramic camera is done in the usual way (see Start/ Stop
Recording and Working with Archive). Working with archive records is possible both in the General

view mode and the Dewarped mode. To switch between these camera modes in archive the and
buttons are also used.

Other operations with the camera are carried out in the standard ways (see Other Operations with
Camera).

5.6.7 Sending Emergency Ticket to the Emergency Service with the Help of
Media Client
On Linux platform (available only for SecurOS Enterprise edition) the functionality is not supported.

Using a Media Client operator can send Emergency ticket to an external Emergency service. A message
can be send both from on-line and archive video modes.

Warning!
1. Operation is available only for Camera object.
2. Emergency ticket can be sent only if this feature is configured by the system administrator.

To send an Emergency ticket do the following:


1. Right click the cell of required Camera.
2. In the context menu select the Fill out Ticket and send it to Emergency Service command
(see Figure 27).

www.issivs.com
SecurOS 35 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 27. Camera cell context menu

3. In the Emergency Ticket window (see Figure 28) select from the list the Incident Type, select, if
necessary, the People in danger checkbox and fill out the Additional Info field.

Figure 28. Emergency ticket

www.issivs.com
SecurOS 36 Quick User Guide
Media Client - Application to Work with Video and Audio

4. Click the Send button to send Emergency ticket.

Result of message sending can be viewed with the help of Event Viewer (see Sending Emergency ticket
to the Emergency service with the Help of Event Viewer).

5.6.8 Operations with Bookmarks

Bookmark is a special mark added to the video record. Each bookmark marks appropriate time stamp,
that allows to find required frame or video fragment quickly, instead of to view archive in a whole.

This section describes the following operations with Bookmarks:


1. Setting Bookmarks;
2. Setting Bookmarks for a Time Interval.

5.6.8.1 Setting Bookmarks


Bookmark is always added on the currently displayed frame independently of working mode. To add a

bookmark click the button (Add Bookmark), see Figure 29.

Figure 29. Add Bookmark button

Warning! When working in Live camera mode this button is displayed only if video recording is on.

Name of the added bookmark is created automatically and has the following format:
<Camera Name> <current frame time stamp>.

www.issivs.com
SecurOS 37 Quick User Guide
Media Client - Application to Work with Video and Audio

5.6.8.2 Setting Bookmarks for a Time Interval


To add bookmark on the time interval call camera cell context menu, then select the Add Bookmark On
Interval. The system will display the Creating Bookmark window (see Figure 30).

Figure 30. Bookmark settings window


To specify parameters use the following text boxes:
1. Bookmark name — bookmark name. Default value is in the <Camera Name>
<current_frame_time_stamp> format.
2. Start time — start date and time of the interval. Date and time of the current frame are set by default.
3. End time — end date and time of the interval. Date and time of the current frame are set by default.

The borders of the time interval can be set manually or taken from the archive (specified with the help
of the time-line).

To set borders manually click the button, then moving on a calendar grid double click the
necessary date. To specify time, click the time setup field, then use keyboard to set the time. One can
also specify time using the mouse scroll wheel.

To specify the interval using the time-line move the cursor to the desired start position, then click the
(Take time-line position time) button. Move cursor to the end of the interval, then click the
button.

To set a bookmark with the specified parameters click the Save button. To cancel the operation and
close the bookmark settings window without saving click Cancel.

5.7 Working in Live Video Buffering Mode


Cameras, video from which are displayed on the Media Client, can work in the live video buffering
mode, if this functionality is configured by the system administrator. The operating indicator of the live
video buffering mode is the icon displayed in the Camera cell (see Camera Cell Controls). When
working in live video buffering mode:
1. The video will be displayed with a delay that depends on the size of the specified buffer.
2. The alarm and archive recording mode indicators correspond to the real time of the frame, that is,
they not coincide in time with the displayed frames.

www.issivs.com
SecurOS 38 Quick User Guide
Media Client - Application to Work with Video and Audio

3. When working with PTZ (see Controlling PTZ Cameras), the buffering mode will be disabled
automatically immediately after the start of the user operations. Buffering mode is also activated
automatically. It will be activated in 10 seconds after the last control command was executed. In this
case, video playback will be paused for some time to fill the buffer.
4. When working with Presets and Tours (see Working with Presets and Tours) buffering mode in not
disabled.

5.8 Working with Archive


This section describes the following basic operations with archive:
Switching to Archive Mode;
Searching Records in Archive;
Navigating Through Archive;
Playing Back records;
Fast Playback of Last N Minutes;
Working with Group Archive;
Archive Export;
Searching Alarms and Bookmarks, Smart Search;
Forensic Search.

5.8.1 Switching to Archive Mode

In the archive mode one can watch video or listen to audio recordings. Each of the archive video or
audio records contains a set of files of specified size, which are played back sequentially starting from
the current archive position.

To switch to archive mode do the following:


1. Select and activate the required camera or microphone.

2. Click the (Live/ Archive) button in the upper right corner of the camera or microphone cell. The

system will go to the archive mode. The button will change to in the camera cell and to in
the microphone cell.

Additional Information
One can switch to archive mode using the appropriate command in the camera cell context menu.

When switching to the archive mode, the system will display the Archive Panel (see Figure 31). The
archive position pointer on the Time-Line will be automatically moved to the end of the archive.

Notes:
1. If any object (Camera/Microphone) of the given Media Client is already switched to the archive mode,
then switching the other objects to the archive mode will not change current position of the archive
pointer.
2. If the Camera is in full screen mode or the 1x1 layout is used when switching to the archive mode,
then the time in the Camera cell will be displayed in the HH:MM:SS.FFF format by viewing video
"frame-by-frame", or by scrolling through the records or stop playback. When playing back archive
the time will be displayed in usual format (HH:MM:SS).

www.issivs.com
SecurOS 39 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 31. Microphone cell in archive mode

Additional Information
The end of archive is specified as the last frame of the last record for the video record and the beginning of the last
file of the last record for the audio record.

To work with the archive records use standard media-player buttons that are displayed on the Archive
Panel (see Playing Back Records).

5.8.2 Searching Records in Archive

This section describes the following operations:


Searching Video Record;
Searching Audio Record.

Searching Video Record


To search for and playback a recorded video sequence, perform the following steps:
1. Activate the camera which recorded the video that you wish to review, and switch to the archive
playback mode.

2. In the camera cell click the button (Archive Search). System will display the Archive Search
window to specify search conditions (see Figure 32).

www.issivs.com
SecurOS 40 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 32. Video search window

3. Set the date and time interval for which it is necessary to find the recorded video. Click on the Search
button. The list of all video recordings corresponding to the given search conditions will be
displayed.
4. Select the line corresponding to the record start time (see Figure 33).

Figure 33. Setting video start time

5. Click on the selected line. The system will move the archive position pointer to the first frame of the
selected record.
6. Activate the camera cell. Use playback controls. Use the Time-Line for local navigation.

www.issivs.com
SecurOS 41 Quick User Guide
Media Client - Application to Work with Video and Audio

Additional Information

To specify dates with the help of the calendar click the button in the search window. The system will display a
calendar in which all dates on which there are video recordings will be underlined (see Figure 34). Current date is
marked with a gray background. Select required date and click it. Selected date will be marked with turquoise
frame around. When the current date is selected, it will be marked with a gray background with a turquoise frame
around. Click the Search button. The system will display a list of all video recordings on that date.

Figure 34. Calendar in the search window

For a quick search of dates that contain video recordings, click the Calendar button on the Archive Panel
(see Figure 35). Scroll through the calendar and select the necessary date by double clicking on it. Archive position
pointer will be moved to the first frame of the first record of the specified date.

Figure 35. Calendar button of the Archive Panel

Searching Audio Record


To search for and play back a recorded audio sequence, perform the following steps:
1. Activate the microphone which recorded the audio that you wish to listen, and switch to the archive
playback mode.

2. In the Archive Panel click the (Calendar) button, see Figure 35. System will display the calendar
window (see Figure 34).

3. Scroll through the calendar and select the necessary date by double clicking on it. The archive
position pointer will be moved to the first file of the last record of the specified date. Use the
playback controls to listen to the audio recordings. Use the Time-Line for local navigation.

5.8.3 Navigating Through Archive

The Time-Line of the Archive Panel is used for a quick navigation through the video recordings.

www.issivs.com
SecurOS 42 Quick User Guide
Media Client - Application to Work with Video and Audio

Each video or audio record that corresponds to a certain time interval is designated on the Archive Panel
by a stripe of blue-green or pale yellow color; the archive position pointer is a turquoise colored vertical
marker (see Figure 36). Blue-green colored stripes correspond to records that were made by a camera in
a normal or armed mode when no motion was detected, and also by a microphone. Pale yellow colored
stripes correspond to records that were made by a camera when motion was detected in the frame
(see Arming/ Disarming Cameras). The Time-Line range is restricted to the earliest and latest dates of
the video or audio record stored on the recording hard drive(s).

To set the archive pointer position click a record on the required point. The date and time of the current
archive pointer position will be displayed to the left (see Figure 36).

Figure 36. Archive pointer positioning

On the Time-Line, video records of a limited time frame are displayed. To view records for a different
period of time, click the Time-Line and, while holding down the mouse button, move the mouse pointer
in the desired direction, or use the and navigation buttons. One can also move along the time-

line using the mouse scroll wheel if the pointer takes the form.

To change the scale of the Time-Line click the Increase timeline scale button ( ) or Decrease timeline
scale button ( ). Time-Line scaling can also be done using the mouse wheel if mouse pointer takes the
form.

5.8.4 Playing Back Records

Playback control is performed with the help of the media player buttons (see Figure 37 and Table 1).

Figure 37. Media player buttons

Table 1. Media player buttons

Parameter Description

Play/ pause buttons (enable depending on the current mode)

www.issivs.com
SecurOS 43 Quick User Guide
Media Client - Application to Work with Video and Audio

Parameter Description

Playing records
(Play)

Playing records in opposite direction


(Reverse play)

Stop playing
(Pause)

Rewind buttons (enable for active camera only)

Jump to the previous record


(Previous record)

Jump to the previous frame


(Previous frame)

Jump to the next frame


(Next frame)

Jump to the next record


(Next record)

Playback speed control buttons (current speed indicator is displayed to the left of the playback
buttons (see Figure 37))

Decrease playback speed


(Slower)

Increase playback speed


(Faster)

When working with audio records the , , , buttons (Previous frame, Next frame,
Slower, Faster) are disabled.

5.8.5 Fast Playback of Last N Minutes

Warning! This feature is available only if configured by the administrator.

To play the last N seconds/minutes of the record (starting from the current moment) do the following:
1. Select the required Camera in the Devices Panel of the Media Client or in the Working area of the Media
Client (see Media Client - Application to Work with Video and Audio).
2. In the Camera's right-click menu select the Playback N s/ min of record option (see Figure 38). Menu
option and shortcut can be used both in live and archive mode.

www.issivs.com
SecurOS 44 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 38. Camera cell context menu

Depending on archive availability the system will set the archive pointer to the earliest frame of the
record within the specified interval and start playback automatically.

5.8.6 Working with Group Archive

Archive records of multiple objects — Cameras, Microphones or Cameras and Microphones simultaneously
can be displayed in the Archive Panel at the same time. Such archive mode is called group archive
(see Figure 39).

Figure 39. Group archive

www.issivs.com
SecurOS 45 Quick User Guide
Media Client - Application to Work with Video and Audio

When switching several objects to the Archive mode, the Archive Panel will display the List of objects in
archive mode and archive records of all these objects (see Figure 39). An archive position pointer will be
placed at the end of the archive record of the object that has been switched to the archive mode first.
This position will not be changed if other objects will be switched to the archive mode. The order of the
objects in the List of objects in archive mode will match the order of switching of objects to the archive
mode. The active object in the List of objects in archive mode is highlighted in turquoise.

To create a group archive, one can sequentially switch the required Cameras and/or Microphones to the
archive mode. All Cameras of the video page can be switched to the archive mode simultaneously with
the help of the appropriate command of the camera cell context menu. Any object selected to be used
with the given Media Client, including armed or recording objects, can be switched to the archive mode.

For the convenience of working with group archive, the records can be sorted on the Archive Panel in
such a way, as it is required by operator. The position of the object in the list can be changed by using
drag-and-drop method (see Basic Techniques and Operations with Objects). When sorting archive
objects, the order of Camera cells in the Media Client's Working area and the order of Microphones on the
Microphones Panel is not changed.

Searching records, navigating archive and playing back records are performed in the standard way
(see Searching Records in Archive, Navigating Through Archive and Playing Back Records sections).
Navigating archive with the playback control buttons is performed according to the record of the active
object only.

Note. When you are searching records in the group archive using the Calendar, then all the dates, on which
there is a record of at least one of the objects in the archive mode will be marked in the calendar window.

When playing back group archive, records of all cameras are played back synchronously (if such
records exist for the same time). At the same time, only one audio record from an independent
Microphone or microphone linked to a Camera can be played back synchronously with the video record.
To play back audio records activate the required object in the Object list.

To remove archive records from the Archive Panel the context menu of the List of objects in archive mode is
used (see Figure 40).

Figure 40. Object list context menu

Menu consists of the following commands:


Hide — remove from the Archive Panel the record of the object that is selected in the List of objects in
archive mode. When executing the command, the Microphone is switched to Live mode automatically,
and the mode of the Camera is not changed.
Hide all Cameras — remove records of all Cameras from the Archive Panel;

Warning! After executing the Hide all Cameras command all the Cameras are kept in the archive mode. To

switch a camera to Live mode use the button in the Camera cell. To quickly switch all Cameras to Live
mode select Switch all cameras to live mode command from context menu of any camera.

Switch all Microphones to live mode — remove records of all Microphones from the Archive Panel.
All Microphones are switched to Live mode automatically.

www.issivs.com
SecurOS 46 Quick User Guide
Media Client - Application to Work with Video and Audio

All Cameras of the video page can be switched to Live mode simultaneously with the help of
appropriate command of the camera cell context menu (see Camera Cell Controls). Records of all
Cameras are removed from the Archive Panel.

5.8.7 Archive Export

Archive export can be performed both for separate record (see Record Saving) and for group of records
simultaneously (see Group Archive Export).

Record can be saved as a file of default AVI/ASF format or as a file of special Evidence format:
Exporting a video or audio sequence to a AVI/ASF file allows to play back the records using any
standard media player, for example VLC Media Player.
When exporting record to Evidence format a file with .evi extension is being created. Such file
can be played with proprietary SecurOS Evidence Manager player (see SecurOS Evidence Manager
User Guide).

If necessary, one can use digital signature when exporting archive (see Digital Signature). Evidence file
can also be encrypted and protected with password to prevent unauthorized access.

Note. Format of the saved file is specified by the system administrator and can not be changed by the
operator.

5.8.7.1 Record Saving


Any segment of the record obtained by any specified Camera or Microphone in any given time interval
can be saved to a file.

Warning! When saving to a file of Evidence format records are being exported with no sound.

To save a record to a file do the following:


1. Activate the Camera or the Microphone for which the records should be exported.

Note. Camera/ Microphone can be selected at any next step, but not later than export task starts. All specified
task export parameters will be applied to the selected Camera/ Microphone.

2. In the Media Client's toolbars area jump to the Export tab (see Figure 41).

www.issivs.com
SecurOS 47 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 41. Media Client Export tab activation

The system will display the Export panel (see Figure 42).

www.issivs.com
SecurOS 48 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 42. Export panel

3. Define the Start time and the End time parameters.

Note. For fast filling in the Start time and End time text boxes use the button (Take time-line position
time). Move the archive pointer to the beginning of the fragment to be saved then click the button next to the
Start time text box. Then move archive pointer to the end of the fragment to be saved and click the button

next to the End time text box. When filling in the text boxes manually use the button to quickly enter the
date.

4. In the Export with text box select the converter that will be used to export. Depending on the selected
converter an archive will be saved either on the Video Server or on the local Computer.

Note. The Export with field is not displayed if the Media Client is configured to work only with the one
converter.

If the system is configured to digitally sign a file using a certificate (see Digital Signature) the
digital signature icon will be displayed on the right of converter (see Figure 43).

www.issivs.com
SecurOS 49 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 43. Export with digital signature icon

The icon will be displayed only for those converters that can be used for digital signature on this
Computer (see Digital Signature).

5. In the Export Directory field click the Browse button and using the file manager select the folder to
save the video records to.

Note. The Export with field is not displayed if the converter located on the remote Computer is used to
perform the export task. In this case the file is saved to the directory specified by the system administrator.

6. Select the Password protect checkbox to encrypt the file and protect it with password.

Note. The Password protect check box is displayed only if export is performed to the Evidence file format.

7. Click the button. If the Password protect checkbox is selected define a


password at the Protect with encryption window (see Figure 44) and click the OK button.

Figure 44. Protect with encryption window

www.issivs.com
SecurOS 50 Quick User Guide
Media Client - Application to Work with Video and Audio

Note. When played with SecurOS Evidence Manager player (see SecurOS Evidence Manager User Guide) the
system will request defined password.

8. The window to display export tasks sent to the converter will be opened (see Figure 45).

Figure 45. Export task sending window

If archive for specified period is not found for any selected object, then system will display error
message (see Figure 46).

Figure 46. Error message

9. To control export procedure click the Task Window button. System will display the Task Window
(see Figure 47), in which the state of the executed procedure and system messages about possible
errors will be displayed.

Figure 47. Task Window

If export task is not finished it can be canceled. To cancel a task select appropriate row and click the
Cancel selected button. To cancel all unfinished tasks click the Cancel all button. When task is finished
appropriate rows can be deleted by clicking the Remove finished button.

The Archive Converter field displays information about converter used to perform the export task: the
Media Client or the Archive Converter.

After export task is finished the Export directory field displays the path to the folder where archive is
saved to (see Figure 48).

www.issivs.com
SecurOS 51 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 48. Path to the saved archive

The path is represented as a link that can browse to the specified folder. To copy the path to the
clipboard, select the Copy command in the context menu. If archive has been saved on the remote
computer, then the path will be in the REMOTE_COMPUTER_NAME [IP address] format and will not
be a link that can be copied.

5.8.7.2 Group Archive Export


Group export procedure allows you to upload from the SecurOS archives of multiple objects for the
same period. Archives of several Cameras, Microphones or Cameras and Microphones simultaneously can
be uploaded. Similar to video record export (see Record Saving), group export is also performed with
the help of Media Client, but it is not necessary to switch an objects to archive mode.

Procedure is launched by clicking the (Group export) button on the Export panel. Time
interval of the records to upload can be specified both working with archive with the help of Time-Line
(see Record Saving) and with no visual control, simply specifying date and time values in the
appropriate fields of the panel.

To perform group export of the video and/or audio archive do the following:
1. Select Media Client, that works with objects, archives of which must be uploaded.

2. On the Export panel click the button (Group export).


3. The system will display the Group export window (see Figure 49).

www.issivs.com
SecurOS 52 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 49. Group export window

4. Parameters, specified in the Export panel, and the Device Tree (tree of the Cameras and Microphones)
will be displayed in the window.
5. Define values of the following parameters: Start time, End time, Export with and Export Directory.
If necessary select the Password protect checkbox.

Note. Features of the parameter setting procedure are described in the Record Saving section.

6. In the Device Tree select devices, archive of which must be exported. To do this, select checkboxes on
the left of required device (see Figure 50).

www.issivs.com
SecurOS 53 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 50. Devices selected in the Group export window

By default all Cameras and Microphones selected to work with the given Media Client are displayed in
the Device Tree (the and buttons on the right of the Search field are pressed and displayed in
blue). To display in the tree only devices with required identifiers/names specify a part of the Camera
or Microphone name or ID in the Search field and release the appropriate button (inactive buttons are
displayed in gray).

7. To launch export procedure click the button at the bottom of the window.

Note. Depending on defined format there may be several export tasks (for AVI/ASF format) or just one task
(for Evidence format).

8. For more information about export operations see Saving Record.

www.issivs.com
SecurOS 54 Quick User Guide
Media Client - Application to Work with Video and Audio

5.8.7.3 Digital Signature


On Linux platform (available only for SecurOS Enterprise edition) the functionality is not supported.

A digital signature with a certificate ensures that the signed file has not been replaced or edited after
creation. The PKCS#7 Signed data detached signature standard is used for digital signature within
SecurOS. One can confirm the authenticity of the file with most tools that support this standard.

Notes:
1. Due to restrictions on the conditions of the system operation, trusted time-stamp is not published
when creating digital signature. This can limit the list of supported third-party signature verification
tools.
2. To check and demonstrate how does digital signature work one can use self-signed certificate created
with the help of the Certif icate Generator utility (see SecurOS Administration Guide).

This section describes the features associated with the digital signature of audio- and video files:
Choosing signature certificate;
Rejection of the signature use;
Results of archive converting using digital signature;
Pointing out the fact of digital signature usage;
Digital signature verification utility.

The ability to sign files using a certificate is available on the Computers that have any role (Video Server
or Operator Workstation).
Digital signature on the Video Server is possible only if the converter specified within any Operator
Workspaces (exclude Local) is selected to perform the export task.
Digital signature on the Operator Workstation is possible if the converter specified on this Operator
Workstation or in any Operator Workspaces is selected to perform the export task.

To sign the files that have been exported an operator must select a digital certificate.

Note. List of available certificates is populated by those ones that are installed within the system
(see SecurOS Administration Guide).

To select a certificate for all export tasks do the following:


1. Activate the Control Panel (see Control Panel Activation);

2. Click on the (Change user/ Shutdown system) button and select the Digital Signature
Certificate command from the drop-down list (see Figure 51);

www.issivs.com
SecurOS 55 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 51. Digital Signature Certificate command

3. In Choosing a digital signature certificate window tick the Use digital signature certificate
checkbox (see Figure 52);

Figure 52. Choosing a digital signature certificate window

4. Choose required certificate from the list.

Additional Information
Choosing a digital signature certificate window can also be opened by the application icon context menu
command in the notification field of the Windows task bar (system tray).

After selecting the certificate, the digital signature of the converted files will be executed automatically.

Warning! Digital signature settings are saved only for Windows user.

Rejection of the signature use:


Follow steps of the Choosing signature certificate operation. On step 3 uncheck the Use digital
signature certificate checkbox (see Figure 52).

Result of digital signature operation is a file with .p7s extension. Name of this file matches the name
of converted file. Further archive file must be copied and moved together with the corresponding
digital signature file.

www.issivs.com
SecurOS 56 Quick User Guide
Media Client - Application to Work with Video and Audio

Note. If selected certificate is protected by password, this password will be requested by Windows every time
after archive export task will be finished. This behavior is defined by OS settings and can not be changed with
the help of SecurOS tools.

Information, associated with digital signature, is displayed in Event Viewer (see Event Viewer) and
conversion Task Window:
Information concerning the fact of digital signature use will be displayed in the comments to the
Archive Converter events in the Event Viewer window (see Figure 53);

Figure 53. Use of digital signature confirmed in Event Viewer

At the moment when export task will be generated the Export task has been sent event from the
Camera will be generated. This event also will be displayed in the Event Viewer (see Figure 53);
Pop up tooltip will be displayed in conversion Task Window to indicate problems, associated with
digital signature, if they will rise (see Figure 54).

Figure 54. Tooltip for a digital signature error in the conversion Task Window

To confirm file authenticity the Digital certificate verification utility, shipped with SecurOS is used
(see Figure 55).

Location:
<SecurOS root folder>\tools\DigSiVerU.exe

www.issivs.com
SecurOS 57 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 55. Digital signature verification utility

To verify file authenticity do the following:


1. Launch digital signature verification utility;

Warning! One must have administrator privileges to launch utility.

2. In the utility window click on Select and verify button;


3. Specify path to the file that must be verified. Only files located in the same folder as the
corresponding digital signature files can be selected.

After selection utility will display verification results. Possible verification results are represented in
Table 2:

Table 2. Possible results of verification

Result Description

File corresponds to digital signature The file has not been modified, and the certificate it
is signed with has a high degree of trust.
Certificate was issued by trusted
Certification Authority

File corresponds to digital signature The file has not been modified, and the certificate it
is signed with cannot not be trusted.
The certificate was issued by non-trusted
Certification Authority

The file does not match the digital The file does not match the signature file and
signature probably has been modified.

Error digital signature verification Authenticity of the file cannot be verified, for
example, because the signature file is damaged.

Additional info about certificate used for digital signature one can get by clicking on View certificate
button.

Note. If verification results in error, View certificate button is disabled.

www.issivs.com
SecurOS 58 Quick User Guide
Media Client - Application to Work with Video and Audio

5.8.8 Searching Alarms and Bookmarks, Smart Search

With the help of Media Client one can search Alarms and Bookmarks in archive, and also perform a Smart
Search (searching of motion in predefined area of the frame).

To activate search window click the button, located in the Media Client window on the Archive
Panel (see Figure 56).

Figure 56. Activating Search in archive window

The system will display the Search in archive window (see Figure 57).

Figure 57. Search in archive window

www.issivs.com
SecurOS 59 Quick User Guide
Media Client - Application to Work with Video and Audio

At the top of the window the


mode switching buttons are located. When window opens the Search Alarms and Bookmarks mode is
activated by default.

Warning! If Forensic search feature is disabled these buttons are not displayed.

A form to specify search criteria is in the left part of the window and search results are displayed in the
right one.

Search parameters adjusting procedure, search results and working with search result are described in
appropriate sections:
Searching Alarms and Bookmarks;
Smart Search.

5.8.8.1 Searching Alarms and Bookmarks


In the archive mode the Media Client can be used to find records corresponding to Alarms or Bookmarks
(see Searching Alarms or Bookmarks).

Found Alarms or Bookmarks can be used to do the following:


Viewing fragment in the Media Client;
Exporting fragment to a file.

Searching Alarms or Bookmarks


To search Alarms or Bookmarks do the following:
1. Fill in the following fields (see Figure 58):
Search mode — select Alarms (default value) or Bookmarks.
Start time/ End time — specify date and time of the start/end of the search period. Date can be
entered manually or specified with the help of the Calendar by clicking the button.
Duration more than — select this checkbox if necessary and specify duration of the desired Alarm
or Bookmark (only for Bookmarks f or time interval).
Bookmark name contains the string (is not shown on the Figure) — type some characters that are
the part of the bookmark's Name. Only those Bookmarks a name of which contain specified
characters will be displayed as a search result.
Cameras — by default all Cameras selected to work with the given Media Client are displayed in the
camera's tree (see below). The and buttons on the right of the Search field are pressed
and displayed in turquoise. To display in the tree only Cameras with required identifiers/names
specify a part of the Camera name or ID in the Search field and release the appropriate button
(inactive buttons are displayed with no frames, white font on blue background).
Cameras Tree — select checkboxes opposite those Cameras for which it is necessary to search
Alarms and Bookmarks.
Group results by — to group search results by Cameras/Dates select required value from the list.
2. To start search click the Search button.

Found Alarms/ Bookmarks will be displayed in the right part of the window as a list (for example,
see Figure 58).

www.issivs.com
SecurOS 60 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 58. Bookmark search result

Search results will be displayed as a list (see Figure 58), entries of which will be grouped by Cameras or
by Date (depending on the Group results by parameter value, see above). By default, after search is
finished, this list is collapsed. To view list details consequently click the icon on the left of the
required element until list is completely expanded (see Figure 59).

Figure 59. Completely expanded list

The search result table contains the following fields:


For the Bookmarks:
Bookmark Name — name of the Bookmark;

www.issivs.com
SecurOS 61 Quick User Guide
Media Client - Application to Work with Video and Audio

Time — video fragment start time;


Duration — video fragment duration in the MM:SS.FFF format.
For the Alarms:
Alarm start — video fragment start time (the beginning of the Alarm), in the HH:MM:SS.FFF
format;
Alarm end — video fragment end time (the end of the Alarm), in the HH:MM:SS.FFF format;
Duration — video fragment duration in the MM:SS.FFF format.
Archive video fragments that match found Alarms/ Bookmarks can be viewed in the Media Client or
exported to a file of standard image format, if this possibility is configured by the system administrator.

Viewing fragment in the Media Client


To view fragment in Media Client double click required entry. Appropriate Camera will be switched to
archive mode and archive position pointer will be set at the found Alarm/ Bookmark start time. To play
record use appropriate media player buttons (see Playing Back Records).

Exporting fragment to a file


To export a video fragment to a file do the following:
1. Select checkboxes on the left of the found Alarms/ Bookmarks that you want to export.

2. Define export parameters and click the button.

Note. For more information about export parameters and export control operations see Saving Record.

5.8.8.2 Smart Search


Searching the video archive for Alarms in a specific part of a camera view is called Smart Search. The
search is possible only if the following conditions are met:
1. The Zone object, specified for the given Camera, should be configured to perform Smart Search (see
SecurOS Administration Guide).
2. The search area (mask) specified in the Search in archive window should be completely covered by
the motion detection Zone area defined for the given Camera.

Smart Search operations sequence is described in the Searching Alarms inside the detection area
section.

Found Alarms can be used to do the following:


Viewing fragment in the Media Client;
Exporting fragment to a file.

Searching Alarms inside the detection area


To search alarms by mask inside the detection area do the following:
1. Fill in the following fields (see Figure 60):
Search mode — select Smart Search.
Start time/ End time — specify date and time of the start/end of the search period. Date can be
entered manually or specified with the help of the Calendar by clicking the button.
Camera — select a Camera, in archive of which it is necessary to perform the Smart Search.

www.issivs.com
SecurOS 62 Quick User Guide
Media Client - Application to Work with Video and Audio

Note. Only Cameras, selected to work with the given Media Client, are displayed in the list. Zone object of these
Cameras must be configured to perform Smart Search, too.

Figure 60. Search in archive window

2. Specify search area (mask) with the help of mouse (see Figure 61). By default, search area is equal to
whole frame.

www.issivs.com
SecurOS 63 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 61. Specifying search area

Warning! Make sure that the selected search mask covers at least one of camera detection zones! The system
will search for motion events within the specified mask. To configure camera motion detection zone(s),
consult with a system administrator.

3. Click Search button.

Found Alarms, for which motion was detected within specified area, will be displayed in the right part
of the window as a list (for example, see Figure 62).

www.issivs.com
SecurOS 64 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 62. Search results

The search result table contains the following fields:


Alarm start — video fragment start time (the beginning of the Alarm), in the HH:MM:SS.FFF
format;
Alarm end — video fragment end time (the end of the Alarm), in the HH:MM:SS.FFF format;
Duration — video fragment duration in the MM:SS.FFF format.

Viewing fragment in the Media Client


To view fragment in Media Client double click required entry. Appropriate Camera will be switched to
archive mode and archive position pointer will be set at the found Alarm start time. To play record use
appropriate media player buttons (see Playing Back Records).

Exporting fragment to a file


To export a video fragment to a file do the following:
1. Select checkboxes on the left of the found Alarms that you want to export.

2. Define export parameters and click the button.

Note. For more information about export parameters and export control operations see Saving Record.

5.8.9 Forensic Search


For Windows OS the functionality is available in the following editions: SecurOS Datacenter,
SecurOS Enterprise, SecurOS Premium.

For Linux OS the functionality is available in SecurOS Enterprise edition.

www.issivs.com
SecurOS 65 Quick User Guide
Media Client - Application to Work with Video and Audio

Forensic (retrospective) search in the video archive is based on the use of metadata that accompanied
the video stream. Metadata means data that describes what is happening in the frame (for example,
information about moving objects and their tracks, speed, classification attributes, data on video stream
quality and camera malfunctions, etc.). Metadata is generated by video analytics detectors and recorded
and stored in SecurOS in its original form, i.e. before it has been processed by the algorithms of such
detectors. Any object’s attribute stored in the database can be used as a parameter of the forensic
search.

Forensic search is possible if a video analytics detector is configured to save metadata (see SecurOS
Administration Guide) and archive recording has been performed.

Results of the Forensic Search are represented by snapshots with required objects. Results of the forensic
search can be used to do the following:
Viewing fragment in the Media Client;
Other operations available in the archive mode (see Working with Archive).

Forensic search is performed in the archive mode in the Search in archive window of the Media Client.

To open Search in archive window click the button, located in the Media Client window on the
Archive Panel (see Searching Alarms and Bookmarks, Smart Search).

Figure 63. Forensic search in Search in archive window

To perform Forensic search:


1. Click the Forensic search button (see Figure 63).
2. Fill in the following fields:
Objects — select the class of the required object. Possible values:
All (default value);
Human;
Vehicle;

www.issivs.com
SecurOS 66 Quick User Guide
Media Client - Application to Work with Video and Audio

Unclassified Object.
Color — select the color of the required object from the list.
Start time/ End time — specify date and time of the start/end of the search period. Date can be
entered manually or specified with the help of the Calendar by clicking the button.
Camera — select a Camera, in archive of which it is necessary to perform the forensic search.

Note. The list displays the Cameras selected to work with video analytics detectors for which metadata
recording is configured.

Video Search Area — specify search area within the frame using left mouse button. Searching by
all parameters will be performed only within the specified frame area. By default, search area is
equal to the whole frame. To reset specified search area select the Reset Search Area command in
the context menu.
Time spent in the area (at least) — additional search parameter. Select this checkbox to search only
those frames on which the object has been in the specified area of the frame for at least the specified
period of time.
Objects in area (at least) — additional search parameter. Select this checkbox to search only those
frames that contain at least specified number of objects at the given area of the frame at the same
time.
3. To start search click the Search button.

Frames that match the specified search criteria will be displayed in the right part of the window
(see Figure 64).

Figure 64. Search result

The found object is highlighted in the frame with a white rectangular frame. The time interval during
which the object was in the frame is displayed under each frame.

www.issivs.com
SecurOS 67 Quick User Guide
Media Client - Application to Work with Video and Audio

Viewing fragment in the Media Client


To view fragment in Media Client double click required snapshot. Corresponding Camera will be
switched to the archive mode and archive position pointer will be set at the snapshot time. To play
record use appropriate media player buttons (see Playing Back Records).

5.9 Working with Long-Term Archive


On Linux platform (available only for SecurOS Enterprise edition) the functionality is not supported.

Warning!
1. The ability to work with a Long-term archive is determined by the system administrator.
2. Long-term archive playback doesn't support audio.

The Media client is used to work with Long-term archive. When working with long-term archive, operator
can perform all operations, available for primary archive:
Switching to Archive Mode;
Searching Records in Archive;
Navigating Through Archive;
Playing back records;
Working with Group Archive;
Searching in Archive;
Archive Export.

Note. When working with Long-term archive several Media Client's controls will be marked with the icon.

To work with Long-term archive, select the appropriate type in the camera cell context menu (Select
archive type Long-term archive, see Figure 65). Media Client will switch to the Long-term archive
mode.

Warning! After switching all operations will be executed only with Long-term archive of given camera. To
return to the Primary archive mode, switch operation mode again.

www.issivs.com
SecurOS 68 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 65. Selecting archive type in the camera cell context menu

After Long-term archive is selected, the (Live/Archive) button in the Camera cell will look like .
Appropriate Camera in the list of cameras in archive mode will be marked with the icon, for example,
see Figure 66.

Figure 66. Cameras working with long-term archive

In Status Bar such cameras also will be marked with the icon.

5.10 Working with Audio


The Media client is used to work with audio.

Warning! To work with live/archive audio the appropriate sound devices should be installed and configured.

Note. The volume of the played back audio record is specified in the Operating System settings and cannot be
managed by SecurOS.

www.issivs.com
SecurOS 69 Quick User Guide
Media Client - Application to Work with Video and Audio

5.10.1 Working with Live Audio

To listen to live audio from an independent microphone, find and activate the required Microphone on
the Microphone Panel or in the Devices Panel.

To listen to live audio from a microphone linked to a camera, find and activate the required Camera in
the Media Client's Working area or in the Devices Panel.

5.10.2 Start/Stop Audio Recording

If a Camera is linked to a microphone, audio recording starts/stops automatically when video recording
starts/stops (see Start/ Stop Video Recording).

To start/stop audio recording from independent microphone do the following:


1. Activate an independent microphone for which it is necessary to start/stop recording. The
microphone control buttons will be displayed in the activated cell (see Figure 67).

Figure 67. Control elements and indicators

Note. If Bound parameter (see SecurOS Administration Guide) is specified in the Microphone object settings,
then recording will start only when specified sound threshold is reached. Otherwise, the recording will start
immediately after command is executed.

2. To start/stop recording click the Record button. When switching to the corresponding mode, the
recording indicators state mode and the Start/ Stop Record button change:
/ (Recording indicator) — the recording is turned on/off (see Figure 67).

/ (Start/ Stop Record) button) — the recording is turned on/off (see Figure 67).

5.10.3 Working with Audio Records

The audio records archive is stored in folders on a storage device (e.g. SATA HDDs, NAS, SAN, etc..).
The actual partition/drive letter dedicated for the recordings is set by the administrator.

To listen to the audio recorded by an independent microphone, find the required Microphone on the
Microphone Panel or in the Devices Panel. Switch to the Archive mode and find the required audio
record. To play back the found record click the Play button.

www.issivs.com
SecurOS 70 Quick User Guide
Media Client - Application to Work with Video and Audio

To listen to the audio recorded by the microphone linked to a camera, find the required Camera in the
Media Client's Working area or in the Devices Panel. Switch to the Archive mode and find the required
video record. To play back a found record click the Play button.

Warning!
1. You can only listen to one microphone recording at the same time.
2. Audio records are played back only at the normal ( ) video playback speed. Otherwise, the audio
will not be played back.
3. To listen to the audio recorded by the microphone linked to a camera, one can activate the
appropriate Camera cell. Otherwise, the audio will not be played back.

5.10.4 Working with a Camera's Speaker

Warning! Some Camera models do not support this feature.

Within SecurOS it is possible to transfer sound from an operator's microphone to a built-in Camera's
speaker.

Note. Operator's microphone is not a SecurOS object and is represented by an audio device connected to the
Mic input of the computer's sound card.

To transfer sound to the built-in camera speaker do the following:

1. Click the Turn speaker on button ( , see figure 68).

Figure 68. Turn speaker on button

Note. If the button has a form, it means that the speaker is being used by another operator.

2. Speak a message into the microphone.

3. After transmitting the message click the Turn speaker off button ( ).

www.issivs.com
SecurOS 71 Quick User Guide
Media Client - Application to Work with Video and Audio

Warning! Transmitting is automatically terminated in the following cases:


1. Camera is deactivated.
2. Camera is switched to the archive mode.

5.11 Controlling PTZ Cameras


PTZ (optical) enabled Cameras are displayed in the Devices Panel with the icon showed in Figure 69.

Figure 69. Camera with PTZ device icon

In the PTZ camera cell there will be a corresponding control button displayed — (PTZ).

Note. If user access rights to the Camera is limited by the View level, then PTZ control button is not displayed
in the camera cell.

5.11.1 Mouse Controls

Note. The ability to use mouse controls is set by the system administrator.

To control a PTZ camera using a mouse, click the (PTZ) button.

If mouse pointer takes the form, the following operations are available:
Pan/ Tilt;
Scaling frame.

If mouse pointer takes the form, the following operations are available:
Centering frame on the selected point;
Scaling selected frame area;
Scaling frame.

To exit PTZ mouse control mode click the (PTZ) button again.

www.issivs.com
SecurOS 72 Quick User Guide
Media Client - Application to Work with Video and Audio

Pan/ Tilt
To pan/tilt the PTZ camera/device (see Figure 70), click and hold the left mouse button and move the
pointer in the required direction (up/down, left/right). Release the mouse button to stop movement.

Figure 70. Pan/ Tilt

Note. The current center of the camera's field of view is marked by a red cross (see Figure above). Camera
rotation speed depends on how the mouse cursor is moved off from the camera center.

Scaling frame
Image scaling (approaching/moving away) is performed with the mouse wheel.

Centering frame on the selected point


To center a frame on the selected point click any point of the frame. Center of the camera will be moved
to the selected point.

Scaling selected frame area


To scale selected frame area click and hold the left mouse button, then select rectangle area on the frame
(see Figure 71).

Figure 71. Selected frame area


Release the mouse button. Selected frame area will be scaled on the full frame size (see Figure 72).

www.issivs.com
SecurOS 73 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 72. Scaled selected frame area

Note. Selected frame area may be scaled in the cell of the other camera if PTZ-camera is a hardware system
such as Axis Q6000-E or Hikvision PanoVU.

5.11.2 PTZ Control Panel

Notes:
1. The enabling/disabling of the display of the PTZ Control Panel is performed by the system
administrator.
2. The Media Client PTZ Control Panel is activated only when a PTZ enabled camera/device is selected.
For non-PTZ cameras, the PTZ Control Panel will stay deactivated.
3. If user access rights to the Camera is limited by the View level, then PTZ Control Panel is blocked.

To control a camera using the PTZ Control Panel do the following:


1. Activate (click on) the PTZ camera. The system will activate the Media Client PTZ Panel
(see Figure 73).

www.issivs.com
SecurOS 74 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 73. Media Client PTZ Control Panel

2. To control a camera, click the corresponding navigation buttons. For the camera to quickly stop, click
the STOP button.

Additional Information
The additional functions of the panel are available depending on the camera model used and the system settings.

5.11.3 Joystick Control


For Windows OS the functionality is available in the following editions: SecurOS Datacenter,
SecurOS Enterprise, SecurOS Premium, SecurOS Prof essional, SecurOS Xpress.

For Linux OS the functionality is available in SecurOS Enterprise edition.

To use joystick controls:


1. Move the joystick to where you want the PTZ camera to turn (combined motion “right–left” and
“forward–backward”). Camera motion speed depends on joystick speed movement.
2. Click on the corresponding joystick buttons (configured by administrator) to zoom in / zoom out of
the image.
3. Click on the corresponding joystick buttons (configured by administrator) to focus on forefront or
background.

www.issivs.com
SecurOS 75 Quick User Guide
Media Client - Application to Work with Video and Audio

5.11.4 Working with Presets and Tours

Operations with camera's presets and tours are performed with the help of PTZ control tab of the Media
Client. These operations are described in the following sections:
Working with Presets;
Working with Tours.

Working with Presets


The Presets panel of the PTZ control tab of the Media Client is used to work with presets (see Figure 74).

Figure 74. Presets panel


The panel consists of specified presets, preset control buttons and a context menu (see Figure 75) that
can be opened by right-clicking on a preset.

Figure 75. Presets panel context menu


Presets are displayed in <Name><[ID]> format, where:
Name — preset name, given at preset creation;
[ID] — preset identifier, assigned to it by SecurOS.

Presets in the list are sorted by [ID].

Warning! When working with presets with the help of other devices (fort example, joystick or CCTV-
keyboard) or scripts, it is necessary to use only identifier, assigned to a preset by SecurOS, i.e. the [ID]
value.

The context menu contains the following commands, that are duplicated with the control buttons:

Go to selected preset ( ) — go to selected preset;

Return to home preset ( ) — go to camera "home" preset;

www.issivs.com
SecurOS 76 Quick User Guide
Media Client - Application to Work with Video and Audio

Refresh preset list ( ) — refresh preset list from the SecurOS;

Create preset ( ) — create new preset;


Update selected preset — remove selected preset;
Remove selected preset — remove selected preset.

Warning! For several camera models the buttons and context menu commands are not available.

To create a preset, move the camera to the required position and select the Add preset command in the
context menu or click the button. In the displayed window (see Figure 76) specify the preset name:

Figure 76. Preset name window


Click the Create button.

Warning! A preset's name restrictions (for example, name length or permitted characters) are defined by the
camera's type and model. The allowable number of presets also depends on the camera type and model.

To move a camera to the required preset do one of the following:

select preset in the presets list, then click the button;


select preset in the presets list, then select the Return to home preset command in the context menu;
double-click required preset in the list.

To update a preset move the camera to required position, select the position you want to update in the
list and select the Update selected preset command in the context menu.

To remove preset select it in the list, then select Remove selected preset command in the context menu.
Click the OK button in the displayed window.

Warning! A preset may be preconfigured by camera manufacturer. In this case it can not be edited or deleted.
Nevertheless such presets are displayed in the list and have an effect on maximum camera preset count.

Working with Tours


Working with the following types of tours is supported depending on the Camera model:
Tours by presets;
Recorded tours;
Keypoint tours.

Tours by presets
Tours created by administrator on the base of the presets, existing in the own camera settings, are
called Tours by presets. The Tours panel of the PTZ control tab of the Media Client is used to work with
tours by presets in SecurOS (see Figure 77).

www.issivs.com
SecurOS 77 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 77. Tours list

The panel consists of specified tours, tour control buttons and a context menu (see Figure 78) that can
be opened by right-clicking on a tour.

Figure 78. Tours by presets panel context menu

Tours are displayed in <Name><[ID]> format, where:


Name — tour name, given at tour creation;
[ID] — tour identifier, assigned to it by SecurOS.

Tours in the list are sorted by [ID].

Warning! When working with tours with the help of other devices (for example, joystick or CCTV keyboard)
or scripts, it is necessary to use only identifier, assigned to tour by SecurOS, i.e. the [ID] value.

The context menu contains the following commands, that are duplicated with the control buttons:

Start tour ( ) — start selected tour;

Stop tour ( ) — stop tour;

Refresh tour list ( ) — refresh tours list from the SecurOS.

To activate patrol mode select required tour in the list, then click the button (Start tour). To
deactivate patrol mode click the button (Stop tour).

To update tour list click the (Refresh tour list) button.

Recorded tours

www.issivs.com
SecurOS 78 Quick User Guide
Media Client - Application to Work with Video and Audio

Warning!
1. The functionality of working with recorded tours and tour control buttons are available not for all
camera models.
2. The ability to record tours is determined by the system administrator.
3. For cameras that support the tour recording functionality, only a limited number of tours specified
by the manufacturer can be recorded.

A tour created by an operator using any PTZ camera controls is called Recorded. A special cells of the
Tours panel of the PTZ control tab of the Media Client is used to work with recorded tours in SecurOS
(see Figure 79). Number of such cells to record tours is specified in the own camera settings and cannot
be changed by the user. Each cell is intended for recording one tour of fixed duration. Recorded tours
are stored in the own camera settings.

Note. The number of cells for tour recording and the duration of the tour is determined by the camera
settings. For information on the tour duration contact the administrator.

Figure 79. List of the recorded tours of the


PTZ panel

The panel consists of the list of the cells to record tours, tour control buttons and a context menu
(see Figure 80) that can be opened by right-clicking on a tour.

Figure 80. Recorded tour context menu

Tours are displayed in <Recorded tour N><[ID]> format, where:


Recorded tour — constant unchangeable part of the tour name;
N — ordinal tour number;
[ID] — tour identifier, assigned to it by SecurOS.

Tours in the list are sorted by [ID].

www.issivs.com
SecurOS 79 Quick User Guide
Media Client - Application to Work with Video and Audio

Warning! When working with tours with the help of other devices (for example, joystick or CCTV keyboard)
or scripts, it is necessary to use only identifier, assigned to tour by SecurOS, i.e. the [ID] value.

The context menu contains the following commands, that are duplicated with the control buttons:

Start tour ( ) — start selected tour;

Stop tour ( ) — stop tour;

Refresh tour list ( ) — refresh tours list from the SecurOS;

Start tour recording ( ) — start tour recording;

Stop tour recording ( ) — stop tour recording;

Delete tour ( ) — delete tour selected in the list. Clears the cell for recording a new tour.

Warning! The Delete tour ( ) button is available not for all camera models.

To record a tour:
1. Select a free cell in the tour list.

Note. If there are no free cells to record a tour, you can reuse one of the occupied cell for recording.

2. Click the (Start tour recording) button.


3. Define the camera route in any available way (using mouse, PTZ panel, CCTV keyboard or joystick).
4. In the recording mode the time passed from the beginning of the tour record is displayed in the
camera cell (see Figure 81). This allows the operator not to exceed the allowed tour time in cases
where it is possible to record a certain number of tours with a specified duration.

Figure 81. Tour recording time

5. To stop tour recording click on the (Stop tour recording) button.

To activate patrol mode select required tour in the list, then click the (Start tour) button. To
deactivate patrol mode click the (Stop tour) button.

www.issivs.com
SecurOS 80 Quick User Guide
Media Client - Application to Work with Video and Audio

To delete tour select required tour in the tour list, then click the (Delete tour) button.

Warning! The Delete tour ( ) button is available not for all camera models.

Keypoint tours

Warning! The functionality of working with keypoint tours is available not for all camera models.

Keypoint tours are created with the help of the special Tour editor and stored in the SecurOS settings.
Working with this type of tours is described below in the following subsections:
Creating tour;
Editing tour;
Deleting tour;
Turning patrol mode on/ off;
Using context menu.

Creating tour

Warning! To create a tour the operator access level to the Camera object must be not less than Configure (
).

To create a keypoint tour:

1. Click the (Create keypoint tour) button on the Tours panel of the PTZ control tab of the Media
Client (see Figure 82).

Figure 82. Calling tour editor

Warning! If the shared control mode is on for the camera (see Shared and Exclusive PTZ Control), then
camera telemetry control will be captured while working with the tour editor.

2. In the Tour creation window (see Figure 83) specify Tour name and Tour identifier (ID).

www.issivs.com
SecurOS 81 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 83. Tour creation window

3. Use the PTZ controls panel to move camera to the tour start position.
4. If necessary, specify camera zoom (Zoom parameter) in this point using PTZ controls panel.

5. Click the (Add keypoint) button in the Tour creation window.


6. Specify keypoint Name and Delay of the camera in this keypoint before jumping to the next
keypoint (see Figure 84).

www.issivs.com
SecurOS 82 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 84. Keypoint parameters

Warning! The time specified in the Delay parameter includes the time it takes for the camera to move from
the previous keypoint.

7. Move the camera to the next keypoint using the PTZ controls panel. Click the (Add keypoint)
button. Specify parameters of the new keypoint in the new entry (see Figure 85).

Figure 85. Second keypoint

www.issivs.com
SecurOS 83 Quick User Guide
Media Client - Application to Work with Video and Audio

8. Repeat the above steps to add the required number of keypoints.


9. After all the required keypoints have been specified, click the Finish creation button (see Figure 85).
10.After saving the tour, the system will display a corresponding message.
11.In the list of tours, the created keypoint tours will be marked with the icon (see Figure 86).

Figure 86. Keypoint tours in the tours list

Editing tour

Warning! To edit a tour the operator access level to the Camera object must be not less than Configure ( ).

To edit a keypoint tour:


1. Select a tour to edit in the tours list of the Tours panel.
2. Select the Edit tour command in the tour context menu (see Figure 87).

Figure 87. Edit tour command

Warning! If the shared control mode is on for the camera (see Shared and Exclusive PTZ Control), then
camera telemetry control will be captured while working with the tour editor.

3. In the Tour editing window (see Figure 88):

www.issivs.com
SecurOS 84 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 88. Tour editing window

Edit Tour name, name of the Keypoint or Delay of the camera in this point.

Delete or add a new keypoint. To delete the keypoint click the (Remove from list) to the right
of the selected keypoint. To add a new keypoint click the (Add keypoint) button, specify point
parameters.

To check the position of the camera at an interested keypoint, click the (Go to keypoint) button
on the corresponding entry.

To change the patrol route, press and hold the button and drag the point to the required
position in the list.
4. After finishing tour editing, click the Save changes button.

Deleting tour

Warning! To delete a tour the operator access level to the Camera object must be not less than Configure (
).

To delete a tour select required tour in the tour list, then click the (Delete tour) button. Tour also
can be deleted via context menu command (see below).

Turning patrol mode on/ off

Warning! To turn patrol mode on/off the operator access level to the Camera object must be not less than
Control ( ).

www.issivs.com
SecurOS 85 Quick User Guide
Media Client - Application to Work with Video and Audio

To activate patrol mode select required tour in the list, then click the (Start tour) button. To
deactivate patrol mode click the (Stop tour) button. Turning patrol mode on/off is also possible via
context menu commands (see below).

Using context menu


Working with keypoint tours is also possible via tour context menu (see Figure 89). To perform an
operation select required tour in the tour list on the Tours panel, then select required command in the
context menu.

Figure 89. Keypoint tour context


menu

5.11.5 Shared and Exclusive PTZ Control

Telemetry control of the Camera can be performed in two modes:


Shared telemetry control — each User Account has an equal rights to control any PTZ Camera. In
this case the control commands are executed in the order they are received.
Exclusive telemetry control — order of the command execution is defined by priority that is
specified for each User Account personally by system administrator. In this case in first turn will be
executed the commands sent by User Account with higher telemetry control priority. When control
is captured by such User Account, then telemetry control access is blocked for all other User Accounts
with lower and the same priority.
When working in exclusive telemetry control mode, there are two options of the operator work:
Capture of PTZ control with automatic control release — in this case PTZ
control is released in 5 secondes after the last command of the operator is executed.
Capture of PTZ control for a long time with release by operator's
command — in this case PTZ control is held and released by operator in manual mode. PTZ
control can also be release by operator, that has a higher PTZ control priority.

Shared telemetry control


In shared telemetry control mode all of the Media Client's PTZ controls are not disabled.

Exclusive telemetry control with automatic release


When PTZ is controlled by any operator and control is intercepted by User Account with higher
telemetry control priority, then the following control elements are blocked on the operator's Media
Client (see Figure 90):

www.issivs.com
SecurOS 86 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 90. Blocked PTZ control elements in the exclusive telemetry control mode

The PTZ button.


PTZ Control Panel.

The "yellow lock" ( ) is used as an icon of blocking. In addition, when mouse pointer is placed over
PTZ button or PTZ Control Panel, the PTZ control on hold tip is displayed.

Exclusive telemetry control with long-term PTZ hold

Warning! This mode is available only if this feature is configured by the system administrator.

If long-term PTZ hold mode is configured, then the on/off button of the long-term telemetry hold
button is additionally displayed in the Camera cell (see Figure 91):

www.issivs.com
SecurOS 87 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 91. Long-term PTZ hold control button

To capture and hold PTZ control for a long time, click on the (Hold/ Release PTZ control) button.

Button changes its appearance to . On the Media Clients of all other operators, depending on PTZ
control priority of these operators, this button will be displayed as follows:

— button is disabled for all operators, whose PTZ control priority is the same or lower. Such
operators will not be able to control telemetry until it will be released from outside (see PTZ
Control Request).

— button is enabled for all operators whose PTZ control priority is higher. Such operators can
both control PTZ, hold and release it.

To release telemetry control for other users when you finished your work, click on the Hold/ Release

PTZ control ( ) button.

5.11.5.1 PTZ Control Request


If PTZ control is held by the operator with the higher priority, then operator with the lower or the same
priority can send a request to release PTZ control. The request can be sent if the administrator has
completed the necessary settings and PTZ control of the requested Camera is held.

To send a request select the PTZ control request command in the Camera cell context menu
(see Figure 92).

www.issivs.com
SecurOS 88 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 92. PTZ Control Request Command

After that the PTZ control request sent message will be displayed on the computer of this operator
(see Figure 93) and the PTZ control request window will be displayed on the computer of the operator
who is holding PTZ control (see Figure 94).

Figure 93. PTZ Control Request Sent Message

Figure 94. PTZ Control Request Window

Warning! If Media Client with the requested Camera is hidden on the Desktop of the operator who is holding
the PTZ control, then the PTZ control request window is not displayed on his monitor.

After receiving the request the operator of the remote computer makes a decision and clicks
corresponding button in the PTZ control request window.

PTZ control request window is displayed on the remote computer on top of all other windows and
automatically disappears in the following cases:
PTZ control is intercepted and held by operator with the higher priority after the PTZ control
request has been sent;
Operator released PTZ control on the remote computer;
PTZ control has been released automatically when timeout expired.

5.12 Working with Other Camera Devices


Camera can be equipped with the following additional devices:
Wiper (see Start/ Stop Wiper).
Washing Kit (see Start/ Stop Washing).

www.issivs.com
SecurOS 89 Quick User Guide
Media Client - Application to Work with Video and Audio

Built-in light (see Turning Light On/ Off).

5.12.1 Start/Stop Wiper

Warning! The ability to control camera wiper is determined by the system administrator.

Some models of cameras can be equipped with a wiper — device, which allows to clean the camera lens
from natural noise - dust, raindrops, snow. In the Cell Title of such camera on the Media Client the
icon is displayed. To turn wiper on select the Start wiper command in the camera cell context menu
(see Figure 95).

Figure 95. Starting Wiper

After the time specified in the camera settings has expired, wiper automatically turns off.

5.12.2 Start/Stop Washing

Warning! The ability to start the washing procedure is determined by the system administrator.

Several models of the cameras can be equipped with the washer that allows to execute lens cleaning. In
the Cell Title of such camera on the Media Client the icon is displayed. To start washing procedure
select the Start washing procedure command in the camera cell context menu (see Figure 96).

www.issivs.com
SecurOS 90 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 96. Starting washing procedure

Warning! The washing procedure cannot be terminated by operator and will end itself after the entire cycle
has been completed.

5.12.3 Turning Light On/Off


On Linux platform (available only for SecurOS Enterprise edition) the functionality is not supported.

Warning! The ability to control camera light is determined by the system administrator.

Some camera models can be equipped with a built-in light, that allows to further illuminate camera
scene. To on/off camera light, select Light in the camera cell context menu, then select Turn on/Turn
off command (see Figure 97).

Figure 97. Turning camera light on/ off

www.issivs.com
SecurOS 91 Quick User Guide
Media Client - Application to Work with Video and Audio

5.13 Customizing Media Client Appearance


This section is about how to configure the Media Client for the needs of the particular operator: how to
select a layout of the Working area, how to place cameras in cells and how to configure additional
panels.

5.13.1 Selecting Layout

Video received from all cameras, selected to work with the given Media Client, is displayed in the
Working area simultaneously, in a page mode. Each Media Client's page is the working area that contains
the number of cells which is defined by a current layout. The active layout is highlighted in the Layout
bar in light green (see Figure 98). To activate another layout click the corresponding button in the Layout
bar.

Figure 98. Layout bar

Note. The set of layouts available in the Layout bar is defined by the system administrator.

The number of Media Client pages depends both on the current layout, and from the total quantity of
cameras selected to work with the given Media Client. If the total quantity of cameras selected to work
with the given Media Client exceeds the allowed number of cells displayed on one page with the
selected layout, then the remaining cells are displayed on the next page. Switching to the next/previous

page (paging) in manual mode is carried out by clicking the and buttons in the Camera
Control Bar (see Figure 99). Paging in automatic mode (with no operator actions) is carried out by

clicking the button.

Figure 99. Camera Control


Bar

Example. If the Media Client is configured to work with 20 cameras and the 3x3 layout is selected, then the
total number of Media Client pages is 3. The last page will contain only 2 Camera cells.

5.13.2 Placing Cameras on Page

After a layout is selected each video page contains a specified number of camera cells. By default, the
camera order in the cells of the pages is set by the system and can be changed by the user. To change
the camera order in the page cells use one of the following methods:

To move a camera to a cell, select from the Devices Panel the camera which needs to be moved to the
selected page (see Figure 100).

www.issivs.com
SecurOS 92 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 100. Selecting camera from the Microphone and Camera List

Click and drag the selected camera icon to the necessary page cell.

Similarly, the camera can be moved to the cell from the Map Window.

Note. Camera can be moved from the Map Window only if it has been selected for working with given Media
Client in its settings.

To change a camera's location on the video page, left-click the cell of the camera that needs to be moved
and holding the button drag the camera to the new cell location (see figure 101).

www.issivs.com
SecurOS 93 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 101. Reordering Cameras in Cells

Note. The camera can be moved both to a blank cell, and to a cell occupied by any other camera.

5.13.3 Customizing Additional Panels

An operator can both display or hide additional panels of the Media Client and change their size.

Note. Additional panels are displayed only if they are enabled by an administrator.

To hide additional panels, click the button when the mouse pointer takes the form shown on
Figure 102.

www.issivs.com
SecurOS 94 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 102. Hiding additional panels

To display hidden additional panels click the button again.

To change panel size (width or height) click the button or the button, and holding it down,
move the mouse pointer in the required direction.

To minimize/maximize a tab of the additional panel click the button or the on it.

5.14 Using Views


Often it is necessary to display video streams from certain Cameras in the Media Client's Working Area.
For example, video streams from Cameras installed on the stage, parking etc. To get a quick access to
image of such Cameras one can use Views.

Views allow to group Cameras and place them to Working Area of the Media Client as required. Views also
can contain Microphones.

Note. Privileges to create, delete, edit and rename Views are delegated by system administrator (more detailed
about these operations see SecurOS Administration Guide).

Figure 103 illustrates an example of View, that consists of:


Camera 1, Camera 2;

www.issivs.com
SecurOS 95 Quick User Guide
Media Client - Application to Work with Video and Audio

Microphone 1, Microphone 3, Microphone 4.

Figure 103. View example

All Views available to operator are listed in the Views List on the Views Panel. The most frequently used
Views can be placed on the Views quick access panel.

Note. Views Panel is displayed if it is specified in system settings.

A View with the All devices name exists always and includes all Cameras and Microphones available to
user. The All devices View, in difference of other Views, is a multi-page view.

Warning! Further operations with Views will be considered for Cameras only. Operations with Views for
Microphones are similar.

User can perform the following operations with Views:


Choosing View in Media Client.
Temporarily Changing View.
Setting Up Views Quick Access Panel.
Sequential Switching of Views.

5.14.1 Choosing View in Media Client

To choose a View in the Media Client click on this View in the Views List or on the Views quick access
panel.
Media Client will display contents of the selected View. Selected View will be marked with the rectangle
frame in the Views List and in blue on the Views quick access panel (see Figure 104).

www.issivs.com
SecurOS 96 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 104. View 2 is selected for displaying

Warning! If Camera, that not belongs to the current View is selected in the Device List, then All devices View
will be automatically displayed.

5.14.2 Temporarily Changing View

You can temporarily change a View by the following ways:


Adding Camera to the Media Client Cell.
Deleting Camera from the Media Client Cell.
Changing Camera Arrangement.
Changing Layout of the Media Client Working Area.

Warning!
1. Temporary View changes are not saved. When switching to the other View and returning to the
previously changed View, then the last one assumes its initial state.
2. Changed View is not specially highlighted in the Media Client window.

To add a Camera to the Media Client cell, drag-and-drop required Camera from the Device list to the
Media Client cell.

Warning! If you select the Camera from the Device List and do not drag it, the All devices View automatically
appears.

To delete a Camera from the Media Client cell, drag-and-drop Camera from the Media Client cell to the
Device List.

To change Cameras arrangement, drag-and-drop Camera from the Device List or from the Media Client
cell to the other cell of the Media Client.

To change layout of the Media Client Working Area, select required layout on the Layout Bar.

www.issivs.com
SecurOS 97 Quick User Guide
Media Client - Application to Work with Video and Audio

5.14.3 Setting Up Views Quick Access Panel

You can configure Views quick access panel by the following ways:
Adding View/ Views to the panel.
Deleting View/ Views from the panel.
Changing View position on the panel.

To add View/ Views to the panel, do one of the following:


to add single View drag-and-drop it from the Views List to the panel;
to add all Views simultaneously, call context menu by right clicking on the panel, and then select
Add all command (see Figure 105).

Figure 105. Views Quick Access Panel Context Menu

To delete View/ Views from the panel:


1. Call context menu by right clicking on the panel or appropriate button on it.
2. Do one of the available actions to hide View/ Views.

To delete View from the panel you can also drag-and-drop it from the panel to the Views List.

To change View position on the panel drag-and-drop required View to the new location.

5.14.4 Sequential Switching of Views

You can alternately observe Views in the Media Client window by sequential switching.
Views can be can switched in auto-scroll mode or manually.

Warning! If your current View is All devices, then sequential switching of the Views is impossible. All Cameras
available to the user will be listed instead.

To sequentially switch Views:


1. Select a View, from which you want to start switching.
2. Do one of the following:

To switch Views in the auto scroll mode click on the (Auto scroll) button on the Camera
Control Bar (see Figure 106). Views will start switching in accordance with time interval, specified in

the Media Client settings. To stop scrolling click on the button;

www.issivs.com
SecurOS 98 Quick User Guide
Media Client - Application to Work with Video and Audio

To switch Views manually use (Next page) and (Prev page) buttons on the Camera
Control Bar.

Figure 106. Camera Control Bar

Note. When switching Views sequentially, the following cases are possible:
if there is only one View on the Views quick access panel, except All devices View, then sequential
switching of the Views listed in the Views List will start;
if there is more than one View on the Views quick access panel, except All devices View, then
sequential switching of the Views located on the Views quick access panel will start;

5.15 Object Controls


This section presents a detailed description of the Camera and Microphone controls.

5.15.1 Camera Cell Controls

Each camera video frame is displayed in a certain cell in the SecurOS Media Client. Controls and
indicators are placed along the cell edges (see Figure 107). Camera state indicators are also displayed in
the Status Bar.

Notes:
1. Camera cell controls are displayed in the camera cell if such feature was configured by system
administrator.
2. If user access rights to the Camera is limited by the View level, then Camera controls are not displayed
in the camera cell/context menu. These controls are the record control, arm/disarm, PTZ control,
Wiper control, Speaker control buttons/commands, Washing Kit and lighting controls. In addition,
the PTZ Control Panel is blocked.

Playback of video archive is also performed from the camera cells. Each cell plays back video archive
made from the associated camera only. To simultaneously play back several archive records made from
different cameras, several camera cells are used.

A detailed description of the controls and indicators of the operating modes is given in the following
subsections:

www.issivs.com
SecurOS 99 Quick User Guide
Media Client - Application to Work with Video and Audio

Live video mode.


Archive mode.

Live video mode

Figure 107. Camera cell controls

A camera cell has the following control elements (numbered in Figure 107):
1. The camera frame. The following colors are used to define video mode and camera state:
no frame — live or archive video, camera is inactive;
turquoise — live video or archive video, camera is active or armed;
yellow — live or archive video, an alarm event was detected.
2. Arming/Disarming button;
3. Camera Identifier;
4. Camera Name;
5. Date and time of the displayed video frame;
6. Wiper or Washing device indicator;
7. Microphone indicator (built-in or connected to the camera);
8. Live video buffering mode and the current state of the buffering process. The following color scheme
is used to indicate the buffering process state:

— buffering mode is on, the buffer is full. Frame playback is in progress;

— the buffer is being filled up;

— the buffer is empty.


9. Live/Archive mode toggle button (Live/Archive button);
10.Button to transmit sound from the operator’s microphone to the built-in Camera's speaker (Turn

www.issivs.com
SecurOS 100 Quick User Guide
Media Client - Application to Work with Video and Audio

speaker on/Turn speaker off button).


11.Button to hold/release long-term PTZ control (Hold/ Release PTZ control button). This button is
displayed if camera has a built-in PTZ device and appropriate option is turned on within SecurOS;
12.PTZ device control button (PTZ button). Present only when camera is equipped with PTZ control;
13.Record Start/Stop button (Start/ Stop Record button) and recording indicator;

Note. If the camera only works with external archive, the recording mode indicator in the cell title is replaced
with the external archive operation indicator. At the same time, archive recording in SecurOS is impossible.

14.Add bookmark to a frame button (Add Bookmark button);

Note. In Live mode is displayed only if record is started. In Archive mode is always available.

15.Export button for video frame export (Export frame button);


16.Digital zoom button and indicator: on/off frame zooming (Zoom button).

Archive mode
In archive mode the following controls are additionally displayed (see Figure 108):

Figure 108. Active camera in archive mode and Archive Panel

1. Archive Search button to search records in archive;


2. Display/Hide camera archive on the Time-Line button (Timeline button);
3. Time-Line;
4. Calendar button for quick archive search;
5. Date of archive displayed on Time-Line;

www.issivs.com
SecurOS 101 Quick User Guide
Media Client - Application to Work with Video and Audio

6. Time-Line scaling buttons;


7. Date and Time of the current archive cursor position (date and time of displayed frame);
8. Standard playback control buttons;
9. Search in Archive button.
10.Scroll bar (is used if archives of several objects are displayed in the Archive Panel).

Background and font color in the Camera Cell Title also depends on camera mode:
black background/white font — live video, camera is active/inactive;
blue-green background/white font — archive video, camera is active/inactive;
black background/yellow font — live video, an alarm event was detected;
blue-green background/yellow font — archive video, an alarm event was detected.

Cell control commands (including current video page mode control commands) are duplicated in the
cell context menu that can be opened by right-clicking anywhere in the cell. Depending on the mode
(live/archive) the context menu may contain different options.

When the mouse pointer is placed over an arbitrary camera cell, then in the Media Client Status Bar the
information about the corresponding Camera is displayed (see Figure 109).

Note. By default, status bar is hidden. To display/hide status bar press the F9 key.

www.issivs.com
SecurOS 102 Quick User Guide
Media Client - Application to Work with Video and Audio

Figure 109. Status Bar

5.15.2 Microphone Cell Controls

Each microphone is placed in a separate cell in the Microphone Panel. Microphone controls and state
indicators are placed along the cell edges (see Figure 110). Microphone state indicators are also
displayed in the Status Bar.

Figure 110. Microphone cell controls

A microphone cell has the following control elements (numbered in Figure 110):
1. Cell frame. The following colors are used to indicate microphone mode:
no frame — live or archive audio, microphone is inactive;
turquoise — live or archive audio, microphone is active.

www.issivs.com
SecurOS 103 Quick User Guide
Media Client - Application to Work with Video and Audio

2. Recording mode indicator;


3. Microphone name;
4. Live/Archive mode toggle button (Live/ Archive button);
5. Record Start/Stop button (Record button).

When the mouse pointer is placed over an arbitrary microphone cell, then in the Media Client Status Bar,
the information about the corresponding Microphone is displayed (see Figure 111).

Figure 111. Status Bar

5.16 Object State Indicators


If some command is executed, the state of the object in SecurOS changes. Object state can also be
changed if some event occurs within SecurOS. Indicators that are displayed on the Media Client are used
to monitor object state. This section presents a detailed description of the Camera and Microphone state
indicators.

5.16.1 Camera State Indicators

Camera state indicators are displayed in the Devices Panel. Each camera button (including icon inside)
reflects its camera's state by different colors (see table 3). If camera state changes, then not only its cell
changes (for example, border color, or buttons color), but also color and shape of its button on the
panel.

Table 3. Camera state icons

Indicator
State/Mode/Equipment
Live Archive

Detached (No signal)

Active

Inactive

Simple modes (camera is inactive)

Recording

www.issivs.com
SecurOS 104 Quick User Guide
Media Client - Application to Work with Video and Audio

Arm

Complex modes (camera is inactive)

Arm + Recording

Arm + Motion detected

Arm + Motion detected +


Recording

Equipment (camera is inactive)

Equipped with PTZ

Equipped with Microphone

Working with external archive (camera is inactive)

Camera works only with external


archive. Archive recording is not
possible

5.16.2 Microphone State Indicators

Microphone state indicators are displayed in the Microphone Panel. Each microphone button (including
icon inside) reflects its microphone's state by different colors (see table 4). If the microphone state
changes, then not only does its cell change (for example, border color, or buttons color), but also the
color and shape of its button in the list changes.

Table 4. Microphone state icons

Indicator
State/Mode
Live Archive

Active

Inactive

Simple modes (microphone is inactive)

Recording

Microphone states indicators are also duplicated in the Devices Panel.

www.issivs.com
SecurOS 105 Quick User Guide
Map Window - Application for Working with the Graphic Scheme of the Object

6 Map Window - Application for Working


with the Graphic Scheme of the Object
The Map Window represents a user interface to display the Map, i.e. the graphic plan of the video
surveillance object on which cameras are placed according to their physical layout on the territory.
Similar to the Media Client, the Map Window is displayed in a separate window. The video from any
camera allocated on the Map Window can also be displayed on the Media Client. An example of the Map
Window is shown in Figure 112.

Figure 112. Map Window

In the map window the following controls are provided:


The Search and Options buttons — are used to search objects on the Map and adjust the order of
displaying objects on the Map.
The Zoom field — is used to scale the Map.
The Levels panel — is used to display all the map levels and provide the ability to toggle between
them.
The Alarms panel — is used to display Map levels with active alarms on them and provide the ability
to quickly view those levels. A Level will be displayed in the Alarms panel if at least one of its objects
has an active alarm.

Warning! Displaying of the Levels and Alarms panels in the Map Window is configurable by the system
administrator.

www.issivs.com
SecurOS 106 Quick User Guide
Map Window - Application for Working with the Graphic Scheme of the Object

6.1 Switching Map Levels


Moving through Map levels is performed with the help of Levels, Alarms panels or level link icon.

Warning! Displaying the Levels and Alarms panels in the Map Window is configurable by the system
administrator.

To go to the required level do one of the following:


Click level name in the list on the Levels panel (see Figure 113).

Figure 113. Levels panel

Click alarmed level name in the list on the Alarms panel (see Figure 114).

Figure 114. Alarms panel

Click the level link icon on the level image in the Map Window (see Figure 115).

Figure 115. Level link icon

Note. Blinking level link icon indicates that an alarm is detected on the linked level.

6.2 Searching Objects on Map


To search for objects in a Map do the following:
1. Click the Search button in the Map Window (see Figure 116).

www.issivs.com
SecurOS 107 Quick User Guide
Map Window - Application for Working with the Graphic Scheme of the Object

Figure 116. Search button in Map Window

2. In the Search key field of the Search window type any character (or character set) that is part of an
object name (see Figure 117).

Note. Search is not case-sensitive.

Figure 117. Search window

3. All objects whose names meet the search conditions will be displayed and grouped by levels in the
Object Tree of the window (see Figure 117).

www.issivs.com
SecurOS 108 Quick User Guide
Map Window - Application for Working with the Graphic Scheme of the Object

6.3 Displaying Objects on Map


By default, for each object displayed on a Map, its name and current state are also displayed
(see Figure 118).

Figure 118. Displaying


object name and state on
Map

Each type of an object displayed on the Map has a unique icon (see Object Icons).

To change the order of an object's attributes displayed on a map (name/state), perform the following
steps:
1. Click the Options button in the Map Window (see Figure 119).

Figure 119. Map Window

2. In the Options window (see Figure 120) select/deselect the appropriate checkboxes.

Figure 120. Options window

Warning! Settings will be applied to the currently displayed map level only. To apply settings to all Map
levels select the Apply to all levels checkbox.

3. Click the OK button.

www.issivs.com
SecurOS 109 Quick User Guide
Map Window - Application for Working with the Graphic Scheme of the Object

6.3.1 Object Icons

Notes:
1. Not initialized state is assigned to the object if the Video Server with which this object is
connected has no connection with the SecurOS core.
2. Icon blinking for certain states of the objects is specified in the system settings.

Table 5. Video Server object icons

Icon State

Connected

Disconnected/Unknown

Not initialized

Table 6. Operator Workstation object icons

Icon State

States of the computer that has an Operator Workstation role are not monitored

Table 7. Camera object icons (no PTZ/PTZ)

Icon State

Disarmed
/

Armed. Motion is not detected


/

Armed. Alarm (motion is detected)


/

Disarmed. Recording is on
/

Armed. Motion is not detected. Recording is on


/

www.issivs.com
SecurOS 110 Quick User Guide
Map Window - Application for Working with the Graphic Scheme of the Object

Icon State

Armed. Alarm (motion is detected). Recording is on


/

No signal/Unknown/Detached
/

Not initialized
/

Table 8. Relay object icons (Woofer, Wiper)

Icon State

Off

On

Unknown

Not initialized

Table 9. Relay object icons (Light)

Icon State

Off

On

Unknown

Not initialized

www.issivs.com
SecurOS 111 Quick User Guide
Map Window - Application for Working with the Graphic Scheme of the Object

Table 10. Relay object icons (Lock)

Icon State

Off

On

Unknown

Not initialized

Table 11. Sensor object icons (Glass, PIR, IR, Gerkon, Smoke)

Icon State

Disarmed

Armed

Alarm

Alarm confirmed

Sabotage

Unknown/Malfunction

Not initialized

www.issivs.com
SecurOS 112 Quick User Guide
Map Window - Application for Working with the Graphic Scheme of the Object

Table 12. Sensor object icons (Window)

Icon State

Disarmed

Armed

Alarm

Alarm confirmed

Sabotage

Unknown/Malfunction

Not initialized

Table 13. Sensor object icons (Fire)

Icon State

Disarmed

Armed

Alarm

Alarm confirmed

Sabotage

Unknown/Malfunction

www.issivs.com
SecurOS 113 Quick User Guide
Map Window - Application for Working with the Graphic Scheme of the Object

Icon State

Not initialized

Table 14. SIP Device object icons

Icon State

Idle

Busy (call to device)

Calling (call from device)

Unknown/Malfunction

6.4 Scaling and Moving Map


To change the scale of the Map level image do one of the following:
1. In the Map Window (see Figure 121) select required scale from the list in the Zoom field.

Figure 121. Changing scale of the Map level image

2. Place mouse pointer over the level image, press the CTRL key and turn the mouse wheel to set
required scale.

www.issivs.com
SecurOS 114 Quick User Guide
Map Window - Application for Working with the Graphic Scheme of the Object

To move Map to the left/right or up/down do one of the following:


use the arrow keys on the keyboard.
use window's scroll bar.
click the level image and holding mouse button down, move the mouse pointer in the required
direction.

Warning! Icons size is specified by administrator in the system settings. When the scale is from 25% to 200%,
icons of the specified size will be displayed in the Map Window. When a map level scale is less than 25%, small
icons will be automatically displayed. When a scale is more than 200% the large icons will be displayed.

6.5 Moving Camera from Map Window to Media Client Cell


To move a camera from the Map Window to the Media Client cell do the following:
1. In the Map Window place the cursor over the camera which should be moved. Click and drag the
selected camera icon to the necessary Media Client cell.

Note. Camera can be moved from the Map Window only if it has been selected to work with the given Media
Client in its settings.

Figure 122. Moving Camera From Map Window To Media Client Cell

Note. This procedure is possible on a Desktop which includes both the Map Window application and the Media
Client.

www.issivs.com
SecurOS 115 Quick User Guide
Map Window - Application for Working with the Graphic Scheme of the Object

6.6 Jump to Viewing Video in the Media Client


From the Map Window one can jump to viewing video in the Media Client.

Warning!
1. Operation is available only for Camera and Sensor objects. Possibility to view video for the Sensor
object is specified by the system administrator separately.
2. Possibility to jump to the Media Client to viewing video is specified by system administrator.

To jump to the Media Client to view video click the icon of one of the following objects located in the
Map Window:
Camera — after jumping the cell of the corresponding Camera will be displayed in the 1x1 layout in
the live video mode;
Sensor — after jumping the cells of all Cameras specified in the selected Sensor object settings will be
displayed in the most appropriate layout in the live video mode.

6.7 Start/Stop Video Recording, Arm/Disarm Cameras


The start/stop recording and arm/disarm operations are executed from the context menu of the
corresponding camera icons on a Map Window.

Additional Information
The indicator of a camera's current mode is located in the status bar below the camera icon:
Disarmed — arm mode off;
Armed — arm mode on;
Alarm — arm mode on; alarm is raised.
If the camera is recording, the status bar updates to the new status description (Record).

To start/stop recording or arm/disarm a camera do the following:


1. In the Map Window place mouse pointer over the icon of the camera, that must be set to arm/disarm
or start/stop record mode. Icons and names of the other cameras will be darkened (see Figure 123).

Figure 123. Map Window: selected camera

2. Right-click the selected camera. The context menu will appear (see Figure 124).

www.issivs.com
SecurOS 116 Quick User Guide
Map Window - Application for Working with the Graphic Scheme of the Object

Figure 124. Map Window: camera context menu

3. From the context menu select one of the following commands:


Arm — to arm camera;
Start record — to start recording;
Start record with prealarm — to start record and add pre-recorded video from pre-recording buffer
before beginning of this record;
Disarm — to disarm camera;
Stop record — to stop recording.

6.8 Controlling Sensor and Relay Objects


Relay and Sensor objects are controlled like Camera (see Start/ Stop Video Recording, Arm/ Disarm
Cameras).

www.issivs.com
SecurOS 117 Quick User Guide
Event Viewer - Application for Viewing Information about System Events

7 Event Viewer - Application for Viewing


Information about System Events
Event Viewer is an interface SecurOS object intended for displaying operative information about current
SecurOS events. List of events displayed in the Event Viewer window can be limited by appropriate
filter that, for example, selects events by their name and type.

Event Viewer can work in two modes:


Events monitoring mode — an operative information about current SecurOS events are displayed;
Events search mode — information about archive events that match specified search criteria are
displayed.

The appearance of the Event Viewer window in the Events monitoring mode is shown in Figure 125.

Figure 125. Event Viewer window

Table 15. Event Viewer window components

Parameter Description

Click this button to switch to the Events monitoring mode. In this


mode SecurOS events are added to the Protocol window as they arise
within the system.
Monitoring (button)
Note. If the button is highlighted in green this means the Event Viewer
works in Events monitoring mode.

www.issivs.com
SecurOS 118 Quick User Guide
Event Viewer - Application for Viewing Information about System Events

Parameter Description

Click this button to switch to the Events search mode to search an


events in accordance with specified criteria.
Events Search (button)
Note. If the button is highlighted in green this means the Event Viewer
works in Events search mode.

Click this button to create a new or edit current Event Viewer filter
Filter Editor (button) (see Customizing Filters).

List of all filters created with the help of Event Viewer object. Select
from the list a filter that will be used in Events monitoring mode and
Events search mode to display an events.
Filter
Note. Preliminary event filtration can be performed by Event Filter object
that is configured by system administrator (see SecurOS
Administration Guide).

Window where events selected by current Event Viewer filter are


displayed. Each protocol record is a table entry that consists of the
following columns:

Object Type — type of the SecurOS object, for which an event is


generated;

Name — name of the object of the given type;


Event Protocol window
Time — event date and time;

Event — event name, specified in the system settings;

Operator — name of the user who acknowledged an alarm


event. This field is populated automatically when an event is
acknowledged (see Acknowledgment of Alarm);

Comment — comment on the event.

Comment on the event. As opposed to the Comment field in the


Comment window
table displays complete comment text.

Each record is highlighted in the Protocol window with one of the following colors:
White — standard record;
Yellow — alarm record. If it is specified in the system settings, operator have to acknowledge a
record during specified time period (see SecurOS Administration Guide);
Gray — acknowledged alarm or information record.

Note. Record color depends on event type and is specified by the system settings.

The following operations are available in the Event Viewer:


Acknowledgment of Alarm.
Events Filtering.

www.issivs.com
SecurOS 119 Quick User Guide
Event Viewer - Application for Viewing Information about System Events

Searching Events.
Viewing Event in the Media Client.
Sending Emergency ticket to the Emergency service with the Help of Event Viewer.

7.1 Acknowledgment of Alarm


To acknowledgment an alarm select appropriate alarm record in the protocol window, then press the
Space key on the keyboard or select the appropriate command from the context menu.

Warning! Possibility to acknowledge an alarm and time period for operator reaction on alarm event are
defined by system operator. If specified reaction time period is expired it is not possible to acknowledgment
an alarm further. After alarm acknowledgment, log entry changes its color. Operator field displays name of
the SecurOS user or Windows user (if Active Directory is used, see SecurOS Administration Guide), who
acknowledged this alarm.

7.2 Events Filtering


To filter events displayed in the protocol window select appropriate filter (see Customizing Filters)
from the Filter drop-down list (see Figure 126).

Figure 126. Selecting filter

7.3 Searching Events


Searching events should be used to search different events in the system. To switch to Events Search
mode, please, click Events Search in the Event Viewer window.

You can search events in the system using the following parameters:
Time interval
Object type
Object name
Event name

Example: Search the alarms over the particular time interval attributed to Camera 1 and Camera 2.
Please, follow these steps to complete the task.
Set the time interval in the fields From and To
Choose Camera in the Object Type list
Tick Camera 1 and Camera 2 in the Names list
Tick Alarm in the Events list

www.issivs.com
SecurOS 120 Quick User Guide
Event Viewer - Application for Viewing Information about System Events

Click the Search button


As a result, the system will show all the alarms attributed to cameras in the Event viewer window (see
Figure 127).

Figure 127. Event Viewer searching form

Features of Events Search Mode


1. The selected Filter value influences the possible values of Object Type, Names and Events.
2. The selected Filter value also influence the search results. For example, if there is Filter 1 in the
system to search alarms attributed to the cameras, you will finally see only alarms produced by
cameras.
3. If you do not specify From and To parameters, the event search will be performed from the date and
time of the first entry in the Event Viewer database to the date and time when the Search button was
pressed.

Note. Searching the events which occurred over a long time interval is time-consuming.

4. If you do not choose Object Type, the system will show all the events in the search results. Names
and Events will go gray. Vice versa, if you do choose Object Type, you may tick a particular object.
The rule is valid for the Events list.
5. Type in the relevant fields to find an parameter value quickly. For example, if you type "Entrance
Checkpoint" in the Names field, you will see each possible value comprising "Entrance Checkpoint".
6. If you need to find all the events of the particular type, tick Normal, Alarm or Information in the
Events list.

7.4 Viewing Event in the Media Client


Using Event Viewer operator can call a Media Client to view frames that match a registered event.

Warning!
1. Operation is available only for events that were generated by Camera, Sensor, LPR: logic module and
Cargo: logic module objects. Possibility to view Sensor's events is specified by the system administrator
separately.
2. Possibility to view an event in Media Client is specified by system administrator.

www.issivs.com
SecurOS 121 Quick User Guide
Event Viewer - Application for Viewing Information about System Events

To view video do the following:

1. In the Protocol window right click an event, video of which you want to view.
2. Select the View event in Media Client command in the context menu (see Figure 128).

Note. Archive video can also be opened in a Media Client by double clicking or using hot keys.

Figure 128. Event context menu in the Protocol window

3. In the Media Client selected to work with that Event Viewer, an appropriate Camera will be switched to
archive mode. Archive pointer will be set in position corresponding an event time. At the same time
all other cameras of the Media Client will be switched to on-line mode.

Warning! Automatic jump to the Media Client window is not performed. It must be activated manually.

Notes:
1. When working with Sensor's event all Cameras associated with this object will be switched to archive
mode. Minimal layout, that allows to place all cameras associated with given Sensor, will be
automatically selected on the Media Client.
2. If working with archive is not allowed by system settings, then appropriate camera of the Media
Client will display on-line video.

4. To view an event activate required Media Client and play a record.

7.5 Sending Emergency Ticket to the Emergency Service with the Help
of Event Viewer
On Linux platform (available only for SecurOS Enterprise edition) the functionality is not supported.

Using an Event Viewer operator can send Emergency ticket to an external Emergency service.

Warning!
1. Operation is available only for events that were generated by Camera object.
2. Emergency ticket can be sent only if this feature is configured by the system administrator.

To send an Emergency ticket do the following:


1. In the Protocol window right click an event, video of which you want to view.

www.issivs.com
SecurOS 122 Quick User Guide
Event Viewer - Application for Viewing Information about System Events

2. To view a video record and make a decision if this event is an incident select the View event in
Media Client context menu command (see Figure 129).

Note. To quickly jump to the Media Client to view an event double click required event from the list.

3. If after of examination an event is classified as an incident, return to appropriate entry in the Event
Viewer. In the context menu select the Fill out Ticket and send it to Emergency Service command
(see Figure 129).

Figure 129. Event context menu in the Protocol window

4. In the Emergency Ticket window (see Figure 130) select from the list the Incident Type, select, if
necessary, the People in danger checkbox and fill out the Additional Info field.

Figure 130. Emergency ticket

5. Click the Send button to send Emergency ticket.

After message is sent two events of the Emergency ticket sending are added to the Protocol window:
Event of sending by User Account — is generated by User Account object.

www.issivs.com
SecurOS 123 Quick User Guide
Event Viewer - Application for Viewing Information about System Events

Event of sending by Emergency Service — is generated by Emergency Service object.

If emergency ticket was successfully sent by Emergency Service then sent data are displayed in the
comment window. If sending failure occured the reasons of the error are displayed (for example,
see Figure 131).

figure 131. Emergency ticket sending error message

7.6 Customizing Filters


Filter is a set of criteria that defines sampling and displaying events from the common SecurOS log.
Each filter has its own unique name and can be called from the filter list.

Event Viewer object allows to create any number of filters. When the Event Viewer is started for the first
time the filter list contains the only Default filter which permits the conclusion of all events from all
objects SecurOS without restrictions.

To configure filter the Filter Editor is used (see Figure 132).


To launch Filter Editor click the Filter Editor button in the Event Viewer window. To stop working and
exit click the Close button in the Filter Editor window.

www.issivs.com
SecurOS 124 Quick User Guide
Event Viewer - Application for Viewing Information about System Events

Figure 132. Filter Editor window

To create a new filter do the following:


1. Click the Create New Filter button in the Filter Editor window.
2. Specify parameters of a new filter (see Table 16).
3. Click the Save button. Created filter will be saved within the system and available in the filter list
(the Filter field).

Table 16. Filter parameters

Parameter Description

Filter Name of current filter selected in the Event Viewer window.

Selected Filter Settings

Name of the currently used filter. When creating a new filter, type
Filter name
its name in this field.

www.issivs.com
SecurOS 125 Quick User Guide
Event Viewer - Application for Viewing Information about System Events

Parameter Description

Select from the list the event type that must be displayed in the
Event Viewer window if given filter is used. Possible values:

Alarm only — only alarm messages. Messages of this type


must be acknowledged by operator (if this feature is allowed in
Event type object settings, see SecurOS Administration Guide);

Alarm and information — only alarm and information


messages;

Any — all messages.

Specify maximum number of records to display in the Event Viewer


Number of events limit window if given filter is used. When specified value is reached, then
oldest records will be substituted with newest ones.

Show events from objects

Type any characters that are a part of an object name. The object tree
will display only those objects whose names contain specified
Filter
characters. If the field is empty then all SecurOS objects, including
disabled in the SecurOS Object tree, will be displayed in the tree.

Buttons (Select all)/ Click the appropriate button to select/deselect checkbox for all
(Clear all) objects of the tree simultaneously.

Tree of the objects the events of which can be displayed in the Event
Viewer window. The structure of the tree depends on the Filter
parameter value. To enable displaying object's events select
checkbox on the left of the object name. To disable displaying
object's events deselect checkbox.
Object tree
Note. All object in the tree are grouped by object type. The name of the
grouping object is the same as type name. To select all object of the same
type, select checkbox on the left of grouping object. If not all object of the
same type are selected, then the icon is displayed on the left of the
grouping object.

Buttons

Create New Filter Create and save a new filter.

Remove Selected Filter Remove selected filter from the list.

Save Save current filter settings changes.

Cancel Cancel current filter changes.

Close Close filter editing panel and save no changes.

To edit filter parameters do the following:


1. In the Filter field of the Filter Editor select from the list the filter that must be edited.
2. Change filter parameters.

www.issivs.com
SecurOS 126 Quick User Guide
Event Viewer - Application for Viewing Information about System Events

3. To save filter with the same name click the Save button. To save filter with a new name specify it in
the Filter field, then click the Save button.

Warning! When filter that is being edited is saved with a new name, the initial filter is completely removed
and can not be restored.

To remove filter do the following:


1. In the Filter field of the Filter Editor select from the list the filter that must be removed.
2. Click the Remove Selected Filter button.

7.7 Customizing Operator GUI

Each operator can customize Event Viewer window appearance. The following components can be
adjusted in the window:
Order of the protocol columns;
Width of the protocol columns;
Protocol entries font size;
Position of the protocol window and comment window delimiter.

To change the order of the table columns click required column by the left mouse button and holding
button down move column to the required position.

To change column width place mouse pointer over column delimiter. Mouse pointer will be as
presented in Figure 133.

Figure 133. Changing table column width

Click and hold the left mouse button, then move a pointer into required direction.

To change font size for the entries displayed in the Event Viewer window use the following shortcuts:
- (Num Pad) — decrease font size;
+ (Num Pad) — increase font size.

Note. All shortcuts available in the Event Viewer window are described in the Keyboard Shortcuts section
(see Event Protocol Window).

To change a position of the protocol window and comment window delimiter place mouse pointer
over it. Mouse pointer will be as presented in Figure 134.

www.issivs.com
SecurOS 127 Quick User Guide
Event Viewer - Application for Viewing Information about System Events

Figure 134. Changing protocol window and comment window delimiter position

Click and hold the left mouse button move delimiter to the required direction.

To save GUI changes press the Ctrl + S keys. Otherwise all changes will be lost when Event Viewer
window will be started next time.

Warning! All settings of the Event Viewer window are saved only for Windows user account.

www.issivs.com
SecurOS 128 Quick User Guide
Subsystem for Working with SIP Devices

8 Subsystem for Working with SIP


Devices
On Linux platform (available only for SecurOS Enterprise edition) the functionality is not supported.

External SIP Devices (intercoms) are devices for emergency communication, for example, with a
situation monitoring center or emergency assistance. Such devices can be located in crowded places, in
places of increased danger, etc. In an emergency, a person can use the intercom to call the monitoring
center for assistance, etc. On the other hand, the operator of such a center can visually monitor the
situation in the area of the intercom installation and, if necessary, make an outgoing call on the
intercom. Visual control is carried out by the operator using a camera built into the intercom, or
cameras installed in the immediate vicinity of it.

When establishing incoming or outgoing connection with a SIP Device:


The device becomes inaccessible to other operators.
All Cameras linked to this SIP Device are displayed in the Media Client. The primary Camera of this
device is always displayed in the upper left corner of the Media Client.
PTZ cameras (that are linked with the device) will automatically go to the presets specified for
working with the SIP Device.
After the connection is established, one of the following events is recorded in the Event Viewer:
Incoming call — is generated at an incoming call from a SIP Device to the SecurOS by the object
with the SIP Device type;
Outgoing call — is generated at an outgoing call from SecurOS to a SIP Device by the object with
the SIP Device type.

This section contains the following subsections:


SIP: GUI - Application for Working with SIP Devices — contains a description of the SecurOS
operator interface for making outgoing calls to and receiving calls from SIP Devices.
Calling SIP Device from Media Client — contains a description of how to call a SIP Device from
the Media Client window.
Working with SIP Devices from Map Window — contains a description of operations with SIP
Devices in the Map Window and their features.

8.1 SIP: GUI - Application for Working with SIP Devices


The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium.

The SIP: GUI application is intended for making calls from SecurOS to external SIP Devices (intercoms)
and receiving calls from them.

The appearance of the SIP: GUI window in call standby mode is shown in Figure 135.

www.issivs.com
SecurOS 129 Quick User Guide
Subsystem for Working with SIP Devices

Figure 135. SIP: GUI window

The window contains the following main elements (the serial number of the element corresponds to the
numbering in the figure):
1. Operator information block — contains the operator's login and current state.
2. SIP Devices block — contains SIP Devices tree, that the current operator can work with and the SIP
Device search field.
3. Selected SIP Device information block — contains the name of the SIP Device selected in the Devices
tree and its current state.
4. Current call block — contains detailed description of the SIP Device, selected in the Devices tree and
the state of the current call. Also contains call control tools.

For more information on the blocks see General Description subsection.

This section also contains the description of the following operations:


Searching SIP Device in the List.
Calling SIP Device.
Receiving Call from SIP Device.
Jump to Viewing Video in the Media Client.
Calling SIP Device from Media Client.

Some operations with SIP Devices are available to the operator from the Map Window (see Working
with SIP Devices from Map Window).

8.1.1 General Description

SIP: GUI window consists of 4 blocks. The horizontal size of each block can be changed using the
vertical divider by moving it with the mouse.

Details of each block are provided in the following sections:


Operator information block.
SIP Devices block.
Selected SIP Device information block.
Current call block.

www.issivs.com
SecurOS 130 Quick User Guide
Subsystem for Working with SIP Devices

Operator information block


The block contains the login and state of the current operator. The appearance of the block is shown in
Figure 136.

Figure 136. Operator information block

Possible states of the operator are the following:


Online — normal working mode. The operator is at his workplace and ready to make and receive
calls (see Figure 136).
Away (calls disabled) — the operator temporarily left the workplace. Incoming calls do not
attract the operator's attention. In this state the background color of the block changes
(see Figure 137).

Figure 137. Away (calls disabled) state

For the details see Changing Operator State section.

SIP Devices block


This block contains a list of SIP Devices and their IDs. Devices are grouped by parent System object.
Also contains a SIP Device search string. The appearance of the block is shown in Figure 138.

Figure 138. SIP Devices block

The list displays the current states of SIP Devices and the corresponding icons (for some states):
1. SIP Device with which the SecurOS operator is currently communicating (outgoing or incoming
connection established).
2. Idle SIP Device (no outgoing or incoming calls).
3. SIP Device with which there is no connection, for which no contact is specified, or the device settings
are incorrect.
4. SIP Device that calls SecurOS.
5. SIP Device that is currently used by other operator.

www.issivs.com
SecurOS 131 Quick User Guide
Subsystem for Working with SIP Devices

6. SIP Device receiving a call from SecurOS.

Selected SIP Device information block


This block contains the name of the current SIP Device and its current state. Block colors and states
correspond to the colors and states of the SIP Devices in the SIP Devices block (see SIP Devices block).
The example of the block appearance is shown in Figure 139.

Figure 139. SIP Device information block

Current call block


This block contains a textual description of the SIP Device (for example, the installation site address),
the button for copying the description to the clipboard, the time of incoming / outgoing calls and
call control buttons. The example of the block appearance is shown in Figure 140.

Figure 140. Current call block


The block contains the following control buttons:

— button for copying the description of a SIP Device to the clipboard.

— button to jump to viewing video in the Media Client. It is displayed if at least one Camera
is linked to the device.

— button to call SIP Device.

— button to answer incoming call from a SIP Device.

— hang up button.

— button for switching operator's microphone off.

www.issivs.com
SecurOS 132 Quick User Guide
Subsystem for Working with SIP Devices

— button for switching operator's microphone on.

8.1.2 Changing Operator State

To change the operator's state click the icon to the right of the current state and select the required
one from the list (see Figure 141).

Figure 141. Changing Operator Status

8.1.3 Searching SIP Device in the List

To quickly search for a SIP Device in the list, enter any character (or set of characters) of the device
name, including device identifier, in the Search field (see Figure 142).

Figure 142. Searching SIP Device in the List

Note. Search is case-sensitive.

All SIP Devices that meet the search conditions will be displayed in the list (see Figure 142).

www.issivs.com
SecurOS 133 Quick User Guide
Subsystem for Working with SIP Devices

8.1.4 Calling SIP Device

To call SIP Device from SecurOS:


1. Select required SIP Device in the list.

2. Click the button.

The SIP: GUI window will look as follows (see Figure 143):

Figure 143. Calling SIP Device

When the connection is established (i.e. if the SIP Device answered the call), the window will look like
this (see Figure 144):

Figure 144. External SIP device answered outgoing call from SecurOS

www.issivs.com
SecurOS 134 Quick User Guide
Subsystem for Working with SIP Devices

By default, after the call is answered the SecurOS operators microphone is on. To temporarily turn the

microphone off while talking to a caller, click the button. The appearance of the button will

change to . Click the button again to turn the microphone back on.

To hang-up click the button.

8.1.5 Receiving Call from SIP Device

When a call comes from an external intercom to SecurOS, the SIP: GUI window as follows
(see Figure 145):

Figure 145. Incoming call

To answer incoming call click the button.

Note. After dialing the number on the intercom, the call is placed in the call queue in SecurOS. If no SecurOS
operator answers within 40 seconds, the call is declined by the timed out.

When the connection is established (i.e. if the SecurOS operator answered the SIP Device call), the
window will look like this (see Figure 146):

www.issivs.com
SecurOS 135 Quick User Guide
Subsystem for Working with SIP Devices

Figure 146. Window appearance when answering incoming call

By default, after the call is answered the SecurOS operators microphone is on. To temporarily turn the

microphone off while talking to a caller, click the button. The appearance of the button will

change to . Click the button again to turn the microphone back on.

To hang-up click the button.

8.1.6 Jump to Viewing Video in the Media Client

To display on the Media Client all Cameras linked to the current SIP Device from the list, select the

required device in the list and click the (Show cameras) button, see Figure 147.

Figure 147. Jump to Viewing Video in the Media Client

www.issivs.com
SecurOS 136 Quick User Guide
Subsystem for Working with SIP Devices

The most suitable layout will be selected on the Media Client. The layout cells will display all Cameras
linked to this SIP Device. The primary Camera of the SIP Device will be located in the upper left cell.

Note. Primary Camera of the SIP Device is specified by the system administrator.

Warning! Automatic jump to the Media Client window is not performed. The window must be activated
manually.

8.2 Calling SIP Device from Media Client


SecurOS operator can call an external SIP Device from the Media Client’s Camera cell.

Note. To make such a call, a Camera displayed on the Media Client must be linked to at least one SIP Device.

To call an external SIP Device from the Camera cell:


1. Call the Camera cell context menu with the right mouse button.
2. Select the Voice notification command in the list of commands (see Figure 148).

Figure 148. Voice notification command to call SIP Device

Note. If this Camera is linked to several SIP Devices, click the arrow to the right of the command (see the figure
above) and select the required device from the list.

8.3 Working with SIP Devices from Map Window

Displaying and states of SIP Devices in the Map Window


SIP Devices available to the operator in the Map Window can have the following states:

— SIP Device is idle.

— SIP Device with which the SecurOS operator is currently communicating (outgoing or
incoming connection established). Also a SIP Device receiving a call from SecurOS.

www.issivs.com
SecurOS 137 Quick User Guide
Subsystem for Working with SIP Devices

— incoming call from SIP Device to SecurOS.

— SIP Device with which there is no connection, for which no contact is specified, or the
device settings are incorrect.

When making a call from SecurOS (see Calling SIP Device) to a SIP Device displayed in the Map
Window, the map will be automatically centered relative to this device (if possible).

Note. If the SIP Device icon is located in the border areas of the map, the map is not centered.

Operations with SIP devices in the Map Window


When working with SIP Devices from the Map Window, the operator can perform the following
operations:

Warning! The ability to perform operations is configured by the system administrator.

Calling SIP Device.


Jump to cameras linked to the SIP Device.

Calling SIP Device


To make a call to the SIP Device from the Map Window select the Voice notification command in the
device context menu (see Figure 149).

Figure 149. Voice notification command

Jump to cameras linked to the SIP Device


To display on the Media Client all Cameras linked to the given SIP Device select the Show cameras
command in the device context menu (see Figure 150).

www.issivs.com
SecurOS 138 Quick User Guide
Subsystem for Working with SIP Devices

Figure 150. Show cameras command

The most suitable layout will be selected on the Media Client. The layout cells will display all Cameras
linked to this SIP Device. The primary Camera of the SIP Device will be located in the upper left cell.

Note. Primary Camera of the SIP Device is specified by the system administrator.

www.issivs.com
SecurOS 139 Quick User Guide
Using CCTV Keyboards and Joysticks

9 Using CCTV Keyboards and Joysticks


SecurOS system supports integration with CCTV keyboards and joysticks for controlling user interface
objects (for example, Media Client, cameras and their working modes, layouts and Views of Media Client
or other objects).

SecurOS system supports the following keyboards and joysticks:


AXIS T8310.
Bosch Intuikey.
Bosch KBD-Universal XF.
Hanwha SPC-7000.
Hikvision DS-1100KI.
Panasonic WV-CU950.

Note. See SecurOS Administration Guide for information about SecurOS system integration with CCTV
keyboards and joysticks.

SecurOS system ignores commands with invalid input values when working with CCTV keyboards
and joysticks. Examples of invalid input in commands:
ID of a Camera is not available in the Cameras list of the active Media Client.
The selected camera working mode is prohibited by the Media Client working mode (for example,
switching camera to archive mode when Media Client is working in Live only mode).

9.1 AXIS T8310


To start using SecurOS system with AXIS T8310 it is required to:
Activate Media Client.
Activate camera.

After that, the following functions become available:


Turning archive mode on/ off.
PTZ control.
Moving the camera to presets.
Controlling focal length of the camera.
Controlling iris of the camera.
Playing back records.
Exporting video frame in standard format.

www.issivs.com
SecurOS 140 Quick User Guide
Using CCTV Keyboards and Joysticks

Note. The set of available functions depends on the active camera model, working mode and settings of the
active Media Client (see Working modes of Media Client section).

AXIS T8310 overview with specified device components is shown in Figure 151:

Figure 151. AXIS T8310 components overview

9.1.1 Working with AXIS T8312 Keypad

Warning! Only the objects of current SecurOS Desktop are available while working with AXIS T8312 (see
Desktop Administration section for details).

The AXIS T8312 keypad (see Figure 152) can be used to:
Activate Media Client.
Activate camera.
Turn archive mode on/ off.

Figure 152. AXIS T8312 keys layout

Warning! SecurOS executes a command when a key is released. If one of the keyboard keys is pressed,
pressing of other keys will be ignored.

www.issivs.com
SecurOS 141 Quick User Guide
Using CCTV Keyboards and Joysticks

Note. To reset input made on the AXIS T8312 keypad, press the F1 key.

To activate Media Client, specify the required Media Client ID with the 0...9 keys and press the
key.

Note. Contact the system administrator to obtain the IDs of Media Clients.

Active Media Client has light blue frame (see Figure 153).

To activate camera, enter the required ID with 0...9 keys and press the key. Use Camera IDs,
displayed in the Camera cell headers (see Camera Cell Controls section for details).

Warning! Camera activation is not possible in the following cases:


1. Camera is not displayed in the Cameras list of the active Media Client.
2. Camera cannot be displayed at the moment (for example, when Media Client is working in Alarming
mode).

Active camera cell has blue frame (see Figure 153).

Figure 153. Active Media Client and the active camera cell

Warning! The functions described below are available for active camera depending on the Media Client
working mode (see section Working modes of Media Client).

To switch all cameras of active Media Client to archive mode, press the F3 key.

To switch active camera to archive mode, use playing recording from the specified time feature.

To switch all cameras of active Media Client to live mode, press the F2 key.

www.issivs.com
SecurOS 142 Quick User Guide
Using CCTV Keyboards and Joysticks

9.1.2 Working with AXIS T8311 Joystick

Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).

The AXIS T8311 joystick (see Figure 154) can be used to:
Control camera PTZ.
Moving the camera to presets.
Controlling focal length of the camera.
Controlling the camera iris.

Figure 154. AXIS T8311 keys layout

To control camera PTZ:

Note. The movement speed depends on the joystick's deflection angle. The zoom speed depends on the knob
rotation angle.

1. Move the joystick left and right to change camera pan.


2. Move the joystick up and down to change camera tilt.
3. Turn the joystick knob to zoom.

To move the camera to a preset:


Press the J1 key to move to the preset with ID 1.
Press the J2 key to move to the preset with ID 2.
Press the J3 key to move to the preset with ID 3.
Press the J4 key to move to the preset with ID 4.

Presets IDs are displayed on the Presets panel on the PTZ control tab of the Media Client (see
section Working with Presets and Tours for details).

www.issivs.com
SecurOS 143 Quick User Guide
Using CCTV Keyboards and Joysticks

To apply camera auto focus, press the L key.

To apply automatic iris control of the camera, press the R key.

9.1.3 Working with AXIS T8313 Jogdial

Warning! The functions described below are available for active camera working in archive mode (see
section Working with AXIS T8312 Keypad).

The AXIS T8313 jogdial (see Figure 155) can be used to:
Play back records.
Export video frame in standard format.

Figure 155. AXIS T8313 jogdial keys


layout

While in archive mode:


Press the key to play recording/pause playing.
Press the key to skip to the previous recording.
Press the key to skip to the next recording.
Turn the shuttle ring:
Clockwise to increase playing speed.
Counter-clockwise to decrease playing speed.

Note. If the shuttle ring is released, playback stops.

Turn the jogdial:


Clockwise to playback recording forward frame by frame.
Counter-clockwise to playback recording backward frame by frame.

Note. Turning the jogdial stop playback and then starts playing frame by frame.

www.issivs.com
SecurOS 144 Quick User Guide
Using CCTV Keyboards and Joysticks

Warning! If the shuttle ring is held in turned position, SecurOS system will ignore pressing keys of the AXIS
T8310. SecurOS system will respond to pressing keyboard keys after the shuttle ring is released.

To play recording from the specified time, specify the time in HHMM format with the 0...9 keys of AXIS
T8312 numeric panel and press the key. The archive pointer will be set to the first archive frame after
the specified time.

Example. Entering 1100 and pressing sets the archive pointer to the first frame after 11:00 time mark.

To export video frame in standard format (see the Exporting Video Frame In Standard Format section
for details), press the L key. The system will display a window with information about the saved frame
(see Figure 156).

Figure 156. Information about frame

9.2 Bosch Intuikey


To start using SecurOS system with Bosch IntuiKey it is required to select active camera.

After that, the following functions become available:


PTZ Control of Active Camera.
Arming/ Disarming Cameras.
Recording Control.
Other Operations.

Note. The set of available functions depends on the active camera model, working mode and settings of the
active Media Client (see Working modes of Media Client section).

Bosch IntuiKey overview is displayed in Figure 157:

www.issivs.com
SecurOS 145 Quick User Guide
Using CCTV Keyboards and Joysticks

Figure 157. Bosch IntuiKey overview

Table 17. Bosch IntuiKey components

Number Description

1 Menu and programmatic keys

2 Display

3 Functional keys

4 Numeric keys and Enter key

Initially the main menu of Bosch IntuiKey displays commands, specified by the system administrator
(see SecurOS Administration Guide). The default main menu is displayed in Figure 158.

www.issivs.com
SecurOS 146 Quick User Guide
Using CCTV Keyboards and Joysticks

Figure 158. Bosch IntuiKey main menu

The menu contents changes depending on selected command. Selecting the Other commands
command opens the new menu with the commands not assigned to the main menu. The default Other
commands menu contains the following functions:
Start tour.
Stop tour.
Arm camera.
Disarm camera.
Start recording video.
Stop recording video.

Note. The Other commands item is always located in the right bottom.

To execute a command, press the programmatic key near the required menu item.

If the entered command requires additional input, the main menu displays the hint text.
Example. If the Activate camera command is selected, the menu will display the hint "Specify Camera ID
and press [Enter]. Press [Clr] to Exit".

The display (see 2 in Figure 157) shows user input.

www.issivs.com
SecurOS 147 Quick User Guide
Using CCTV Keyboards and Joysticks

9.2.1 Selecting Active Camera

Warning! Media Clients available for usage with Bosch IntuiKey are specified in the keyboard settings (see
SecurOS Administration Guide for details). If a command is sent to unavailable Media Client, it will be
ignored by SecurOS system.

To start using SecurOS system with Bosch IntuiKey it is required to:


Activate Media Client.
Activate camera.

Note. When SecurOS starts, Media Client, specified for default control by the keyboard, will be active
(see SecurOS Administration Guide).

To activate Media Client:

Note. When a Media Client is activated, the system switches to Desktop, containing activated Media Client.

1. Select the Activate Media Client command in the menu.


2. In the new menu select the name of required Media Client.

Active Media Client has light blue frame (see Figure 159).

Figure 159. Active Media Client and the active camera cell

Select Media Client layout if needed.

www.issivs.com
SecurOS 148 Quick User Guide
Using CCTV Keyboards and Joysticks

To activate camera:
1. Select the Activate camera command in the menu.

2. Specify the required Camera ID with 0...9 keys and press the key. Use camera IDs,
displayed in the camera cell headers (see Camera Cell Controls section for details).

Warning! To delete numbers entered by the numeric keys, press the key.

Active camera cell has blue frame (see Figure 160).

Use the main menu commands Up, Down, Left and Right to change active camera.

To select Media Client's layout:


1. Select the Select layout command in the menu.
2. In the new menu select the Previous layout or Next layout command.

All available Media Client layouts are switched in their order of appearance in the Layouts panel.
Selected layout is highlighted in the Layouts panel (see Selecting Layout section).

Turn on/ off automatic paging of Media Client:


1. Select the Select layout command in the menu.
2. In the new menu select the Autoscroll ON/Autoscroll OFF commands.

9.2.2 PTZ Control of Active Camera

Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).

Bosch IntuiKey can be used to:


Control camera PTZ.
Start and stop tours.

To control camera PTZ:

Note. The movement speed depends on the joystick's deflection angle. The zoom speed depends on the knob
rotation angle.

1. Move the joystick left and right to change camera pan.


2. Move the joystick up and down to change camera tilt.
3. Turn the joystick knob to zoom.

To start tour:
1. Select the Start tour command in the menu.

2. Enter the tour ID using the 0...9 keys and press the key. Use tour IDs, specified on
the Tours panel of the PTZ control tab of the Media Client (see the Working with Presets and Tours

www.issivs.com
SecurOS 149 Quick User Guide
Using CCTV Keyboards and Joysticks

section for details).

Warning! To delete numbers entered by the numeric keys, press the key.

To stop tour, select the Stop tour command in the menu.

9.2.3 Arming/Disarming Cameras

Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).

To arm the camera, select the Arm menu command.

To disarm the camera, select the Disarm menu command.

Note. See the Arming/ Disarming Cameras section for details.

9.2.4 Recording Control

Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).

To start recording video, select the Start record menu command.

To stop recording video, select the Stop record menu command.

9.2.5 Other Operations

Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).

This section describes the following operations:


Changing the camera cell size.
Exporting video frame in standard format.
Setting bookmarks.
Executing Macros.

To change the size of the active camera cell:


Select the Maximize camera command in the menu to maximize the camera cell.
Select the Restore camera command in the menu to switch the camera cell to the previous size.

www.issivs.com
SecurOS 150 Quick User Guide
Using CCTV Keyboards and Joysticks

To export video frame in standard format (see the Exporting Video Frame In Standard Format section
for details), select the Save image command in the menu. The system will display a window with
information about the saved frame (see Figure 160).

Figure 160. Information about frame

To set a bookmark on a frame (see the Setting Bookmarks section for details), select the Set bookmark
command in the menu. Name of the added bookmark is created automatically and has the following
format: <Camera Name> <current frame time stamp>. The system will display a window with
information about the created bookmark (see Figure 161).

Figure 161. Information about bookmark

To execute Macro:
1. Select the Macro command in the menu.
2. In the new menu select the Macro.

9.3 Bosch KBD-Universal XF


To start using SecurOS system with Bosch KBD-Universal XF it is required to select active camera.

After that, the following functions become available:


PTZ Control of Active Camera.
Recording Control and Working With Archive.
Other Operations with Camera.

Note. The set of available functions depends on the active camera model, working mode and settings of the
active Media Client (see Working modes of Media Client section).

Keyboard layout of Bosch KBD-Universal XF is shown in Figure 162:

www.issivs.com
SecurOS 151 Quick User Guide
Using CCTV Keyboards and Joysticks

Figure 162. Bosch KBD-Universal XF keyboard layout

Note. Keys without icons are reserved and are not used when working with SecurOS system.

9.3.1 Selecting Active Camera

Warning! Only the objects of current SecurOS Desktop are available while working with Bosch KBD-Universal
XF (see Desktop Administration section for details).

To start using SecurOS system with Bosch KBD-Universal XF it is required to:


Activate Media Client.
Activate camera.

www.issivs.com
SecurOS 152 Quick User Guide
Using CCTV Keyboards and Joysticks

To activate Media Client, switch between all available Media Clients of the current Desktop with the

key. Active Media Client has light blue frame (see Figure 163).

Figure 163. Active Media Client and the active camera cell

Select the Media Client's View or layout if needed (see below).

To activate camera:
1. Enter the required camera ID with the 0...9 keys. Use camera IDs, displayed in the camera cell
headers (see Camera Cell Controls for details). To cancel input, press the ESC key.

Note. ID input will be reset in 10 seconds. If the input is not confirmed within this interval, input must be
repeated.

2. Confirm input with the OK key.

Active camera cell has blue frame (see Figure 163).

To select Media Client's View:

Press the key to switch to the next View.

Press the key to switch to the previous View.

All available Media Client Views are switched in their order of appearance in the Views list or Views quick
access panel (see section Using Views).

www.issivs.com
SecurOS 153 Quick User Guide
Using CCTV Keyboards and Joysticks

Selected View is highlighted in the Views list and Views quick access panel (see section Choosing View in
Media Client).

To select Media Client's layout:

1. Press and hold the ESC key and press the or the keys to switch to layout operations
mode.

2. Press and hold the key and press the key to select the next layout.

Press and hold the key and press the key to select the previous layout.

All available Media Client layouts are switched in their order of appearance in the Layouts panel. Selected
layout is highlighted in the Layouts panel (see Selecting Layout section).

9.3.2 PTZ Control of Active Camera

Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).

Bosch KBD-Universal XF can be used to:


Control camera PTZ.
Start and stop tours.
Moving the camera to presets.
Controlling focal length of the camera.
Controlling the camera iris.

To control camera PTZ:

Note. The movement speed depends on the joystick's deflection angle. The zoom speed depends on the knob
rotation angle.

1. Move the joystick left and right to change camera pan.


2. Move the joystick up and down to change camera tilt.
3. Turn the joystick knob to zoom.

To start tour, enter the tour ID using the 0...9 keys and press the key. Use tour IDs, specified on
the Tours panel of the PTZ control tab of the Media Client (see the Working with Presets and Tours
section for details).

Note. ID input will be reset in 10 seconds. If the input is not confirmed within this interval, input must be
repeated.

www.issivs.com
SecurOS 154 Quick User Guide
Using CCTV Keyboards and Joysticks

To stop tour, press and hold the ESC key and press the key.

To move camera to a preset, enter the tour ID using the 0...9 keys and press the key. Use tour
IDs, specified on the Presets panel of the PTZ control tab of the Media Client (see the Working with
Presets and Tours section for details).

Note. ID input will be reset in 10 seconds. If the input is not confirmed within this interval, input must be
repeated.

To change camera focal distance:

Press the key to increase focal distance.

Press the key to decrease focal distance.

To change camera iris:

Press the key to increase iris.

Press the key to decrease iris.

9.3.3 Recording Control and Working with Archive

Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).

Bosch KBD-Universal XF can be used to:


Start/ stop recording.
Play back records.

To start recording video, press the key.

To switch to the archive mode, press the key.

While in archive mode:

Press the key to play recording.

Press the key to play recording backwards.

Press the key to stop playback.

www.issivs.com
SecurOS 155 Quick User Guide
Using CCTV Keyboards and Joysticks

Press the key to skip to the previous recording.

Press the key to skip to the next recording.


Turn the shuttle ring:
Clockwise to increase playing speed.
Counter-clockwise to decrease playing speed.
Turn the jogdial:
Clockwise to playback recording forward frame by frame.
Counter-clockwise to playback recording backward frame by frame.

9.3.4 Other Operations with Camera

Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).

This section describes the following operations:


Changing the camera cell size.
Exporting video frame in standard format.
Setting bookmarks.
Turning the camera speaker on/ off.

To change the size of the active camera cell:

Press the key to maximize the camera cell.

Press the key to switch the camera cell to the previous size.

To export video frame in standard format (see the Exporting Video Frame In Standard Format section

for details), press the key. The system will display a window with information about the saved
frame (see Figure 164).

Figure 164. Information about frame

www.issivs.com
SecurOS 156 Quick User Guide
Using CCTV Keyboards and Joysticks

To set a bookmark on a frame (see the Setting Bookmarks section for details), press the key.
Name of the added bookmark is created automatically and has the following format: <Camera Name>
<current frame time stamp>. The system will display a window with information about the
created bookmark (see Figure 165).

Figure 165. Information about bookmark

To turn the camera speaker on/ off (see the Working with a Camera's Speaker section for details),

press the key.

9.4 Hanwha SPC-7000

Warning! To use the keyboard in SecurOS, you must switch it to SSM mode. To do this select the Recorder
command in the keyboard main menu, then the SSM command.

To start using SecurOS system with Hanwha SPC-7000 it is required to select active camera.

After that, the following functions become available:


PTZ Control of Active Camera.
Recording Control and Working With Archive.
Other Operations.

Note. The set of available functions depends on the active camera model, working mode and settings of the
active Media Client (see Working modes of Media Client section).

Hanwha SPC-7000 overview with keys layout is displayed in Figure 166. Device keys, used in SecurOS
system are in the table 18.

www.issivs.com
SecurOS 157 Quick User Guide
Using CCTV Keyboards and Joysticks

Figure 166. Hanwha SPC-7000 overview

Table 18. Hanwha SPC-7000 keys used in SecurOS system

Number Description

1 Joystick with built-in button and keys for working with presets
and tours.

2 Numeric keys

3 Cameras, Views and Media Clients switching keys

4 Arrow keys to control selections in special modes

5 Focal distance and iris control keys

6 Archive recording and playback control panel

9.4.1 Selecting Active Camera

Warning! Only the objects of current SecurOS Desktop are available while working with Hanwha SPC-7000
(see Desktop Administration section for details).

To start using SecurOS system with Hanwha SPC-7000 it is required to:


Activate Media Client.
Activate camera.

www.issivs.com
SecurOS 158 Quick User Guide
Using CCTV Keyboards and Joysticks

To activate the Media Client switch between all available Media Clients of the current Desktop using
the MON.|CON key. Active Media Client has light blue frame (see Figure 167).

Figure 167. Active Media Client and the active camera cell

Select Media Client View if needed.

To activate camera:
1. Enter the required camera ID with the 0...9 keys. Use camera IDs, displayed in the camera cell
headers (see Camera Cell Controls for details). To cancel input, press the ESC|SETUP key.
2. Confirm input with the CAM key.

Active camera cell has blue frame (see Figure 167).

To select Media Client's View:


Press the LAYOUT|SEQ. key to enter the Views switching mode.
Press the Right arrow key to switch to the next View.
Press the Left arrow key to switch th the previous View.
Press the ESC|SETUP key to exit the Views switching mode.

To turn automatic paging of the Views on:


Press the LAYOUT|SEQ. key to enter the Views switching mode.
Press the ENTER key to start automatic Views paging.

To stop automatic paging of the Views press the same keys again.

All available Media Client Views are switched in their order of appearance in the Views list or Views quick
access panel (see section Using Views).

www.issivs.com
SecurOS 159 Quick User Guide
Using CCTV Keyboards and Joysticks

Selected View is highlighted in the Views list and Views quick access panel (see section Choosing View in
Media Client).

9.4.2 PTZ Control of Active Camera

Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).

Hanwha SPC-7000 can be used to:


Control camera PTZ.
Start and stop tours.
Moving the camera to presets.
Controlling focal length of the camera.
Controlling the camera iris.

To control camera PTZ:

Note. The movement speed depends on the joystick's deflection angle. The zoom speed depends on the knob
rotation angle.

1. Move the joystick left and right to change camera pan.


2. Move the joystick up and down to change camera tilt.
3. Turn the joystick knob to zoom.

To start tour, specify the tour ID with the 0...9 keys and press the GROUP|TOUR key. Use the tour
IDs displayed on the Tours panel on the PTZ control tab of the Media Client (see section Working with
Presets and Tours for details).

To stop tour, press the GROUP|TOUR key.

Warning! To delete digits entered with the help of the keys, press the ESC|SETUP key.

To move camera to a preset, specify the preset ID with the 0...9 keys and press the PRESET key. Use
presets IDs displayed on the Presets panel on the PTZ control tab of the Media Client (see Working
with Presets and Tours section for details).

To change camera focal distance:


Press the FOCUS N/ F key to switch to the focal distance control mode.
Press the Right arrow key to increase focal distance.
Press the Left arrow key to decrease focal distance.
Press the ESC|SETUP key to exit the focal distance control mode.

To set focal distance automatically press the AF key.

To change camera iris:


Press the IRIS C/ O key to switch to the iris control mode.

www.issivs.com
SecurOS 160 Quick User Guide
Using CCTV Keyboards and Joysticks

Press the Right arrow key to close iris (make the image darker).
Press the Left arrow key to open iris (make the image lighter).
Press the ESC|SETUP key to exit the iris control mode.

9.4.3 Recording Control and Working with Archive

Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).

Hanwha SPC-7000 can be used to:


Start/ stop recording.
Play back records.

To start/ stop recording video, press the key.

To switch to the archive mode/ return to the live video, press the SEARCH key.

While in archive mode:

Press the key to play recording.

Press the or key to stop playback.

Press the and keys to slow or fast forward playback.


Turn the shuttle ring:
Clockwise to fast playback forward.
Counter-clockwise to fast playback backward.

Note. If the shuttle ring is released, playback stops.

Turn the jogdial:


Clockwise to playback recording forward frame by frame.
Counter-clockwise to playback recording backward frame by frame.

Note. Turning the jogdial stop playback and then starts playing frame by frame.

www.issivs.com
SecurOS 161 Quick User Guide
Using CCTV Keyboards and Joysticks

9.4.4 Other Operations

Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).

This section describes the following operations:


Exporting video frame in standard format.

To export video frame in standard format (see the Exporting Video Frame In Standard Format section
for details), press the button located on the joystick handle. The system will display a window with
information about the saved frame (see Figure 168).

Figure 168. Information about frame

9.5 Hikvision DS-1100KI


To start using SecurOS system with Hikvision DS-1100KI it is required to select active camera.

After that, PTZ Control of Active Camera becomes available.

Note. The set of available functions depends on the active camera model, working mode and settings of the
active Media Client (see Working modes of Media Client section).

Hikvision DS-1100KI overview with specified device components is shown in Figure 169:

www.issivs.com
SecurOS 162 Quick User Guide
Using CCTV Keyboards and Joysticks

Figure 169. Hikvision DS-1100KI overview

Table 19. Hikvision DS-1100KI components

Number Description

1 Playback panel (not used when working with SecurOS system)

2 Functional keys (see Figure 170)

3 Numeric keys (see Figure 171)

4 PTZ control keys and joystick (see Figure 172)

Figure 170. Hikvision DS-1100KI functional keys

www.issivs.com
SecurOS 163 Quick User Guide
Using CCTV Keyboards and Joysticks

Figure 171. Hikvision DS-1100KI numeric keys

Figure 172. Hikvision DS-1100KI PTZ control keys and joystick

9.5.1 Selecting Active Camera

Warning! Media Clients available for usage with Hikvision DS-1100KI are specified in the keyboard settings
(see SecurOS Administration Guide for details). If a command is sent to unavailable Media Client, it will be
ignored by SecurOS system.

To start using SecurOS system with Hikvision DS-1100KI it is required to:


1. Activate Media Client.
2. Activate Workling Area cell.
3. Place the required camera into the active cell.

Warning! To cancel input made from the keyboard, press the ESC key of Hikvision DS-1100KI.

Note. When SecurOS starts, Media Client, specified for default control by the keyboard, will be active
(see SecurOS Administration Guide).

To activate Media Client, enter the required Media Client ID with the 0...9 keys and press the MON
key.

www.issivs.com
SecurOS 164 Quick User Guide
Using CCTV Keyboards and Joysticks

Note. Contact the system administrator to obtain the IDs of Media Clients.

Select Media Client's layout if needed:

Warning! If the Layouts panel is not displayed, switching layouts is not available.

To select the layout, enter 1 and press the MULT key.

To select the layout, enter 4 and press the MULT key.

To select the layout, enter 9 and press the MULT key.

To select the layout, enter 16 and press the MULT key.

Selected layout is highlighted in the Layouts panel (see Selecting Layout section).

To activate a cell of the Media Client's Working Area, enter the cell number with the 0...9 keys and
press the WIN key. Working area cell are numbered left to right and top to bottom, starting with top left
cell (see Figure 173).

Active cell has blue frame (see Figure 172).

To place the required camera to the active cell, enter the required Camera ID with the 0...9 keys and
press the CAM key. Use Camera IDs, displayed in the Camera cell headers (see Camera Cell Controls for
details).

Note. If the Media Client's cell number was not specified, active camera will be placed into the previous active
cell.

The selected camera's video will be displayed in the active cell.

www.issivs.com
SecurOS 165 Quick User Guide
Using CCTV Keyboards and Joysticks

Figure 173. Media Client cells numbering and the active camera cell

9.5.2 PTZ Control of Active Camera

Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).

Hikvision DS-1100KI can be used to:


Control camera PTZ.
Start and stop tours.
Create presets.
Moving the camera to presets.

Warning! To cancel input made from the keyboard, press the ESC key of Hikvision DS-1100KI.

To control camera PTZ:

Note. The movement speed depends on the joystick's deflection angle. The zoom speed depends on the knob
rotation angle.

1. Move the joystick left and right to change camera pan.


2. Move the joystick up and down to change camera tilt.
3. Turn the joystick knob or use the ZOOM+ and ZOOM- keys to zoom.

www.issivs.com
SecurOS 166 Quick User Guide
Using CCTV Keyboards and Joysticks

To start tour, specify the tour ID with the 0...9 keys and press the PATROL key. Use the tour IDs
displayed on the Tours panel on the PTZ control tab of the Media Client (see section Working with
Presets and Tours for details).

To create a preset:
1. Set the camera PTZ to the required position.
2. Enter the preset name with the 0...9 keys and press the PRESET key.
The created preset will be added to the Presets panel on the PTZ control tab of the Media Client (see
section Working with Presets and Tours for details).

To move camera to a preset, specify the preset ID with the 0...9 keys and press the CALL key. Use
presets IDs displayed on the Presets panel on the PTZ control tab of the Media Client (see Working
with Presets and Tours section for details).

9.6 Panasonic WV-CU950


To start using SecurOS system with Panasonic WV-CU950 it is required to select active camera.

After that, the following functions become available:


PTZ Control of Active Camera.
Arming/ Disarming Cameras.
Recording Control and Working With Archive.
Other Operations.

Note. The set of available functions depends on the active camera model, working mode and settings of the
active Media Client (see Working modes of Media Client section).

Panasonic WV-CU950 overview with keys layout is displayed in Figure 174. Device keys, used in
SecurOS system are in the table 20.

www.issivs.com
SecurOS 167 Quick User Guide
Using CCTV Keyboards and Joysticks

Figure 174. Panasonic WV-CU950 overview

Table 20. Panasonic WV-CU950 keys used in SecurOS system

Number Description

4 SHIFT key

5 CLEAR key

6 ALM RESET key

8 ALARM key

13 TOUR SEQ key

14 SEQ PAUSE key

17 MULTI SCREEN key

18 MARK key

21 SEARCH key

24 STOP key

25 PLAY/ PAUSE key

26 REC key

27 Shuttle ring

28 SHUTTLE HOLD key

www.issivs.com
SecurOS 168 Quick User Guide
Using CCTV Keyboards and Joysticks

Number Description

30 “-" key

31 "+" key

33 PRESET key

34 CAM POSI key

35 Numeric keys

36 MON key

37 CAM key

41 Functional buttons

53 Joystick zoom wheel

54 IRIS CLOSE/ IRIS OPEN keys

55 FOCUS NEAR/ FOCUS FAR keys

56 A and B joystick keys

57 Joystick

Note. Keys 41 and 56 are programmatic. Contact the system administrator for the information about these
keys' functions.

The following commands can be executed with the F1-F4 keys (and their combinations with the SHIFT
key) and the A and B joystick keys:
Arm camera.
Disarm camera.
Start recording video.
Stop recording video.
Stop tour.
Export video frame in stadard format.
Set bookmark.
Execute Macro.
Camera auto focus.
Automatic iris control.

9.6.1 Selecting Active Camera

Warning! Media Clients available for usage with Panasonic WV-CU950 are specified in the keyboard settings
(see SecurOS Administration Guide for details). If a command is sent to unavailable Media Client, it will be
ignored by SecurOS system.

www.issivs.com
SecurOS 169 Quick User Guide
Using CCTV Keyboards and Joysticks

To start using SecurOS system with Panasonic WV-CU950 it is required to:


1. Activate Media Client.
2. Activate camera.

Note. When SecurOS starts, Media Client, specified for default control by the keyboard, will be active
(see SecurOS Administration Guide).

Warning! To delete numbers entered by the numeric keys of Panasonic WV-CU950, press the CLEAR key.

To activate Media Client, enter the required Media Client ID with the 0...9 keys and press the MON
(ESC) key.

Note. Contact the system administrator to obtain the IDs of Media Clients.

If needed:
Change layout/ View of Media Client.
Select Media Client's page.
Place the required camera into the selected Working Area cell.

To activate camera, enter the required Camera ID with the 0...9 keys and press the CAM (SET) key.
Use Camera IDs, displayed in the Camera cell headers (see Camera Cell Controls for details).

If the required camera is not displayed in the current layout page, active Media Client will switch to the
layout's page containing the required camera. Active camera cell has blue frame (see Figure 174).

Figure 175. Active Media Client and the active camera cell

www.issivs.com
SecurOS 170 Quick User Guide
Using CCTV Keyboards and Joysticks

To select View/ layout of Media Client, enter the number of View/layout with the 0...9 keys and press
the GO TO LAST key, to select a specific View/layout.

Selected View is highlighted in the Views list and Views quick access panel (see section Choosing View in
Media Client). Selected layout is highlighted in the Layouts panel (see Selecting Layout section).

To switch between Views/ layouts of Media Client sequentially:


Press the GO TO LAST key to select the next View/layout.
Press and hold the SHIFT key and press the GO TO LAST key to select the next View/layout.

All available Media Client Views/layouts are switched in their order of appearance in the Views list or
Views quick access panel (if switching Views) or in the Layouts panel (if switching layouts).

Note. If working with Views is allowed in the active Media Client, then the instructions above are used to
switch Views of the Media Client. If working with Views is not allowed, then the instructions above are used to
switch Media Client's layouts.

To select Media Client's page, press and hold the SHIFT key and press the +/- keys.

To place the required camera into the selected Working Area cell:
1. Enter the Working area cell number with the 0...9 keys and press the CAM POSI key. Working area
cell are numbered left to right and top to bottom, starting with top left cell (see Figure 176).
2. To activate camera, enter the required Camera ID with the 0...9 keys and press the CAM (SET) key.
Use Camera IDs, displayed in the Camera cell headers (see Camera Cell Controls for details).

Figure 176. Media Client cells numbering

Video from required camera will be displayed in the selected Working Area cell of the Media Client. If the
selected cell already contains camera, it will be moved to another cell within the layout.

www.issivs.com
SecurOS 171 Quick User Guide
Using CCTV Keyboards and Joysticks

9.6.2 PTZ Control of Active Camera

Warning! The functions described below are available for active camera depending on the Media Client
working mode (see section Working modes of Media Client).

Panasonic WV-CU950 can be used to:


Control camera PTZ.
Start and stop tours.
Moving the camera to presets.
Controlling focal length of the camera.
Controlling the camera iris.

Note. Functions, described in this section, can be assigned to programmatic keys by the system administrator
(see the Panasonic WV-CU950 section).

To control camera PTZ:

Note. The movement speed depends on the joystick's deflection angle. The zoom speed depends on the knob
rotation angle.

1. Move the joystick left and right to change camera pan.


2. Move the joystick up and down to change camera tilt.
3. Turn the joystick zoom wheel to zoom.

To start tour, press the TOUR SEQ key.


The first tour displayed on the Presets panel on the PTZ control tab of the Media Client (see
section Working with Presets and Tours for details) will start.

To stop tour, press and hold the SHIFT key and press the SEQ PAUSE key or use a programmatic key.

Warning! To delete numbers entered by the numeric keys, press the CLEAR key.

To move camera to a preset, specify the preset ID with the 0...9 keys and press the PRESET key.
Use presets IDs displayed on the Presets panel on the PTZ control tab of the Media Client (see
section Working with Presets and Tours for details).

To change camera focal distance:


Press the FOCUS FAR key to increase focal distance.
Press the FOCUS NEAR key to decrease focal distance.
Use a programmatic key for auto focus.

To change camera iris:


Press the IRIS OPEN key to open iris (make the image lighter).

www.issivs.com
SecurOS 172 Quick User Guide
Using CCTV Keyboards and Joysticks

Press the IRIS CLOSE key to close iris (make the image darker).
Use a programmatic key for automatic iris control.

9.6.3 Arming/Disarming Cameras

Warning! The functions described below are available for active camera depending on the Media Client
working mode (see section Working modes of Media Client).

Note. Functions, described in this section, can be assigned to programmatic keys by the system administrator
(see the Panasonic WV-CU950 section).

To arm the camera, press and hold the SHIFT key and press the ALARM key or use a programmatic
key.

To disarm the camera, press and hold the SHIFT key and press the ALM RESET key or use a
programmatic key.

Note. See the Arming/ Disarming Cameras section for details.

9.6.4 Recording Control and Working With Archive

Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).

Panasonic WV-CU950 can be used to:


Start/ stop recording.
Play back records.

Note. Functions, described in this section, can be assigned to programmatic keys by the system administrator
(see the Panasonic WV-CU950 section).

To start recording video, press the REC key. Press and hold the REC key for longer than 1 sec to stop
recording video. Starting and stopping recording video can be performed by the programmatic keys.

To switch to the archive mode, press the SEARCH key.

To switch to the live mode, press and hold the SHIFT key and press the SEARCH key.

While in archive mode:


Press the PLAY/ PAUSE key to play recording.
Press the STOP key to stop playing.
Turn the shuttle ring:
Clockwise to increase playing speed.

www.issivs.com
SecurOS 173 Quick User Guide
Using CCTV Keyboards and Joysticks

Counter-clockwise to decrease playing speed.

Note. If the shuttle ring is released, playback stops.

Turn the jogdial:


Clockwise to playback recording forward frame by frame.
Counter-clockwise to playback recording backward frame by frame.

Note. Turning the jogdial stop playback and then starts playing frame by frame.

Press the SHUTTLE HOLD key, while holding the shuttle ring in required position, and release the
shuttle ring to set the constant playback speed. To restore original playback speed, press the
SHUTTLE HOLD key again.

9.6.5 Other Operations

Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).

This section describes the following operations:


Changing the camera cell size.
Exporting video frame in standard format.
Setting bookmarks.
Executing Macros.

Note. Functions, described in this section, can be assigned to programmatic keys by the system administrator
(see the Panasonic WV-CU950 section).

To switch camera cell between full-screen mode and back, press the MULTI SCREEN key.

To export video frame in standard format (see the Exporting Video Frame In Standard Format section
for details), press a programmatic key. The system will display a window with information about the
saved frame (see Figure 177).

Figure 177. Information about frame

www.issivs.com
SecurOS 174 Quick User Guide
Using CCTV Keyboards and Joysticks

To set a bookmark on a frame (see the Setting Bookmarks section for details), press the MARK key or
a programmatic key. Name of the added bookmark is created automatically and has the following
format: <Camera Name> <current frame time stamp>. The system will display a window with
information about the created bookmark (see Figure 178).

Figure 178. Information about bookmark

To execute Macro, press a programmatic key.

www.issivs.com
SecurOS 175 Quick User Guide
Keyboard Shortcuts

10 Keyboard Shortcuts
Note. All keyboard shortcuts work with the English keyboard layout only.

10.1 Event Protocol Window

Note. In the Event Protocol window, keyboard shortcuts are only used.

Table 21. Keyboard Shortcuts for Event Protocol Window

Shortcuts Description

Space Confirm alarm.

Move to one record up.

Move to one record down.

Page Up, Shift+Page Up Switch to previous page.

Page Down, Shift+Page Switch to next page.


Down

Home, Shift+Home Switch to the top of the list.

End, Shift+End Switch to the end of the list.

- (Num Pad) Decrease font size.

+ (Num Pad) Increase font size.

Ctrl+A View event in the Media Client.

Call the Emergency ticket window to fill in a form and send a


Ctrl+N
message it to the Emergency service.

Save current window parameters (font size, log window and


Ctrl+S
commentary window separator, column's size and order).

www.issivs.com
SecurOS 176 Quick User Guide
Keyboard Shortcuts

10.2 Media Client Window


On Linux platform (available only for SecurOS Enterprise edition) the functionality is limited.

Table 22. Keyboard Shortcuts for Media Client

Shortcuts Description

Warning! Shortcuts can only be used if corresponding commands/buttons are available in user interface.

Moving through cameras (the camera becomes active). Works for


, , ,
the current Media Client layout.

Expand all groups of the Cameras and Microphones in the Devices


Panel.
*
Note. Enable if Cameras and Microphones are grouped in the Devices
Panel.

Collapse all groups of the Cameras and Microphones in the Devices


Panel.
/
Note. Enable if Cameras and Microphones are grouped in the Devices
Panel.

F9 Display/Hide the Status bar in the Media Client main window.

F10 Display/Hide the Titles of all cells in the Media Client main window.

Enable/Disable full screen mode for the Media Client. If full screen
F11 mode is on, the Media Client works only in View mode (all Media
Client controls are not available).

Ctrl+

Ctrl+
Turn PTZ camera in the specified direction.
Ctrl+

Ctrl+

CTRL++ (plus)
Change zoom of PTZ camera.
CTRL+- (minus)

Ctrl+(1-9) Go to preset of specified number (from the preset list).

Ctrl+B Set Bookmark for an active Camera.

Switch Media Client to archive mode for quick replay of last N


seconds/minutes of the recording.
Ctrl+I
Note. Available, if the corresponding option is enabled in the Media
Client settings by the administrator.

Call the Emergency ticket window to fill in a form and send a


Ctrl + N
message it to the Emergency service.

www.issivs.com
SecurOS 177 Quick User Guide
Keyboard Shortcuts

Shortcuts Description

Ctrl+O Switch Camera to live/archive video mode.

Ctrl+P Print frame.

Ctrl+R Start/stop recording on Camera.

Ctrl+S Arm/disarm Camera.

Export frame to specified directory.

Ctrl+T Note. Export directory is set by system administrator in system's


settings.

Activate/deactivate Camera. First Camera of current layout becomes


Ctrl+X
active.

Export frame of all Cameras of current layout to specified directory.

Ctrl+Shift+T Note. Export directory is set by system administrator in system's


settings.

Go to next/previous video page of the Media Client (with the same


Page Up / Page Down
layout).

10.3 Map Window


Table 23. Keyboard Shortcuts for Map Window

Shortcuts Description

Working with the Map objects tree (in the Levels and Alarms panels)

* Expand all child branches to the currently selected one.

+ Expand currently selected branch. Child branches are not expanded.

- Collapse currently expanded branch.

Move up/down on object tree. Moving is performed according to


, the current tree view; collapsed child branches will not be
expanded.

Move down on object tree; collapsed child branches will not be


expanded. Jump is performed from the parent to the child object.
Jump to the other branches is not performed.

Move up on object tree; expanded child branches will be collapsed.


Jump is performed from the child to the parent object. Jump to the
other branches is not performed.

Move to the upper object in the tree. Moving is performed according


Home to the current tree view; collapsed child branches will not be
expanded.

www.issivs.com
SecurOS 178 Quick User Guide
Keyboard Shortcuts

Shortcuts Description

Move to the bottom object in the tree. Moving is performed


End according to the current tree view; collapsed child branches will not
be expanded.

PageUp Jump to the previous page of the object tree.

PageDown Jump to the next page of the object tree.

www.issivs.com
AXIS A4x20-E Readers
AXIS A4020-E Reader
AXIS A4120-E Reader with Keypad

User Manual
AXIS A4x20-E Readers

Installation

Installation

To watch this video, go to the web version of this document.

www.axis.com/products/online-manual/70685#t10171383

Installation video for the device

2
AXIS A4x20-E Readers

Configure your device

Configure your device

The device works as a standard OSDP reader out-of-the-box. You can access specific features and change settings in
AXIS Camera Station Secure Entry. Below is an example of how to configure the device through AXIS Camera Station Secure Entry.

Encrypted communication
AXIS Camera Station Secure Entry supports OSDP (Open Supervised Device Protocol) Secure Channel to enable line encryption
between controller and AXIS A4020-E Reader.

To turn on OSDP Secure Channel for entire system:

1. Go to Configuration > Access control > Encrypted communication.

2. Specify your main encryption key and click OK. To change the main encryption key, click .

3. Turn on OSDP Secure Channel. This option is only available after you have set the main encryption key.

4. By default, the OSDP Secure Channel key is generated by the main encryption key. To manually set the OSDP Secure
Channel key:

4.1 Under OSDP Secure Channel, click .

4.2 Clear Use main encryption key to generate OSDP Secure Channel key.

4.3 Type the OSDP Secure Channel key and click OK.

To turn on or turn off OSDP Secure Channel for a specific reader, see .

3
AXIS A4x20-E Readers

Troubleshooting

Troubleshooting

Reset to factory default settings


A reset to factory default resets all settings to the factory default values.

1. Remove the device from the backplate. This disconnects power from the device.

2. Use a blunt instrument to press and hold the control button while you reconnect power by connecting the terminal block
to the pins in the device. See Product overview on page 5 . You will hear a beep when you reconnect power.

3. Keep the control button pressed for 5–10 seconds.

4. Release the control button. The device has been reset to the factory default settings.

5. Put the terminal block in its place in the backplate.

6. Hook the device onto the backplate and close the unit slowly.

4
AXIS A4x20-E Readers

Specifications

Specifications

Product overview

1 Reader indicator stripe


2 DIP switches
3 Control button

Reader indicator stripe


Behavior State
Flashing red Waiting for controller connection

DIP switches
DIP switch Default setting Function
1 Off OSDP address:
Off + Off = 0*
2 Off Off + On = 1
On + Off = 2
On + On = 3
3 Off RS485 termination, Off = active
4 Off -
5 Off -

5
AXIS A4x20-E Readers

Specifications

6 Off Secure mode


* When switch 1 and 2 are both set to Off, you can use the command osdp_COMSET to change the address.

Buttons
Control button
The control button is used for:

• Resetting the product to factory default settings. See Reset to factory default settings on page 4 .

Baud rate
The default baud rate is 9600. To change it, use the command osdp_COMSET.

6
User Manual Ver. M1.11
AXIS A4x20-E Readers Date: September 2021
© Axis Communications AB, 2021 Part No. T10171378
AXIS A82 Network Video Door Station Series
AXIS A8207-VE Network Video Door Station
AXIS A8207-VE Mk II Network Video Door Station

User Manual
AXIS A82 Network Video Door Station Series

Table of Contents

Solution overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Product overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Get started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Find the device on the network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Access the device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Secure passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Additional settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Change the root password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Set up direct SIP (P2P) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Set up SIP through a server (PBX) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Create an organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Create a contact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Configure the call button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Set up as card reader - network connection . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Set up as card reader - wired connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Use DTMF to unlock the door for a visitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Transmit live video to a monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Print a contact list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Learn more . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
The phone book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Voice over IP (VoIP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Set up rules and alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Daily use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Use the keypad . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Reset to factory default settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Check the current firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Upgrade the firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Technical issues, clues and solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Performance considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Front panel indicators and controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
LED indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
SD card slot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Connectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Safety information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Hazard levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Other message levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

2
AXIS A82 Network Video Door Station Series

Solution overview

Solution overview

1 Door station
2 Door station combined with AXIS A9801
3 Door station combined with AXIS A9161
4 Door station combined with an access control system, for example AXIS A1001 or AXIS A1601

3
AXIS A82 Network Video Door Station Series

Product overview

Product overview

1 Speaker
2 Camera
3 Call indicator icons on page 23
4 Card reader indicator stripe on page 23
5 Keypad
6 Call button on page 23
7 Card reader icon
8 Microphone
9 PIR-sensor
10 T-coil icon

4
AXIS A82 Network Video Door Station Series

Product overview

1 HDMI connector on page 24 (microHDMI)


2 Power connector on page 26
3 Network connector on page 24 (PoE+)
4 Relay connector on page 24
5 Relay connector on page 24
6 I/O connector on page 25
7 Status LED
8 Control button on page 24
9 2N VBUS (not used)
10 Audio connector on page 24
11 SD card slot on page 23 (microSD/microSDHC/microSDXC)
12 Reader connector on page 25

5
AXIS A82 Network Video Door Station Series

Installation

Installation

To watch this video, go to the web version of this document.

www.axis.com/products/online-manual/44899#t10170588

Installation video for A8207-VE reader.

To watch this video, go to the web version of this document.

www.axis.com/products/online-manual/44899#t10170587

Installation video for A8207-VE relay.

6
AXIS A82 Network Video Door Station Series

Get started

Get started

Find the device on the network


To find Axis devices on the network and assign them IP addresses in Windows®, use AXIS IP Utility or AXIS Device Manager. Both
applications are free and can be downloaded from axis.com/support.

For more information about how to find and assign IP addresses, go to How to assign an IP address and access your device.

Access the device


1. Open a browser and enter the IP address or host name of the Axis device.

If you do not know the IP address, use AXIS IP Utility or AXIS Device Manager to find the device on the network.

2. Enter the username and password. If you access the device for the first time, you must set the root password. See Set a
new password for the root account on page 7 .

Secure passwords
Important
Axis devices send the initially set password in clear text over the network. To protect your device after the first login, set
up a secure and encrypted HTTPS connection and then change the password.

The device password is the primary protection for your data and services. Axis devices do not impose a password policy as they
may be used in various types of installations.

To protect your data we strongly recommend that you:

• Use a password with at least 8 characters, preferably created by a password generator.

• Don’t expose the password.

• Change the password at a recurring interval, at least once a year.

Set a new password for the root account


Important
The default administrator username is root. If the password for root is lost, reset the device to factory default settings. See
Reset to factory default settings on page 20

To watch this video, go to the web version of this document.

www.axis.com/products/online-manual/44899#t10098905

Support tip: Password security confirmation check

1. Type a password. Follow the instructions about secure passwords. See Secure passwords on page 7 .

7
AXIS A82 Network Video Door Station Series

Get started

2. Retype the password to confirm the spelling.

3. Click Save. The password has now been configured.

8
AXIS A82 Network Video Door Station Series

Additional settings

Additional settings

This section will cover all the important configurations that an installer needs to do to get the product up and running after
the hardware installation has been completed.

Change the root password


1. Log in to the product’s webpage and go to System > Users.

2. For the root user, click Edit.

3. Enter a new password and save.

Set up direct SIP (P2P)


VoIP (Voice over IP) is a group of technologies that enables voice and multimedia communication over IP networks. For more,
see Voice over IP (VoIP) on page 15.

In this product VoIP is enabled through the SIP protocol. For more information about SIP, see Session Initiation Protocol (SIP) on
page 16

There are two types of setups for SIP. Peer-to-peer is one of them. Use peer-to-peer when the communication is between a few user
agents within the same IP network and there is no need for extra features that a PBX-server could provide. For information on
how to set it up, see Peer-to-peer SIP (P2PSIP) on page 16.

1. Go to VoIP > SIP settings and select Enable SIP.

2. In Call timeout, set the number of seconds that a call will last before it ends if there is no answer.

3. To allow the device to receive incoming calls, select Allow incoming calls.

NOTICE
NO TICE
When you allow incoming calls, the device accepts calls from any device connected to the network. If the device is accessible
from a public network or the internet, we recommend you to disable incoming calls.

4. Set the number of seconds before timeout for incoming calls.

5. Click Save.

6. In Port settings, enter the SIP port number and SIP TLS port number.

Note
• SIP port – for SIP sessions. Signalling traffic through this port is non-encrypted. The default port number is 5060.
• SIP TLS port – for SIPS and TLS secured SIP sessions. Signalling traffic through this port is encrypted with Transport Layer
Security (TLS). The default port number is 5061.
• RTP start port – Enter the port used for the first RTP media stream in a SIP call. The default start port for media transport is
4000. Some firewalls might block RTP traffic on certain port numbers. A port number must be between 1024 and 65535.

7. Click Save.

8. In NAT traversal, select the protocols you want to enable for NAT traversal.

Note
Use NAT traversal when the device is connected to the network from behind a NAT router or a firewall. For more information
see .

9
AXIS A82 Network Video Door Station Series

Additional settings

Set up SIP through a server (PBX)


VoIP (Voice over IP) is a group of technologies that enables voice and multimedia communication over IP networks. For more,
see Voice over IP (VoIP) on page 15.

In this product VoIP is enabled through the SIP protocol. For more information about SIP, see Session Initiation Protocol (SIP) on
page 16

There are two types of setups for SIP. A PBX-server is one of them. Use a PBX-server when the communication should be between an
infinite number of user agents within and outside the IP network. Additional features could be added to the setup depending on the
PBX-provider. For more information see, Private Branch Exchange (PBX) on page 16.

1. Request the following information from your PBX provider:

- User ID

- Domain

- Password

- Authentication ID

- Caller ID

- Registrar

- RTP start port

2. Go to VoIP > SIP accounts > Create account.

3. Enter a Name for the account.

4. Select Registrar.

5. Select a transport mode.

6. Add the account information from the PBX provider.

7. Click Save.

8. Set up the SIP settings the same way as for peer-to-peer. See Set up direct SIP (P2P) on page 9 for more information.

Create an organization
Note
Every contact in the phone book must belong to an organization.

1. Go to VoIP > Phone book > Contacts.

2. Click New.

3. Enter a name and description of the organization.

4. Click Save.

Create a contact
This example explains how to create a new contact in the phone book. This contact:

• has a SIP address

• belongs to an organization

10
AXIS A82 Network Video Door Station Series

Additional settings

• belongs to a department

Before you start

• Create the organization in the phone book. To find out how to create it, see Create an organization on page 10.

• Enable SIP in VoIP > SIP settings.

1. Go to VoIP > Phone book > Contacts.

2. Click Edit next to the name of the organization to which the contact belongs.

3. Click New.

4. Enter the first and last name of the contact.

5. Enter an available speed dial number.

Note
The speed dial number is used to call the contact from the door station. If you enter a speed dial number which is already
assigned to another contact, a warning message appears and you cannot save the contact.

6. Under Department, select New and enter the name of the department.

7. In Call information, select SIP address.

8. Enter the contact’s SIP address.

Note
For information about SIP addresses, see Session Initiation Protocol (SIP) on page 16.

9. Select the SIP account to call from.

10. In Fallback, select None.

Note
A fallback is a contact, to whom the call is forwarded if the original contact does not reply.

11. Click Save.

Configure the call button


By default, the call button is configured to make VMS (Video Management System) calls. If you want to keep this configuration, you
just need to add the Axis network door station to the VMS.

This example explains how to set up the system to call a contact in the phone book when a visitor presses the call button.

1. Go to VoIP > Phone book > Call button and click Add.

2. Select a contact and click Add.

3. Deselect VMS call.

4. Click Save.

To disable the call button:

1. Don’t add any recipients, or remove already added recipients.

2. Deselect VMS call.

3. Click Save.

11
AXIS A82 Network Video Door Station Series

Additional settings

Set up as card reader - network connection


To use the door station as a card reader, you must connect it to a door controller. The door controller stores all credentials and
keeps track of who is allowed through the door. In this example we connect the devices over the network. We also modify the
allowed card types.

Important
The network connection only works with Axis door controllers. To connect to a non-Axis door controller, you need to
physically connect the devices with wires. See Set up as card reader - wired connection on page 12.

Before you start

Configure the door controller’s hardware, using the Wiegand protocol for the reader. See the door controller’s user manual for
instructions.

Set up the door station as a card reader

1. Go to Hardware > Reader > Reader protocol > Protocol and select VAPIX reader.

2. Click Connect to Axis door controller.

3. In the pop-up, select the protocol for communicating with the door controller.

4. Enter the IP address and credentials for the door controller.

5. Click Save.

6. In Selected reader, select the reader.

7. Click Save.

8. In the Card types tab, select the card types to allow.

Note
You can keep the default set of card types or modify the list according to your needs.

9. Click Save.

Set up as card reader - wired connection


To use the door station as a card reader, you must connect it to a door controller. The door controller stores all credentials and keeps
track of who is allowed through the door. In this example, we connect the devices with wires, we use the Wiegand protocol, activate
the beeper and use one I/O port for the LED. We also modify the allowed card types.

Important
Use I/O ports that are not already in use. If you use I/O ports already in use, any events created for these ports will stop
working.

Before you start

• Physically connect the door station to a door controller. Use the electrical wiring drawings available at
axis.com/products/axis-a8207-ve

• Configure the door controller’s hardware, using the Wiegand protocol for the reader. See the door controller’s user
manual for instructions.

Set up the door station as a card reader

1. Go to Hardware > Reader > Reader protocol > Protocol and select Wiegand.

2. In Beeper, select Activate beeper.

12
AXIS A82 Network Video Door Station Series

Additional settings

3. Under Input for beeper, select I3.

4. In Inputs used for LED control, select 1.

5. Under Input for LED1, select I1.

6. Select what colors to use for each state.

7. Click Save.

8. In the Card types tab, select the card types to allow.

Note
You can keep the default set of card types or modify the list according to your needs.

9. Click Save.

Use DTMF to unlock the door for a visitor


When a visitor makes a call from the door station, the person who answers can use the Dual-Tone Multi-Frequency signaling (DTMF)
of his SIP device to unlock the door. The door controller unlocks and locks the door.

This example explains how to:

• define the DTMF signal in the door station

• set up the door station to:

- request the door controller to unlock the door, or

- unlock the door using the internal relay.

You make all settings in the door station’s webpage.

Before you start

• Allow SIP calls from the device and set up a SIP account. See Set up direct SIP (P2P) and Set up SIP through a server (PBX).

Define the DTMF signal in the door station

1. Go to VoIP > DTMF.

2. Click the pencil next to the SIP account.

3. Click Add.

4. In the Name field, enter "Unlock door".

5. In the Sequence field, enter "1".

6. Click Apply and then OK.

Set up the door station to request the door controller to unlock the door

1. Go to Events > Management > Action rules and click Add.

2. In the Name field, enter "DTMF unlock door".

3. From the list of triggers, select Call, DTMF and Unlock door.

4. From the list of actions, select Axis Door Control.

5. Click New Recipient.

13
AXIS A82 Network Video Door Station Series

Additional settings

6. Enter the details for the door controller and click OK.

7. Click Retrieve doors and select the door from the list.

8. Under Door actions, select AccessDoor.

9. Click OK.

Set up the door station to unlock the door using the internal relay

1. Follow the steps under Define the DTMF signal in the door station

2. Go to Events > Management > Action rules and click Add.

3. In the Name field, enter "DTMF unlock door".

4. From the list of triggers, select Call, DTMF and Unlock door.

5. From the list of actions, select Output Port.

6. From the list of ports, select Relay 1 (Port 4).

7. Select Duration.

8. Select Go to opposite state after and set it to 7 seconds, which means that the door is open for 7 seconds.

9. Click OK.

Transmit live video to a monitor


Your device can transmit a live video stream to an HDMI monitor without a network connection. Use the monitor to see who
is at the door.

1. Connect an external monitor to the HDMI connector.

2. Adjust the HDMI settings in System > HDMI.

Print a contact list


You can print a list of all or some of the contacts in the phone book with their speed dial numbers. To print a list of all contacts:

1. Go to VoIP > Phone book > Contacts and click Print contact list.

2. Enter a message, that will be the title of the list.

3. Enter the name of the building or organization and the address.

4. Select to print all contacts.

5. Click Print.

14
AXIS A82 Network Video Door Station Series

Learn more

Learn more

The phone book


The phone book consists of:

• Organizations – companies or organizations located in the building where the door station is placed.

• Contacts – persons belonging to an organization and sometimes also a department. You assign a speed dial number to each
contact. For each contact you can assign a fallback, to whom the call is forwarded if the original contact does not answer.

• Departments – a contact can belong to a department. You create a department when you create a contact.

• Call groups – consists of several contacts or SIP addresses. You call all recipients in a call group simultaneously, and
any recipient can answer the call.

You can print a list of all the contacts in the phone book to place next to the door station.

In the phone book you can also configure the call button, to decide where the call will go when a visitor presses it.

Voice over IP (VoIP)


Voice over IP (VoIP) is a group of technologies that enables voice communication and multimedia sessions over IP networks, such as
the internet. In traditional phone calls, analog signals are sent through circuit transmissions over the Public Switched Telephone
Network (PSTN). In a VoIP call, analog signals are turned into digital signals to make it possible to send them in data packets
across local IP networks or the internet.

In the Axis product, VoIP is enabled through the Session Initiation Protocol (SIP) and Dual-Tone Multi-Frequency (DTMF) signaling.

Example

When you press the call button on an Axis door station, a call is initiated to one or more predefined recipients. When a recipient
replies, a call is established. The voice and video is transferred through VoIP technologies.

15
AXIS A82 Network Video Door Station Series

Learn more

Session Initiation Protocol (SIP)


The Session Initiation Protocol (SIP) is used to set up, maintain and terminate VoIP calls. You can make calls between two or more
parties, called SIP user agents. To make a SIP call you can use, for example, SIP phones, softphones or SIP-enabled Axis devices.

The actual audio or video is exchanged between the SIP user agents with a transport protocol, for example RTP (Real-Time
Transport Protocol).

You can make calls on local networks using a peer-to-peer setup, or across networks using a PBX.

Peer-to-peer SIP (P2PSIP)


The most basic type of SIP communication takes place directly between two or more SIP user agents. This is called peer-to-peer SIP
(P2PSIP). If it takes place on a local network, all that’s needed are the SIP addresses of the user agents. A typical SIP address in this
case would be sip:<local-ip>

Example

SIP

1 User agent A - door station. SIP address: sip:192.168.1.101


2 User agent B - SIP-enabled phone. SIP address: sip:192.168.1.100

You can set up the Axis door station to call for example a SIP-enabled phone on the same network using a peer-to-peer SIP setup.

Private Branch Exchange (PBX)


When you make SIP calls outside your local IP network, a Private Branch Exchange (PBX) can act as a central hub. The main
component of a PBX is a SIP server, which is also referred to as a SIP proxy or a registrar. A PBX works like a traditional switchboard,
showing the client's current status and allowing for example call transfers, voicemail, and redirections.

The PBX SIP server can be set up as a local entity or offsite. It can be hosted on an intranet or by a third party provider. When you
make SIP calls between networks, calls are routed through a set of PBXs, that query the location of the SIP address to be reached.

Each SIP user agent registers with the PBX, and can then reach the others by dialing the correct extension. A typical SIP address in
this case would be sip:<user>@<domain> or sip:<user>@<registrar-ip>. The SIP address is independent of its IP
address and the PBX makes the device accessible as long as it is registered to the PBX.

Example

16
AXIS A82 Network Video Door Station Series

Learn more

SIP SIP

SIP

1 sip:[email protected]
2 sip:[email protected]
3 PBX sip.company.com
4 sip:[email protected]

When you press the call button on an Axis door station, the call is forwarded through one or more PBXs to a SIP address either on the
local IP network or over the internet.

Set up rules and alerts


You can create rules to make your device perform an action when certain events occur. A rule consists of conditions and actions.
The conditions can be used to trigger the actions. For example, the device can start a recording or send an email when it detects
motion, or show an overlay text while the device is recording.

Applications
AXIS Camera Application Platform (ACAP) is an open platform that enables third parties to develop analytics and other applications
for Axis products. To find out more about available applications, downloads, trials and licenses, go to axis.com/applications.

To find the user manuals for Axis applications, go to axis.com.

To watch this video, go to the web version of this document.

www.axis.com/products/online-manual/44899#t10001688

How to download and install an application

17
AXIS A82 Network Video Door Station Series

Learn more

To watch this video, go to the web version of this document.

www.axis.com/products/online-manual/44899#t10001688

How to activate an application licence code on a device

18
AXIS A82 Network Video Door Station Series

Daily use

Daily use

Use the keypad


I want to... Action
Call someone who can let me into the building.
Press .
Call a person in the building.
Enter the person’s speed dial number and press .
Open the door with my card and PIN. Tap the card and enter the PIN.
Open the door with my PIN. Enter the PIN and press #.
Open the door with my card. Tap the card.

19
AXIS A82 Network Video Door Station Series

Troubleshooting

Troubleshooting

Reset to factory default settings


Important
Reset to factory default should be used with caution. A reset to factory default resets all settings, including the IP address, to
the factory default values.

To reset the product to the factory default settings:

1. Disconnect power from the product.

2. Press and hold the control button while reconnecting power. See Product overview on page 4 .

3. Keep the control button pressed for 15–30 seconds until the status LED indicator flashes amber.

4. Release the control button. The process is complete when the status LED indicator turns green. The product has been reset
to the factory default settings. If no DHCP server is available on the network, the default IP address is 192.168.0.90

5. Use the installation and management software tools to assign an IP address, set the password, and access the product.

The installation and management software tools are available from the support pages on axis.com/support

It is also possible to reset parameters to factory default through the web interface. Go to Maintenance > Maintenance actions and
click Restore to reset to factory default values but keep the IP address, or Default to reset all values including the IP address.

Check the current firmware


Firmware is the software that determines the functionality of network devices. One of your first actions when you troubleshoot a
problem should be to check the current firmware version. The latest version may contain a correction that fixes your particular
problem.

To check the current firmware:

1. In the device’s webpage, go to Overview.

2. Check the Firmware version.

Upgrade the firmware


Important
Preconfigured and customized settings are saved when the firmware is upgraded (provided that the features are available in
the new firmware), although this is not guaranteed by Axis Communications AB.

Important
Make sure the device remains connected to the power source throughout the upgrade process.

Note
When you upgrade the device with the latest firmware, the device receives the latest functionality available. Always read the
upgrade instructions and release notes available with each new release before you upgrade the firmware. To find the latest
firmware and the release notes, go to axis.com/support/firmware

1. Download the latest firmware file to your computer, available free of charge at axis.com/support/firmware

2. Log in to the device as an administrator.

20
AXIS A82 Network Video Door Station Series

Troubleshooting

3. Go to System > Maintenance > Firmware upgrade and follow the instructions on the page. When the upgrade has
finished, the device restarts automatically.

Technical issues, clues and solutions


If you can’t find what you’re looking for here, try the troubleshooting section at axis.com/support.

Problems upgrading the firmware


Firmware upgrade failure If the firmware upgrade fails, the device reloads the previous firmware. The most common reason
is that the wrong firmware file has been uploaded. Check that the name of the firmware file
corresponds to your device and try again.

Problems setting the IP address


The device is located on a If the IP address intended for the device and the IP address of the computer used to access the
different subnet device are located on different subnets, you cannot set the IP address. Contact your network
administrator to obtain an IP address.
The IP address is being used Disconnect the Axis device from the network. Run the ping command (in a Command/DOS window,
by another device type ping and the IP address of the device):

• If you receive: Reply from <IP address>: bytes=32; time=10...


this means that the IP address may already be in use by another device on the network.
Obtain a new IP address from the network administrator and reinstall the device.
• If you receive: Request timed out, this means that the IP address is available
for use with the Axis device. Check all cabling and reinstall the device.
Possible IP address conflict The static IP address in the Axis device is used before the DHCP server sets a dynamic address.
with another device on the This means that if the same default static IP address is also used by another device, there may
same subnet be problems accessing the device.

The device cannot be accessed from a browser


Cannot log in When HTTPS is enabled, ensure that the correct protocol (HTTP or HTTPS) is used when attempting
to log in. You may need to manually type http or https in the browser’s address field.

If the password for the user root is lost, the device must be reset to the factory default settings.
See Reset to factory default settings on page 20.
The IP address has been IP addresses obtained from a DHCP server are dynamic and may change. If the IP address has been
changed by DHCP changed, use AXIS IP Utility or AXIS Device Manager to locate the device on the network. Identify
the device using its model or serial number, or by the DNS name (if the name has been configured).

The device is accessible locally but not externally


To access the device externally, we recommend using one of the following applications for Windows®:

• AXIS Companion: free of charge, ideal for small systems with basic surveillance needs.
• AXIS Camera Station: 30-day trial version free of charge, ideal for small to mid-size systems.
For instructions and download, go to axis.com/vms.

Performance considerations
When setting up your system, it is important to consider how various settings and situations affect the performance. Some factors
affect the amount of bandwidth (the bitrate) required, others can affect the frame rate, and some affect both. If the load on the
CPU reaches its maximum, this also affects the frame rate.

The following factors are the most important to consider:

21
AXIS A82 Network Video Door Station Series

Troubleshooting

• High image resolution or lower compression levels result in images containing more data which in turn affects the
bandwidth.

• Access by large numbers of Motion JPEG or unicast H.264 clients affects the bandwidth.

• Simultaneous viewing of different streams (resolution, compression) by different clients affects both frame rate and
bandwidth.

Use identical streams wherever possible to maintain a high frame rate. Stream profiles can be used to ensure that
streams are identical.

• Accessing Motion JPEG and H.264 video streams simultaneously affects both frame rate and bandwidth.

• Heavy usage of event settings affects the product’s CPU load which in turn affects the frame rate.

• Using HTTPS may reduce frame rate, in particular if streaming Motion JPEG.

• Heavy network utilization due to poor infrastructure affects the bandwidth.

• Viewing on poorly performing client computers lowers perceived performance and affects frame rate.

• Running multiple AXIS Camera Application Platform (ACAP) applications simultaneously may affect the frame rate and
the general performance.

22
AXIS A82 Network Video Door Station Series

Specifications

Specifications

Front panel indicators and controls


When you connect the product to power, the indicator icons and the indicator strip light up for xx seconds.

Call indicator icons


Icon Indication
Steady blue when outgoing call initiated.

Flashes blue when incoming call initiated.


Steady amber for ongoing call.

Steady green when door is open.

Card reader indicator stripe


The stripe indicates reader feedback.

Call button
You can use the built-in light around the call button to light up the faces of visitors.

LED indicators
Status LED Indication
Green Steady green for normal operation.

SD card slot
NOTICE
NO TICE
• Risk of damage to SD card. Do not use sharp tools, metal objects, or excessive force when inserting or removing the
SD card. Use your fingers to insert and remove the card.
• Risk of data loss and corrupted recordings. Do not remove the SD card while the product is running. Unmount the SD card
from the product’s webpage before removal.

This product supports microSD/microSDHC/microSDXC cards.

For SD card recommendations, see axis.com.

microSD, microSDHC, and microSDXC Logos are trademarks of SD-3C LLC. microSD, microSDHC, microSDXC are
trademarks or registered trademarks of SD-3C, LLC in the United States, other countries or both.

23
AXIS A82 Network Video Door Station Series

Specifications

Buttons
Control button
The control button is used for:

• Resetting the product to factory default settings. See Reset to factory default settings on page 20.

Connectors
HDMI connector
Use the microHDMITM connector to connect a display or public view monitor.

Network connector
RJ45 Ethernet connector with Power over Ethernet Plus (PoE+).

Audio connector
4-pin terminal block for audio input and output.

Function Pin Notes


Line in 1 Line in (mono)
GND 2 Audio ground
Line out 3 Line out
GND 4 Audio ground

Relay connector
8-pin terminal block for solid state relays that can be used in the following ways:

• As a standard relay that opens and closes auxiliary circuits.

• To control a lock directly.

• To control a lock through a safety relay. Using a safety relay on the secure side of the door prevents hotwiring.

Function Pin Notes Specifications


NO/NC 1 Normally open/normally closed Max current 1 A
For connecting relay devices. Max voltage 30 V DC
The two relay pins are galvanically separated from the
rest of the circuitry.

24
AXIS A82 Network Video Door Station Series

Specifications

COM 2 Common
24 V DC 3 For powering auxiliary equipment. Output voltage 24 V DC
Note: This pin can only be used as power out. Max current 50 mA1
Max current 350 mA2
DC ground 4 0 V DC
NO/NC 5 Normally open/normally closed Max current 1 A
For connecting relay devices. Max voltage 30 V DC
The two relay pins are galvanically separated from the
rest of the circuitry.
COM 6 Common
12 V DC 7 For powering auxiliary equipment. Output voltage 12 V DC
Note: This pin can only be used as power out. Max current 100 mA3
Max current 700 mA4
DC ground 8 0 V DC
1. When powered through Power over Ethernet IEEE 802.3af/802.3at Type 1 Class 3.
2. When powered through Power over Ethernet Plus (PoE+) IEEE 802.3at Type 2 Class 4 or DC power input.
3. When powered through Power over Ethernet IEEE 802.3af/802.3at Type 1 Class 3.
4. When powered through Power over Ethernet Plus (PoE+) IEEE 802.3at Type 2 Class 4 or DC power input.

Reader connector
4–pin terminal block for connecting external reader.

Function Pin Notes Specifications


DC ground 1 0 V DC
12 V DC 2 For powering auxiliary Output voltage 12 V DC
equipment.
Note: This pin can only be
used as power out.
D0/A+ 3 Wiegand: DATA0 output
RS485: A+
D1/B- 4 Wiegand: DATA1 output
RS485: B-

I/O connector
Use the I/O connector with external devices in combination with, for example, motion detection, event triggering, and alarm
notifications. In addition to the 0 V DC reference point and power (DC output), the I/O connector provides the interface to:

Digital input - For connecting devices that can toggle between an open and closed circuit, for example PIR sensors, door/window
contacts, and glass break detectors.

Digital output - For connecting external devices such as relays and LEDs. Connected devices can be activated by the VAPIX®
Application Programming Interface, trough an event or from the product’s webpage.

Function Pin Notes Specifications


DC ground 1 0 V DC

25
AXIS A82 Network Video Door Station Series

Specifications

DC output 2 Can be used to power auxiliary equipment. 12 V DC


Note: This pin can only be used as power out. Max load = 50 mA
Configurable 3–6 Digital input – Connect to pin 1 to activate, or leave floating 0 to max 30 V DC
(Input or Output) (unconnected) to deactivate.
Digital output – Internally connected to pin 1 (DC ground) when 0 to max 30 V DC, open drain,
active, and floating (unconnected) when inactive. If used with an 100 mA
inductive load, e.g., a relay, connect a diode in parallel with the load,
to protect against voltage transients.

Example

1 DC ground
2 DC output 12 V, max 50 mA
3 I/O configured as input
4 I/O configured as output
5 Configurable I/O
6 Configurable I/O

Power connector
2-pin terminal block for DC power input. Use a Safety Extra Low Voltage (SELV) compliant limited power source (LPS) with either
a rated output power limited to ≤100 W or a rated output current limited to ≤5 A.

Function Pin Notes Specifications


DC ground 1 0 V DC
DC input 2 For powering controller when not using Power over 8–28 V DC, max 22 W
Ethernet. Max load on outputs 9 W
Note: This pin can only be used as power in.

26
AXIS A82 Network Video Door Station Series

Safety information

Safety information

Hazard levels
DANGER
Indicates a hazardous situation which, if not avoided, will result in death or serious injury.

WARNING
Indicates a hazardous situation which, if not avoided, could result in death or serious injury.

CAUTION
Indicates a hazardous situation which, if not avoided, could result in minor or moderate injury.

NOTICE
NO TICE
Indicates a situation which, if not avoided, could result in damage to property.

Other message levels


Important
Indicates significant information which is essential for the product to function correctly.

Note
Indicates useful information which helps in getting the most out of the product.

27
User Manual Ver. M7.3
AXIS A82 Network Video Door Station Series Date: January 2020
© Axis Communications AB, 2019 - 2020 Part No. T10121755
AXIS A1001 & AXIS Entry Manager

User Manual
AXIS A1001 & AXIS Entry Manager

Table of Contents

Product overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
.............................................................. 4
.............................................................. 5
.............................................................. 6
LED Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Connectors and buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
How to access the product . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Access the device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
About the mobile landing page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
How to access the product from the internet . . . . . . . . . . . . . . . . . . . . . . . . . 10
How to set the root password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
The Overview page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
System configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Configuration – step by step . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Select a language . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Set the Date and Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Configure the Network Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Configure the hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Verify the Hardware Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Configure cards and formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Configure Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Manage Network Door Controllers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Configuration mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Maintenance Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Access Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
About Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
The Access Management Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Choose a Workflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Create and Edit Access Schedules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Create and Edit Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Manage Doors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Manage floors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Create and edit users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Example Access Schedule Combinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Alarm and Event Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
View the event log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
View the Alarm Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Configure the Event and Alarm Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
How to set up action rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Reader feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
View, Print, and Export Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
System options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Date & Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Ports & Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Backup the application data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Advanced . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Reset to factory default settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
How to check the current firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
How to upgrade the firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Emergency Recovery Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Symptoms, possible causes and remedial actions . . . . . . . . . . . . . . . . . . . . . . 63
Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Connectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Connection Diagrams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69

2
AXIS A1001 & AXIS Entry Manager

Table of Contents

Safety information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Hazard levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Other message levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

3
AXIS A1001 & AXIS Entry Manager

Product overview

Product overview

Front and back:


1 Cover
2 Cover screw
3 Cover removal slot
4 Base
5 DIN clip – upper
6 Tampering alarm switch – back
7 DIN clip – lower
8 Part number (P/N) & Serial number (S/N)

4
AXIS A1001 & AXIS Entry Manager

Product overview

I/O interface:
1 Reader data connector (READER DATA 1)
10 Reader data connector (READER DATA 2)
3 Reader I/O connector (READER I/O 1)
8 Reader I/O connector (READER I/O 2)
4 Door connector (DOOR IN 1)
7 Door connector (DOOR IN 2)
6 Auxiliary connector (AUX)
5 Audio connector (AUDIO) (not used)

External power inputs:


2 Power connector (DC IN)
12 Network connector (PoE)

Power outputs:
9 Power lock connector (LOCK)
11 Power & Relay connector (PWR, RELAY)

5
AXIS A1001 & AXIS Entry Manager

Product overview

LED indicators, buttons and other hardware:


1 Power LED indicator
2 Status LED indicator
3 Network LED indicator
4 Reader 2 LED indicator (not used)
5 Reader 1 LED indicator (not used)
6 Tampering alarm pin header – front (TF)
7 Tampering alarm pin header – back (TB)
8 Lock LED indicator
9 Lock LED indicator
10 Tampering alarm sensor – front
11 SD card slot (microSDHC) (not used)
12 Control button
13 Part number (P/N) & Serial number (S/N)

LED Indicators
LED Color Indication
Network Green Steady for connection to a 100 MBit/s network. Flashes for network activity.
Amber Steady for connection to a 10 MBit/s network. Flashes for network activity.
Unlit No network connection.
Status Green Steady green for normal operation.
Amber Steady during startup and when restoring settings.
Red Slow flash for failed upgrade.
Power Green Normal operation.
Amber Flashes green/amber during firmware upgrade.

6
AXIS A1001 & AXIS Entry Manager

Product overview

Lock Green Steady when not energized.


Red Steady when energized.
Unlit Floating.

Note
• The Status LED can be configured to flash while an event is active.
• The Status LED can be configured to flash for identifying the unit. Go to Setup > Additional Controller Configuration >
System Options > Maintenance .

Connectors and buttons


I/O Interface
Reader Data Connectors
Two 6-pin terminal blocks supporting RS485 and Wiegand protocols for communication with the reader. For specifications, see
page 65.

Reader I/O Connectors


Two 6-pin terminal blocks for reader input and output. In addition to the 0 V DC reference point and power (DC output), the
reader I/O connector provides the interface to:

• Digital input – For connecting, for example, reader tampering alarms.

• Digital output – For connecting, for example, reader beepers and reader LEDs.

For specifications, see page 65.

Door Connectors
Two 4-pin terminal blocks for connecting door monitoring devices and request to exit (REX) devices. For specifications, see page 66.

Auxiliary Connector
4-pin configurable I/O terminal block. Use with external devices, in combination with, for example tampering alarms, event triggering
and alarm notifications. In addition to the 0 V DC reference point and power (DC output), the auxiliary connector provides the
interface to:

• Digital input – An alarm input for connecting devices that can toggle between an open and closed circuit, for example PIR
sensors or glass break detectors.

• Digital output – For connecting external devices such as burglar alarms, sirens or lights. Connected devices can be
activated by the VAPIX® application programming interface or by an action rule.

For specifications, see page 67.

External Power Inputs


NOTICE
NO TICE
The product shall be connected using a shielded network cable (STP). All cables connecting the product to the network shall
be intended for their specific use. Make sure that the network devices are installed in accordance with the manufacturer’s
instructions. For information about regulatory requirements, see .

Power Connector
2-pin terminal block for DC power input. Use a Safety Extra Low Voltage (SELV) compliant limited power source (LPS) with either a
rated output power limited to ≤100 W or a rated output current limited to ≤5 A. For specifications, see page 67.

Network Connector
RJ45 Ethernet connector. Supports Power over Ethernet (PoE). For specifications, see page 68.

7
AXIS A1001 & AXIS Entry Manager

Product overview

Power Outputs
Power Lock Connector

4-pin terminal block for connecting one or two locks. The lock connector can also be used to power external devices. For
specifications, see page 68.

Power & Relay Connector

6-pin terminal block for connecting power and the door controller’s relay to external devices such as locks and sensors. For
specifications, see page 68.

Buttons and Other Hardware


Tampering Alarm Pin Header
Two 2-pin headers for disconnecting the front and back tampering alarms. For specifications, see page 69.

Control Button
The control button is used for:

• Resetting the product to factory default settings. See page 61.

• Connecting to an AXIS Video Hosting System service. See page 55. To connect, press and hold the button for about 1
second until the Status LED flashes green.

• Connecting to AXIS Internet Dynamic DNS Service. See page 56. To connect, press and hold the button for about 3 seconds.

8
AXIS A1001 & AXIS Entry Manager

Installation

Installation

To watch this video, go to the web version of this document.

www.axis.com/products/online-manual/19467#t10170589

Installation video for the product.

9
AXIS A1001 & AXIS Entry Manager

How to access the product

How to access the product

To install the Axis product, see the Installation Guide supplied with the product.

Access the device


1. Open a browser and enter the IP address or host name of the Axis device.

If you do not know the IP address, use AXIS IP Utility or AXIS Device Manager to find the device on the network.

2. Enter the username and password. If you access the device for the first time, you must set the root password. See .

3. AXIS Entry Manager opens in your browser. If you are using a computer, you will reach the Overview page. If you are using
a mobile device, you will reach the mobile landing page.

About the mobile landing page


The mobile landing page shows the status of doors and locks connected to the door controller. You can test to lock and unlock.
Refresh the page to see the result.

A link takes you to Axis Entry Manager.

Note
• Axis Entry Manager doesn’t support mobile devices.
• If you continue to Axis Entry Manager, there is no link back to the mobile landing page.

How to access the product from the internet


A network router allows products on a private network (LAN) to share a single connection to the internet. This is done by forwarding
network traffic from the private network to the internet.

Most routers are pre-configured to stop attempts to access the private network (LAN) from the public network (internet).

If the Axis product is located on an intranet (LAN) and you want to make it available from the other (WAN) side of a NAT (Network
Address Translator) router, turn on NAT traversal. With NAT traversal properly configured, all HTTP traffic to an external HTTP port
in the NAT router is forwarded to the product.

How to turn on the NAT-traversal feature

• Go to Setup > Additional Controller Configuration > System Options > Network > TCP/IP > Advanced.

• Click Enable.

• Manually configure your NAT router to allow access from the internet.

See also AXIS Internet Dynamic DNS Service at www.axiscam.net

Note
• In this context, a “router” refers to any network routing device such as a NAT router, network router, internet gateway,
broadband router, broadband sharing device, or a software such as a firewall.
• For NAT traversal to work, NAT traversal must be supported by the router. The router must also support UPnP®.

How to set the root password


To access the Axis product, you must set the password for the default administrator user root. This is done in the Configure Root
Password dialog, which opens when the product is accessed for the first time.

10
AXIS A1001 & AXIS Entry Manager

How to access the product

To prevent network eavesdropping, the root password can be set via an encrypted HTTPS connection, which requires an HTTPS
certificate. HTTPS (Hypertext Transfer Protocol over SSL) is a protocol used to encrypt traffic between web browsers and servers. The
HTTPS certificate ensures encrypted exchange of information. See HTTPS on page 52.

The default administrator user name root is permanent and cannot be deleted. If the password for root is lost, the product must be
reset to the factory default settings. See Reset to factory default settings on page 61.

To set the password, enter it directly in the dialog.

The Overview page


The Overview page in AXIS Entry Manager shows information about the door controller’s name, MAC address, IP address, and
firmware version. It also enables you to identify the door controller on the network or in the system.

The first time you access the Axis product, the Overview page will prompt you to configure the hardware, to set date and time, to
configure the network settings, and to configure the door controller as part of a system or as a standalone unit. For more information
about configuring the system, see Configuration – step by step on page 12.

To return to the Overview page from the product’s other webpages, click Overview in the menu bar.

11
AXIS A1001 & AXIS Entry Manager

System configuration

System configuration

To open the product’s setup pages, click Setup in the top right-hand corner of the Overview page.

The Axis product can be configured by administrators. For more information about users and administrators, see page 31, page 39,
and page 52.

Configuration – step by step


Before you start using the access control system, you should complete the following setup steps:

1. If English is not your first language, you may want AXIS Entry Manager to use a different language. See Select a language
on page 12.

2. Set the date and time. See page 13.

3. Configure the network settings. See page 14.

4. Configure the door controller and connected devices such as readers, locks and request to exit (REX) devices. See Configure
the hardware on page 14.

5. Verify the Hardware Connections. See page 20.

6. Configure cards and formats. See page 21.

7. Configure the door controller system. See Manage Network Door Controllers on page 26.

For information about how to configure and manage the system's doors, schedules, users and groups, see Access Management on
page 31.

For information about maintenance recommendations, see Maintenance Instructions on page 29.

Note
To add or remove door controllers, to add, remove, or edit users, or to configure the hardware, more than half of the door
controllers in the system must be online. To check the door controller status, go to Setup > Manage Network Door
Controllers in System.

Select a language
The default language of AXIS Entry Manager is English, but you can switch to any of the languages that are included in the product’s
firmware. For information about the latest available firmware, see www.axis.com

You can switch languages in any of the product’s web pages.

To switch languages, click the language drop-down list and select a language. All the product’s web pages and help pages are
displayed in the selected language.

Note
• When you switch languages, the date format also changes to a format commonly used in the selected language. The
correct format is displayed in the data fields.
• If you reset the product to factory default settings, AXIS Entry Manager switches back to English.
• If you restore the product, AXIS Entry Manager will continue to use the selected language.
• If you restart the product, AXIS Entry Manager will continue to use the selected language.
• If you upgrade the firmware, AXIS Entry Manager will continue to use the selected language.

12
AXIS A1001 & AXIS Entry Manager

System configuration

Set the Date and Time


If the door controller is part of a system, the date and time settings will be distributed to all the door controllers. This means that the
settings are pushed to the other controllers in the system, regardless of whether you synchronize with an NTP server, set the date and
time manually, or get the date and time from the computer. If you cannot see the changes, try refreshing the page in your browser.
For more information about managing a system of door controllers, see Manage Network Door Controllers on page 26.

To set the date and time of the Axis product, go to Setup > Date & Time.

You can set the date and time in the following ways:

• Get the date and time from a network time protocol (NTP) server. See page 13.

• Set the date and time manually. See page 13.

• Get the date and time from the computer. See page 13.

Current controller time displays the door controller’s current date and time (24h clock).

The same options for date and time are also available in the System Options pages. Go to Setup > Additional Controller
Configuration > System Options > Date & Time.

Get the Date and Time from a Network Time Protocol (NTP) Server
1. Go to Setup > Date & Time.

2. Select your Timezone from the drop-down list.

3. If daylight saving time is used in your region, select Adjust for daylight saving .

4. Select Synchronize with NTP.

5. Select the default DHCP address or enter the address of a NTP server.

6. Click Save.

When synchronizing with an NTP server, date and time are updated continuously because the data is pushed from the NTP server. For
information about NTP settings, see NTP Configuration on page 56.

If you use a host name for the NTP server, a DNS server must be configured. See DNS Configuration on page 56.

Set the Date and Time Manually


1. Go to Setup > Date & Time.

2. If daylight saving time is used in your region, select Adjust for daylight saving .

3. Select Set date & time manually.

4. Enter the desired date and time.

5. Click Save.

When setting the date & time manually, date and time are set once and will not be updated automatically. This means that if the
date or time needs to be updated, the changes must be made manually because there is no connection to an external NTP server.

Get the Date and Time from the Computer


1. Go to Setup > Date & Time.

2. If daylight saving time is used in your region, select Adjust for daylight saving .

3. Select Set date & time manually.

13
AXIS A1001 & AXIS Entry Manager

System configuration

4. Click Sync now and save.

When using the computer time, date and time are synchronized with the computer time once and will not be updated automatically.
This means that if you change the date or time on the computer you use to manage the system, you should synchronize again.

Configure the Network Settings


To configure the basic network settings, go to Setup > Network Settings or to Setup > Additional Controller Configuration >
System Options > Network > TCP/IP > Basic.

For more information about network settings, see Network on page 54.

Configure the hardware


Before you can manage the doors and floors, the hardware must be configured in the Hardware Configuration pages.

You can connect readers, locks and other devices to the Axis product before you complete the hardware configuration. However,
it will be easier to connect devices if you complete the hardware configuration first. This is because a hardware pin chart will be
available when the configuration is complete. The hardware pin chart is a guide on how to connect devices to the pins and can be
used as a reference sheet for maintenance. For maintenance instructions, see page 29.

If configuring the hardware for the first time, select one of the following methods:

• Import a hardware configuration file. See page 14.

• Create a new hardware configuration. See page 15.

Note
If the product’s hardware has not been configured before or has been deleted, Hardware Configuration will be available in
the notification panel in the Overview page.

How to import a hardware configuration file


The hardware configuration of the Axis product can be completed faster by importing a hardware configuration file.

By exporting the file from one product and importing it to others, you can make multiple copies of the same hardware setup without
having to repeat the same steps over and over again. You can also store exported files as backups and use them to restore previous
hardware configurations. For more information, see How to export a hardware configuration file on page 14.

To import a hardware configuration file:

1. Go to Setup > Hardware Configuration.

2. Click Import hardware configuration or, if a hardware configuration already exists, Reset and import hardware
configuration.

3. In the file browser dialog that appears, locate and select the hardware configuration file (*.json) on your computer.

4. Click OK.

How to export a hardware configuration file


The hardware configuration of the Axis product can be exported to make multiple copies of the same hardware setup. You can also
store exported files as backups and use them to restore previous hardware configurations.

Note
The hardware configuration of floors is not possible to export.

Wireless lock settings are not included in the hardware configuration export.

14
AXIS A1001 & AXIS Entry Manager

System configuration

To export a hardware configuration file:

1. Go to Setup > Hardware Configuration.

2. Click Export hardware configuration.

3. Depending on the browser, you may need to go through a dialog to complete the export.

Unless otherwise specified, the exported file (*.json) is saved in the default download folder. You can select a download
folder in the web browser’s user settings.

Create a new hardware configuration


Follow the instructions according to your requirements:

• How to create a new hardware configuration without peripherals on page 15

• How to create a new hardware configuration for wireless locks on page 18

• How to create a new hardware configuration with elevator control (AXIS A9188) on page 19

How to create a new hardware configuration without peripherals


1. Go to Setup > Hardware Configuration and click Start new hardware configuration.

2. Enter a name for the Axis product.

3. Select the number of connected doors and click Next.

4. Configure the door monitors (door position sensors) and locks according to your requirements and click Next. For more
information about the available options, see How to configure door monitors and locks on page 15.

5. Configure the readers and REX devices that will be used and click Finish. For more information about the available options,
see How to configure readers and REX devices on page 17.

6. Click Close or click the link to view the hardware pin chart.

How to configure door monitors and locks


When you have selected a door option in the new hardware configuration, you can configure the door monitors and locks.

1. If a door monitor will be used, select Door monitor and then select the option that matches how the door monitor
circuits will be connected.

2. If the door lock shall lock immediately after the door has been opened, select Cancel access time once door is opened.

If you want to delay the relock, set the time of the delay in milliseconds in Relock time.

3. Specify the door monitor time options or, if no door monitor will be used, the lock time options.

4. Select the options that match how the lock circuits will be connected.

5. If a lock monitor will be used, select Lock monitor and then select the options that match how the lock monitor circuits
will be connected.

6. If the input connections from readers, REX devices, and door monitors shall be supervised, select Enable supervised inputs.

For more information, see How to use supervised inputs on page 18.

15
AXIS A1001 & AXIS Entry Manager

System configuration

Note
• Most lock, door monitor, and reader options can be changed without resetting and starting a new hardware configuration.
Go to Setup > Hardware Reconfiguration.
• You can connect one lock monitor per door controller. So if you use double-lock doors, only one of the locks can have a lock
monitor. If two doors are connected to the same door controller, lock monitors cannot be used.
• Motorized locks must be configured as secondary locks.

About door monitor and time options


The following door monitor options are available:

• Door monitor – Selected by default. Each door has its own door monitor that, for example, will signal when the door has
been forced open or open too long. Deselect if no door monitor will be used.

- Open circuit = Closed door – Select if the door monitor circuit is normally open. The door monitor gives the door
open signal when the circuit is closed. The door monitor gives the door closed signal when the circuit is open.

- Open circuit = Open door – Select if the door monitor circuit is normally closed. The door monitor gives the door
open signal when the circuit is open. The door monitor gives the door closed signal when the circuit is closed.

• Cancel access time once door is opened – Select to prevent tailgating. The lock will be locked as soon as the door
monitor indicates that the door has been opened.

The following door time options are always available:

• Access time – Set the number of seconds the door shall remain unlocked after access has been granted. The door remains
unlocked until the door has been opened or until the set time has been reached. The door will lock when it closes regardless
of whether the access time has expired or not.

• Long access time – Set the number of seconds the door shall remain unlocked after access has been granted. Long
access time overrides the already set access time and will be enabled for users with long access time selected, see
User Credentials on page 40

Select Door monitor to make the following door time options available:

• Open too long time – Set the number of seconds the door is allowed to stay open. If the door is still open when the set
time has been reached, the door open too long alarm is triggered. Set up an action rule to configure which action the
open too long event shall trigger.

• Pre-alarm time – A pre-alarm is a warning signal that is triggered before the open too long time has been reached. It
informs the administrator and warns, depending on how the action rule has been set up, the person entering the door
that the door needs to be closed to avoid the door open too long alarm to go off. Set the number of seconds before the
door open too long alarm is triggered the system shall give the pre-alarm warning signal. To disable the pre-alarm, set
the pre-alarm time to 0.

1 Access granted – lock unlocks


2 Access time

16
AXIS A1001 & AXIS Entry Manager

System configuration

3 No action taken – lock locks


4 Action taken (door opened) – lock locks or stays unlocked until door closes
5 Open too long time
6 Pre-alarm goes off
7 Pre-alarm time
8 Open too long-alarm goes off

For information about how to set up an action rule, see How to set up action rules on page 45.

About lock options


The following lock circuit options are available:

• 12 V

- Fail-secure – Select for locks that remain locked during power outages. When applying electric current, the
lock will unlock.

- Fail-safe – Select for locks that unlock during power outages. When applying electric current, the lock will lock.

• Relay – Can only be used on one lock per door controller. If two doors are connected to the door controller, a relay can
only be used on the lock of the second door.

- Relay open = Locked – Select for locks that remain locked when the relay is open (fail-secure). When the
relay closes, the lock will unlock.

- Relay open = Unlocked – Select for locks that unlock during power outages (fail-safe). When the relay closes,
the lock will lock.

• None – Only available for Lock 2. Select if only one lock will be used.

The following lock monitor options are available for single-door configurations:

• Lock monitor – Select to make the lock monitor controls available. Then select the lock that shall be monitored. A lock
monitor can only be used on double-lock doors and cannot be used if two doors are connected to the door controller.

- Open circuit = Locked – Select if the lock monitor circuit is normally closed. The lock monitor gives the door
unlocked signal when the circuit is closed. The lock monitor gives the door locked signal when the circuit is open.

- Open circuit = Unlocked – Select if the lock monitor circuit is normally open. The lock monitor gives the door
unlocked signal when the circuit is open. The lock monitor gives the door locked signal when the circuit is closed.

How to configure readers and REX devices


When you have configured the door monitors and locks in the new hardware configuration, you can configure the readers and
request to exit (REX) devices.

1. If a reader will be used, select the checkbox and then select the options that match the reader’s communication protocol.

2. If a REX device such as a button, sensor, or push bar will be used, select the checkbox and then select the option that
matches how the REX device’s circuits will be connected.

If the REX signal does not influence door opening (for example for doors with mechanical handles or push bars), select
REX does not unlock door.

3. If connecting more than one reader or REX device to the door controller, do the previous two steps again until each
reader or REX device has the correct settings.

About reader and REX device options


The following reader options are available:

17
AXIS A1001 & AXIS Entry Manager

System configuration

• Wiegand – Select for readers that use Wiegand protocols. Then select the LED control that is supported by the reader.
Readers with single LED control usually toggle between red and green. Readers with dual LED control use different wires
for the red and green LEDs. This means that the LEDs are controlled independently of each other. When both LEDs are on,
the light appears to be amber. See the manufacturer’s information about which LED control the reader supports.

• OSDP, RS485 half duplex – Select for RS485 readers with half duplex support. See the manufacturer’s information
about which protocol the reader supports.

The following REX device options are available:

• Active low – Select if activating the REX device closes the circuit.

• Active high – Select if activating the REX device opens the circuit.

• REX does not unlock door – Select if the REX signal does not influence door opening (for example for doors with
mechanical handles or push bars). The door forced open alarm will not be triggered as long as the user opens the door
within the access time. Deselect if the door shall unlock automatically when the user activates the REX device.

Note
Most lock, door monitor, and reader options can be changed without resetting and starting a new hardware configuration.
Go to Setup > Hardware Reconfiguration.

How to use supervised inputs


Supervised inputs report on the status of the connection between the door controller and the readers, REX devices, and door
monitors. If the connection is interrupted, an event is activated.

To use supervised inputs:

1. Install end of line resistors on all the used supervised inputs. See the connection diagram on page 70.

2. Go to Setup > Hardware Reconfiguration and select Enable supervised inputs. You can also enable supervised inputs
during the hardware configuration.

About supervised input compatibility


The following connectors support supervised inputs:

• Reader I/O connector – tampering signal. See page 65.

• Door connector. See page 66.

Readers and switches that can be used with supervised inputs include:

• HID readers with internal 1 kΩ pull-up to 5 V.

• Readers and switches with internal 1 kΩ pull-up to 5 V.

• Readers and switches without internal pull-up.

How to create a new hardware configuration for wireless locks


1. Go to Setup > Hardware Configuration and click Start new hardware configuration.

2. Enter a name for the Axis product.

3. In the list of peripherals, select a manufacturer for a wireless gateway.

4. If you want to connect a wired door, select the 1 Door checkbox and click Next. If no door is included, click Finish.

5. Depending on what lock manufacturer you got, proceed according to one of the bullets:

18
AXIS A1001 & AXIS Entry Manager

System configuration

- ASSA Aperio: Click the link to view the hardware pin chart or click Close and go to Setup > Hardware
Reconfiguration to complete the configuration, see Add Assa AperioTM doors and devices on page 19

- SmartIntego: Click the link to view the hardware pin chart or click Click here to select wireless gateway and
configure doors to complete the configuration, see How To Configure SmartIntego on page 26.

Add Assa AperioTM doors and devices


Before adding a wireless door to the system it needs to be paired with the connected Assa Aperio communication hub, using
Aperio PAP (Aperio programming application tool).

To add a wireless door:

1. Go to Setup > Hardware Reconfiguration.

2. Under Wireless Doors and Devices click Add door.

3. In the Door name field: Enter a descriptive name.

4. In the ID field under Lock: Enter the six-character-long address of the device that you want to add. The device address is
printed on the product label.

5. Optionally, under Door position sensor: Choose Built in door position sensor or External door position sensor.

Note
If using an external door position sensor (DPS), make sure that the Aperio lock device has support for door handle state
detection before configuring it.

6. Optionally, in the ID field under Door position sensor: Enter the six-character-long address of the device that you want to
add. The device address is printed on the product label.

7. Click Add.

How to create a new hardware configuration with elevator control (AXIS A9188)
Important
Before creating a HW configuration you need to add a user in AXIS A9188 Network I/O Relay Module. Go to the A9188 web
interface > Preferences > Additional device configuration > Basic setup > Users > Add > User setup.

Note
Max 2 AXIS 9188 Network I/O Relay Modules can be configured with each Axis Network Door Controller

1. In A1001, go to Setup > Hardware Configuration and click Start new hardware configuration.

2. Enter a name for the Axis product.

3. In the list of peripherals, select Elevator control to include an AXIS A9188 Network I/O Relay Module and click Next.

4. Enter a name for the connected reader.

5. Select the reader protocol that will be used and click Finish.

6. Click Network Peripherals to complete the configuration see How to add and setup network peripherals on page 20 or
click the link to go to the hardware pin chart.

19
AXIS A1001 & AXIS Entry Manager

System configuration

How to add and setup network peripherals


Important
• Before you set up the network periphals you need to add a user in AXIS A9188 Network I/O Relay Module. Go to the AXIS
A9188 web interface > Preferences > Additional device configuration > Basic setup > Users > Add > User setup.
• Don’t add another AXIS A1001 Network Door Controller as a network peripheral.

1. Go to Setup > Network Periphals to add a device

2. Find your device(s) under Discovered devices.

3. Click Add this device

4. Enter a name for the device

5. Enter the AXIS A9188 username and password

6. Click Add.

Note
You can manually add network periphals by entering MAC address or IP address in the Manually add device dialog.

Important
If you want to delete a schedule, first make sure it’s not used by the network I/O relay module.

How to setup I/Os and relays in network peripherals


Important
Before setting up the network peripherals you need to add a user in AXIS A9188 Network I/O Relay Module. Go to the AXIS
A9188 web interface > Preferences > Additional device configuration > Basic setup > Users > Add > User setup.

1. Go to Setup > Network Periphals and click on the Added devices row.

2. Choose which I/Os and relays to set as floor.

3. Click Set as floor and enter a name.

4. Click Add.

The floor is now visible in the Floor tab under Access Management.

Note
In AXIS Entry Manager you can add maximum 16 floors.

Verify the Hardware Connections


When the hardware installation and configuration is complete, and anytime during the door controller’s lifetime, you can verify the
function of the connected door monitors, Network I/O Relay Modules, locks and readers.

To verify the configuration and access the verification controls, go to Setup > Hardware Connection Verification.

Verification Controls Doors


• Door state – Verify the current state of the door monitor, door alarms and locks. Click Get current state.

• Lock – Manually trigger the lock. Both primary locks and secondary locks if there are any will be affected. Click Lock or
Unlock.

• Lock – Manually trigger the lock to grant access. Only primary locks will be affected. Click Access.

20
AXIS A1001 & AXIS Entry Manager

System configuration

• Reader: Feedback – Verify the reader feedback, for example sounds and LED signals, for different commands. Select the
command and click Test. Which types of feedback that are available depends on the reader. For more information, see
Reader feedback on page 49. See also the manufacturer’s instructions.

• Reader: Tampering – Get information about the last tampering attempt. The first tampering attempt will be registered
when the reader is installed. Click Get last tampering.

• Reader: Card swipe – Get information about the last swiped card or other type of user token accepted by the reader.
Click Get last credential.

• REX – Get information about the last time the request to exit (REX) device was pressed. Click Get last REX.

Verification Controls Floors


• Floor state – Verify the current state of the floor access. Click Get current state.

• Floor lock & unlock – Manually trigger the floor access. Both primary locks and secondary locks if there are any will
be affected. Click Lock or Unlock.

• Floor access – Manually grant temporary access to the floor. Only primary locks will be affected. Click Access.

• Elevator Reader: Feedback – Verify the reader feedback, for example sounds and LED signals, for different commands.
Select the command and click Test. Which types of feedback that are available depends on the reader. For more
information, see Reader feedback on page 49. See also the manufacturer’s instructions.

• Elevator Reader: Tampering – Get information about the last tampering attempt. The first tampering attempt will be
registered when the reader is installed. Click Get last tampering.

• Elevator Reader: Card swipe – Get information about the last swiped card or other type of user token accepted by the
reader. Click Get last credential.

• REX – Get information about the last time the request to exit (REX) device was pressed. Click Get last REX.

Configure cards and formats


The door controller has a few predefined commonly used card formats that you can use as they are or modify as required. You can
also create custom card formats. Each card format has a different set of rules, field maps, for how the information stored on the card
is organized. By defining a card format you tell the system how to interpret the information that the controller gets from the reader.
For information about which card formats the reader supports, see the manufacturer’s instructions.

To enable card formats:

1. Go to Setup > Configure cards and formats.

2. Select one or more card formats that match the card format used by the connected readers.

To create new card formats:

1. Go to Setup > Configure cards and formats.

2. Click Add card format.

3. In the Add card format dialog, enter a name, a description, and the bit length of the card format. See Card format
descriptions on page 22.

4. Click Add field map and enter the required information in the fields. See Field maps on page 22.

5. To add multiple field maps, repeat the previous step.

To expand an item in the Card formats list and view the card format descriptions and field maps, click .

To edit a card format, click and change the card format descriptions and field maps as required. Then click Save.

21
AXIS A1001 & AXIS Entry Manager

System configuration

To delete a field map in the Edit card format or Add card format dialog, click

To delete a card format, click .

Important
• All changes to card formats apply to the whole system of door controllers.
• You can only enable and disable card formats if at least one door controller in the system has been configured with at least
one reader. See Configure the hardware on page 14 and How to configure readers and REX devices on page 17.
• Two card formats with the same bit length cannot be active the same time. For example, if you have defined two 32-bit
card formats, “Format A” and “Format B”, and you have enabled “Format A”, you cannot enable “Format B” without
disabling “Format A” first.
• If no card formats have been enabled, you can use the Card raw only and Card raw and PIN identification types to
identify a card and grant access to users. However, we do not recommend this since different reader manufacturers
or reader settings can generate different card raw data.

Card format descriptions


• Name (required) – Enter a descriptive name.

• Description – Enter additional information as desired. This information is only visible in the Edit card format and Add
card format dialogs.

• Bit length (required) – Enter the bit length of the card format. This has to be a number between 1 and 1000000000.

Field maps
• Name (required) – Enter the field map name unspaced, for example OddParity.

Examples of common field maps include:

- Parity – Parity bits are used for error detection. Parity bits are usually added to the beginning or end of a
binary code string and indicate if the number of bits is even or odd.

- EvenParity – Even parity bits make sure that there is an even number of bits in the string. The bits that have
the value 1 are counted. If the count is already even, the parity bit value is set to 0. If the count is odd, the
even parity bit value is set to 1, making the total count an even number.

- OddParity – Odd parity bits make sure that there is an odd number of bits in the string. The bits that have
the value 1 are counted. If the count is already odd, the odd parity bit value is set to 0. If the count is even,
the parity bit value is set to 1, making the total count an odd number.

- FacilityCode – Facility codes are sometimes used for verifying that the token matches the ordered end user
credential batch. In legacy access control systems, the facility code was used for a degraded validation, allowing
entry to every employee in the credential batch that had been encoded with a matching site code. This field map
name, which is case sensitive, is required for the product to validate on facility code.

- CardNr – The card number or user ID is what is most commonly validated in access control systems. This field
map name, which is case sensitive, is required for the product to validate on card number.

- CardNrHex – The card number binary data is encoded as hex-lowercase numbers in the product. It is primarily
used for troubleshooting why you are not getting the expected card number from the reader.

• Range (required) – Enter the bit range of the field map, for example 1, 2–17, 18–33, and 34.

• Encoding (required) – Select the encoding type of each field map.

- BinLE2Int – Binary data is encoded as integer numbers in little endian bit order. Integer means that it needs to
be a whole number (no decimals). Little endian bit order means that the first bit is the smallest (least significant).

- BinBE2Int – Binary data is encoded as integer numbers in big endian bit order. Integer means that it needs to be
a whole number (no decimals). Big endian bit order means that the first bit is the biggest (most significant).

22
AXIS A1001 & AXIS Entry Manager

System configuration

- BinLE2Hex – Binary data is encoded as hex-lowercase numbers in little endian bit order. The hexadecimal
system, also known as the base-16 number system, consists of 16 unique symbols: the numbers 0–9 and the
letters a–f. Little endian bit order means that the first bit is the smallest (least significant).

- BinBE2Hex – Binary data is encoded as hex-lowercase numbers in big endian bit order. The hexadecimal system,
also known as the base-16 number system, consists of 16 unique symbols: the numbers 0–9 and the letters a–f.
Big endian bit order means that the first bit is the biggest (most significant).

- BinLEIBO2Int – Binary data is encoded in the same way as for BinLE2Int, but the card raw data is read with
inverted byte order in a multiple-byte sequence before field maps are taken out to be encoded.

- BinBEIBO2Int – Binary data is encoded like for BinBE2Int, but the card raw data is read with inverted byte order
in a multiple-byte sequence before the field maps are taken out to be encoded.

For information about which field maps your card format uses, see the manufacturer’s instructions.

Preset facility code


Facility codes are sometimes used for verifying that the token matches the facility’s access control system. Often all tokens issued for
a single facility have the same facility code. Enter a preset facility code to allow easier manual registration of a batch of cards. The
preset facility code is automatically filled in when adding users, see User Credentials on page 40

To set a preset facility code:

1. Go to Setup > Configure cards and formats.

2. Under Preset facility code: Enter a facility code.

3. Click Set facility code.

Configure Services
The Configure Services in the Setup page is used to access the set up for the external services that can be used with the door controller.

HID Mobile Access


HID Mobile Access extends the access control by using a mobile device as a credential.

Prerequisites HID Mobile Access


The following prerequisites need to be met before you set up HID Mobile Access for your door controller:

• HID account. Contact your HID partner to set it up.

• Part a number (for your mobile credentials) associated with your HID account.

• The product needs access to the HID Mobile Access cloud servers, using outgoing HTTPS encrypted communication. Please
update your IT infrastructure accordingly. This includes an eventual DNS server connection.

Configure HID Mobile Access


1. Click Setup in the top menu.

2. Click Configure Services > Settings.

3. Enter your client ID and password for HID.

4. Enter the proxy settings, if needed, and click Connect.

5. Click Set as current to select the part number you want to use for this installation.

6. Add HID Mobile Access to users either by:

23
AXIS A1001 & AXIS Entry Manager

System configuration

- creating and edit users manually (see Create and edit users on page 39 on page page 39)

- importing users (see Import Users on page 40 on page page 40)

Note
Each user that is given access to HID Mobile Access gets an email with a link to the app to continue the installation on
their device.

AXIS Visitor Access


With AXIS Visitor Access, temporary credentials can be created in the form of a QR code. An Axis network camera or door station
connected to the access control system scans the QR code.

The service consists of:

• an Axis door controller with AXIS Entry Manager and firmware version 1.65.2 or higher

• an Axis network camera or door station, with the QR scanner application installed

• a Windows® PC with the AXIS Visitor Access application installed

Usage of AXIS Visitor Access service

The user creates an invitation in AXIS Visitor Access (1) and sends the invitation to the visitor’s email address. At the same time the
credentials to unlock the door are created and stored in the connected Axis door controller (4). The visitor shows the QR code included
in the invitation at the network camera or door station (3), which asks the door controller (4) to unlock the door for the visitor.

QR Code is a registered trademark of Denso Wave, inc.

Prerequisites AXIS Visitor Access


Before you can use the AXIS Visitor Access service, you need:

24
AXIS A1001 & AXIS Entry Manager

System configuration

• to configure the door controller hardware

• an Axis network camera or door station connected to the same network as the door controller, and placed accessible
to the visitor by the door

• the AXIS Visitor Access installation package. You can find it at axis.com

• two additional user accounts in the door controller, only to be used by the AXIS Visitor Access service. You need one for the
AXIS Visitor Access application, and the other for the QR scanner application. To find out how to create user accounts,
see Users on page 52

Important
• You can only connect the AXIS Visitor Access service to a single door controller in the entire system.
• With the AXIS Visitor Access service, you can only address doors that are controlled by the connected door controller.
You cannot address other doors in the system.
• Use the AXIS Visitor Access application to modify and delete visitors. Do not use AXIS Entry Manager.
• If you change the password of the user account used for AXIS Visitor Access, you need to update it also in AXIS Visitor Access.
• If you change the password of the user account used for the QR scanner application, you need to set up the QR scanner again.

Set up AXIS Visitor Access

You install the QR scanner application on the Axis network camera or door station when you set up the AXIS Visitor Access service.
You don’t need to make any separate installation.

1. In the door controller’s webpage, go to Setup > Configure Services > Settings.

2. Click Start a new setup.

3. Follow the instructions to finalize the setup.

Important
If you want to enforce HTTPS, make sure that the door controller communicates through HTTPS. Otherwise the application
will not be able to communicate with the door controller.

4. On the computer that will be used for creating temporary credentials, install and set up the AXIS Visitor Access application.

SmartIntego
SmartIntego is a wireless solution that increases the number of doors a door controller can handle.

Prerequisites SmartIntego
The following prerequisites needs to be met before proceeding with the SmartIntego configuration:

25
AXIS A1001 & AXIS Entry Manager

System configuration

• A csv-file needs to be created. The csv-file contains information about what GatewayNode and doors that are used in your
SmartIntego solution. The file is created in a standalone software provided by a SimonsVoss partner.

• The Hardware Configuration of SmartIntego has been done, see How to create a new hardware configuration for wireless
locks on page 18.

Note
• SmartIntego Configuration tool must be version 2.1.6452.23485, build 2.1.6452.23485 (8/31/2017 1:02:50 PM) or later.
• The Advanced Encryption Standard (AES) is not supported for SmartIntego, and must therefore be disabled in the
SmartIntego Configuration tool.

How To Configure SmartIntego


Note
• Make sure that prerequisites listed have been met.
• For increased visibility of the battery status, go to Setup > Configure event and alarms logs, and add either Door —
Battery alarm or IdPoint — Battery alarm as an alarm.
• The door monitor settings come from the imported CSV file. You shouldn't need to change this setting in a normal
installation.

1. Click Browse..., select the csv-file and click Upload file.

2. Select a GatewayNode and click Next.

3. A preview of the new configuration is shown. Disable the door monitors if needed.

4. Click Configure.

5. An overview of the doors included in the configuration is shown. Click Settings to configure each door individually.

How to re-configure SmartIntego


1. Click Setup in the top menu.

2. Click Configure Services > Settings.

3. Click Re-configure.

4. Click Browse..., select the csv-file and click Upload file.

5. Select a GatewayNode and click Next.

6. A preview of the new configuration is shown. Disable the door monitors if needed.

Note
The door monitor settings come from the imported CSV file. You shouldn't need to change this setting in a normal installation.

7. Click Configure.

8. An overview of the doors included in the configuration is shown. Click Settings to configure each door individually.

Manage Network Door Controllers


The Manage Network Door Controllers in System page shows information about the door controller, its system status, and which
other door controllers are part of the system. It also enables the administrator to change the system setup by adding and removing
door controllers.

Important
All door controllers in a system must be connected to the same network, and be setup for use at a single site.

26
AXIS A1001 & AXIS Entry Manager

System configuration

To manage door controllers, go to Setup > Manage Network Door Controllers in System.

The Manage Network Door Controllers in System page includes the following panels:

• System status of this controller – Shows the door controller's system status and enables switching between system and
standalone modes. For more information, see Door Controller System Status on page 27.

• Network door controllers in system – Shows information about the door controllers in the system and includes controls
for adding and removing a controller from the system. For more information, see Connected Door Controllers in the
System on page 27.

Door Controller System Status


If the door controller can be part of a system of door controllers depends on its system status. The door controller’s system status
is displayed in the System status for this controller panel.

If the door controller is not in standalone mode and you want to protect the door controller from being added to a system, click
Activate standalone mode to enter standalone mode.

If the door controller is in standalone mode but you intend to add the door controller to a system, click Deactivate standalone
mode to leave the standalone mode.

System Modes
• This controller is not part of a system and not in standalone mode – The door controller has not been configured as
part of a system and it is not in standalone mode. This means that the door controller is open and can be added to a
system by any other door controller within the same network. To protect the door controller from being added to a
system, activate the standalone mode.

• This controller is set to standalone mode – The door controller is not part of a system. It cannot be added to a
system by other door controllers in the network or add other door controllers itself. Standalone mode is typically used
in small setups with one door controller and one or two doors. To allow the door controller to be added into a system,
deactivate the standalone mode.

• This controller is part of a system – The door controller is part of a distributed system. In the distributed system, users,
groups, doors, and schedules are shared between the connected controllers.

Connected Door Controllers in the System


The Network door controllers in system panel provides controls for the following system changes:

• Add a door controller to a system, see Add Door Controllers to the System on page 28.

• Remove a door controller from a system, see Remove Door Controllers from the System on page 28.

Connected Door Controllers List


The Network door controllers in system panel also includes a list that shows the following ID and status information about
the connected door controllers in the system:

• Name – The user-defined name of the door controller. If the administrator has not set a name when configuring the
hardware, the default name will be shown.

• IP address

• MAC address

• Status – The door controller from which you access the system will show status This controller. The other door controllers
in the system will show status Online.

• Firmware version

27
AXIS A1001 & AXIS Entry Manager

System configuration

To open the webpages of another door controller, click the controller’s IP address.

To update the list, click Refresh the list of controllers.

Note
All controllers in a system always need to have the same firmware version. Use Axis Device Manager to do a parallel
firmware upgrade on all controllers in the entire system.

Add Door Controllers to the System


Important
When pairing door controllers, all access management settings on the added door controller will be deleted and overwritten
by the system’s access management settings.

To add a door controller to the system from the list of door controllers:

1. Go to Setup > Manage Network Door Controllers in System.

2. Click Add controllers to system from list.

3. Select the door controller that you wish to add.

4. Click Add.

5. To add more door controllers, repeat the steps above.

To add a door controller to the system by its known IP address or MAC address:

1. Go to Manage Devices.

2. Click Add controller to system by IP or MAC address.

3. Enter the IP address or MAC address.

4. Click Add.

5. To add more door controllers, repeat the steps above.

When the pairing is completed, all users, doors, schedules, and groups are shared by all door controllers in the system.

To update the list, click Refresh list of controllers.

Remove Door Controllers from the System


Important
• Before removing a door controller from the system, reset its hardware configuration. If you skip this step, all doors related to
the removed door controller will remain in the system and cannot be deleted.
• When removing a door controller from a two-controller system, both door controllers automatically switch to standalone
mode.

To remove a door controller from the system:

1. Access the system through the door controller that you want to remove and go to Setup > Hardware Configuration.

2. Click Reset hardware configuration.

3. After the hardware configuration has been reset, go to Setup > Manage Network Door Controllers in System.

4. In the Network door controllers in system list, identify the door controller that you want to remove and click Remove
from system.

5. A dialog opens reminding you to reset the door controller’s hardware configuration. Click Remove controller to confirm.

28
AXIS A1001 & AXIS Entry Manager

System configuration

6. A dialog opens prompting you to confirm that you want to remove the door controller. Click OK to confirm. The removed
door controller is now in standalone mode.

Note
• When a door controller is removed from the system, all its access management settings are deleted.
• Only door controllers that are online can be removed.

Configuration mode
Configuration mode is the standard mode when you access the device for the first time. When configuration mode is disabled
most of the configuration features for the device are hidden.

Important
To disable configuration mode should not be considered a security feature. It is intended to stop configuration mistakes
and not to stop malicious users changing vital settings.

How to disable configuration mode


1. Go to Setup > Disable Configuration Mode.

2. Enter a PIN and select OK.

Note
PIN is not mandatory.

How to enable configuration mode


1. Go to Setup > Enable Configuration Mode.

2. Enter the PIN and select OK.

Note
If you don not remember your PIN you can enable configuration mode by entering http://[IP-
address]/webapp/pacs/index.shtml#resetConfigurationMode.

Maintenance Instructions
To keep the access control system running smoothly, Axis recommends regular maintenance of the access control system, including
door controllers and connected devices.

Do maintenance at least once a year. The suggested maintenance procedure includes, but is not limited to, the following steps:

• Make sure all the connections between the door controller and the external devices are secure.

• Verify all the hardware connections. See Verification Controls Doors on page 20.

• Verify that the system, including the connected external devices, functions correctly.

- Swipe a card and test the readers, doors, and locks.

- If the system includes REX devices, sensors or other devices, test them as well.

- If activated, test the tampering alarms.

If the results from any of the steps above indicate faults or unexpected behavior:

- Test the signals of the wires using appropriate equipment and check if the wires or cables are damaged
in any way.

- Replace all damaged or faulty cables and wires.

29
AXIS A1001 & AXIS Entry Manager

System configuration

- Once the cables and wires have been replaced, verify all the hardware connections again. See Verification
Controls Doors on page 20.

• Make sure all access schedules, doors, groups, and users are up to date.

• If the door controller is not behaving as expected, see Troubleshooting on page 62 and Maintenance on page 59 for
more information.

30
AXIS A1001 & AXIS Entry Manager

Access Management

Access Management

About Users
In AXIS Entry Manager, users are people who have been registered as owners of one or more tokens (identification types). Each
person must have a unique user profile to be granted access to doors in the access control system. The user profile consists of
credentials that tell the system who the user is and when and how they are granted access to doors. For more information, see
Create and edit users on page 39.

Users in this context should not be confused with administrators. Administrators have unrestricted access to all settings. And in the
context of managing the access control system, the product’s web pages (AXIS Entry Manager), administrators are also sometimes
referred to as users. For more information, see Users on page 52.

The Access Management Page


The Access Management page allows you to configure and manage the system’s users, groups, doors, and schedules. To open the
Access Management page, click Access Management.

To add users to groups and apply access schedules and doors, drag the items to their respective destination in the Groups and
Doors lists.

Note
Messages that require action are shown in red text.

Choose a Workflow
The access management structure is flexible, allowing you to develop a workflow that suits your needs. The following is a workflow
example:

1. Create access schedules. See page 32.

2. Create groups. See page 34.

3. Apply access schedules to groups.

4. Add identification types to doors or floors. See page 34 and page 35.

5. Apply access schedules to each identification type.

6. Apply doors or floors to groups.

7. Create users. See page 39.

31
AXIS A1001 & AXIS Entry Manager

Access Management

8. Add users to groups.

For applied examples of this workflow, see Example Access Schedule Combinations on page 41.

Create and Edit Access Schedules


Access schedules are used to define general rules for when doors can and cannot be accessed. They are also used to define rules for
when groups can and cannot access the doors in the system. For more information, see Access Schedule Types on page 32.

To create a new access schedule:

1. Go to Access Management.

2. In the Access Schedules tab, click Add new schedule.

3. In the Add access schedule dialog, enter the schedule name.

4. To create a regular access schedule, select Addition Schedule.

Or to create a subtraction schedule, select Subtraction Schedule.

For more information, see Access Schedule Types on page 32.

5. Click Save.

To expand an item in the Access Schedules list, click . Addition schedules are shown in green text and subtraction schedules
are shown in dark red text.

To view an access schedule’s calendar, click .

To edit an access schedule’s name or a schedule item, click and make the changes. Then click Save.

To delete an access schedule, click .

Note
The door controller has a few predefined commonly used access schedules that can be used as examples or modified as
required. However, the predefined access schedule Always cannot be modified or deleted.

Access Schedule Types


There are two types of access schedules:

• Addition schedule – Regular access schedules that define when doors can be accessed. Typical addition schedules are
office hours, business hours, after hours, or night time hours.

• Subtraction schedule – Exceptions to regular access schedules. They are generally used to restrict access during a specific
time period that occurs within the time period of a regular schedule (addition schedule). For example, subtraction
schedules can be used to deny users access to the building during public holidays that occur on weekdays.

Both types of access schedules can be used at two levels:

• Identification type schedules – Determine when and how readers grant users access to a door. Each identification
type must be connected to an access schedule that tells the system when to grant users access with that particular
identification type. Multiple addition schedules and subtraction schedules can be added to each identification type.
For information about identification types, see page 35.

• Group schedules – Determine when, but not how, members of a group are granted access to a door. Each group must be
connected to one or more access schedules that tell the system when to grant its members access. Multiple addition
schedules and subtraction schedules can be added to each group. For information about groups, see page 34.

Group schedules can restrict entry access rights but not extend entry or exit access rights beyond what the identification type
schedules allow. In other words, if an identification type schedule restricts entry or exit access at certain times, a group schedule

32
AXIS A1001 & AXIS Entry Manager

Access Management

cannot override that identification type schedule. However, if a group schedule is more restrictive about access than the identification
type schedule, the group schedule overrides the identification type schedule.

Identification type schedules and group schedules can be combined in several ways to achieve different results. For example access
schedule combinations, see page 41.

Add Schedule Items


Both addition schedules and subtraction schedules can be one-time (single) events or recurring events.

To add a schedule item to an access schedule:

1. Expand the access schedule in the Access Schedules list.

2. Click Add schedule item.

3. Enter the name of the scheduled item.

4. Select One time or Recurrence.

5. Set the duration in the time fields. See Time Options on page 33.

6. For recurring schedule events, select the Recurrence pattern and Range of recurrence parameters. See Recurrence Pattern
Options on page 33 and Range of Recurrence Options on page 33.

7. Click Save.

Time Options
The following time options are available:

• All day – Select for events that last for all 24 hours of the day. Then enter the desired Start date.

• Start – Click the time field and select the desired time. If required, click the date field and select the desired month, day,
and year. You can also type the date directly in the field.

• End – Click the time field and select the desired time. If required, click the date field and select the desired month, day,
and year. You can also type the date directly in the field.

Recurrence Pattern Options


The following recurrence pattern options are available:

• Yearly – Select to repeat every year.

• Weekly – Select to repeat every week.

• Recurs every week on Monday, Tuesday, Wednesday, Thursday, Friday, Saturday, and Sunday – Select which days to repeat.

Range of Recurrence Options


The following range of recurrence options are available:

• First occurrence – Click the date field and select the desired month, day, and year. You can also type the date directly
in the field.

• No end date – Select to repeat the occurrence indefinitely.

• End by – Click the date field and select the desired month, day, and year. You can also type the date directly in the field.

33
AXIS A1001 & AXIS Entry Manager

Access Management

Create and Edit Groups


Groups allow you to manage users and their access rights collectively and efficiently. A group consists of credentials that tell the
system which users the group consists of and when and how the group members are granted access to the doors.

Each user must belong to one or more groups. To add a user to a group, drag and drop the user to the desired group in the Groups list.
For more information, see Create and edit users on page 39.

To create a new group:

1. Go to Access Management.

2. In the Groups tab, click Add new group.

3. In the Add Group dialog, enter the group’s credentials. See Group Credentials on page 34.

4. Click Save.

To expand an item in the Groups list and view its members, door access rights and schedules, click .

To edit a group’s name or validity date, click and make the changes. Then click Save.

To verify when and how a group can access certain doors, click .

To delete a group or group members, doors or schedules from a group, click .

Group Credentials
The following credentials are available for groups:

• Name (required)

• Valid from and Valid to – Enter the dates between which the group’s credentials shall be valid. Click the date field and
select the desired month, day, and year. You can also type the date directly in the field.

• Whitelist – Users in a whitelist group can always access the doors in the group, even in case of network or power
failure. Since the users in the group always have access to the doors, schedules or valid to and valid from do not apply.
Long access time is not supported for a user that opens a door in a whitelist group. Only doors with wireless locks that
support whitelist functionality can be added to the group.

Note
• To be able to save the group, you must enter the group’s Name.
• Valid to and valid from for a user do not apply when adding the user to whitelist group.
• To sync whitelisted credentials to a wireless lock takes some time and interferes with normal door opening procedures.
Avoid adding or removing large numbers of credentials in a system during peak hours. When the sync of updated credentials
to the lock is done, the event log will show SyncOngoing: false for the lock.

Manage Doors
The general rules for each door are managed in the Doors tab. The rules include adding identification types that determine how users
will be granted access to the door and access schedules that determine when each identification type is valid. For more information,
see Identification Types on page 35 and Create and Edit Access Schedules on page 32.

Before you can manage a door, you must add it to the access control system by completing the hardware configuration, see
Configure the hardware on page 14.

To manage a door:

1. Go to Access Management and select the Doors tab.

34
AXIS A1001 & AXIS Entry Manager

Access Management

2. In the Doors list, click next to the door you want to edit.

3. Drag the door to at least one group. If the Groups list is empty, create a new group. See Create and Edit Groups on page 34.

4. Click Add identification type and select which credentials users need to present to the reader to be granted access to the
door. See Identification Types on page 35.

Add at least one identification type to each door.

5. To add multiple identification types, repeat the previous step.

If both identification types Card number only and PIN only are added, users can choose to either swipe their card or enter
their pin to access the door. But if, instead, only the identification type Card number and PIN is added, users must both
swipe their card and enter their PIN to access the door.

6. To define when the credentials are valid, drag a schedule to each identification type.

To manually unlock doors, lock doors, or grant temporary access, click one of the manual door actions as required. See Use Manual
Door Actions on page 36.

Note
Controls to manually unlock doors, lock doors, or grant temporary access, are not available for wireless doors/devices.

To expand an item in the Doors list, click .

To edit a door or reader name, click and make the changes. Then click Save.

To verify the reader, identification type, and access schedule combinations, click .

To verify the function of the locks connected to the doors, click the verification controls. See Verification Controls Doors on page 20.

To delete identification types or access schedules, click .

Identification Types
Identification types are portable credential storage devices, pieces of memorized information, or various combinations of the two that
determine how users will be granted access to the door. Common identification types include tokens such as cards or key fobs,
personal identification numbers (PINs), and request to exit (REX) devices.

For more information about credentials, see User Credentials on page 40.

The following identification types are available:

• Facility code only – The user can access the door using a card or other token with the facility code accepted by the reader.

• Card number only – The user can access the door using only a card or other token accepted by the reader. The card
number is a unique number that is usually printed on the card. See the card manufacturer’s information about where to
locate the card number. The card number can also be retrieved by the system. Swipe the card on a connected reader,
select the reader in the list, and click Retrieve.

• Card raw only – The user can access the door using only a card or other token accepted by the reader. The information is
stored as raw data on the card. The card raw data can be retrieved by the system. Swipe the card on a connected reader,
select the reader in the list, and click Retrieve. Only use this identification type if a card number cannot be located.

• PIN only – The user can access the door using only a four-digit personal identification number (PIN).

• Facility code and PIN – The user needs both the card or other token with the facility code accepted by the reader, and a
PIN to access the door. The user must present the credentials in the specified order (card first, then PIN).

• Card number and PIN – The user needs both the card, or other token accepted by the reader, and a PIN to access the door.
The user must present the credentials in the specified order (card first, then PIN).

35
AXIS A1001 & AXIS Entry Manager

Access Management

• Card raw and PIN – The user needs both the card, or other token accepted by the reader, and a PIN to access the door. Only
use this identification type if a card number cannot be located. The user must present the credentials in the specified
order (card first, then PIN).

• REX – The user can access the door by activating a request to exit (REX) device, such as a button, sensor, or push bar.

• License plate only – The user can access the door using only a license plate number for a vehicle.

• HID Mobile Access – The user can access the door using a mobile phone with the HID Mobile Access app.

Add Scheduled Unlock States


To automatically keep a door unlocked for a specific duration of time, you can add a Scheduled unlock state to a door and apply an
access schedule to it.

For example, to keep a door unlocked during office hours:

1. Go to Access Management and select the Doors tab.

2. Click next to the Doors list item you want to edit.

3. Click Add scheduled unlock.

4. Select the Unlock state (unlocked or unlock both locks depending on whether the door has one or two locks).

5. Click OK.

6. Apply the predefined Office hours access schedule to the Scheduled unlock state.

To verify when the door is unlocked, click .

To delete a scheduled unlock state or access schedule, click .

Use Manual Door Actions


Doors can be unlocked or locked and temporary access can be granted in the Doors tab through the Manual door actions. Which
manual door actions are available for a specific door depends on how the door has been configured.

To use the manual door actions:

1. Go to Access Management and select the Doors tab.

2. In the Doors list, click next to the door that you want to control.

3. Click the required door action. See Manual Door Actions on page 36.

Note
To use the manual door actions, you need to open the Access Management page through the door controller the specific
door is connected to. If you open the Access Management page through a different door controller, instead of the manual
door actions there will be a link to the Overview page of the door controller the specific door is connected to. Click the
link, go to Access Management, and select the Doors tab.

Manual Door Actions


The following manual door actions are available:

• Get door status – Verify the current state of the door monitor, door alarms, and locks.

• Access – Grant users access to the door. The given access time applies. See How to configure door monitors and locks
on page 15.

36
AXIS A1001 & AXIS Entry Manager

Access Management

• Unlock (one lock) or Unlock both locks (two locks) – Unlock the door. The door remains unlocked until you press Lock or
Lock both locks, a scheduled door state is activated, or the door controller is restarted.

• Lock (one lock) or Lock both locks (two locks) – Lock the door.

• Unlock second lock and lock primary – This option is only available if the door has been configured with a secondary lock.
Unlock the door. The secondary lock remains unlocked until you press Double lock or a scheduled door state is activated.

Manage floors
If you have installed an AXIS 9188 Network I/O Relay Module to your system, floors can be managed in a similar way to managing
doors.

Note
If you use an A1001 in cluster mode with global events enabled, make sure you use unique descriptive names for each floor.
For example “Elevator A, Floor 1”.

Note
Max 2 AXIS 9188 Network I/O Relay Modules can be configured with each A1001 Network Door Controller.

The general rules for each floor are managed in the Floors tab. The rules include adding identification types that determine how users
will be granted access to the floor and access schedules that determine when each identification type is valid. For more information,
see Identification Types Floors on page 38 and Create and Edit Access Schedules on page 32.

Before you can manage a floor, you must add it to the access control system by completing the hardware configuration, see
Configure the hardware on page 14.

To manage a floor:

1. Go to Access Management and select the Floors tab.

2. In the Floors list, click next to the floor you want to edit.

3. Drag the floor to at least one group. If the Groups list is empty, create a new group. See Create and Edit Groups on page 34.

4. Click Add identification type and select which credentials users need to present to the reader to be granted access
to the floor. See Identification Types Floors on page 38.

Add at least one identification type to each floor.

5. To add multiple identification types, repeat the previous step.

If both identification types Card number only and PIN only are added, users can choose to either swipe their card or enter
their pin to access the door. But if, instead, only the identification type Card number and PIN is added, users must both
swipe their card and enter their PIN to access the door.

6. To define when the credentials are valid, drag a schedule to each identification type.

To manually unlock floors, lock floors, or grant temporary access, click one of the manual door actions as required. See Use Manual
Floor Actions on page 39.

Note
Controls to manually unlock floors, lock floors, or grant temporary access, are not available for wireless doors/devices.

To expand an item in the Floors list, click .

To edit a floor or reader name, click and make the changes. Then click Save.

To verify the reader, identification type, and access schedule combinations, click .

37
AXIS A1001 & AXIS Entry Manager

Access Management

To verify the function of the locks connected to the floors, click the verification controls. See Verification Controls Floors on page 21.

To delete identification types or access schedules, click .

Identification Types Floors


Identification types are portable credential storage devices, pieces of memorized information, or various combinations of the two that
determine how users will be granted access to the floor. Common identification types include tokens such as cards or key fobs,
personal identification numbers (PINs), and request to exit (REX) devices.

For more information about credentials, see User Credentials on page 40.

The following identification types are available:

• Facility code only – The user can access the floor using a card or other token with the facility code accepted by the reader.

• Card number only – The user can access the floor using only a card or other token accepted by the reader. The card
number is a unique number that is usually printed on the card. See the card manufacturer’s information about where to
locate the card number. The card number can also be retrieved by the system. Swipe the card on a connected reader,
select the reader in the list, and click Retrieve.

• Card raw only – The user can access the floor using only a card or other token accepted by the reader. The information is
stored as raw data on the card. The card raw data can be retrieved by the system. Swipe the card on a connected reader,
select the reader in the list, and click Retrieve. Only use this identification type if a card number cannot be located.

• PIN only – The user can access the floor using only a four-digit personal identification number (PIN).

• Facility code and PIN – The user needs both the card or other token with the facility code accepted by the reader, and a
PIN to access the floor. The user must present the credentials in the specified order (card first, then PIN).

• Card number and PIN – The user needs both the card, or other token accepted by the reader, and a PIN to access the floor.
The user must present the credentials in the specified order (card first, then PIN).

• Card raw and PIN – The user needs both the card, or other token accepted by the reader, and a PIN to access the floor.
Only use this identification type if a card number cannot be located. The user must present the credentials in the specified
order (card first, then PIN).

• REX – The user can access the floor by activating a request to exit (REX) device, such as a button, sensor, or push bar.

Add Scheduled Unlock States


To automatically keep a floor accessible for anyone for a specific duration of time, you can add a Scheduled unlock state to a floor
and apply an access schedule to it.

For example, to keep a floor accessible for anyone during office hours:

1. Go to Access Management and select the Floors tab.

2. Click next to the Floors list item you want to edit.

3. Click Add scheduled unlock.

4. Select the Unlock state (unlocked or unlock both locks depending on whether the floor has one or two locks).

5. Click OK.

6. Apply the predefined Office hours access schedule to the Scheduled unlock state.

To verify when the floor is accessible, click .

To delete a scheduled unlock state or access schedule, click .

38
AXIS A1001 & AXIS Entry Manager

Access Management

Use Manual Floor Actions


Floors can have different accessibilities, restricted or accessible for everyone. Temporary access can be granted in the Floors tab
through Manual floor actions. Which manual floor actions are available for a specific floor depends on how the floor has been
configured.

To use the manual floor actions:

1. Go to Access Management and select the Floors tab.

2. In the Floors list, click next to the floor that you want to control.

3. Click the required floor action. See Manual Floor Actions on page 39.

Note
To use the manual floor actions, you need to open the Access Management page through the floor controller the specific
door is connected to. If you open the Access Management page through a different floor controller, instead of the manual
floor actions there will be a link to the Overview page of the floor controller the specific floor is connected to. Click the
link, go to Access Management, and select the Floors tab.

Manual Floor Actions


The following manual floor actions are available:

• Get floor status – Verify the current state of the relay connected to a floor.

• Access – Grant users access to the floor. The given access time applies. See How to configure door monitors and locks
on page 15.

• Unlock – The floor gets fully accessible for everyone until you press Lock , a scheduled floor state is activated, or the
door controller is restarted.

• Lock – The floor gets inaccessible for everyone until you press Unlock , a scheduled floor state is activated, or the door
controller is restarted.

Create and edit users


Each person must have a unique user profile to be granted access to doors in the access control system. The user profile consists of
credentials that tell the system who the user is and when and how they are granted access to the doors.

To be able to manage the user access rights efficiently, each user must belong to one or more groups. For more information,
see Create and Edit Groups.

To create a new user profile:

1. Go to Access Management.

2. Select the Users tab and click Add new user.

3. In the Add User dialog, enter the user’s credentials. See User Credentials on page 40.

4. Click Save.

5. Drag the user to one or more groups in the Groups list. If the Groups list is empty, create a new group. See Create
and Edit Groups on page 34.

To expand an item in the Users list and view a user’s credentials, click .

To find a specific user, enter a filter in the filter users field. To force exact matches, surround the filter text with double quotation
marks, for example “John” or “potter, virginia”.

To edit a user’s credentials, click and change the credentials as required. Then click Save.

39
AXIS A1001 & AXIS Entry Manager

Access Management

To delete a user, click .

Important
If a user was created through AXIS Visitor Manager, do not edit or delete it in AXIS Entry Manager. For more information
about AXIS Visitor Manager and the QR code reader service, see AXIS Visitor Access on page 24.

User Credentials
The following credentials are available for users:

• First name (required)

• Last name

• Valid from and Valid until – Enter the dates between which the user’s credentials shall be valid. Click the date field and
select the desired month, day, and year. You can also type the date directly in the field.

• Suspend credential – Select to suspend the credential. When suspended, the user cannot access any doors in the system
through this credential. Deselect to give the user access again. Suspension is intended to be temporary. If the user shall be
denied access permanently, it is better to delete the user profile.

• PIN (required if no card number or card raw) – Enter the four-digit personal identification number (PIN) selected by or
assigned to the user.

• Facility code – Enter a code to verify the facility’s access control system. If a preset facility code is entered this field is
filled in automatically, see Preset facility code on page 23

• Card number (required if no PIN or card raw) – Enter the card number. See the card manufacturer’s information about
where to locate the card number. The card number can also be retrieved by the system. Swipe the card on a connected
reader, select the reader in the list, and click Retrieve.

• Card raw (required if no PIN or card number) – Enter the card raw data. The data can be retrieved by the system. Swipe
the card on a connected reader, select the reader in the list, and click Retrieve. Only use this identification type if a
card number cannot be located.

• Long access time – Select to override existing access time and allow the door to be open for the Long access time for the
user, see About door monitor and time options on page 16

• License plate (this credential is not available in a default door controller installation) – When this credential is activated by
partner software, enter the license plate number for the user's vehicle.
This credential can only be used together with Axis partner software and a camera with license plate recognition software.
For more information, contact your Axis partner or your local Axis sales representative.

• HID Mobile Access – The user can access the door using a mobile phone with the HID Mobile Access app.

Note
The Retrieve button is only available if the hardware configuration has been completed and one or more readers are
connected to the controller.

Import Users
Users can be added to the system by importing a text file in comma-separated value (CSV) format. It is recommended to import
users when you need to add many users at a time.

Before you can import users, you must create and save a file (*.csv or *.txt) in the correct CSV format. Separate values by commas, no
spaces, and separate each user with a line break.

Example

jane,doe,1234,12345678,abc123
john,doe,5435,87654321,cde321

To import users:

40
AXIS A1001 & AXIS Entry Manager

Access Management

1. Go to Setup > Import Users.

2. Locate and select the *.csv or *.txt file that holds the list of users.

3. Select the correct credential option for each column.

4. To import the users to the system, click Import users.

5. Verify that each column contains the correct type of credential.

6. If the columns are correct, click Start importing users. If the columns are incorrect, click Cancel and start over.

7. When the import is finished, click OK.

The following credential options are available:

• First name

• Last name

• PIN code

• Card number

• License plate

• HID Mobile Access

• Unassigned – Values that will not be imported. Select this option to skip a particular column.

For more information about credentials, see Create and edit users.

Export Users
The Export page shows a comma-separated value (CSV) list of all the users in the system. The list can be used to import the
users to another system.

To export the user list:

1. Open a plain text editor and create a new document.

2. Go to Setup > Export Users

3. Select all the values on the page and copy them.

4. Paste the values into the text document.

5. Save the document as a comma-separated value file (*csv) or as a text (*.txt) file.

Example Access Schedule Combinations


Identification type schedules and group schedules can be combined in several ways to achieve different results. The examples
below follow the workflow described on page 31.

Example
To create a schedule combination that

• grants guards access to a door at all times,

- using their card during day shift hours (Monday–Friday, 6 a.m. to 4 p.m.), while

- using their card and PIN before and after day shift hours, and that

• grants day shift personnel access to the same door,

41
AXIS A1001 & AXIS Entry Manager

Access Management

- using their card during day shift hours only:

1. Create an Addition schedule called Day shift hours. See page 32.

2. Create a day shift hours Schedule item that recurs Monday–Friday, 06:00–16:00.

3. Create two groups, one Group called Guards and one Group called Day shift personnel. See page 34.

4. Drag the predefined Always access schedule to the Guards group.

5. Drag the Day shift hours access schedule to the Day shift personnel group.

6. Add the Card number and PIN and Card number only identification types to the door’s reader.

7. Drag the predefined Always access schedule to the Card number and PIN identification type.

8. Drag the Day shift hours access schedule to the Card number only identification type.

9. Drag the door to both groups. Then add users to the groups as required. See page 39.

Example
To create a schedule combination that

• grants guards access to a door at all times,

- using their card during day shift hours (Monday–Friday, 6 a.m. to 4 p.m.), while

- using their card and PIN before and after day shift hours, and that

• grants day shift personnel access to the same door every day between 6 a.m. and 4 p.m.,

- using their card during day shift hours, while

- using their card and PIN during nights and weekends:

1. Create an Addition schedule called Day shift hours. See page 32.

2. Create a day shift hours Schedule item that recurs Monday–Friday, 06:00–16:00.

3. Create a Subtraction schedule called Nights & weekends.

4. Create a nights and weekends Schedule item that recurs Sunday–Saturday 16:00–06:00.

5. Drag the predefined Always schedule and the Nights & weekends access schedule to the Day shift personnel group.

6. Create two groups, one Group called Guards and one Group called Day shift personnel. See page 34.

7. Drag the predefined Always access schedule to the Guards group and the Day shift personnel group.

8. Drag the Nights & weekends access schedule to the Day shift personnel group.

9. Add the Card number and PIN and Card number only identification types to the door’s reader.

10. Drag the predefined Always access schedule to the Card number and PIN identification type.

11. Drag the Day shift hours access schedule to the Card number only identification type.

12. Drag the door to both groups. Then add users to the groups as required. See page 39.

42
AXIS A1001 & AXIS Entry Manager

Alarm and Event Configuration

Alarm and Event Configuration

Events that occur in the system, for example when a user swipes a card or a REX device is activated, are logged in the event log.
Logged events can be configured to trigger alarms and such alarms are logged in the alarm log.

• View the event log. See page 43.

• Export the event log. See page 43

• View the alarm log. See page 44.

• Configure the event and alarm logs. See page 44.

Alarms can also be configured to trigger actions such as email notifications. For more information, see How to set up action
rules on page 45.

View the event log


To view logged events, go to Event Log.

If global events is enabled, you can open the event log from any door controller in the system. For more information about global
events, see Configure the Event and Alarm Logs on page 44.

To expand an item in the event log and view the event details, click .

Applying filters to the event log makes it easier to find specific events. To filter the list, select one or several event log filters and click
Apply filters. For more information, see Event Log Filters on page 43.

As an administrator, you might have more interest in some events than others. Therefore, you can choose which events that shall be
logged, and for which controllers. For more information, see Event log options on page 44.

Event Log Filters


You can narrow the scope of the event log by selecting one or several of the following filters:

• User – Filter on events that relates to a selected user.

• Door & floor – Filter on events that relates to a specific door or floor.

• Topic – Filter on event type.

• Source – Filter on events from a selected controller. Available only in a controller cluster and when global events are
enabled.

• Date and time – Filter the event log by a date and time span.

Export the Event Log


To export logged events, go to Event Log:

1. Click .

2. Select export format from the pop up menu to start the export.

Note
CSV format is supported in all browsers, XLSX format is supported in ChromeTM and Internet Explorer®.

43
AXIS A1001 & AXIS Entry Manager

Alarm and Event Configuration

Note

After a completed export the export button changes from to . To initiate another export, refresh the
webpage. The export button changes back to .

View the Alarm Log


To view the triggered alarms, go to Alarm Log. If global events is enabled, you can open the alarm log from any door controller in the
system. For more information about global events, see Configure the Event and Alarm Logs on page 44.

To expand an item in the alarm log and view the alarm details, for example door identity and state, click .

To remove an alarm from the list after verifying the cause of the alarm, click Acknowledge. To remove all alarms click Acknowledge
all alarms.

As an administrator, you might need some events to trigger alarms. Therefore, you can choose which events shall trigger alarms
and for which controllers. For more information, see Alarm log options on page 44.

Configure the Event and Alarm Logs


The Configure Event and Alarm Logs page allows you to define which events shall be logged and trigger alarms.

To share events and alarms between all connected controllers, select Global events. When global events is enabled, you only need
to open one Event Log page and one Alarm Log page to simultaneously manage the events and alarms of all door controllers in
the system. Global events is enabled by default.

If you disable global events, you will have to open one Event Log page and one Alarm Log page for each individual door controller
and manage their events and alarms separately.

Important
Each time that you enable or disable global events, the event log is cleared. This means that all events before that moment
are removed and the event log starts over.

Alarms can also be configured to trigger actions such as email notifications. For more information, see How to set up action
rules on page 45.

Event log options


To define which events shall be included in the event log, go to Setup > Configure Event and Alarm Logs.

The following options for logging events are available:

• No logging – Disable event logging. The event will not be registered or included in the event log.

• Log for all sources – Enable event logging in all door controllers. The event will be registered for all controllers and
included in the event log.

• Log for selected sources – Enable event logging in selected door controllers. The event will be registered for all selected
controllers and included in the event log. Select this option for events that will be combined with either the alarm log
option No alarms or Log alarm for selected controllers.

In the Configure event logging list, click Select controllers under the event log item you want to enable. The Device
Specific Event Logging dialog opens. Under Log event, select the controllers that shall have alarm logging enabled
and click Save.

Alarm log options


To define which events should trigger an alarm, go to Setup > Configure Event and Alarm Logs.

44
AXIS A1001 & AXIS Entry Manager

Alarm and Event Configuration

The following options for triggering and logging alarms are available:

• No alarms – Disable alarm logging. The event will not trigger any alarms or be included in the alarm log.

• Log alarm for all sources – Enable alarm logging in all door controllers. The event will trigger an alarm and be included in
the alarm log.

• Log alarm for selected sources – Enable alarm logging in selected door controllers. The event will trigger an alarm
and be included in the alarm log.

In the Configure alarm logging list, click Select sources under the alarm log item you want to enable. The Device
Specific Alarm Triggering dialog opens. Under Trigger alarm, select the door controllers that shall have alarm logging
enabled and click Save.

How to set up action rules


The Event pages allow you to configure the Axis product to perform actions when different events occur. For example, the product
can send an email notification or activate an output port when an alarm is triggered. The set of conditions that defines how and
when the action is triggered is called an action rule. If multiple conditions are defined, all of them must be met to trigger the action.

For more information about available triggers and actions, see Triggers on page 46 and Actions on page 48.

This example describes how to set up an action rule to send an email notification when any alarm is triggered.

1. Configure the alarms. See Configure the Event and Alarm Logs on page 44.

2. Go to Setup > Additional Controller Configuration > Events > Action Rules and click Add.

3. Select Enable rule and enter a descriptive name for the rule.

4. Select Event Logger from the Trigger drop-down list.

5. Optionally, select a Schedule and Additional conditions. See below.

6. Under Actions, select Send Notification from the Type drop-down list.

7. Select an email recipient from the drop-down list. See How to add recipients on page 48.

This example describes how to set up an action rule to activate an output port when the door is forced open.

1. Go to Setup > Additional Controller Configuration > System Options > Ports & Devices > I/O Ports.

2. Select Output from the desired I/O Port Type drop-down list and enter a Name.

3. Select the I/O port’s Normal state and click Save.

4. Go to Events > Action Rules and click Add.

5. Select Door from the Trigger drop-down list.

6. Select Door Alarm from the drop-down list.

7. Select the desired door from the drop-down list.

8. Select DoorForcedOpen from the drop-down list.

9. Optionally, select a Schedule and Additional conditions. See below.

10. Under Actions, select Output Port from the Type drop-down list.

11. Select the desired output port from the Port drop-down list.

12. Set state Active.

13. Select Duration and Go to opposite state after. Then enter the desired duration of the action.

45
AXIS A1001 & AXIS Entry Manager

Alarm and Event Configuration

14. Click OK.

To use more than one trigger for the action rule, select Additional conditions and click Add to add additional triggers. When using
additional conditions, all conditions must be met to trigger the action.

To prevent an action from being triggered repeatedly, a Wait at least time can be set. Enter the time in hours, minutes and seconds,
during which the trigger should be ignored before the action rule can be activated again.

For more information, see the product’s built-in help.

Triggers
Available action rule triggers and conditions include:

• Access Point

- Access Point Enabled – Triggers an action rule when an access point device such as a reader or REX device is
configured, for example when the hardware configuration is completed or an identification type is added.

• Configuration

- Access Point Changed – Triggers an action rule when the configuration of an access point device such as a
reader or REX device is changed, for example when hardware is configured or an identification type is edited,
changing the ways through which a door can be accessed.

- Access Point Removed – Triggers an action rule when the hardware configuration of an access point device
such as a reader or REX device is reset.

- Area Changed – Not supported by this version of AXIS Entry Manager. Must be configured by a client such as an
access management system, through the VAPIX® application programming interface, that supports this feature
and use devices that can provide the required signals. Triggers the action rule when an access area is changed.

- Area Removed – Not supported by this version of AXIS Entry Manager. Must be configured by a client such
as an access management system, through the VAPIX® application programming interface, that supports this
feature and use devices that can provide the required signals. Triggers the action rule when an access area is
removed from the system.

- Door Changed – Triggers an action rule when the door configuration settings, for example door name, are
changed or when a door is added to the system. This can for example be used to send a notification when a
door is installed and configured.

- Door Removed – Triggers an action rule when a door is removed from the system. This can for example be used
to send a notification when a door is removed from the system.

• Door

- Battery Alarm – Triggers an action rule when a wireless door battery is low and when it is flat.

- Door Alarm – Triggers an action rule when the door monitor indicates that the door has been forced open, the
door is open too long, or if the door is faulty in any way. This can for example be used to send a notification
when someone is forcing an entry.

- Door Double-Lock Monitor – Triggers an action rule only when the secondary lock changes state to either
locked or unlocked.

- Door Lock Monitor – Triggers an action rule when the normal lock changes state to either locked or unlocked.
For example, a fault is triggered when the door monitor detects that the door is open although the lock is locked.

- Door Mode – Triggers an action rule when the door changes states, for example, when the door has been
accessed or blocked, or the door is in lockdown mode. For more detailed descriptions of these modes, see the
online help.

- Door Monitor – Triggers an action rule when the door monitor state changes. This can for example be used to
send a notification when a door monitor indicates that the door is opened or closed.

46
AXIS A1001 & AXIS Entry Manager

Alarm and Event Configuration

- Door Tamper – Triggers an action rule when the door monitor detects that the connection is interrupted, for
example if someone cuts the wires to the door monitor. To use this trigger, make sure that Enable supervised
inputs is selected and that end of line resistors are installed on the relevant door connector input ports. For
more information, see How to use supervised inputs on page 18.

- Door Warning – Triggers an action rule before the door open too long alarm goes off. This can be used to, for
example, send a warning signal that the door controller will send the real alarm, the door open too long alarm, if
the door is not closed within the specified door open too long time. For more information about door open
too long time, see How to configure door monitors and locks on page 15.

- Lock Jammed – Triggers an action rule when a wireless door lock is physically blocked.

• Event Logger – Keeps track of all events in the door controller, for example when a user swipes a card or opens a door. If
Global events is enabled, the event logger keeps track of all the events in every controller in the system. To set which
alarms and events that can trigger an action rule, go to Setup > Configure Event and Alarm Logs. The event logger is
shared by the system and can store up to 30 000 events. When the limit is reached, the event logger uses the first in first
out (FIFO) rule. This means that the first event is the first to be overwritten.

- Alarm – Triggers an action rule when one of the specified alarms has been triggered. The system administrator
can configure which events are more important than others and select whether a particular event should
trigger an alarm or not.

- Dropped Alarms – Triggers an action rule when new alarm records cannot be written to the alarm logs. For
example if there are so many simultaneous alarms that the event logger cannot keep up. When an alarm is
dropped, a notification can be sent to the operator.

- Dropped Events – Triggers an action rule when new event records cannot be written to the event logs. For
example, if there are so many simultaneous events that the event logger cannot keep up. When an event is
dropped, a notification can be sent to the operator.

• Hardware

- Network – Triggers an action rule when the network connection is lost. Select Yes to trigger the action rule when
the network connection is lost. Select No to trigger the action rule when the network connection is restored.
Select IPv4/v6 address removed or New IPv4/v6 address to trigger an action when the IP address changes.

- Peer Connection – Triggers an action rule when the Axis product has established a connection with another
door controller, if the network connection between the devices is lost, or if the pairing of door controllers has
failed. This can for example be used to send a notification that a door controller has lost its network connection.

• Input Signal

- Digital Input Port – Triggers an action rule when an I/O port receives a signal from a connected device. See I/O
Ports on page 59.

- Manual Trigger – Triggers an action rule when the manual trigger is activated. It can be used by a client such
as an access management system, through the VAPIX® application programming interface, to manually start
or stop the action rule.

- Virtual Inputs – Triggers an action rule when one of the virtual inputs changes states. It can be used by a client
such as an access management system, through the VAPIX® application programming interface, to trigger
actions. Virtual inputs can, for example, be connected to buttons in the management system's user interface.

• Schedule

- Interval – Triggers an action rule at the schedule’s start time and remains active until the schedule’s end time
is reached.

- Pulse – Triggers an action rule when a one-time event occurs. That is, an event that happens at a specific
time and has no duration.

• System

47
AXIS A1001 & AXIS Entry Manager

Alarm and Event Configuration

- System Ready – Triggers an action rule when the system is in state ready. For example, the Axis product can
detect the system state and send a notification when the system has started.

Select Yes to trigger the action rule when the product is in state ready. Note that the rule will only trigger when
all necessary services, such as the event system, has started.

• Time

- Recurrence – Triggers an action rule by monitoring the recurrences that you have created. You can use this
trigger to initiate recurring actions such as sending notifications every hour. Select a recurrence pattern or create
a new one. For more information about setting up a recurrence pattern, see How to set up recurrences on page 49.

- Use Schedule – Triggers an action rule according to the selected schedule. See How to create schedules
on page 49.

Actions
You can configure several actions:

• Output Port – Activate an I/O port to control an external device.

• Send Notification – Send a notification message to a recipient.

• Status LED – The status LED can be set to flash for the duration of the action rule or for a set number of seconds. The
status LED can be used during installation and configuration to visually validate if the trigger settings, for example the
door open too long trigger, work correctly. To set the status LED flash color, select an LED Color from the drop-down list.

How to add recipients


The product can send messages to notify recipients about events and alarms. But before the product can send notification messages,
you must define one or more recipients. For information about available options, see Recipient types on page 48.

To add a recipient:

1. Go to Setup > Additional Controller Configuration > Events > Recipients and click Add.

2. Enter a descriptive name.

3. Select a recipient Type.

4. Enter the information needed for the recipient type.

5. Click Test to test the connection to the recipient.

6. Click OK.

Recipient types
The following recipient types are available:

HTTP

HTTPS

Email

TCP

How to set up email recipients


Email recipients can be configured by selecting one of the listed email providers, or by specifying the SMTP server, port and
authentication used by, for example, a corporate email server.

48
AXIS A1001 & AXIS Entry Manager

Alarm and Event Configuration

Note
Some email providers have security filters that prevent users from receiving or viewing large attachments, from receiving
scheduled emails and similar. Check the email provider’s security policy to avoid delivery problems and locked email accounts.

To set up an email recipient using one of the listed providers:

1. Go to Events > Recipients and click Add.

2. Enter a Name and select Email from the Type list.

3. Enter the email addresses to send emails to in the To field. Use commas to separate multiple addresses.

4. Select the email provider from the Provider list.

5. Enter the user ID and password for the email account.

6. Click Test to send a test email.

To set up an email recipient using for example a corporate email server, follow the instructions above but select User defined as
Provider. Enter the email address to appear as sender in the From field. Select Advanced settings and specify the SMTP server
address, port and authentication method. Optionally, select Use encryption to send emails over an encrypted connection. The server
certificate can be validated using the certificates available in the Axis product. For information on how to upload certificates,
see Certificates on page 53.

How to create schedules


Schedules can be used as action rule triggers or as additional conditions. Use one of the predefined schedules or create a new
schedule as described below.

To create a new schedule:

1. Go to Setup > Additional Controller Configuration > Events > Schedules and click Add.

2. Enter a descriptive name and the information needed for a daily, weekly, monthly or yearly schedule.

3. Click OK.

To use the schedule in an action rule, select the schedule from the Schedule drop-down list in the Action Rule Setup page.

How to set up recurrences


Recurrences are used to trigger action rules repeatedly, for example every 5 minutes or every hour.

To set up a recurrence:

1. Go to Setup > Additonal Controller Configuration > Events > Recurrences and click Add.

2. Enter a descriptive name and recurrence pattern.

3. Click OK.

To use the recurrence in an action rule, first select Time from the Trigger drop-down list in the Action Rule Setup page and then
select the recurrence from the second drop-down list.

To modify or remove recurrences, select the recurrence in the Recurrences List and click Modify or Remove.

Reader feedback
Readers use LEDs and beepers to send feedback messages to the user (the person accessing or trying to access the door). The door
controller can trigger a number of feedback messages, some of which are preconfigured in the door controller and supported by
most readers.

49
AXIS A1001 & AXIS Entry Manager

Alarm and Event Configuration

Readers have different LED behaviors, but typically they use different sequences of steady lights and flashing lights in red, green, and
amber.

Readers can also use one-pitch beepers to send messages, using different sequences of short and long beeper signals.

The table below shows the events that are preconfigured in the door controller to trigger reader feedback and their typical reader
feedback signals. Feedback signals for AXIS readers are presented in the Installation Guide supplied with the AXIS reader.

Event Wiegand Wiegand OSDP Beeper pattern State


dual LED single LED
Idle1 Off Red Red Silent Normal
RequirePIN Flashing red/green Flashing red/green Flashing red/green Two short beeps PIN required
AccessGranted Green Green Green Beep Access granted
AccessDenied Red Red Red Beep Access denied
1. Idle state is entered when the door is closed and the lock is locked.

Feedback messages other than the above must be configured by a client such as an access management system, through the VAPIX®
application programming interface, that supports this feature and use readers that can provide the required signals. For more
information, see the user information supplied by the access management system developer and reader manufacturer.

50
AXIS A1001 & AXIS Entry Manager

Reports

Reports

The Reports page allows you to view, print, and export reports that contain different types of information about the system. For
more information about which reports that are available, see Report Types on page 51.

View, Print, and Export Reports


To open the Reports page, click Reports.

To view a report, click View and print.

To print a report:

1. Click View and print.

2. Select the columns that shall be included in the report. All columns are selected by default.

3. If you want to narrow the scope of the report, enter a filter in the relevant filter field. For example, you can filter users by
which group they belong to, doors by their schedules, or groups by the doors they have access to.

To force exact matches, surround the filter text with double quotation marks, for example “John”.

4. If you want to sort the report items in a different order, click in the relevant column. To change between standard
and reverse order, toggle the sorting buttons.

Shows the items in standard order (ascending).

Shows the items in reverse order (descending).

5. Click Print selected columns.

To export a report, click Export CSV file.

The report is exported as a a comma-separated value (CSV) file and includes all possible columns and items for the report type.
Unless otherwise specified, the exported file (*.csv) is saved in the default download folder. You can select a download folder
in the web browser’s user settings.

Note
Only users that have credentials are shown in reports.

Report Types
The following report types are available:

• Access schedules. For more information about access schedule types and options, see page 32 and page 33.

• Groups. For more information about group credentials, see page 34.

• Doors. For more information about doors and identification types, see page 34 and page 35.

• Users. For more information about user credentials, see page 40.

• Door controllers. For more information about connected controllers and their ID types, see page 27. For more information
about door monitor time options, see page 17.

51
AXIS A1001 & AXIS Entry Manager

System options

System options

Security
Users
User access control is enabled by default and can be configured under Setup > Additional Controller Configuration > System
Options > Security > Users. An administrator can set up other users by giving them user names and passwords.

The user list displays authorized users and user groups (access levels):

• Administrators have unrestricted access to all settings. The administrator can add, modify and remove other users.

Note
Note that when the option Encrypted & unencrypted is selected, the webserver will encrypt the password. This is the default
option for a new unit or a unit reset to factory default settings.

Under HTTP/RTSP Password Settings, select the type of password to allow. You may need to allow unencrypted passwords if there are
viewing clients that do not support encryption, or if you upgraded the firmware and existing clients support encryption but need
to log in again and be configured to use this functionality.

ONVIF
ONVIF is an open industry forum that provides and promotes standardized interfaces for effective interoperability of IP-based
physical security products.

By creating a user you automatically enable ONVIF communication. Use the user name and password with all ONVIF communication
with the product. For more information see www.onvif.org

IP Address Filter
IP address filtering is enabled on the Setup > Additional Controller Configuration > System Options > Security > IP Address
Filter page. Once enabled, the listed IP address are allowed or denied access to the Axis product. Select Allow or Deny from the list
and click Apply to enable IP address filtering.

The administrator can add up to 256 IP address entries to the list (a single entry can contain multiple IP addresses).

HTTPS
HTTPS (HyperText Transfer Protocol over Secure Socket Layer, or HTTP over SSL) is a web protocol providing encrypted browsing.
HTTPS can also be used by users and clients to verify that the correct device is being accessed. The security level provided by
HTTPS is considered adequate for most commercial exchanges.

The Axis product can be configured to require HTTPS when administrators log in.

To use HTTPS, an HTTPS certificate must first be installed. Go to Setup > Additional Controller Configuration > System Options >
Security > Certificates to install and manage certificates. See Certificates on page 53.

To enable HTTPS on the Axis product:

1. Go to Setup > Additional Controller Configuration > System Options > Security > HTTPS

2. Select an HTTPS certificate from the list of installed certificates.

3. Optionally, click Ciphers and select the encryption algorithms to use for SSL.

4. Set the HTTPS Connection Policy for the different user groups.

5. Click Save to enable the settings.

52
AXIS A1001 & AXIS Entry Manager

System options

To access the Axis product via the desired protocol, in the address field in a browser, enter https:// for the HTTPS protocol
and http:// for the HTTP protocol.

The HTTPS port can be changed on the System Options > Network > TCP/IP > Advanced page.

IEEE 802.1X
IEEE 802.1X is a standard for port-based Network Admission Control providing secure authentication of wired and wireless network
devices. IEEE 802.1X is based on EAP (Extensible Authentication Protocol).

To access a network protected by IEEE 802.1X, devices must be authenticated. The authentication is performed by an authentication
server, typically a RADIUS server, examples of which are FreeRADIUS and Microsoft Internet Authentication Service.

In Axis implementation, the Axis product and the authentication server identify themselves with digital certificates using EAP-TLS
(Extensible Authentication Protocol - Transport Layer Security). The certificates are provided by a Certification Authority (CA).
You need:

• a CA certificate to authenticate the authentication server.

• a CA-signed client certificate to authenticate the Axis product.

To create and install certificates, go to Setup > Additional Controller Configuration > System Options > Security > Certificates.
See Certificates on page 53.

To allow the product to access a network protected by IEEE 802.1X:

1. Go to Setup > Additional Controller Configuration > System Options > Security > IEEE 802.1X.

2. Select a CA Certificate and a Client Certificate from the lists of installed certificates.

3. Under Settings, select the EAPOL version and provide the EAP identity associated with the client certificate.

4. Check the box to enable IEEE 802.1X and click Save.

Note
For authentication to work properly, the date and time settings in the Axis product should be synchronized with an NTP
server. See Date & Time on page 54.

Certificates
Certificates are used to authenticate devices on a network. Typical applications include encrypted web browsing (HTTPS), network
protection via IEEE 802.1X and notification messages for example via email. Two types of certificates can be used with the Axis
product:

Server/Client certificates - To authenticate the Axis product. A Server/Client certificate can be self-signed or issued by a Certificate
Authority (CA). A self-signed certificate offers limited protection and can be used before a CA-issued certificate has been obtained.

CA certificates - To authenticate peer certificates, for example the certificate of an authentication server in case the Axis product is
connected to an IEEE 802.1X protected network. The Axis product is shipped with several preinstalled CA certificates.

Note
• If the product is reset to factory default, all certificates, except preinstalled CA certificates, will be deleted.
• If the product is reset to factory default, all preinstalled CA certificates that have been deleted will be reinstalled.

How to create a self-signed certificate


1. Go to Setup > Additional Controller Configuration > System Options > Security > Certificates.

2. Click Create self-signed certificate and provide the requested information.

53
AXIS A1001 & AXIS Entry Manager

System options

How to create and install a CA-signed certificate


1. Create a self-signed certificate, see How to create a self-signed certificate on page 53.

2. Go to Setup > Additional Controller Configuration > System Options > Security > Certificates.

3. Click Create certificate signing request and provide the requested information.

4. Copy the PEM-formatted request and send to the CA of your choice.

5. When the signed certificate is returned, click Install certificate and upload the certificate.

How to install additional CA certificates


1. Go to Setup > Additional Controller Configuration > System Options > Security > Certificates.

2. Click Install certificate and upload the certificate.

Date & Time


The Axis product’s date and time settings are configured under Setup > Additional Controller Configuration > System Options >
Date & Time.

Current Server Time displays the current date and time (24h clock).

To change the date and time settings, select the preferred Time mode under New Server Time:

• Synchronize with computer time – Sets date and time according to the computer’s clock. With this option, date and
time are set once and will not be updated automatically.

• Synchronize with NTP Server – Obtains date and time from an NTP server. With this option, date and time settings are
updated continuously. For information on NTP settings, see NTP Configuration on page 56.

If using a host name for the NTP server, a DNS server must be configured. See DNS Configuration on page 56.

• Set manually – Allows you to manually set date and time.

If using an NTP server, select your Time zone from the drop-down list. If required, check Automatically adjust for daylight saving
time changes.

Network
Basic TCP/IP Settings
The Axis product supports IP version 4 (IPv4).

The Axis product can get an IPv4 address in the following ways:

• Dynamic IP address – Obtain IP address via DHCP is selected by default. This means that the Axis product is set to get
the IP address automatically via Dynamic Host Configuration Protocol (DHCP).

DHCP allows network administrators to centrally manage and automate the assignment of IP addresses.

• Static IP address – To use a static IP address, select Use the following IP address and specify the IP address, subnet mask
and default router. Then click Save.

DHCP should only be enabled when using dynamic IP address notification, or if the DHCP can update a DNS server that makes
it possible to access the Axis product by name (host name).

If DHCP is enabled and the product cannot be accessed, run AXIS IP Utility to search the network for connected Axis products, or
reset the product to the factory default settings and then perform the installation again. For information about how to reset to
factory default, see page 61.

54
AXIS A1001 & AXIS Entry Manager

System options

ARP/Ping
The product’s IP address can be assigned using ARP and Ping. For instructions, see Assign an IP address using ARP/Ping on page 55.

The ARP/Ping service is enabled by default but is automatically disabled two minutes after the product is started, or as soon as an IP
address is assigned. To re-assign IP address using ARP/Ping, the product must be restarted to enable ARP/Ping for an additional
two minutes.

To disable the service, go to Setup > Additional Controller Configuration > System Options > Network > TCP/IP > Basic and clear
the option Enable ARP/Ping setting of IP address.

Pinging the product is still possible when the service is disabled.

Assign an IP address using ARP/Ping


The device’s IP address can be assigned using ARP/Ping. The command must be issued within 2 minutes of connecting power.

1. Acquire a free static IP address on the same network segment as the computer.

2. Locate the serial number (S/N) on the device label.

3. Open a command prompt and enter the following commands:

Linux/Unix syntax

arp -s <IP address> <serial number> temp


ping -s 408 <IP address>

Linux/Unix example

arp -s 192.168.0.125 00:40:8c:18:10:00 temp


ping -s 408 192.168.0.125

Windows syntax (this may require that you run the command prompt as an administrator)

arp -s <IP address> <serial number>


ping -l 408 -t <IP address>

Windows example (this may require that you run the command prompt as an administrator)

arp -s 192.168.0.125 00-40-8c-18-10-00


ping -l 408 -t 192.168.0.125

4. Restart the device by disconnecting and reconnecting the network connector.

5. Close the command prompt when the device responds with Reply from 192.168.0.125:... or similar.

6. Open a browser and type http://<IP address> in the address field.

For other methods of assigning the IP address, see the document How to assign an IP address and access your device at
www.axis.com/support

Note
• To open a command prompt in Windows, open the Start menu and search for cmd.
• To use the ARP command in Windows 8/Windows 7/Windows Vista, right-click the command prompt icon and select
Run as administrator.
• To open a command prompt in Mac OS X, open the Terminal utility from Application > Utilities.

AXIS Video Hosting System (AVHS)


AVHS used in conjunction with an AVHS service, provides easy and secure Internet access to controller management and logs
accessible from any location. For more information and help to find a local AVHS Service Provider go to www.axis.com/hosting

55
AXIS A1001 & AXIS Entry Manager

System options

The AVHS settings are configured under Setup > Additional Controller Configuration > System Options > Network > TCP IP >
Basic. The possibility to connect to an AVHS service is enabled by default. To disable, clear the Enable AVHS box.

One-click enabled - Press and hold the product’s control button (see Product overview on page 4 ) for about 3 seconds to connect to
an AVHS service over the Internet. Once registered, Always will be enabled and the Axis product stays connected to the AVHS service.
If the product is not registered within 24 hours from when the button is pressed, the product will disconnect from the AVHS service.

Always - The Axis product will constantly attempt to connect to the AVHS service over the Internet. Once registered, the product will
stay connected to the service. This option can be used when the product is already installed and it is not convenient or possible to
use the one-click installation.

Note
AVHS support is dependent on the availability of subscriptions from service providers.

AXIS Internet Dynamic DNS Service


AXIS Internet Dynamic DNS Service assigns a host name for easy access to the product. For more information, see www.axiscam.net

To register the Axis product with AXIS Internet Dynamic DNS Service, go to Setup > Additional Controller Configuration > System
Options > Network > TCP/IP > Basic. Under Services, click the AXIS Internet Dynamic DNS Service Settings button (requires access to
the Internet). The domain name currently registered at AXIS Internet Dynamic DNS service for the product can at any time be removed.

Note
AXIS Internet Dynamic DNS Service requires IPv4.

Advanced TCP/IP Settings

DNS Configuration
DNS (Domain Name Service) provides the translation of host names to IP addresses. The DNS settings are configured under Setup >
Additional Controller Configuration > System Options > Network > TCP/IP > Advanced.

Select Obtain DNS server address via DHCP to use the DNS settings provided by the DHCP server.

To make manual settings, select Use the following DNS server address and specify the following:

Domain name - Enter the domain(s) to search for the host name used by the Axis product. Multiple domains can be separated by
semicolons. The host name is always the first part of a fully qualified domain name, for example, myserver is the host name in the
fully qualified domain name myserver.mycompany.com where mycompany.com is the domain name.

Primary/Secondary DNS server - Enter the IP addresses of the primary and secondary DNS servers. The secondary DNS server is
optional and will be used if the primary is unavailable.

NTP Configuration
NTP (Network Time Protocol) is used to synchronize the clock times of devices in a network. The NTP settings are configured under
Setup > Additional Controller Configuration > System Options > Network > TCP/IP > Advanced.

Select Obtain NTP server address via DHCP to use the NTP settings provided by the DHCP server.

To make manual settings, select Use the following NTP server address and enter the host name or IP address of the NTP server.

Host Name Configuration


The Axis product can be accessed using a host name instead of an IP address. The host name is usually the same as the assigned
DNS name. The host name is configured under Setup > Additional Controller Configuration> System Options > Network >
TCP/IP > Advanced.

Select Obtain host name via IPv4 DHCP to use host name provided by the DHCP server running on IPv4.

56
AXIS A1001 & AXIS Entry Manager

System options

Select Use the host name to set the host name manually.

Select Enable dynamic DNS updates to dynamically update local DNS servers whenever the Axis product’s IP address changes. For
more information, see the online help.

Link-Local IPv4 Address


Link-Local Address is enabled by default and assigns the Axis product an additional IP address which can be used to access
the product from other hosts on the same segment on the local network. The product can have a Link-Local IP and a static
or DHCP-supplied IP address at the same time.

This function can be disabled under Setup > Additional Controller Configuration > System Options > Network > TCP/IP
> Advanced.

HTTP
The HTTP port used by the Axis product can be changed under Setup > Additional Controller Configuration > System Options >
Network > TCP/IP > Advanced. In addition to the default setting, which is 80, any port in the range 1024–65535 can be used.

HTTPS
The HTTPS port used by the Axis product can be changed under Setup > Additional Controller Configuration > System Options >
Network > TCP/IP > Advanced. In addition to the default setting, which is 443, any port in the range 1024–65535 can be used.

To enable HTTPS, go to Setup > Additional Controller Configuration > System Options > Security > HTTPS. For more information,
see HTTPS on page 52.

NAT traversal (port mapping) for IPv4


A network router allows devices on a private network (LAN) to share a single connection to the internet. This is done by forwarding
network traffic from the private network to the “outside”, that is, the internet. Security on the private network (LAN) is increased
since most routers are pre-configured to stop attempts to access the private network (LAN) from the public network (internet).

Use NAT traversal when the Axis product is located on an intranet (LAN) and you wish to make it available from the other (WAN) side
of a NAT router. With NAT traversal properly configured, all HTTP traffic to an external HTTP port in the NAT router is forwarded to
the product.

NAT traversal is configured under Setup > Additional Controller Configuration > System Options > Network > TCP/IP > Advanced.

Note
• For NAT traversal to work, this must be supported by the router. The router must also support UPnP®.
• In this context, router refers to any network routing device such as a NAT router, Network router, Internet Gateway,
Broadband router, Broadband sharing device, or a software such as a firewall.

Enable/Disable - When enabled, the Axis product attempts to configure port mapping in a NAT router on your network, using
UPnP. Note that UPnP must be enabled in the product (see Setup > Additional Controller Configuration > System Options
> Network > UPnP).

Use manually selected NAT router - Select this option to manually select a NAT router and enter the IP address for the router in
the field. If no router is specified, the product automatically searches for NAT routers on your network. If more than one router is
found, the default router is selected.

Alternative HTTP port - Select this option to manually define an external HTTP port. Enter a port in the range 1024–65535. If the
port field is empty or contains the default setting, which is 0, a port number is automatically selected when enabling NAT traversal.

57
AXIS A1001 & AXIS Entry Manager

System options

Note
• An alternative HTTP port can be used or be active even if NAT traversal is disabled. This is useful if your NAT router does not
support UPnP and you need to manually configure port forwarding in the NAT router.
• If you attempt to manually enter a port that is already in use, another available port is automatically selected.
• When the port is selected automatically it is displayed in this field. To change this, enter a new port number and click Save.

FTP
The FTP server running in the Axis product enables upload of new firmware, user applications, etc. The FTP server can be disabled
under Setup > Additional Controller Configuration > System Options > Network > TCP/IP > Advanced.

RTSP
The RTSP server running in the Axis product allows a connecting client to start an event stream. The RTSP port number can be changed
under Setup > Additional Controller Configuration > System Options > Network > TCP/IP > Advanced. The default port is 554.

Note
Event streams will not be available if the RTSP server is disabled.

SOCKS
SOCKS is a networking proxy protocol. The Axis product can be configured to use a SOCKS server to reach networks on the other
side of a firewall or proxy server. This functionality is useful if the Axis product is located on a local network behind a firewall, and
notifications, uploads, alarms, etc need to be sent to a destination outside the local network (for example the Internet).

SOCKS is configured under Setup > Additional Controller Configuration > System Options > Network > SOCKS. For more
information, see the online help.

QoS (Quality of Service)


QoS (Quality of Service) guarantees a certain level of a specified resource to selected traffic on a network. A QoS-aware network
prioritizes network traffic and provides a greater network reliability by controlling the amount of bandwidth an application may use.

The QoS settings are configured under Setup > Additional Controller Configuration > System Options > Network > QoS. Using
DSCP (Differentiated Services Codepoint) values, the Axis product can mark event/alarm traffic and management traffic.

SNMP
The Simple Network Management Protocol (SNMP) allows remote management of network devices. An SNMP community is the
group of devices and management station running SNMP. Community names are used to identify groups.

To enable and configure SNMP in the Axis product, go to the Setup > Additional Controller Configuration > System Options
> Network > SNMP page.

Depending on the level of security required, select the version on SNMP to use.

Traps are used by the Axis product to send messages to a management system on important events and status changes. Check Enable
traps and enter the IP address where the trap message should be sent and the Trap community that should receive the message.

Note
If HTTPS is enabled, SNMP v1 and SNMP v2c should be disabled.

Traps for SNMP v1/v2 are used by the Axis product to send messages to a management system on important events and status
changes. Check Enable traps and enter the IP address where the trap message should be sent and the Trap community that
should receive the message.

The following traps are available:

• Cold start

58
AXIS A1001 & AXIS Entry Manager

System options

• Warm start

• Link up

• Authentication failed

SNMP v3 provides encryption and secure passwords. To use traps with SNMP v3, an SNMP v3 management application is required.

To use SNMP v3, HTTPS must be enabled, see HTTPS on page 52. To enable SNMP v3, check the box and provide the initial user
password.

Note
The initial password can only be set once. If the password is lost, the Axis product must be reset to factory default, see
Reset to factory default settings on page 61.

UPnP
The Axis product includes support for UPnP®. UPnP is enabled by default and the product is automatically detected by operating
systems and clients that support this protocol.

UPnP can be disabled under Setup > Additional Controller Configuration > System Options > Network > UPnP.

Bonjour
The Axis product includes support for Bonjour. Bonjour is enabled by default and the product is automatically detected by operating
systems and clients that support this protocol.

Bonjour can be disabled under Setup > Additional Controller Configuration > System Options > Network > Bonjour.

Ports & Devices


I/O Ports
The auxiliary connector on the Axis product provides two configurable input and output ports for connection of external devices. For
information about how to connect external devices, see the Installation Guide, available on www.axis.com

The I/O ports are configured under Setup > Additional Controller Configuration > System Options > Ports & Devices > I/O Ports.
Select the port direction (Input or Output). The ports can be given descriptive names and their Normal states can be configured as
Open circuit or Grounded circuit.

Port Status
The list on the System Options > Ports & Devices > Port Status page shows the status of the product’s input and output ports.

Maintenance
The Axis product provides several maintenance functions. These are available under Setup > Additional Controller Configuration
> System Options > Maintenance.

Click Restart to perform a correct restart if the Axis product is not behaving as expected. This will not affect any of the current
settings.

Note
A restart clears all entries in the Server Report.

Click Restore to reset most settings to the factory default values. The following settings are not affected:

• the boot protocol (DHCP or static)

59
AXIS A1001 & AXIS Entry Manager

System options

• the static IP address

• the default router

• the subnet mask

• the system time

• the IEEE 802.1X settings

Click Default to reset all settings, including the IP address, to the factory default values. This button should be used with caution. The
Axis product can also be reset to factory default using the control button, see Reset to factory default settings on page 61.

For information about firmware upgrade, see How to upgrade the firmware on page 62.

Backup the application data


Go to Setup > Create a backup to create a backup of the application data. The data that is backed up includes users, credentials,
groups, and schedules. When you create a backup, a file with the data is saved locally on your computer.

Important
You can't create a backup of the application data if it includes HID mobile credentials

Go to Setup > Upload a backup to use a previously created backup file to restore the application data. Before you can upload the
backup file, you have to reset the device to factory default settings. For instructions, see Reset to factory default settings on page 61.

Support
Support Overview
The Setup > Additional Controller Configuration > System Options > Support > Support Overview page provides information on
troubleshooting and contact information, should you require technical assistance.

See also Troubleshooting on page 62.

System Overview
To get an overview of the Axis product’s status and settings, go to Setup > Additional Controller Configuration > System Options
> Support > System Overview. Information that can be found here includes firmware version, IP address, network and security
settings, event settings, and recent log items.

Logs & Reports


The Setup > Additional Controller Configuration > System Options > Support > Logs & Reports page generates logs and reports
useful for system analysis and troubleshooting. If contacting Axis Support, please provide a server report with your query.

System Log - Provides information about system events.

Access Log - Lists all failed attempts to access the product. The access log can also be configured to list all connections to the
product (see below).

View Server Report - Provides information about the product status in a pop-up window. The access log is automatically included
in the server report.

Download Server Report - Creates a .zip file that contains a complete server report text file in UTF–8 format. Select the Include
snapshot from Live View option to include a snapshot of the product’s Live View. The .zip file should always be included when
contacting support.

Parameter List - Shows the product's parameters and their current settings. This may prove useful when troubleshooting or
when contacting Axis Support.

60
AXIS A1001 & AXIS Entry Manager

System options

Connection List - Lists all clients that are currently accessing media streams.

Crash Report - Generates an archive with debugging information. The report takes several minutes to generate.

The log levels for the system and access logs are set under Setup > Additional Controller Configuration > System Options
> Support > Logs & Reports > Configuration. The access log can be configured to list all connections to the product (select
Critical, Warnings & Info).

Advanced
Scripting
Scripting allows experienced users to customize and use their own scripts.

NOTICE
NO TICE
Improper use may cause unexpected behavior and loss of contact with the Axis product.

Axis strongly recommends that you do not use this function unless you understand the consequences. Axis Support does not provide
assistance for problems with customized scripts.

To open the Script Editor, go to Setup > Additional Controller Configuration > System Options > Advanced > Scripting. If a
script causes problems, reset the product to its factory default settings, see page 61.

For more information, see www.axis.com/developer

File Upload
Files, for example webpages and images, can be uploaded to the Axis product and used as custom settings. To upload a file, go to
Setup > Additional Controller Configuration > System Options > Advanced > File Upload.

Uploaded files are accessed through http://<ip address>/local/<user>/<file name> where <user> is the
selected user group (administrator) for the uploaded file.

Reset to factory default settings


Important
Reset to factory default should be used with caution. A reset to factory default resets all settings, including the IP address, to
the factory default values.

To reset the product to the factory default settings:

1. Disconnect power from the product.

2. Press and hold the control button while reconnecting power. See Product overview on page 4 .

3. Keep the control button pressed for 25 seconds until the status LED indicator turns amber for the second time.

4. Release the control button. The process is complete when the status LED indicator turns green. The product has been reset
to the factory default settings. If no DHCP server is available on the network, the default IP address is 192.168.0.90.

5. Use the installation and management software tools, assign an IP address, set the password, and access the product.

It is also possible to reset parameters to factory default through the web interface. Go to Setup > Additional Controller
Configuration > Setup > System Options > Maintenance and click Default.

61
AXIS A1001 & AXIS Entry Manager

Troubleshooting

Troubleshooting

How to check the current firmware


Firmware is software that determines the functionality of network devices. One of your first actions when troubleshooting a problem
should be to check the current firmware version. The latest version may contain a correction that fixes your particular problem.

The current firmware version in the Axis product is displayed in the Overview page.

How to upgrade the firmware


Important
• Your dealer reserves the right to charge for any repair attributable to faulty upgrade by the user.
• Preconfigured and customized settings are saved when the firmware is upgraded (providing the features are available in the
new firmware) although this is not guaranteed by Axis Communications AB.
• If you install a previous firmware version, you need to restore the product to factory default settings afterwards.

Note
• After the upgrade process has completed, the product restarts automatically. If you restart the product manually after
the upgrade, wait 5 minutes even if you suspect that the upgrade has failed.
• Because the database of users, groups, credentials, and other data are updated after a firmware upgrade, the first start-up
could take a few minutes to complete. The time required is dependent on the amount of data.
• When you upgrade the Axis product with the latest firmware, the product receives the latest functionality available. Always
read the upgrade instructions and release notes available with each new release before upgrading the firmware.

Stand-alone door controllers:

1. Download the latest firmware file to your computer, available free of charge at www.axis.com/support

2. Go to Setup > Additional Controller Configuration > System Options > Maintenance in the product’s webpages.

3. Under Upgrade Server, click Choose file and locate the file on your computer.

4. If you want the product to automatically restore to factory default settings after the upgrade, check the Default checkbox.

5. Click Upgrade.

6. Wait approximately 5 minutes while the product is being upgraded and restarted. Then clear the web browser's cache.

7. Access the product.

Door controllers in a system:

You can use AXIS Device Manager or AXIS Camera Station to upgrade all door controllers in a system. See www.axis.com for more
information.

Important
• Do not select sequential upgrade.

Note
• All controllers in a system must always be on the same firmware version.
• Upgrade all controllers in a system at the same time, using the parallel option in AXIS Device Manager or
AXIS Camera Station.

62
AXIS A1001 & AXIS Entry Manager

Troubleshooting

Emergency Recovery Procedure


If power or network connection is lost during the upgrade, the process fails and the product may become unresponsive. Flashing
red Status indicator indicates a failed upgrade. To recover the product, follow the steps below. The serial number is found on
the product’s label.

1. In UNIX/Linux, type the following from the command line:

arp -s <IP address> <serial number> temp


ping -l 408 <IP address>

In Windows, type the following from a command/DOS prompt (this may require that you run the command prompt as
an administrator):

arp -s <IP address> <serial number>


ping -l 408 -t <IP address>

2. If the product does not reply in 30 seconds, restart it and wait for a reply. Press CTRL+C to stop Ping.

3. Open a browser and type in the product’s IP address. In the page that opens, use the Browse button to select the upgrade
file to use. Then click Load to restart the upgrade process.

4. After the upgrade is complete (1–10 minutes), the product automatically restarts and shows a steady green on the
Status indicator.

5. Reinstall the product, referring to the Installation Guide.

If the emergency recovery procedure does not get the product up and running again, contact Axis support at www.axis.com/support

Symptoms, possible causes and remedial actions


Problems upgrading the firmware
Firmware upgrade failure If the firmware upgrade fails, the product reloads the previous firmware. Check the firmware
file and try again.

Problems setting the IP address


When using ARP/Ping Try the installation again. The IP address must be set within two minutes after power has been
applied to the product. Make sure the Ping length is set to 408. For instructions, see Installation
Guide on the product page at axis.com.
The product is located on a If the IP address intended for the product and the IP address of the computer used to access the
different subnet product are located on different subnets, you will not be able to set the IP address. Contact your
network administrator to obtain an IP address.
The IP address is being used Disconnect the Axis product from the network. Run the Ping command (in a Command/DOS
by another device window, type ping and the IP address of the product):

• If you receive: Reply from <IP address>: bytes=32; time=10...


this means that the IP address may already be in use by another device on the network.
Obtain a new IP address from the network administrator and reinstall the product.
• If you receive: Request timed out, this means that the IP address is available
for use with the Axis product. Check all cabling and reinstall the product.
Possible IP address conflict The static IP address in the Axis product is used before the DHCP server sets a dynamic address.
with another device on the This means that if the same default static IP address is also used by another device, there may
same subnet be problems accessing the product.

63
AXIS A1001 & AXIS Entry Manager

Troubleshooting

The product cannot be accessed from a browser


Cannot log in When HTTPS is enabled, make sure that the correct protocol (HTTP or HTTPS) is used when
attempting to log in. You may need to manually type http or https in the browser’s address field.

If the password for the user root is lost, the product must be reset to the factory default settings.
See Reset to factory default settings on page 61.
The IP address has been IP addresses obtained from a DHCP server are dynamic and may change. If the IP address has been
changed by DHCP changed, use AXIS IP Utility or AXIS Device Manager to locate the product on the network. Identify
the product using its model or serial number, or by the DNS name (if the name has been configured).

If required, a static IP address can be assigned manually. For instructions, see the document How to
assign an IP address and access your device on the product page at axis.com
Certificate error when using For authentication to work properly, the date and time settings in the Axis product should be
IEEE 802.1X synchronized with an NTP server. See Date & Time on page 54.

The product is accessible locally but not externally


Router configuration To configure your router to allow incoming data traffic to the Axis product, enable the NAT-traversal
feature which will attempt to automatically configure the router to allow access to the Axis
product, see NAT traversal (port mapping) for IPv4 on page 57. The router must support UPnP®.
Firewall protection Check the Internet firewall with your network administrator.
Default routers required Check if you need to configure the router settings from Setup > Network Settings or Setup >
Additional Controller Configuration > System Options > Network > TCP/IP > Basic.

Status and Network indicator LEDs are flashing red rapidly


Hardware failure Contact your Axis reseller.

Product does not start up


Product does not start up If the product does not start up keep the network cable connected and re-insert the power cable
to the midspan.

64
AXIS A1001 & AXIS Entry Manager

Specifications

Specifications

Connectors
For information about the connectors’ positions, see .

For connection diagrams and information about the hardware pin chart generated through the hardware configuration, see
Connection Diagrams on page 69 and Configure the hardware on page 14.

The following section describes the connectors’ technical specifications.

Reader Data Connector


6-pin terminal block supporting RS485 and Wiegand protocols for communication with the reader.

The RS485 ports support:

• Two-wire RS485 half duplex

• Four-wire RS485 full duplex

The Wiegand ports support:

• Two-wire Wiegand

Function Pin Notes


RS485 A- 1 For full duplex RS485
For half duplex RS485
B+ 2
RS485 A- 3 For full duplex RS485
For half duplex RS485
B+ 4
Wiegand D0 (Data 0) 5 For Wiegand
D1 (Data 1) 6

Important
The RS485 ports have a fixed baudrate of 9600 Bit/s.

Important
The recommended maximum cable length is 30 m (98.4 ft).

Important
The output circuits in this section are Class 2 power limited.

Reader I/O Connector


6-pin terminal block for:

• Auxiliary power (DC output)

• Digital Input

65
AXIS A1001 & AXIS Entry Manager

Specifications

• Digital Output

• 0 V DC (-)

Pin 3 on the reader I/O connectors can be supervised. If the connection is interrupted, an event is activated. To use supervised inputs,
install end of line resistors. Use the connection diagram for supervised inputs. See page 70.

Function Pin Notes Specifications


0 V DC (-) 1 0 V DC
DC output 2 For powering auxiliary equipment. 12 V DC
Note: This pin can only be used as power out. Max load = 300 mA
Configurable (Input 3–6 Digital input — Connect to pin 1 to activate, or leave 0 to max 40 V DC
or Output) floating (unconnected) to deactivate.
Digital output — Connect to pin 1 to activate, or leave 0 to max 40 V DC, open drain,
floating (unconnected) to deactivate. If used with an 100 mA
inductive load, e.g. a relay, a diode must be connected
in parallel with the load, for protection against voltage
transients.

Important
The recommended maximum cable length is 30 m (98.4 ft).

Important
The output circuits in this section are Class 2 power limited.

Door Connector
Two 4-pin terminal blocks for door monitoring devices (digital input).

All door input pins can be supervised. If the connection is interrupted, an alarm is triggered. To use supervised inputs, install end of
line resistors. Use the connection diagram for supervised inputs. See page 70.

Function Pin Notes Specifications


0 V DC (-) 1, 3 0 V DC
Input 2, 4 For communicating with door monitor. 0 to max 40 V DC
Digital input — Connect to pin 1 or 3 respectively to
activate, or leave floating (unconnected) to deactivate.
Note: This pin can only be used for input.

Important
The recommended maximum cable length is 30 m (98.4 ft).

66
AXIS A1001 & AXIS Entry Manager

Specifications

Auxiliary Connector
4-pin configurable I/O terminal block for:

• Auxiliary power (DC output)

• Digital Input

• Digital Output

• 0 V DC (-)

For an example connection diagram, see Connection Diagrams on page 69.

Function Pin Notes Specifications


0 V DC (-) 1 0 V DC
DC output 2 For powering auxiliary equipment. 3.3 V DC
Note: This pin can only be used as power out. Max load = 100 mA
Configurable 3–4 Digital input — Connect to pin 1 to activate, or leave 0 to max 40 V DC
(Input or Output) floating (unconnected) to deactivate.
Digital output — Connect to pin 1 to activate, or leave 0 to max 40 V DC, open drain,
floating (unconnected) to deactivate. If used with an 100 mA
inductive load, e.g. a relay, a diode must be connected
in parallel with the load, for protection against voltage
transients.

Important
The recommended maximum cable length is 30 m (98.4 ft).

Important
The output circuits in this section are Class 2 power limited.

Power connector
2-pin terminal block for DC power input. Use a Safety Extra Low Voltage (SELV) compliant limited power source (LPS) with either
a rated output power limited to ≤100 W or a rated output current limited to ≤5 A.

Function Pin Notes Specifications


0 V DC (-) 1 0 V DC
DC input 2 For powering controller when not using Power over 10–28 V DC, max 36 W
Ethernet. Max load on outputs = 14 W
Note: This pin can only be used as power in.

67
AXIS A1001 & AXIS Entry Manager

Specifications

Network Connector
RJ45 Ethernet connector. Use Category 5e cables or higher.

Function Specifications
Power and Ethernet Power over Ethernet IEEE 802.3af/802.3at Type 1 Class 3, 44–57 V DC

Max load on outputs = 7.5 W

Power lock connector


4-pin terminal block for powering one or two locks (DC output). The lock connector can also be used to power external devices.

Connect locks and loads to the pins according to the hardware pin chart generated through the hardware configuration.

Function Pin Notes Specifications


0 V DC (-) 1, 3 0 V DC
0 V DC, floating, or 2, 4 For controlling up to two 12 V locks. Use the hardware 12 V DC
12 V DC pin chart. See Configure the hardware on page 14. Max total load = 500 mA

NOTICE
NO TICE
If the lock is non-polarized, we recommend you to add an external flyback diode.

Important
The output circuits in this section are Class 2 power limited.

Power & relay connector


6-pin terminal block with built-in relay for:

• External devices

• Auxiliary power (DC output)

• 0 V DC (-)

Connect locks and loads to the pins according to the hardware pin chart generated through the hardware configuration.

Function Pin Notes Specifications


0 V DC (-) 1, 4 0 V DC
Relay 2–3 For connecting relay devices. Use the hardware pin Max current = 700 mA
chart. See Configure the hardware on page 14. Max voltage = +30 V DC
The two relay pins are galvanically separated from the
rest of the circuitry.

68
AXIS A1001 & AXIS Entry Manager

Specifications

12 V DC 5 For powering auxiliary equipment. Max voltage = +12 V DC


Note: This pin can only be used as power out. Max load = 500 mA

24 V DC 6 Not used

NOTICE
NO TICE
If the lock is non-polarized, we recommend you to add an external flyback diode.

Important
The output circuits in this section are Class 2 power limited.

Tampering Alarm Pin Header


Two 2-pin headers for bypassing:

• Back tampering alarm (TB)

• Front tampering alarm (TF)

Function Pin Notes


Back tampering alarm 1–2 To bypass the front and back tampering alarm simultaneously, connect jumpers
between TB 1, TB 2 and TF 1, TF 2 respectively. Bypassing the tampering alarms
Front tampering alarm 1–2 means that the system will not identify any tampering attempts.

Note
Both the front and back tampering alarms are connected by default. The casing open trigger can be configured to perform an
action if the door controller is opened or if the door controller is removed from the wall or ceiling. For information about how
to configure alarms and events, see Alarm and Event Configuration on page 43.

Connection Diagrams
Connect devices according to the hardware pin chart generated through the hardware configuration. For more information about
hardware configuration and the hardware pin chart, see Configure the hardware on page 14.

69
AXIS A1001 & AXIS Entry Manager

Specifications

Auxiliary Connector

1 0 V DC (-)
2 DC output: 3.3 V, max 100 mA
A I/O configured as input
B I/O configured as output

Supervised inputs
To use supervised inputs, install end of line resistors according to the diagram below.

i Input
ii 0 V DC (-)

Note
It is recommended to use twisted and shielded cables. Connect shielding to 0 V DC.

70
AXIS A1001 & AXIS Entry Manager

Safety information

Safety information

Hazard levels
DANGER
Indicates a hazardous situation which, if not avoided, will result in death or serious injury.

WARNING
Indicates a hazardous situation which, if not avoided, could result in death or serious injury.

CAUTION
Indicates a hazardous situation which, if not avoided, could result in minor or moderate injury.

NOTICE
NO TICE
Indicates a situation which, if not avoided, could result in damage to property.

Other message levels


Important
Indicates significant information which is essential for the product to function correctly.

Note
Indicates useful information which helps in getting the most out of the product.

71
User Manual Ver. M23.3
AXIS A1001 & AXIS Entry Manager Date: May 2021
© Axis Communications AB, 2013 - 2021 Part No. T10010336
Firmware version 1.20
Alarm Control Panels

INTEGRA

USER
MANUAL

SATEL sp. z o.o.


ul. Budowlanych 66
80-298 Gdańsk
POLAND
tel. + 48 58 320 94 00
www.satel.eu
integra_u_en 08/21
IMPORTANT
Before you start using the control panel, please read carefully this manual in order to avoid
mistakes that can lead to malfunction or even damage to the equipment.
Changes, modifications or repairs not authorized by the manufacturer shall void your rights
under the warranty.
The INTEGRA control panels should only be connected to the analog subscriber lines. In
case of changing the analog line to the digital one, it is necessary to contact the alarm
system installer.
Pay special attention if the telephone line used by the control panel is frequently busy and/or
failures are reported, concerning the line and/or monitoring. Report such situations to the
alarm system installer immediately.
To ensure adequate protection, the alarm security system must be in good working order,
therefore SATEL recommends that it be regularly tested. The control panel is equipped with
a number of self-diagnostic functions which, when properly configured by the installer, ensure
control over correct functioning of the system.
The alarm system can not prevent burglary, hold-up or fire from happening, but in emergency
situation it will allow you to take steps to minimize the potential damage (by triggering optical
or acoustic alarm signal, notifying appropriate authorities of the alarm etc.). Thus, it can deter
any would-be intruders.

SATEL aims to continually improve the quality of its products, which may result in changes in
their technical specifications and software. Current information about the changes being
introduced is available on our website.
Please visit us at:
https://support.satel.eu

The declaration of conformity may be consulted at www.satel.eu/ce

Factory default codes:


Service code: 12345
Object 1 master user (administrator) code: 1111

The following symbols may be used in this manual:


- note;

- caution.
CONTENTS
1. General ............................................................................................................................. 3
2. Technical reliability of the alarm system ........................................................................... 3
3. Alarm system operating costs ........................................................................................... 3
4. Authorization of users ....................................................................................................... 4
4.1 Authorization with two identifiers ............................................................................... 4
4.2 Factory default codes ................................................................................................ 4
4.3 Operation under duress ............................................................................................. 5
5. Operating the alarm system by means of LCD keypad..................................................... 5
5.1 Keypads description .................................................................................................. 5
5.1.1 LCD display ........................................................................................................ 5
5.1.2 LED indicators .................................................................................................... 7
5.1.3 Keys ................................................................................................................... 8
5.1.4 Built-in proximity card reader .............................................................................. 9
5.1.5 Sound signaling .................................................................................................. 9
5.2 [Code] – arming / disarming menu ........................................................................ 10
5.2.1 Arming menu .................................................................................................... 10
5.2.2 Disarming menu ............................................................................................... 10
5.3 [Code] – user menu.............................................................................................. 10
5.3.1 Functions list .................................................................................................... 11
5.3.2 Starting functions.............................................................................................. 15
5.3.3 Menu shortcuts ................................................................................................. 15
5.3.4 Entering data by means of the LCD keypad ..................................................... 16
5.3.5 Description of user functions ............................................................................ 17
5.4 Arming ..................................................................................................................... 23
5.4.1 Full arming without partition selection .............................................................. 23
5.4.2 Full arming the selected partitions .................................................................... 23
5.4.3 Arming in the selected mode ............................................................................ 24
5.4.4 Quick arming .................................................................................................... 24
5.4.5 Denial of arming ............................................................................................... 24
5.4.6 Failure of arming procedure ............................................................................. 25
5.4.7 Shortening the exit delay time .......................................................................... 25
5.5 Disarming and alarm clearing .................................................................................. 25
5.5.1 Alarm clearing without disarming...................................................................... 25
5.6 Two-code arming / disarming .................................................................................. 25
5.7 Triggering the alarm from keypad ............................................................................ 26
5.8 Users ....................................................................................................................... 26
5.8.1 User types ........................................................................................................ 27
5.8.2 Adding new user............................................................................................... 28
5.8.3 Edit user ........................................................................................................... 28
5.8.4 Removing a user .............................................................................................. 29
5.8.5 Adding proximity card / DALLAS iButton .......................................................... 29
5.8.6 Adding keyfob................................................................................................... 29
5.8.7 Removing keyfob.............................................................................................. 30
5.9 Master users (administrators) .................................................................................. 31
5.10 Zone bypassing ....................................................................................................... 31
5.10.1 Zone inhibiting .................................................................................................. 31
5.10.2 Zone isolating ................................................................................................... 32
5.10.3 Unbypassing..................................................................................................... 32
5.11 Viewing the event log .............................................................................................. 32
2 User Manual SATEL

5.11.1 Viewing all events ............................................................................................. 32


5.11.2 Viewing the events required for Grade 2 .......................................................... 33
5.11.3 Viewing the selected events ............................................................................. 33
5.11.4 Way of presenting events ................................................................................. 33
5.12 Replacing batteries in wireless keypad .................................................................... 34
5.13 Programming the partition timer............................................................................... 34
5.14 Zone testing ............................................................................................................. 35
5.15 Outputs control ........................................................................................................ 36
5.15.1 Controlling the MONO SWITCH type of output .................................................... 36
5.15.2 Controlling the BI SWITCH type of output ............................................................ 36
5.15.3 Controlling the REMOTE SWITCH type of outputs ................................................. 37
5.15.4 Controlling the roller shutter outputs ................................................................. 37
6. Using the partition keypad .............................................................................................. 37
6.1 Description of partition keypads ............................................................................... 38
6.1.1 LED indicators .................................................................................................. 38
6.1.2 Keys ................................................................................................................. 38
6.1.3 Built-in proximity card reader ............................................................................ 38
6.1.4 Sound signaling ................................................................................................ 38
6.2 Functions available from the partition keypad .......................................................... 39
6.2.1 [Code] ............................................................................................................ 39
6.2.2 [Code] ............................................................................................................ 40
6.2.3 Quick arming .................................................................................................... 40
6.2.4 Triggering the alarm from keypad ..................................................................... 40
6.2.5 Silencing the alarm sound at the keypad .......................................................... 40
6.2.6 Code changing ................................................................................................. 40
7. Using the entry keypad ................................................................................................... 41
7.1 LED indicators ......................................................................................................... 41
7.2 Sound signaling ....................................................................................................... 41
7.3 Functions available from the entry keypad .............................................................. 41
8. Using the code lock......................................................................................................... 41
8.1 Description of code locks ......................................................................................... 42
8.1.1 LED indicators .................................................................................................. 42
8.1.2 Keys ................................................................................................................. 42
8.1.3 Sound signaling ................................................................................................ 42
8.2 Functions available from code lock .......................................................................... 43
9. Confirming voice messaging ........................................................................................... 43
10. Call answering and telephone control ............................................................................. 44
10.1 Answering phone calls ............................................................................................. 44
10.2 Telephone control .................................................................................................... 45
10.3 Audio alarm verification ........................................................................................... 45
11. SMS control .................................................................................................................... 45
12. Operating the alarm system by means of keyfob ............................................................ 46
13. Manual update history..................................................................................................... 47
14. Brief description of operating the system from keypad ................................................... 50
SATEL INTEGRA 3

1. General
Thank you for choosing the product offered by the SATEL Company. Wishing you full
satisfaction with the choice you made, we are always ready to provide you with professional
assistance and information on our products.
The SATEL Company is manufacturer of a broad range of devices dedicated for use in
security alarm systems. Further information is available on our website www.satel.eu or at
the points of sale offering our products.
It is recommended that that the installers prepare their own user manual for the alarm
system installed by them. The manual must include all changes and modifications in
relation to the factory default settings.

The installer should train the users in the rules of operating the alarm system.

2. Technical reliability of the alarm system


A failure of any component of the alarm system will result in deterioration of the level of
protection. Unfortunately, the devices which are installed outside (e.g. the outdoor sirens) are
exposed to the adverse effects of weather. During storms, the devices connected to the
electrical system or telephone line are vulnerable to damage as a result of atmospheric
discharge.
The control panel is provided with a number of safeguards and automatic diagnostic features
to test the system performance. Detection of irregularities is signaled e.g. by the LED on
the keypad. You should immediately respond to such a signal, and, if necessary,
consult the installer.
In addition, some features designed for testing the alarm system are available in the control
panel. They make it possible to check the detectors, sirens, telephone communicators, etc for
correct functioning. Only regular testing and inspection of the alarm system will allow
you to keep a high level of protection against intrusion.
It is recommended that the installer, at the request of the user, carry out periodic
maintenance of the alarm system.
It is in the interest of the user to anticipate and plan in advance the procedures in case an
alarm is set off by the control panel. It is important to be able to verify the alarm, determine its
source and take appropriate actions (e.g. evacuation in the event of a fire alarm).

3. Alarm system operating costs


The control panel can inform the users and the monitoring station about the status of
protected facility. Implementation of these tasks means financial costs. The amount of the
costs incurred depends on the amount of information sent. A failure, as well as an incorrect
programming of the control panel, may result in increased costs (due to making of excessive
number of calls).
Please inform the installer, which is a priority: to deliver information at any cost, or to prevent
excessive costs. For example, after an event code has failed to be sent successfully to the
monitoring station, the control panel may repeat attempts every few minutes to send the code
or to cease the attempts to send the code until a next event occurs.
4 User Manual SATEL

4. Authorization of users
Operation of the alarm system is possible after the user authorization, which allows the
control panel to verify that the user is authorized to perform the given operation. The
authorization can be done on the basis of:
• code,
• proximity card (125 kHz passive transponder, which can be in the form of card, tag, etc.),
• DALLAS iButton (chip),
• keyfob.
You can not assign the same identifier (code, proximity card, DALLAS iButton or
keyfob) to two users.

For safety reasons, different people should not use the same identifier.

The installer can configure the panel so that it will not accept codes that contain less
than three digits (e.g. 1111 or 1212) or consist of consecutive digits (3456).

The installer may permit the use of certain functions without the need for user
authorization.

Using an invalid code, proximity card or DALLAS iButton three times may:
− trigger an alarm,
− block the keypad / reader for 90 seconds.

4.1 Authorization with two identifiers


The INT-KLCDR, INT-KLFR, INT-KWRL and INT-KWRL2 keypads and the INT-SCR
multifunction keypads have a built-in proximity card reader. The installer can configure these
devices so that the user has to use two identifiers for authorization: the code and the card.
The function to be executed after the authorization depends on the second identifier:
– code – whether it will be confirmed by using the key or the key,
– card – whether it will be presented only or held.

4.2 Factory default codes


By default, the following codes are preprogrammed in the control panel:
service code: 12345
object 1 master user (administrator) code: 1111
The factory default codes make it possible to assign individual codes to consecutive persons
who are to use the alarm system (see: “Users” p. 26).
The factory default codes should be changed before you start using your alarm system
(CHANGE OWN CODE function available in the user menu).

The control panel can inform the user that the code change is necessary, if the code is
known to other users.

The master code should not be used on a daily basis because of the risk of its being
captured. It is recommended that the administrator enter for himself an ordinary user's
code.
SATEL INTEGRA 5

4.3 Operation under duress


When acting under duress, the DURESS type code must be used instead of the normal user
code (see “User types” p. 27).

5. Operating the alarm system by means of LCD keypad


SATEL offers the following keypads for INTEGRA control panels:
INT-TSG – touchscreen keypad,
INT-TSG2 – touchscreen keypad,
INT-TSH – touchscreen keypad,
INT-TSH2 – touchscreen keypad,
INT-TSI – touchscreen keypad,
INT-KSG – LCD keypad with touch keys,
INT-KLCD – LCD keypad with mechanical keys,
INT-KLCDR – LCD keypad with mechanical keys and built-in proximity card reader,
INT-KLCDK – LCD keypad with mechanical keys,
INT-KLCDL – LCD keypad with mechanical keys,
INT-KLCDS – LCD keypad with mechanical keys,
INT-KLFR – LCD keypad with mechanical keys and built-in proximity card reader.
INT-KWRL – wireless LCD keypad with mechanical keys and built-in proximity card reader.
INT-KWRL2 – wireless LCD keypad with mechanical keys and built-in proximity card reader.
The keypads are available in a variety of color options for the enclosure, display and key
backlight. The color variant is indicated by the additional designation in the keypad name
(e.g. INT-KLCD-GR – green display and key backlight; INT-KLCD-BL – blue display and key
backlight).

5.1 Keypads description

The INT-TSG, INT-TSG2, INT-TSH, INT-TSH2, INT-TSI and INT-KSG keypads are
described in separate manuals, which are delivered with these keypads.

5.1.1 LCD display


In wireless keypads, the display is disabled when the keypad is in the sleep mode.
The display facilitates communication between the user and the alarm system, clearly
indicating the system status. The functions available to the user are presented on the display.
The display backlight can be used, if needed.
In standby mode, the display shows:
– in the upper line – the date and time in the format defined by the installer,
– in the lower line – the keypad name or state (status) of selected partitions (to be defined
by the installer).
The installer can configure the keypad so that when you press the 9 key for approx. 3
seconds, the display will enter the partition state presentation mode. The status of
partitions operated by the keypad (including those from which alarm is signaled on the
keypad) is presented by means of symbols. The display will return to the standby mode after
you press the 9 key for approx. 3 seconds again.
6 User Manual SATEL

If some predefined events occur, additional messages may appear on the display (e.g.
arming, disarming, auto-arm delay countdown, entry/exit delay countdown, alarm, etc.).

Fig. 1. Keypads with flap.


SATEL INTEGRA 7

Entering the user code, i.e. the user authorization, will open a menu containing the functions
that are available to the user. The functions are presented in two lines. The currently selected
function is indicated by the arrow on the left-hand side. How the function related information
is presented depends on the specific character of the given function.
The way of display backlighting is programmed by the installer.

INT-KLCDS INT-KLCDL

Fig. 2. Keypads without flap.

5.1.2 LED indicators


In wireless keypads, the LEDs are disabled when the keypad is in the sleep mode.

LED Color Function description


green ON – all keypad operated partitions are armed
flashing – some keypad operated partitions are armed or exit delay
countdown is running
red ON or flashing – alarm or alarm memory

yellow flashing – trouble or trouble memory


green flashing – service mode is entered
green if zone status is being presented or the keypad is switched to graphic
programming mode (see: “Selection from the multiple-choice list”
p. 16), two LEDs indicate which data set is being displayed (see:
table 2)
Table 1. Description of keypad LEDs.
8 User Manual SATEL

LED
Data type Information
left side/upper right side/lower
OFF OFF numbers 1-32
OFF ON numbers 33-64
Zones/Outputs
ON OFF numbers 65-96
ON ON numbers 97-128
OFF OFF system addresses 0-31 (00-1F HEX)
Expanders
OFF ON system addresses 32-63 (20-3F HEX)
Table 2. Information presented by the LEDs.

Information about the armed state can be extinguished after a time period defined by
the installer.

If the installer has enabled the GRADE 2 option:


− the LEDs provide information about alarms only after the code has been
entered and confirmed with the key,
− flashing of the LED means that there is a trouble in the system, some zones
are bypassed, or that there was an alarm.

5.1.3 Keys
The keys designated with digits and letters enable entering the code and data, when using
the functions available in the menu. Additionally, if you press and hold down the selected digit
keys for approx. 3 seconds, you can (if the keypad has been so configured by the installer):
1 - check the state of zones,
4 - check the state of partitions,
5 - view the alarm log (based on the event log),
6 - view the trouble log (based on the event log),
7 - view the troubles,
8 - turn on/off CHIME in the keypad,
9 - toggle the display between the standby mode and partition state display mode.
The other keys enable you to:
- enter the user menu (after entering the code),
- cancel the started operation.
or - arm / disarm and clear alarm (after entering the code),
- start the selected function,
- confirm the entered data.
    - navigate through the display (scroll through the displayed messages, functions
and options, and move the cursor),
- run the installer selected functions (after entering the code).
- trigger the fire alarm.
- trigger the medical (auxiliary) alarm.
- trigger the panic alarm.
SATEL INTEGRA 9

5.1.4 Built-in proximity card reader


The INT-KLCDR, INT-KLFR, INT-KWRL and INT-KWRL2 keypads can be operated by
means of proximity cards (proximity tags or other 125 kHz passive transponders). The
installer defines which functions can be executed after presenting or holding the card.
In wireless keypads, the proximity card reader is disabled when the keypad is in the
sleep mode.

5.1.5 Sound signaling

Beeps generated when operating


The installer can disable the sound signaling.
1 short beep – pressing any number key.
2 short beeps – confirmation of command execution, signaling of entering the user menu,
submenu or function.
3 short beeps – signaling of:
– starting the procedure of arming (there is exit delay in the partition) or arming (there is
no exit delay in the partition),
– disarming and/or alarm clearing,
– turning output off,
– turning off the CHIME in the keypad, using the 8 key,
– toggling the display between the standby mode and the partition status presentation
mode, using the 9 key,
– exiting the function and returning to the menu after confirmation of the data entered.
4 short beeps and 1 long beep – signaling of:
– turning output on,
– turning on the CHIME in the keypad, using the 8 key,
– ending the function and exiting the user menu after confirmation of the data entered.
1 long beep – signaling of:
– violated/ bypassed zones when arming,
– fault of the vibration detector (10. 24H VIBRATION type zone was not violated during the
vibration detector test run upon starting the arming procedure).
2 long beeps – invalid code/card, function not available or exiting the function without
confirmation of the data entered (e.g. by using the key).
3 long beeps – unavailable function.
Events signaled by sounds
Only installer selected events are signaled.

Alarms are being signaled throughout the time programmed by the installer.

In wireless keypads, the audible signaling is disabled when the keypad is in the sleep
mode (except for the CHIME signal).
5 short beeps – zone violation (CHIME).
Long beep every 3 seconds, followed by a series of short beeps for 10 seconds
and 1 long beep – countdown of exit delay (if the time is shorter than 10 seconds, only
the final sequence of short beeps will be generated).
10 User Manual SATEL

A sequence of 7 beeps of diminishing duration, repeated every few seconds –


countdown of auto-arming delay.
2 short beeps every seconds – countdown of entry delay.
2 short beeps every 3 seconds – signaling a new trouble.
Continuous beep – alarm.
Long beep every second – fire alarm.

5.2 [Code] – arming / disarming menu

Information given in the section below do not apply to users having the SIMPLE USER
right (see p. 27).
After you enter the code and confirm it with the key:
– a message on the need to change the code or a service note may be displayed,
– alarm will be cleared – if the user is authorized to clear the alarm and there is an alarm
in the system,
– one partition will be disarmed – if the user is authorized to disarm the partition, has
access to only one partition operated from the keypad and that partition is armed, or has
access to many partitions, but only one partition is armed,
– one partition will be armed – if the user is authorized to arm the partition, has access to
only one partition operated from the keypad and that partition is disarmed,
– the arming/disarming menu will be displayed.

5.2.1 Arming menu


The arming menu will be displayed if:
– the user is authorized to arm the partition,
– the user has access to a number of partitions operated from the keypad,
– none of the partitions accessible to the user is armed,
– there is no alarm.
Two functions are available in the menu:
Arm all arming all partitions
Arm selected arming selected partitions

5.2.2 Disarming menu


The disarming menu will be displayed if:
– the user is authorized to disarm the partition,
– the user has access to a number of partitions operated from the keypad,
– at least two partitions accessible to the user are armed.
Two functions are available in the menu:
Disarm all disarming all partitions
Disarm selected disarming selected partitions

5.3 [Code] – user menu


After you enter the code and confirm using the key, the user menu will be displayed. The
list of available functions depends on the user authority level, as well as the system status
and configuration. In order to exit the user menu, press the key. The keypad will quit the
menu automatically, if 2 minutes have elapsed since the last keypress.
SATEL INTEGRA 11

Upon entering the code and confirming with the key, a message about the need to
change the code or a service note may be displayed.

5.3.1 Functions list


The functions available after entering the service code have been highlighted with
white text against black background. Highlighted with a frame are functions available
to the administrators.
View clear. al. view cleared alarms from selected partition zones
System reset restore system after verified alarm
Disarm disarm selected partitions
Clear alarm clear alarm
Clear other al. clear alarm in other objects
Abort voice m. cancel telephone messaging
Arm arm selected partitions
Arm (2 codes) start two code arming
Disarm (2codes) start two code disarming
Defer auto-arm postpone the auto-arming
Set auto-arm d. set auto-arming postpone time
Arming mode select arming mode
Cancel 1st code cancel consent to two code arming/disarming
Change own code change own code
Change tel.code change own telephone code
Change prefix
Prefix normal set normally used prefix
Prefix duress set duress prefix
Recall time set time to remind of the need to change prefix
Users
New user add new user
Code set code
Telephone code set telephone code
Partitions assign partitions available to the user
Type select type of code
Schedule select time schedule
Existence time set code validity time
Bypass time set bypass time
Rights assign rights
Keypads etc. assign modules available to the user
New prox. card add proximity card
Rem. prox. card remove proximity card
New DALLAS add DALLAS iButton
Remove DALLAS remove DALLAS iButton
New RX key fob add 433 MHz keyfob
Rem. RX key fob remove 433 MHz keyfob
Button 1 assign function to keyfob button 1
12 User Manual SATEL

Button 2 assign function to keyfob button 2


Button 3 assign function to keyfob button 3
Button 4 assign function to keyfob button 4
Button 1 and 2 assign function to combination of keyfob buttons 1 & 2
Button 1 and 3 assign function to combination of keyfob buttons 1 & 3
Events (RX) set event generating rules
New ABAX keyfob add keyfob supported by ABAX 2 / ABAX system
Rem.ABAX keyfob remove keyfob supported by ABAX 2 / ABAX system
Button 1 assign function to keyfob button 1
Button 2 assign function to keyfob button 2
Button 3 assign function to keyfob button 3
Button 4 assign function to keyfob button 4
Button 5 assign function to keyfob button 5
Button 1 and 5 assign function to combination of keyfob buttons 1 & 5
Events (ABAX) set event generating rules
Confirm. (ABAX) set confirmation rules
Name program user name
Edit user edit existing user
[select user]
[list of parameters identical as in case of a new user]
Remove user remove user
Masters
New master add new master
Code set code
Rights assign rights
Keypads etc. assign modules available to the master
New prox. card add proximity card
Rem. prox. card remove proximity card
New DALLAS add DALLAS iButton
Remove DALLAS remove DALLAS iButton
New RX keyfob add 433 MHz keyfob
Rem. RX keyfob remove 433 MHz keyfob
Button 1 assign function to keyfob button 1
Button 2 assign function to keyfob button 2
Button 3 assign function to keyfob button 3
Button 4 assign function to keyfob button 4
Button 1 and 2 assign function to combination of keyfob buttons 1 & 2
Button 1 and 3 assign function to combination of keyfob buttons 1 & 3
Events (RX) set event generating rules
New ABAX keyfob add keyfob supported by ABAX 2 / ABAX system
Rem.ABAX keyfob remove keyfob supported by ABAX 2 / ABAX system
Button 1 assign function to keyfob button 1
Button 2 assign function to keyfob button 2
Button 3 assign function to keyfob button 3
SATEL INTEGRA 13

Button 4 assign function to keyfob button 4


Button 5 assign function to keyfob button 5
Button 1 and 5 assign function to combination of keyfob buttons 1 & 5
Events (ABAX) set event generating rules
Confirm. (ABAX) set confirmation rules
Name set master name
Edit master edit existing master
[select master]
[list of parameters identical as in case of a new master]
Remove master remove master
Zone bypasses
Inhibit temporary zone bypass
Isolate permanent zone bypass
Set time set control panel clock
System state check troubles / check system state
Events
Selected
Select events select type of events to be viewed
Select part. select partitions from which events are to be viewed
View view selected events
View Grade2 view events required for Grade 2
All view all events
Grade2 view events required for Grade 2
Reset zones reset 43. RESETABLE POWER SUPPLY type outputs
Clr.latch.outs clear latched outputs
Fin.f.door open end door fire opening
Change options
Replace battery enabling batteries replacement in wireless keypad
Keypad chime turn on/off CHIME in keypad
Outputs chime block zone violation signal. on 11. CHIME type outputs
Timers edit timers
Part. timers program partition timers
No exp.tamp.al. block expander tampers
Perm.serv.accs. enable/disable permanent installer access
Serv. can edit make user editing available to installer
Serv. ArmDis... make system control available to installer
Perm.DLOADX acc enable/disable permanent DLOADX access
DLOADX IP set address of computer with DLOADX program
GUARDX IP set address of computer with GUARDX program
Erase s.message erase service note
Tests
Partitions check current state of partitions
Zones check current state of zones
Supply voltages check module supply voltage
14 User Manual SATEL

Radio devices check radio signal level for wireless devices


Temperatures check temperatures (wireless devices with temp. sensor)
Zones test
New
Burglary zones start new test for burglary zones
Fire/tech.zones start new test for fire and technical zones
One zone start new test for single zone
View results view test results
Finish test abort test
Clear results clear test results
Battery test test battery and 60. TECHN. - BATTERY LOW zones
Manual tr. test start manual test transmission
Station 1A test start test transmission to station 1 – main phone number
Station 1B test start test transmission to station 1 – backup phone number
Station 2A test start test transmission to station 2 – main phone number
Station 2B test start test transmission to station 2 – backup phone number
GPRS monit.test send test transmission via GPRS [only INTEGRA 128-WRL]
Messaging test start messaging test
Answering test display information on answered tel. call
Prox. card test check proximity card number
CA-64 PTSA test start mimic board test
View masters view master users
Keypad name display keypad name
File in DLOADX display inf. on DLOADX program file with control panel data
Panel version display information on control panel firmware version
STM prg.version display inf. on ABAX syst. firmware [only INTEGRA 128-WRL]
GSM IMEI/v/sig. display information on GSM telephone [only INTEGRA 128-WRL]
IP/MAC/IMEI/ID disp. inf. on ETHM-1 / ETHM-1 Plus / INT-GSM / INT-GSM LTE
Modules version display information on module firmware version
Time synchron. start time synchronization
Service access set installer access time
Open door open selected door controlled by system
Outs control control outputs
Service mode start service mode
Take SM over take over service mode
Downloading
Start DWNL-RS start local programming
Finish DWNL-RS finish local programming
Start DWNL-MOD. start communication via external modem
Start DWNL-TEL start communication via 300 bps modem
Start DWNL-CSD start CSD communication [only INTEGRA 128-WRL]
Start DWNL-GPRS start GPRS communication [only INTEGRA 128-WRL]
ETHM-1 DLOADX start communication with DLOADX via ETHM-1 Plus
ETHM-1 GUARDX start communication with GUARDX via ETHM-1 Plus
SATEL INTEGRA 15

INT-GSM DLOADX start communication with DLOADX via INT-GSM / INT-GSM LTE
INT-GSM GUARDX start communication with GUARDX via INT-GSM / INT-GSM LTE

5.3.2 Starting functions


1. Using the  and  keys, find the required submenu or function. The currently selected
submenu or function is indicated by the arrow ( ) on the left-hand side.
2. Press the  or key to enter the submenu (the  key allows to exit the submenu) or
start the function.

5.3.3 Menu shortcuts


Support for the user menu shortcuts can be disabled by the installer.
You can use shortcuts for quick access to some menu elements (submenus, functions).
Press the suitable digit key (or combination of keys) to enter a submenu or start a function.
Shown below is the list of submenus and functions available by using shortcuts. The
shortcuts are shown in square brackets.
[1] Change own code
[2] Users
[21] New user
[22] Edit user
[23] Remove user
If the installer is not authorized to edit the users, the shortcuts beginning with the digit
2 will allow the installer to start the function from the MASTERS submenu.
[4] Zone bypasses
[41] Inhibit
[42] Isolate
[5] Events
[51] Selected events
[52] All events
[6] Set time
[7] System state
[8] Outputs control
[9] Service mode
[0] Downloading
[01] Start DWNL-RS
[02] Finish DWNL-RS
[03] Start DWNL-MOD.
[04] Start DWNL-TEL
[05] Start DWNL-CSD [only INTEGRA 128-WRL]
[06] Start DWNL-GPRS [only INTEGRA 128-WRL]
[07] ETHM-1 DLOADX
[08] ETHM-1 GUARDX
[09] INT-GSM DLOADX
[00] INT-GSM GUARDX
16 User Manual SATEL

5.3.4 Entering data by means of the LCD keypad


Data are saved to the control panel if you press the key (in some keypads, the key is
also available, whose function is exactly the same). The key enables exiting the function
without saving any changes.
Described below are general rules for entering data, however they may be different as
regards some functions.
Selection from the single-choice list
Shown in the upper line of display is description of the function, and in the lower one – the
currently selected item. You can scroll through the list of items, using the direction keys: 
(down) and  (up). The  and  keys are not used.
Selection from the multiple-choice list
The functions that allow you to make multiple choice can be identified by an additional
symbol situated at the right-hand side of the display:
– displayed item is selected / option is enabled,
– displayed item is not selected / option is disabled.
Pressing any digit key (for some functions, this does not work with the key 0) will change the
currently displayed symbol to the other one. To scroll through the list of items, use the  key
(down) or the  key (up). For some functions, pressing the key 0 will allow you to enter the
number of item to be edited (e.g. number of zone to be bypassed / unbypassed). This will
speed up search.
For some functions, pressing the  or  key will switch the keypad into the graphic
programming mode. The and symbols are used to present on the display the current
status of up to 32 items available in the given function (these can be e.g. zones, outputs,
timers, etc.). Additionally, in case of zone bypassing, the symbol is used. The  key moves
the cursor to the right, and the  key to the left. If the list of items is longer than 32, pressing
the  key when the cursor is placed over the last item will display the next list, and pressing
the  key when the cursor is placed over the first item will display the previous list (see also
description of the LEDs, p. 7). Pressing the key 0, 1 or 2 three times in the graphic mode
within 3 seconds will have the following effect:
000 - the symbol will be displayed at all available items,
111 - the symbol will be displayed at all available items,
222 - reversal of the selection made: the symbol will be displayed at all items where
the symbol was displayed, and the symbol where the symbol was displayed.
On pressing the  or  key, the keypad will return to the text mode.

Fig. 3. Example of how information is presented in the graphic programming mode. The blank
fields are not available for editing.

Entering decimal and hexadecimal values


Digits are entered by pressing the suitable keys. Characters from A to F are available under
the keys with numbers 2 and 3. Keep pressing the keys until the required character appears.
SATEL INTEGRA 17

Entering names
Press the particular keys until the required character appears. The characters available in the
keypad are shown in Table 3. Hold down the key to display the digit assigned to the key.

Key Characters available after next keystroke


1 ! ? ' `  " { } $ % & @ \ ^ | # 1
2 a b c 2
3 d e f 3
4 g h i 4
5 j k l 5
6 m n o 6
7 p q r s 7
8 t u v 8
9 w x y z 9
0 . , : ; + - / = _ < > ( ) [ ] 0
Table 3. Characters available when entering names. The upper case letters are available
under the same keys (to change the letter case, press  key.

Shown on the left side in the upper line of the display is information about the letter case:
[ABC] or [abc] (it will be displayed after pressing any key and will be visible for a few seconds
after the last keystroke).
The  key moves the cursor to the right, and the  key – to the left. The  key deletes the
character on the left side of the cursor.

5.3.5 Description of user functions


View cleared alarms – available, if the user did not view the violated zones after alarm
clearing. It allows to check which zones triggered the alarm. After completion of the
viewing, the function is no longer available.
System reset – available to the installer, if the option REQUIRED SYSTEM RESET AFTER VERIFIED
ALARM is enabled, and a verified alarm took place. After occurrence of the verified alarm, it
is necessary to reset the system by means of this function, in order to make re-arming
possible.
Disarm – allows to disarm the partitions accessible to the user from the given keypad.
Clear alarm – allows to silence the alarm.
Clear other alarms – allows to silence the alarms from other objects, to which the user has
normally no access.
Abort voice messaging – terminates the telephone messaging.
The messaging can be cancelled automatically together with alarm clearing. The
messaging cancellation rules are defined by the installer.
Arm – allows to arm the partitions accessible to the user from the given keypad.
Arm (2 codes) – allows to initiate arming of the partitions which require entering 2 codes.
Disarm (2codes) – allows to initiate disarming of the partitions which require entering 2
codes.
Defer auto-arming – available when auto-arming delay countdown is running. It allows to
postpone by a programmed time period the auto-arming of the partition in which the auto-
arming delay countdown is running. Entering just zeros will block the auto-arming function
(until the next auto-arming time).
18 User Manual SATEL

Set auto-arming delay – available when the auto-arming delay is programmed for at least
one partition and the auto-arming delay countdown is not currently running in that partition.
It allows to postpone by a programmed time period the auto-arming of the partition.
Arming mode – allows to select the arming mode which is to be used (the shortcut key is
shown in square brackets):
[0] full arming (to be used after everybody has left the protected area),
[1] full arming + bypasses (allows the users to stay in the protected area) – the zones for
which the BYPASSED IF NO EXIT option is enabled by the installer will be bypassed,
[2] arming without interior (allows the users to stay in the protected area):
− interior zones (3. INTERIOR DELAYED zone type) will be disarmed,
− violating the exterior zone (8. EXTERIOR zone type) will trigger a silent alarm,
− violating another alarm zone will trigger a loud alarm.
[3] arming without interior and without entry delay (allows the users to stay in the
protected area – to be used when nobody else is to enter the protected area) – this
arming mode is similar to the previous one, but the delayed zones operate as the
instant ones (no entry delay).
Cancel 1st code – if the partition is armed/disarmed by means of two codes and the first
code has already been entered, the user can still cancel the consent to arming/disarming.
Change own code – allows the user to change his/her own code.
Change telephone code – allows the user to change his/her own telephone code.
Change prefix – available to the administrator, if the use of prefixes in the system has been
made available by the installer (the prefix length has been defined). It enables to program
the prefixes and the time to remind about the need to change the prefix. Each code will
have to be preceded by a prefix:
normal – for everyday use. By default, it consists of a suitable number of digits 0 (e.g. if
the determined prefix length is 4, the default prefix is 0000),
DURESS – for use, when the user has been forced to enter the code. Using the code will
trigger a silent alarm. By default, it consists of a suitable number of digits 4 (e.g. if the
determined prefix length is 3, the default prefix is 444).
Users – the following functions are available in the submenu:
New user – allows to create a new user (see: “Adding new user” p. 28).
Edit user – allows to edit the existing users (see: “Edit user” p. 28).
Remove user – allows to remove the existing users (see: “Removing a user” p. 29).
The administrator defines whether the installer is to have access to the USERS
submenu (SERV. CAN EDIT option in the CHANGE OPTIONS submenu).
Masters – the submenu provides the following functions available to the installer:
New master – allows to create a new administrator.
Edit master – allows to edit the existing administrators.
Remove master – allows to remove the existing administrators.
Zone bypasses – the following functions are available in the submenu:
Inhibit – allows to temporarily bypass the zones (see: “Zone inhibiting” p. 31).
Isolate – allows to permanently bypass the zones (see: “Zone isolating” p. 32).
Set time – allows to program the control panel clock. The data are entered in the following
format:
time – hour:minute:second,
date – day:month:year.
SATEL INTEGRA 19

System state – allows to view the troubles and, if the GRADE 2 global option has been
enabled by the installer, also the alarms and bypassed zones, as well as to check the
partition status.
Events – the submenu contains functions which allow to view the events saved to the control
panel memory (see: “Viewing the event log” p. 32).
The content of received SMS messages is also saved to the events log of the
INTEGRA 128-WRL control panel.
Reset zones – running the function will result in a temporary deactivation of the
43. RESETABLE POWER SUPPLY type outputs, thus making it possible to reset the alarm
memory for detectors supplied from those outputs (e.g. fire detectors).
Clear latched outputs – allows to turn off some of the control panel outputs for which the
LATCH option is enabled, as well as the 9. DAY ALARM, 12. SILENT ALARM
and 116. INTERNAL SIREN type outputs.
Fin.f.door open – restores the normal operating mode in all modules executing the access
control functions (in case of fire, the doors controlled by these modules may be
automatically unlocked).
Change options – the following functions are available in the submenu:
Replace battery – allows to disable the tamper protection in the selected wireless keypad
for 3 minutes. During this time you can open the keypad enclosure and replace the
battery. The function is available if a wireless keypad is installed in the alarm system.
The function is supported by ACU-120 / ACU-270 controller with firmware version 5.03
and ACU-220 / ACU-280 controller.
Keypad chime – allows to turn on/off the CHIME in the keypad. The CHIME is five short
sounds by means of which the keypad will inform you e.g. that a door / window is open,
when the system is disarmed. The installer defines which zones of the alarm system
can trigger the CHIME.
Outputs chime – allows to block the chime signal from selected partitions on the
11. CHIME type output.
Timers – allows to program parameters of the timers, the editing of which is permitted by
the installer.
Partition timers – allows to program the partition timers (see: “Programming the partition
timer” p. 34).
No expanders tamper alarms – allows to temporarily disable the expansion module
tamper supervision. In case of any problems with the expansion modules, report the fact
to the installer.
Permanent service access – the option is available to the master user (administrator). If
enabled, the installer has permanent access to the alarm system, which, among other
things, enables the control panel to be programmed by using LCD keypad or DLOADX
program.
Enabling PERMANENT SERVICE ACCESS option will clear the installer access time
programmed with the SERVICE ACCESS function. On the other hand, programming the
installer access time will disable the PERMANENT SERVICE ACCESS option.
Service can edit – the option is available to the master user (administrator). If it is
enabled, the installer can add, edit and delete users in the administrator's object.
Service arm/disarm/clear/bypass – the option is available to the master user
(administrator). If it is enabled, the installer can arm/disarm the system, clear alarms
and bypass zones in the administrator object.
20 User Manual SATEL

Permanent DLOADX access – the option is available to the master user (administrator).
If it is enabled, the control panel can be programmed by means of the DLOADX
program, irrespective of whether or not the installer has access to the alarm system.
DLOADX IP – enables programming the address of the computer, on which the DLOADX
program is installed. If the address is programmed, the control panel users can start
from the keypad the communication with the DLOADX program via ETHM-1 Plus /
ETHM-1 / INT-GSM / INT-GSM LTE module (see description of the ETHM-1 DLOADX
and INT-GSM DLOADX functions, available in the DOWNLOADING submenu). The
address can be entered as a name or IP address.
GUARDX IP – enables programming the address of the computer, on which the GUARDX
program is installed. If the address is programmed, the control panel users can start
from the keypad the communication with the GUARDX program via ETHM-1 Plus /
ETHM-1 / INT-GSM / INT-GSM LTE module (see description of the ETHM-1
GUARDX and INT-GSM GUARDX functions, available in the DOWNLOADING
submenu). The address can be entered as a name or IP address.
Erase service message – allows the user to delete the service message.
Tests – the following functions are available in the submenu:
Partitions – allows to check the status of partitions accessible to the user and operated
from the keypad. The partition status is presented by means of a symbol. The numbers
placed on the glass allow you to identify the partition numbers. By factory default, the
partition status is shown using the following symbols (which can be changed by the
installer):
b - temporary blocked,
? - entry delay,
E - exit delay (less than 10 seconds),
e - exit delay (more than 10 seconds),
P - fire alarm,
A - alarm,
p - fire alarm memory,
a - alarm memory,
a - armed,
- disarmed, not ready to be armed (violated zones),
- disarmed, ready to be armed.
Zones – allows to check the status of zones in the partitions accessible to the user and
operated from the keypad. The zone status is presented by means of a symbol. The
numbers placed on the glass allow you to identify the zone numbers. On starting the
function, the status of zones 1-32 is displayed. Use the  and  keys to display the
status of other zones (see also description of the LEDs, p. 7). By factory default, the
zone status is shown using the following symbols (which can be changed by the
installer):
b - zone bypass,
l - trouble “long violation”,
f - trouble “no violation”,
T - tamper alarm,
A - alarm,
- zone tamper,
- zone violation,
t - tamper alarm memory,
SATEL INTEGRA 21

a - alarm memory,
- zone OK.
Supply voltages – available to the installer. Enables checking of the supply voltage for
individual expansion modules.
Temperatures – allows the user to check the temperature. The temperature information is
provided by wireless temperature detectors or ABAX 2 wireless devices equipped with a
temperature sensor.
Radio devices – allows to check the radio signal level for ABAX 2 / ABAX system wireless
devices supported by the control panel.
Zone Test – the submenu contains functions which allow to test the detectors connected
to the zones (see: “Zone testing” p. 35).
Battery test – available to the installer. Upon starting the function, the control panel will
generate events to inform about the status of batteries of the control panel and
hardwired expansion modules with power supply. Additionally, the status of 60. TECH.-
BATTERY LOW type zones will be analyzed.
Manual transmission test – generates an event, which starts the procedure of event
transmission to the monitoring station (a code sent with the system identifier).
Monitoring station test (1A, 1B, 2A, 2B) – allows to send a test transmission to the
monitoring station (separate functions for each of the telephone numbers). When
sending the transmission, messages are displayed to inform about the currently
performed operation. The function is useful when starting the reporting or in case of any
reporting trouble.
GPRS monit.test – sends a test transmission to the monitoring station via cellular data
network (GPRS). When sending the transmission, messages on the display provide
information on the currently performed operation. only INTEGRA 128-WRL
Messaging test – allows to test the messaging function. Upon starting the function:
1. Enter the number of the telephone (consecutive number on the telephone list).
2. Press the  key.
3. Enter the number of voice message.
4. Press the key. The control panel will call the indicated number and play back the
message.
Answering test – if this function is started, information on the number of rings and going
off-hook is displayed when answering the telephone call.
Proximity card test – allows to check the number of proximity card and establish to whom
it belongs (if the card belongs to a user of the system).
CA-64 PTSA test – allows to test the mimic board.
View masters – available to the administrator. It makes it possible to check in which
objects the master users are created.
Keypad name – allows to check the given keypad name.
File in DLOADX – displays the date and time of writing the data to the control panel by
means of the DLOADX program and the name of file with control panel data.
Panel version – displays information on the control panel firmware version.
STM program version – displays information on the program version of the processor
used to operate ABAX system and control panel zones. only INTEGRA 128-WRL
GSM IMEI/v/sig. – allows to check the level of signal received by the GSM telephone
antenna, individual identification number of the telephone, and the telephone version.
The  and  keys are to be used for scrolling through the displayed information. only
INTEGRA 128-WRL
22 User Manual SATEL

IP/MAC/IMEI/ID – displays the information related to the ETHM-1 Plus / ETHM-1 /


INT-GSM / INT-GSM LTE modules installed in the system. In the case of the
ETHM-1 Plus / ETHM-1 module, the information includes:
− local IP address,
− MAC number,
− public IP address,
− individual identification number assigned to the ETHM-1 Plus module by the SATEL
server [ID].
In the case of the INT-GSM / INT-GSM LTE module, the information includes:
− IMEI number,
− individual identification number assigned to the INT-GSM / INT-GSM LTE module by
the SATEL server [ID],
− cellular signal strength for SIM1 / SIM2 cards,
− operator of the network into which the SIM1 / SIM2 card is logged,
− SIM1 / SIM2 card account balance (press to check the balance).
Use the  and  keys to scroll the information. If several modules are connected to the
control panel, use the  and  keys to scroll the list of modules.
If the INT-GSM / INT-GSM LTE module is connected to the ETHM-1 Plus module,
information about both modules is displayed, except that the IMEI number of INT-GSM
/ INT-GSM LTE module is not shown.
Modules versions – allows to check the firmware versions for devices connected to the
control panel communication buses.
Time synchronization – allows to manually start synchronization of the control panel
clock and the time server. It applies to the control panel to which the ETHM-1 /
ETHM-1 Plus / INT-GSM / INT-GSM LTE module is connected. The address of time
synchronization server must be programmed in the control panel.
The function is unavailable, if the time synchronization is running. Automatic time
synchronization takes place every day at 05:30 and after the control panel restart.
Service access – available to the master user (administrator). Allows to program the time
period of installer access to the alarm system. The time is programmed in hours.
Programming the value 0 means the installer will have no access.
Open door – allows to unlock the door controlled by the alarm system (modules executing
the access control functions) or activate the 101. CARD READ – EXPANDER type outputs.
Outputs control – allow to control the devices connected to the MONO SWITCH, BI SWITCH,
REMOTE SWITCH, SHUTTER UP and SHUTTER DOWN type outputs (see: “Outputs control”
p. 36).
Service mode – available to the installer. Initiates the service mode.
Take SM over – available to the installer. If the service mode has been initiated from another
keypad, it can be “taken over”, i.e. the service menu can be displayed on the keypad, on
which the TAKE SM OVER function has been started.
Downloading – the following functions are available in the submenu:
Start DWNL-RS – available to the installer. Enables communication with the DLOADX
program through the RS-232 / USB port of the control panel (local programming).
Finish DWNL-RS – available to the installer. Disables the local programming of control
panel.
SATEL INTEGRA 23

Start DWNL-MOD. – enables communication with the DLOADX program via the external
modem (analog, GSM or ISDN).
Start DWNL-TEL – enables communication with the DLOADX program via the 300 bps
modem.
Start DWNL-CSD – enables CSD communication with the DLOADX program through the
built-in GSM communicator. only INTEGRA 128-WRL
Start DWNL-GPRS – enables GPRS communication with the DLOADX program through
the built-in GSM communicator. only INTEGRA 128-WRL
ETHM-1 DLOADX – enables communication with the DLOADX program using the
ETHM-1 (firmware version 1.03 or newer) / ETHM-1 Plus module. The communication
takes place over Ethernet. If the INT-GSM / INT-GSM LTE module is connected to the
ETHM-1 Plus module and an attempt to establish communication via Ethernet fails, an
attempt will be made to establish communication via the cellular data network.
ETHM-1 GUARDX – enables communication with the GUARDX program using the
ETHM-1 (firmware version 1.03 or newer) / ETHM-1 Plus module. The communication
takes place over Ethernet. If the INT-GSM / INT-GSM LTE module is connected to the
ETHM-1 Plus module and an attempt to establish communication via Ethernet fails, an
attempt will be made to establish communication via the cellular data network.
INT-GSM DLOADX – enables communication with the DLOADX program using the
INT-GSM / INT-GSM LTE module. The communication takes place via the cellular data
network.
INT-GSM GUARDX – enables communication with the GUARDX program using the
INT-GSM / INT-GSM LTE module. The communication takes place via the cellular data
network.

5.4 Arming
This section describes the operations that must be carried out by the user from the keypad in
order to initiate the arming procedure. The arming procedure is ended at the running out of
the exit delay time (if the procedure is ended successfully, the system becomes armed – see
also “Failure of arming procedure” p. 25). If the exit delay time is 0, the system becomes
armed instantly.
The installer can configure the alarm system so that the arming functions will not be
available after tamper. A message on the display will indicate that the user must call
for service. The arming functions will not be available until the service code is entered
and confirmed with the key.

5.4.1 Full arming without partition selection


The arming without partition selection is possible when none of the partitions to which the
user has access is armed and the keypad is not signaling any alarm.
1. Enter the code and confirm with the key.
2. When the ARM ALL function is displayed, press the key. The arming procedure will be
initiated in all partitions which are accessible to the user and are operated by the keypad.
If the user can only arm one partition, the arming procedure will be initiated as soon as
the code is entered and confirmed with the key.

5.4.2 Full arming the selected partitions


1. Enter the code and confirm with the key.
2. Using the  key, scroll through the menu until you find the ARM function.
24 User Manual SATEL

3. Press the key. A list of partitions which can be armed will be displayed.
4. Using the  and  keys, find in the list the partition which is to be armed (or press 0 key
and enter the partition number).
5. Press one of the digit keys 1 to 9. The symbol in the upper right-hand corner will be
replaced by the symbol (see also “Selection from the multiple-choice list” p. 16).
6. Repeat the steps 4 and 5 for the next partitions which are to be armed.
7. Having selected the partitions which are to be armed, press the key.
You can also arm the selected partitions using of the ARM SELECTED function, available upon
entering the code and confirming with the key, but only when none of the partitions
accessible to you is armed and the keypad is signaling no alarm.

5.4.3 Arming in the selected mode


1. Enter the code and confirm with the key.
2. Using the  key, scroll through the menu until the ARMING MODE function is found.
3. Press the key. A list of arming modes will be displayed (see: description of the ARMING
MODE function, p. 18).
4. Using the  and  keys, find the arming mode which is to be activated, and then press
the key.
5. When the ARM function is displayed, press the key. Proceed in the same way, as for the
full arming of selected partitions (steps 4-7).

5.4.4 Quick arming


The installer can permit the arming without user authorization. The partitions indicated by the
installer will be armed.
1. Select the arming mode (press one of the keys: 0 – full arming; 1 – full arming +
bypasses; 2 – arming without interior; 3 – arming without interior and without entry delay).
2. Press the key. The arming procedure will begin.

5.4.5 Denial of arming


The installer can program the control panel so that the arming procedure could not be
started, if:
– a zone is violated in the partition,
– there is a trouble in the system (including tamper),
– there was a verified alarm.
The keypad will inform you about the refusal to arm by means of a message specifying the
cause for refusal.
If after a verified alarm the arming is impossible, the installer must be called. The
arming will only be possible after the installer intervention (see: description of the
SYSTEM RESET function, p. 17).

Bypassing violated zones when arming


If the arming procedure could not be started, and a message on the display informs you that
there are violated zones, you can review the list of such zones upon pressing the 2 key. To
scroll through the list, use the  and  keys. Pressing the 4 key will allow you to bypass the
given zone. A message on the display will prompt you to press the 1 key to confirm that the
zone is to be bypassed.
SATEL INTEGRA 25

Forced arming
If the arming procedure could not be started, the displayed message can allow of the forced
arming (1=Arm). On pressing the 1 key, the system will be armed despite a violated zone or
a trouble.

5.4.6 Failure of arming procedure


If the installer has enabled the GRADE 2 option, the arming procedure may end in failure. The
system will not be armed, if at the end of the exit delay countdown:
– there is a violated zone in partition which was not violated when the arming procedure
was started,
– there is a trouble which did not exist when the arming procedure was started.

5.4.7 Shortening the exit delay time


If such an option is permitted by the installer, the partition exit delay time may be shortened
upon pressing in turn the 9 and keys. In order to shorten the exit delay time you should use
the same keypad which was used for arming.

5.5 Disarming and alarm clearing


Enter the code and confirm with the key (see: “[Code] – arming / disarming menu” p. 10).
If only selected partitions are to be disarmed (DISARM SELECTED function), the partitions
should be selected in the same way as when arming the selected partitions.

5.5.1 Alarm clearing without disarming


1. Enter the code and confirm with the key.
2. Using the  key, scroll through the menu until the CLEAR ALARM function is found.
3. Press the key.

5.6 Two-code arming / disarming


If the partition is to be armed / disarmed with 2 codes, the user entering the first code must:
1. Enter the code and confirm with the key.
2. Scroll through the menu using the  key until the ARM (2 CODES) / DISARM (2CODES)
function is found.
3. Press the key. Proceed in the same way as for the full arming of selected partitions
(steps 3-7).
4. If the installer has not set the code validity at 60 seconds, specify the code validity and
confirm with the key.
Prior to expiration of the code validity, the user entering the second code must arm / disarm
the partition using the:
• LCD keypad (see: “Arming” or “Disarming and alarm clearing”),
• partition keypad ([code] ),
• reader (read-in of proximity card or DALLAS iButton).
The installer can configure the alarm system so that the second code will have to be
entered on another LCD keypad, partition keypad, etc.
26 User Manual SATEL

5.7 Triggering the alarm from keypad


The installer can permit triggering alarms from the keypad. To trigger an alarm, do the
following:
fire alarm – press the key for approx. 3 seconds,
medical (auxiliary) alarm – press the key for approx. 3 seconds,
panic alarm – press the key for approx. 3 seconds. The installer defines whether the loud
panic alarm (setting off the loud alarm signal) or the silent panic alarm (without the loud
signal) will be triggered.

5.8 Users
The users can be added, edited and removed by:
• master user (administrator),
• installer (if the SERV. CAN EDIT option is enabled by the administrator),
• user (if granted the USERS EDITING right).
The following data can be defined for the user:
Code – a sequence of digits for authorization of the user when using keypads and code
locks. The control panel supports codes consisting of 4 to 8 characters, however the
installer can define the minimum length of the code.
Telephone code – a sequence of digits for authorization of the user when using the
functions of telephone call answering and telephone control (see: “Call answering and
telephone control” p. 44).
Partitions – partitions to which the user has access (i.e. he is authorized to arm or disarm
them, clear alarms etc.).
Type – see: “User types” p. 27.
User schedule – parameter for the SCHEDULED type code (see: “User types” p. 27).
Validity time – parameter for the RENEWABLE, TEMPORARY or SCHEMATIC type codes (see:
“User types” p. 27).
Blocking time – parameter for the BLOCKING PARTITION type code (see: “User types” p. 27).
Rights – define which functions can be used by the user. The following rights (permissions)
are available:
– Arming
– Disarming
– Disarm, when other user arm [Can alw.disarm] – if the user does not have this right,
he/she can only disarm the system if it was armed by him/her
– Partition alarm clearing [Alarm clearing]
– Object alarm clearing [Object al.clr.]
– Other objects alarm clearing [Other al.clr.]
– Telephone messaging canceling [V.msg.clearing]
– Auto-arming defer [Arm deferring]
– First code for two codes partition [Enter.1st code]
– Second code for two codes partition [Enter.2nd code]
– Access temporary blocked partitions [Block p.access]
– Change access code [Code changing]
– Users editing
– Zones bypassing [Zones inhibit]
– Zone isolation [Zones isolate]
SATEL INTEGRA 27

– Clock setting
– Trouble state checking [Troubles view.]
– Event log reviewing [Events viewing]
– Detectors resetting [Zones resett.]
– Options programming [Options chang.]
– Access to menu TEST [Tests]
– Downloading starting [Downloading]
– Access to BI & MONO outputs [Outs control]
– System state review in GUARDX [GUARDX using]
– Resetting outputs [Clr.latch.outs]
– Simple user – having entered the code, confirmed with the key, the user never selects
the partitions which are to be armed / disarmed. All partitions the user has access will
be armed / disarmed.
– Administrator – the user has access to the menu functions which are reserved for the
administrator
Keypads etc. – additional modules from which the user will be able to operate the system
(proximity card arm/disarm devices, partition keypads, code locks, reader expanders).
Proximity cards / DALLAS chips – if the proximity card / DALLAS iButton reader is used in
the system, a proximity card / DALLAS iButton can be assigned to the user, which will
allow the user to operate the system by means of readers.
Keyfobs – in case of the INTEGRA 128-WRL control panel or any other control panel to
which a module with keyfob support is connected (ACU-220, ACU-280, ACU-120,
ACU-270, ACU-100, ACU-250, INT-RX or INT-RX-S), a keyfob can be assigned to the
user, which will allow to operate the system remotely. The user may have up to 2 keyfobs:
the APT-200 (supported by the ABAX 2 / ABAX system) or the APT-100 (supported by the
ABAX system) and the 433 MHz (supported by the INT-RX or INT-RX-S modules).
Buttons – the button functions are available, if a keyfob has been assigned to the user. It is
possible to assign a zone to a keyfob button or combination of buttons. The zone will be
violated upon pressing the button / combination of buttons. The assigned zone should not
exist physically.
Events (RX) / Events (ABAX) – if a keyfob has been assigned to the user, it is possible to
define whether pressing the appropriate keyfob button will result in logging an event which
informs that the keyfob has been used.
ABAX confirmation – if an ABAX 2 / ABAX system keyfob has been assigned to the user, it
is possible to determine the status of which outputs will be presented on the keyfob LEDs
on pressing any button.
Name – individual user name.

5.8.1 User types


The name as used in the keypad is shown in the square brackets. The description includes
only the codes, but the information provided below applies to all identifiers assigned to the
user.
Normal – basic type of user.
One-time [Single] – the user will get one-time access.
Renewable [Time renewable] – the user has access to the system for a defined period of
time. The user validity time should be defined. Before the validity time expires, the control
panel will prompt the user to change the code. After the code has been changed, the
validity time will run from the beginning.
28 User Manual SATEL

Temporary [Time not renew.] – the user has access to the system for a defined period of
time. The user validity time should be defined. After the validity time expires, the user will
have no access to the system.
Duress – code to be used in hold-up and duress situations. Use it to trigger a silent alarm
and send the event code to the monitoring station.
“Mono” output operating [Mono outputs] – code for control of the MONO SWITCH type
outputs.
“Bi” output operating [Bi outputs] – code for control of the BI SWITCH type outputs.
Blocking partition [Part.temp.block.] – the code enables access to the armed partitions.
Using the code will block the armed partition(s) (the partition zones will not trigger the
burglary alarm). The blocking time is defined individually for each user within the range
from 1 to 109 minutes. If, however, the time of blocking for guard round is defined for the
partition and its duration is longer, the blocking will last longer.
Cash machine zones bypassing [Acces.to cash m.] – the code to be used to unblock
access to the cash dispenser (the 24H CASH MACHINE type zones will be temporarily
bypassed in the partition).
Guard – using this code means having made the round (additionally, it can result in the
partition being temporarily bypassed for the duration of guard round). The installer defines
the modules which are used to confirm making the round and determines the time interval
between successive rounds. If such a user is granted access to the partition, he/she will
have the same possibilities as the NORMAL type user.
Scheduled – the user has access to the system as per the time schedule for a specified
period of time. It is necessary to select the schedule (the schedule is programmed by the
installer) and define the user validity period.

5.8.2 Adding new user


1. Enter the code and confirm with the key.
2. Press in turn the 2 and 1 keys. The list of functions to define the user parameters will be
displayed.
If the service code has been entered, before the list of functions is displayed, it is
necessary to specify the object in which the new user is to be created (the service
code enables access to all objects).
3. Using the appropriate functions, define the user's parameters.
At least one identifier, i.e. code, proximity card, DALLAS iButton or keyfob, must be
assigned to the user.

The new user may not be granted a higher authority level than the person who is
adding that user to the system.
4. Press the key.
5. When a prompt appears, asking you if the changes are to be saved, press the 1 key.
6. A message will inform you that a new user has been created. Press the key to return to
the USER submenu.

5.8.3 Edit user


The user can edit the users in relation to which he/she is the superior. For example, if
the user A has created the user B, and the user B has created the user C, then the
user A can edit the users B and C.
SATEL INTEGRA 29

The user being edited may not be granted a higher authority level than the person who
is editing such a user.
1. Enter the code and confirm with the key.
2. Press the 2 key twice. The list of users will be displayed.
3. Using the  and  keys, find in the list the user who is to be edited.
4. Press the key. The list of functions for defining the user's parameters will be displayed.
5. Using appropriate functions, modify the user's parameters.
6. Press the key.
7. When a prompt appears, asking you if the changes are to be saved, press the 1 key.
8. A message will inform you that the user has been modified. Press the key to return to
the list of users.

5.8.4 Removing a user


The user can remove the users in relation to which he/she is the superior. For
example, if the user A has created the user B, and the user B has created the user C,
then the user A can remove the users B and C.
1. Enter the code and confirm with the key.
2. Press in turn the 2 and 3 keys. The list of users will be displayed.
3. Using the  and  keys, find in the list the user who is to be removed.
4. Press the key. A message will inform you that the user has been removed.
5. Press the key to return to the list of users.

5.8.5 Adding proximity card / DALLAS iButton


1. When adding or editing a user, run the NEW PROX. CARD / NEW DALLAS function.
2. Using the  and  keys, select how the card / iButton is to be added. The number of
card / iButton can be read by a selected reader (device equipped with a reader) or
entered manually.
3. Press the key.
4. If the number of card / iButton is to be read, read in the card / iButton twice, following the
instructions appearing on the keypad display. When the read number of card / iButton is
displayed, press the key.
5. If the number of card / iButton is to be entered, enter it from the keypad, and then press
the key.
7. You will be brought back to the list of functions for defining the user parameters. Instead
of the NEW PROX. CARD / NEW DALLAS function, the REMOVE PROX. CARD / REMOVE
DALLAS function will be available. Press the key.
6. When a prompt appears, asking you if the changes are to be saved, press the 1 key.
Proximity cards / DALLAS iButtons are added to the master users (administrators) in
the same way.

5.8.6 Adding keyfob


1. When adding or editing a user, run the NEW RX KEYFOB / NEW ABAX KEYFOB function
(depending on which keyfob is to be added).
2. Using the  and  keys, select how the keyfob is to be added. The number of keyfob
can be read during transmission by a device supporting keyfobs or entered manually.
3. Press the key.
30 User Manual SATEL

4. If the keyfob number is to be read, press twice the keyfob button according to the
instructions displayed on the keypad. When the keyfob number is displayed, press the
key.
5. If the keyfob number is to be entered, enter it from the keypad, and then press the key.
6. You will be brought back to the list of functions for defining the user parameters. Instead
of the NEW RX KEY FOB / NEW ABAX KEYFOB function, the REM. RX KEY FOB / REM.ABAX
KEYFOB function will be available. Additionally, some functions appear to allow you to
configure the keyfob.
Prior to assigning the zones to buttons / combinations of buttons, consult the installer.

Numeration of the keyfob buttons and LEDs is described in section “Operating the
alarm system by means of keyfob” (p. 46).
7. Using the  key, find the BUTTON 1 function in the list, and then press the key.
8. Using the  and  keys, select which zone is to be violated on pressing the 1 button in
the keyfob (you can also enter the zone number from the keypad), and then press the
key.
9. Repeat the steps 7 and 8 for other buttons / combinations of buttons which are to be
used.
10. Using the  key, find the EVENTS (RX) / EVENTS (ABAX) function in the list.
11. Press the key. The list of buttons / combinations of buttons will be displayed. In the
upper right-hand corner of the display, an additional symbol is located:
– pressing the button / combination of buttons is written to the event log (default
setting),
– pressing the button / combination of buttons is not written to the event log.
12. Define whether pressing the button / combination of buttons will be written to the event log
(see: “Selection from the multiple-choice list” p. 16), and then press the key.
13. For the APT-200 (ABAX 2 / ABAX) / APT-100 (ABAX) keyfobs, use the  key to find the
ABAX CONFIRMAT. function in the list, and then press the key.
14. A list will be displayed showing the outputs which have been assigned by the installer for
confirmation (maximum 8). Select up to 3 of them (see: “Selection from the multiple-
choice list” p. 16). Upon pressing any keyfob button, information on the status of selected
outputs will be presented on the keyfob LEDs for a few seconds. Thus you can get
confirmation that the function has been executed or information on the current status of
the system.
The installer can define the list of outputs by means of the keypad (ABAX CONFIRMAT.
function [SERVICE MODE STRUCTURE HARDWARE EXPANDERS ABAX CONFIRMAT.]
or a computer with the DLOADX program (“Keyfobs ABAX” window).
15. Press the key.
16. Press the key.
17. When a prompt appears, asking you if the changes are to be saved, press the 1 key.
Keyfobs are added to the master users (administrators) in the same way.

5.8.7 Removing keyfob


1. When adding or editing a user, run the REM. RX KEY FOB / REM.ABAX KEYFOB function
(depending on which keyfob is to be removed). The appropriate function is only displayed
when a keyfob has already been assigned to the user.
SATEL INTEGRA 31

2. When the keyfob number and a prompt whether the keyfob is to be removed are
displayed, press the 1 key. You will be brought back to the list of functions for defining the
user parameters.
3. Press the key.
4. When a prompt appears, asking you if the changes are to be saved, press the 1 key.
Removal of a keyfob will not erase its settings (dependences between the buttons
and zones, confirmation rules, etc.). When added to the user, the new keyfob will have
the same settings as the deleted one.

The installer can remove all keyfobs, including their settings, by means of the functions
available in the service mode (STRUCTURE HARDWARE EXPANDERS REM.RX KEY
FOBS / REM.ABAX KEYFOB).

The administrators' keyfobs are removed in the same way.

5.9 Master users (administrators)


The master users (administrators) can be added, edited and removed by the installer. There
can be 1 administrator in each object. The administrator has access to all partitions in the
object and also specifies how the system can be accessed by using the service code. Most of
the parameters which are defined for the ordinary user can be defined for the administrator
(see: “Users” p. 26).

5.10 Zone bypassing


If a zone is not to trigger alarm, you can bypass it, when the partition to which the zone
belongs is disarmed. Zone bypassing is useful, for example, when you want to leave
a window open when the system is armed or when a detector connected to the zone is out of
order and sets off false alarms.
Zone bypassing reduces the level of protection. If a zone is bypassed while the system
is armed, an intruder can exploit this vulnerability.

If a zone is bypassed because of its malfunctioning, call in the installer (service


technician) immediately to repair the defect.

For security considerations, the installer may reduce the number of zones that the user
will be allowed to bypass.

5.10.1 Zone inhibiting


The zones can be inhibited by the users having the ZONES BYPASSING right. The inhibited
zone will be bypassed until the partition to which the zone belongs is disarmed, or until the
zone is unbypassed by the user.
1. Enter the code and confirm with the key.
2. Press in turn the 4 and 1 keys. The list of zones will be displayed. There is an additional
symbol in the upper right-hand corner of the display to inform you about the given zone
status:
– the zone is not bypassed,
– the zone is inhibited,
– the zone is isolated.
32 User Manual SATEL

3. Using the  and  keys, find in the list the zone which is to be inhibited (or press 0 key
and enter the zone number).
4. Press one of the digit keys 1 to 9 until the symbol appears in the upper right-hand
corner of the display.
5. Repeat the steps 3 and 4 for the next zones which are to be inhibited.
6. Press the key. A message will inform you that the zones are inhibited.
Having started the INHIBIT function (step 2), you can press the  or  key to switch
over the keypad to the graphic programming mode (see: “Selection from the multiple-
choice list” p. 16).

5.10.2 Zone isolating


The zones can be isolated by the users having the ZONES BYPASSING and ZONE ISOLATION
rights. The isolated zone will remain bypassed until unbypassed by the user.
1. Enter the code and confirm with the key.
2. Press in turn the 4 and 2 keys. The list of zones will be displayed. There is an additional
symbol in the upper right-hand corner of the display to inform you about the given zone
status:
– the zone is not bypassed,
– the zone is inhibited,
– the zone is isolated.
3. Using the  and  keys, find in the list the zone which is to be isolated (or press 0 key
and enter the zone number).
4. Press one of the digit keys 1 to 9 until the symbol appears in the upper right-hand
corner of the display.
5. Repeat the steps 3 and 4 for the next zones which are to be isolated.
6. Press the key. A message will inform you that the zones are isolated.
Having started the ISOLATE function (step 2), you can press the  or  key to switch
over the keypad to the graphic programming mode (see: “Selection from the multiple-
choice list” p. 16).

5.10.3 Unbypassing
The zones can be unbypassed by the users having the ZONES BYPASSING right. Proceed in
the same way as when inhibiting or isolating the zones (steps 1-3), but the symbol must be
shown in the upper right-hand corner of the display, if the zone is to be unbypassed upon
pressing the key.

5.11 Viewing the event log

The events viewing function, when started by the administrator or the ordinary user,
provides no information about:
− panic alarms,
− alarms triggered using the DURESS type code.

5.11.1 Viewing all events


1. Enter the code and confirm with the key.
SATEL INTEGRA 33

2. Press in turn the 5 and 2 keys. The last event which occurred in the system will be
displayed.
3. Using the  key, scroll through the list of previous events.

5.11.2 Viewing the events required for Grade 2


If the GRADE 2 option is enabled in the system, the function allowing the installer and
administrators to view events required by EN 50131 for Grade 2 is available.
1. Enter the code and confirm with the key.
2. Press the 5 key. Functions available in the EVENTS submenu will be displayed.
3. Using the  key, scroll the menu until the GRADE2 function is found.
4. Press the key. The last Grade 2 required event which occurred in the system will be
displayed.
5. Using the  key, scroll through the list of previous events.

5.11.3 Viewing the selected events


1. Enter the code and confirm with the key.
2. Press in turn the 5 and 1 keys.
3. When the SELECT EVENTS function is displayed, press the key. The list of event types
will be displayed.
4. Select which event types are to be displayed (see: “Selection from the multiple-choice list”
p. 16).
5. Press the key. This will bring you back to the SELECTED submenu.
6. Using the  key, scroll down the menu until you find the VIEW function.
7. Press the key. The last one of the selected events which occurred in the system will be
displayed.
8. Using the  key, scroll through the list of previous events.
In addition to defining the event types to be displayed, the SELECT PART. function can
also be used to indicate the partitions to which the events are to refer.

If the GRADE 2 option is enabled in the system, the installer or administrator can use
the VIEW GRADE2 function instead of the VIEW function. In such a case, the events
selected among those required by the EN 50131 standard for Grade 2 will be
displayed.

5.11.4 Way of presenting events


The following information is shown in the display upper line:
– date and time of event occurrence,
– additional information on the events in shortened form, e.g. number of partition, zone,
user, timer, expander, keypad, etc.
Event description is displayed in the lower line.
If no key is pressed for a few seconds, additional information on the event will be displayed,
e.g. name of partition, zone, user, timer, expander, keypad, etc. After a few seconds, the
event description will be displayed again, and so on.
Pressing the  key enables the manual toggling between description of the event and
additional information on the event.
Pressing the  key when the event description is displayed will allow you to see further
additional information on the event, shown in a shortened form.
34 User Manual SATEL

Using the  or  key will block the automatic toggling between description of the event and
additional information on the event.
After the list of events has been scrolled through with the use of the  or  key, the
automatic toggling between description of the event and additional information on the event
will be restored.

5.12 Replacing batteries in wireless keypad


If the battery in the INT-KWRL2 / INT-KWRL wireless keypad is low, it should be replaced.
You must run the REPLACE BATTERY function before you open the keypad enclosure.
1. Enter the code and confirm with the key.
2. Using the  key, scroll through the menu until you find the CHANGE OPTIONS submenu.
3. Press the key.
4. Using the  key, scroll through the menu until you find the REPLACE BATTERY function.
5. Press the key.
6. Using the  key, find the name of wireless keypad in which you want to replace the
battery.
7. Press the key. The status of tamper switch in the keypad will not be checked for 3
minutes, which allows you to replace the battery.

5.13 Programming the partition timer


The partition timer automatically arms / disarms the partition.
1. Enter the code and confirm with the key.
2. Using the  key, scroll through the menu until you find the CHANGE OPTIONS submenu.
3. Press the key.
4. Using the  key, scroll through the menu until you find the PART. TIMERS function.
5. Press the key. The list of partitions will be displayed.
6. Using the  and  keys, find in the list the partition for which the timer is to be
programmed.
7. Press the key.
8. When the ACTIVE option is displayed, make sure it is enabled (the symbol is displayed
next to the option). If it is not enabled (the symbol is displayed next to the option), press
any digit key.
9. Using the  key, scroll through the menu until you find the TYPE function.
10. Press the key.
11. Using the  and  keys, select the timer type:
everyday – if the partition is to be armed / disarmed at the same time every day,
weekly – if the partition is to be armed / disarmed at different times on different days of
the week.
12. Press the key.
13. If you have selected the daily variant, the function will allow you at once to program the
arming time, and upon pressing the  or  key – the disarming time. Upon confirmation
with the key, you will be brought back to the list of options and functions.
14. If you have selected the weekly variant, you will be brought back to the list of options and
functions, where functions will appear to enable programming of the arming / disarming
time for each day of the week (in the same way as for daily timer).
Programming the value 99:99 means that the partition will not be armed / disarmed.
SATEL INTEGRA 35

15. After the arming time has been programmed, an additional function will be displayed,
which allows you to define which arming mode will be activated by the given timer. By
default, the timer activates the full arming mode. If another arming mode is to be
activated, run this function (for the daily timer or individually for each day of the week)
and, using the  and  keys, select another arming mode. Confirm, using the key.
16. Having programmed all parameters, press the key.
17. When a prompt appears, asking you if the changes are to be saved, press the 1 key.

5.14 Zone testing


Within periodic inspections of the security alarm system, the detectors must be checked for
proper functioning. The zone testing function will allow you to do it without triggering the
reaction normally expected on violation, which is of particular importance in case of
permanently armed zones.
1. Enter the code and confirm with the key.
2. Using the  key, scroll through the menu until you find the TESTS submenu.
3. Press the key.
4. Using the  key, scroll through the menu until you find the ZONES TEST submenu.
5. Press the key.
6. When the NEW function is displayed, press the key.
7. Select whether burglary zones or fire and technical zones, or single zone, will be tested,
and then press the key.
8. Select the partitions in which zones will be tested (see: “Selection from the multiple-choice
list” p. 16).
9. Specify the test duration (maximum 50 minutes) and press the key.
10. Define, whether violation of a zone is to trigger CHIME in the keypad (if yes, press any
numeric key – the symbol will be displayed).
11. Press the key. The zone test will start.
Beginning of the zone test in any partition will start the test mode in all ABAX 2 / ABAX
system wireless devices which are used together with the control panel (the wireless
detectors will signal violations by means of LEDs).

If any detectors with remote LED ON/OFF function are connected to the control panel,
you can switch on the LEDs in them for the test duration (the installer can configure
the control panel so that this will take place automatically at the beginning of the test).

You can terminate the zone test before expiration of the programmed time, using the
FINISH TEST function (TESTS ZONE TEST FINISH TEST). Up to 6 seconds can elapse
between starting the function to the actual end of the test (during this the FINISH TEST
function will be still available).
12. Depending on the type of tested detector:
− magnetic contact – open and close the door or window protected by means of the
magnetic contact,
− motion detectors – pass in front of the detector,
− other detectors – follow the manufacturer's directions for the detector testing.
36 User Manual SATEL

13. Look through the test results. To do so, enter again the ZONES TEST submenu (see: steps
1-5) and start the VIEW RESULTS function. You can scroll through the list of results, using
the  and  keys. Press the  or  key to switch over the display to the graphic mode,
in which information is provided by means of symbols:
- zone was not violated,
- zone was violated.
Pressing the  or  key in the graphic mode will display information on another set of
zones (see also description of the LEDs, p. 7).
The test results can be deleted by means of the CLEAR RESULTS function (TESTS
ZONES TEST CLEAR RESULTS).

5.15 Outputs control

If permitted by the installer, the control function can be started without user
authorization, upon pressing in turn the 8 and keys.
1. Enter the code and confirm with the key.
2. Press the 8 key. Depending on how the control panel has been configured by the installer:
− a group of outputs will be displayed – using the  and  keys, find the group which
includes an output, and then press the key to display the list of outputs,
− the list of controllable outputs will be displayed at once.
3. Using the  and  keys, find in the list the output whose status you want to change to
control the device connected to the output. The output status is presented by means of
symbols:
- output inactive (disabled),
- output active (enabled).
The output status can be presented according to the zone status. The displayed
symbols should then be interpreted as follows:
- zone not violated (the device controlled by output is inactive),
- zone violated (the device controlled by output is active).

The way of presenting the status of roller shutter outputs differs from how the status of
other outputs is presented (see: “Controlling the roller shutter outputs”).

5.15.1 Controlling the MONO SWITCH type of output


When the output is inactive:
– pressing the  key will activate the output for the time programmed by the installer,
– pressing the key will allow you to program the time for which the output will be
activated upon the next pressing of the key.
When the output is active, pressing any digit key will turn the output off.

5.15.2 Controlling the BI SWITCH type of output


Pressing the or  key will change over the output status. Additionally, when the output is
active, pressing any digit key will turn the output off.
SATEL INTEGRA 37

5.15.3 Controlling the REMOTE SWITCH type of outputs


Depending on how the output has been programmed, pressing the or  key will activate
the output for the time programmed by the installer or change over the output status.
Additionally, when the output is active, pressing any digit key will turn the output off.

5.15.4 Controlling the roller shutter outputs


The SHUTTER UP and SHUTTER DOWN type of outputs are always programmed as consecutive
and in pairs. Displayed on the list of outputs is only the name of output programmed as
SHUTTER UP. The status of outputs is presented by means of symbols:
- outputs inactive (off),
- SHUTTER UP output active (on),
- SHUTTER DOWN output active (on).
Pressing the or  key will display the cursor in the form of a horizontal line under the
output status symbol. Pressing the  key will turn on the SHUTTER UP type output (if both
outputs are inactive) or turn off the SHUTTER DOWN type output (if it is active). Pressing the 
key will turn on the SHUTTER DOWN type output (if both outputs are inactive) or turn off the
SHUTTER UP type output (if it is active). Irrespective of which output is currently active,
pressing any digit key will turn the output off. When the control is finished, press the or 
key to return to the list of outputs which can be controlled (the cursor under the symbol will
disappear).

6. Using the partition keypad

Fig. 4. Partition keypads (INT-S and INT-SK keypads are shown without flaps).

The main task of the partition keypad is to arm/disarm one partition. Additionally, it offers
a number of other functions, including e.g. the access control (supervision of a single door).
SATEL offers the following partition keypads:
INT-S,
38 User Manual SATEL

INT-SK,
INT-SCR (multifunction keypad, offering the partition keypad functionality).
The keypads are available with keys backlight in various color versions. The color version is
indicated by an additional letter symbol included in the keypad designation (e.g. INT-S-GR –
green backlight; INT-S-BL – blue backlight).

6.1 Description of partition keypads

6.1.1 LED indicators


LED Color Function description
green ON – partition armed
red ON or flashing – alarm or alarm memory

yellow flashing – trouble or trouble memory


Table 4. Description of LEDs in partition keypads.
Information on the armed status can be extinguished after the time period defined by
the installer.

If the installer has enabled the GRADE 2 option:


− the LED will not inform about the alarms,
− flashing of the LED means that there is a trouble in the system, some zones are
bypassed, or that there was an alarm.

The and LEDs flashing alternately indicate that the system is waiting for the
second code during the two code arming / disarming.

All LEDs flashing in turn indicate that there is no communication with the control panel.

6.1.2 Keys
The keys enable authorization of the user by means of code and running of the functions
available from the partition keypad.
In the INT-SCR keypad, the button is additionally available. It controls the keypad OC
type output (the output is active, when the button is pressed).

6.1.3 Built-in proximity card reader


The INT-SCR keypad has a built-in reader which enables operation by means of proximity
cards (proximity tags or other 125 kHz passive transponders). The installer determines, if the
reader will be operated.
Presenting the card is interpreted in the same way as entering the code and confirming with
the key. Holding the card (for approx. 3 seconds) is interpreted in the same way as
entering the code and confirming with the key.

6.1.4 Sound signaling

Beeps generated when operating


The installer can disable the sound signaling or replace it with flashing of the keys
backlight.
SATEL INTEGRA 39

1 short beep – pressing any digit key, confirmation that code has been entered or card has
been read.
2 short beeps – acceptance of the first code during two code arming / disarming.
3 short beeps – signaling of:
– starting the procedure of arming (there is exit delay in the partition) or arming (there is
no exit delay in the partition),
– disarming and/or alarm clearing.
4 short and 1 long beeps – confirmation that the function has been executed.
3 pairs of short beeps – the user should change his/her code.
1 long beep – refusal to arm (there are violated zones in the partition or there is a trouble).
2 long beeps – unknown code/card.
3 long beeps – unavailable function.
Events signaled by sounds
Only installer selected events are signaled.

Alarms are signaled for the time programmed by the installer.


5 short beeps – zone violation (CHIME).
Long beep every 3 seconds, followed by a series of short beeps for 10 seconds
and 1 long beep – countdown of exit delay (if the time is shorter than 10 seconds, only
the final sequence of short beeps will be generated).
A sequence of 7 beeps of diminishing duration, repeated every few seconds –
countdown of auto-arming delay.
2 short beeps every second – countdown of entry delay.
Continuous beep – alarm.
Long beeps every 2 seconds – alarm memory.
Long beep every second – fire alarm.
Short beeps every 2 seconds – fire alarm memory.
Very short beeps – door open too long.

6.2 Functions available from the partition keypad

6.2.1 [Code]
Depending on the user type and authority level, keypad settings and the alarm system status,
entering the code and confirming with the key will execute one or a few of the following
functions:
• unlocking the door (activating the relay),
• disarming the partition,
• clearing alarm,
• changing over the status of 25. BI SWITCH type outputs,
• turning on the 24. MONO SWITCH type outputs,
• guard round confirmation,
• enabling temporary partition blocking.
Most of the abovementioned functions are available after enabling the LOCK [LOCK
FEATURE] option for the partition keypad. Whether the functions are available may also
40 User Manual SATEL

depend on the other keypad options (e.g. if the lock operates in the ON IF PARTITION
ARMED [ON IF PART.ARMED] mode, most of the functions will be unavailable).

6.2.2 [Code]
Depending on the user type and authority level, keypad settings and the alarm system status,
entering the code and confirming with the key will execute one or a few of the following
functions:
• starting the partition arming procedure / arming,
• disarming the partition,
• clearing alarm,
• changing over the status of 25. BI SWITCH type outputs,
• turning on the 24. MONO SWITCH type outputs,
• guard round confirmation,
• enabling temporary partition blocking,
• unblocking cash machine access.

6.2.3 Quick arming


The installer can permit arming without the user authorization.
1. Select the arming mode (press one of the keys: 0 – full arming; 1 – full arming +
bypasses; 2 – arming without interior; 3 – arming without interior and without entry delay).
2. Press the key. The arming procedure will begin.

6.2.4 Triggering the alarm from keypad


The installer can permit triggering alarms from the keypad. To trigger an alarm, do the
following:
fire alarm – press the (INT-S) / (INT-SK) / (INT-SCR) key for approx. 3
seconds,
medical (auxiliary) alarm – press the 0 key for approx. 3 seconds,
panic alarm – press the (INT-S) / (INT-SK) / (INT-SCR) key for approx. 3
seconds. The installer defines whether the triggered alarm will be loud (setting off the loud
alarm signaling) or silent (without loud signaling).

6.2.5 Silencing the alarm sound at the keypad


If the keypad is signaling alarm, pressing any digit key will silence the signaling for approx. 40
seconds.

6.2.6 Code changing


The installer can permit the change of own code by means of the partition keypad.
1. Press the 1 key for 3 seconds.
2. When the and LEDs start flashing alternately, enter the old code and confirm it
with the key.
3. When the and LEDs start flashing alternately, enter the new code and confirm it
with the key.
SATEL INTEGRA 41

7. Using the entry keypad


The INT-SCR multifunction keypad can work in the entry keypad mode (INT-ENT). The main
task of the zone keypad is activation of the delay for the 3. INTERIOR DELAYED type zones. The
time period during which these zones will act as delayed ones is programmable for the
keypad. If more than one zone keypads are assigned to the partition, a different delay
unblocking time can be programmed for each of them. After expiry of the programmed time,
the interior delayed zones will again operate as instant ones.

7.1 LED indicators


Only the LED is used. Flashing of the LED indicates that the delay activation time
countdown is running (disarming has no effect on the LED flashing).

7.2 Sound signaling

The installer can disable the sound signaling or replace it by flashing of keypad
backlight.
During operation, the keypad can generate the following sounds:
1 short beep – pressing any digit key, confirmation that code has been entered or card has
been read.
3 short beeps – confirmation of delay activation.
4 short and 1 long beeps – confirmation of the guard round or execution of the control for
24. MONO SWITCH or 25. BI SWITCH type outputs.
3 pairs of short beeps – the user should change his/her code.
2 long beeps – unknown code/card.
3 long beeps – activation the delay is impossible (the partition is disarmed or the delay has
already been started) or the function is unavailable.
Additionally, the keypad can audibly signal the DELAY ACTIVATION TIME.

7.3 Functions available from the entry keypad


Depending on the user type and authority level, keypad settings and alarm system status,
entering the code and confirming it with the or key (presenting the proximity card) will
result in:
• activating the delay in partition for 3. INTERIOR DELAYED type zones,
• changing over the status of 25. BI SWITCH type outputs,
• turning on the 24. MONO SWITCH type outputs,
• guard round confirmation.

8. Using the code lock


The basic task of the code lock is to execute the access control function (supervise a single
door).
SATEL offers the following code locks:
INT-SZ,
INT-SZK.
42 User Manual SATEL

The code locks are available with keys backlight in various color versions. The color version
is indicated by an additional letter symbol included in the code lock designation (e.g.
INT-SZ-GR – green backlight; INT-SZ-BL – blue backlight).

8.1 Description of code locks

Fig. 5. Code locks.

8.1.1 LED indicators


LED Color Function description
green ON – code lock is operated by the control panel
red ON – door unlocked
yellow flashing – door open
Table 5. Description of the code lock LEDs.
All LEDs flashing in turn indicate that there is no communication with the control panel.

8.1.2 Keys
The keys enable user authorization by means of a code and starting of the functions
available from the code lock.

8.1.3 Sound signaling

Beeps generated when operating


The installer can disable the sound signaling or replace it by flashing of the keypad
backlight.
1 short beep – pressing any digit key or confirmation that code has been entered.
SATEL INTEGRA 43

4 short and 1 long beeps – confirmation of door unlocking or execution of another function.
3 pairs of short beeps – the user should change his/her code.
2 long beeps – unknown code/card.
3 long beeps – unavailable function.
Events signaled by sounds
Only installer selected events are signaled.
5 short beeps – zone violation (CHIME).
Very short beeps – door open too long.

8.2 Functions available from code lock


Depending on the user type and authority level, as well as the code lock settings, entering
the code and confirming it with the or key will result in:
• unlocking the door (activating the relay),
• changing over the status of 25. BI SWITCH type outputs,
• turning on the 24. MONO SWITCH type outputs,
• guard round confirmation,
• enabling temporary partition blocking.
The installer can permit triggering alarms from the keypad. To trigger an alarm, do the
following:
fire alarm – press the (INT-SZ) / (INT-SZK) key for approx. 3 seconds,
medical (auxiliary) alarm – press the 0 key for approx. 3 seconds,
panic alarm – press the (INT-SZ) / (INT-SZK) key for approx. 3 seconds. The
installer defines whether the triggered alarm will be loud (setting off the loud alarm
signaling) or silent (without loud signaling).
The installer can permit changing own code by means of the code lock. Proceed in the same
way, as when changing the code by means of the partition keypad (see: p. 40).

9. Confirming voice messaging


The installer can configure the control panel so that confirmation of listening to the voice
message be required. If there is no confirmation, the control panel can connect many times
for playback of the message. Having listened to the message can be confirmed from the
keypad of DTMF dialing telephone. The installer defines whether any 4-digit sequence is
sufficient to confirm receipt of a voice message, or it must be a specific code. After entering
of the code, the control panel will give the following information by means of sound signals:
1 short beep repeated every 3 seconds – the message has been confirmed, wait for
playback of the next voice message,
4 short and 1 long beeps – the message has been confirmed, there are no more voice
messages,
2 long beeps – an invalid code has been entered (the message has not been confirmed).
If the control panel is sending messages about several events and confirmation of the
voice messages is required, each message should be confirmed. The first message
must be confirmed before the second message can be played back, and so on.
44 User Manual SATEL

The installer can configure the control panel so that acknowledgement of receiving the
message by the user will:
− clear messaging other users,
− allow to get access to the INT-VG module voice menu.

10. Call answering and telephone control

The information below does not apply to the control panels to which the INT-VG
module is connected.
The call answering and telephone control functions are available to the users who have the
telephone code. These functions require that the DTMF dialing phone be used. The call
answering function allows to get information on the partition status (armed, disarmed). Owing
to the telephone control function, it is possible to control the REMOTE SWITCH type outputs
using the telephone.

10.1 Answering phone calls


1. Establish connection with the control panel, using one of the following methods (consult
the installer to learn which method is supported by the control panel):
single call – call the telephone number of control panel. The control panel will answer the
call after the number of rings programmed by the installer.
double call – call the telephone number of control panel. Hang up after the number of
rings programmed by the installer. Call again within three minutes. The call will be
answered by the control panel immediately.
Establishing connection will be signaled by three short beeps.
2. Enter the telephone code on the telephone keypad. 4 short beeps and 1 long beep will
confirm that you have got access to the call answering function. If the entered code is
invalid, this will be signaled by the control panel by two long beeps.
If you make a mistake when entering the code, enter the 4 digits anyway, and when
the control panel signals that the code is wrong, enter the correct code.

After entering three wrong codes, the control panel will hang up.

In case of a single call, if:


− no code has been entered and the connection is terminated,
− an invalid code has been entered and the connection is terminated,
the control panel will answer no calls for the next few minutes. It enables e.g. a fax to
be connected after the control panel.
3. Within up to 15 seconds, enter the 2-digit partition number (e.g. 01, 07 or 15). The control
panel will inform you about the partition status by means of sound signals:
3 short beeps – partition disarmed,
4 short and 1 long beeps – partition armed.
If no key is pressed on the phone for 15 seconds, the control panel will hang up.
4. Upon pressing in turn the 0 and # keys on the telephone keypad, the control panel will
hang up.
SATEL INTEGRA 45

10.2 Telephone control


1. Get access to the phone call answering function (steps 1-2 in section “Answering phone
calls”).
2. Within up to 15 seconds, press in turn the 2 and # keys on the telephone keypad. 4 short
beeps and 1 long beep will confirm that you have got access to the telephone control
function.
3. Within up to 15 seconds, enter the 2-digit number of the remote switch (e.g. 01, 07 or 15).
The control panel will inform you about the switch status change by means of sounds:
3 short beeps – the switch has been turned off,
4 short and 1 long beeps – the switch has been turned on.
The operating mode of the REMOTE SWITCH type output depends on how the output has
been configured by the installer.
4. Upon pressing in turn the 0 and # keys on the telephone keypad, the control panel will
hang up. You can also press the 1 and # keys to return to the phone call answering
function.

10.3 Audio alarm verification

Remote audio alarm verification is possible when the INT-AV module is connected to
the control panel.
1. Get access to the phone call answering function (steps 1-2 in section “Answering phone
calls”).
2. Within up to 15 seconds, press in turn the 3 and # keys on the telephone keypad. 4 short
beeps and 1 long beep will confirm that you have got access to the function of audible
alarm verification. The DTMF commands you can use after starting the listen-in / talk
session are described in the INT-AV module manual.

11. SMS control


In the case of INTEGRA 128-WRL control panel or any control panel to which the INT-GSM /
INT-GSM LTE module is connected, you can control your alarm system by using SMS
messages. The SMS message must be sent to the control panel / module (to the number of
the SIM card installed). The control command must be included in the SMS body. Agree with
the installer:
• content of the control commands.
• functions that are to be run by these commands. The following functions are available:
– zone violation,
– inhibiting the zone,
– unbypassing the zone,
– arming,
– disarming,
– alarm clearing,
– activating the output,
– deactivating the output,
– toggling the output,
– checking partition status,
46 User Manual SATEL

– sending USSD code to the operator of SIM card (e.g. to check the card balance or to
top it up). The reply received from the operator will be sent as an SMS message to the
phone number from which the control command was sent.
• other SMS control requirements (e.g. phone numbers from which it will be possible to send
control commands).
You can insert several control commands in one SMS message.
When sending the USSD codes, the SMS message must have the following form:
xxxx=yyyy=
where “xxxx” is the control command and “yyyy” is the USSD code supported by the cellular
network operator.
In the case of INT-GSM / INT-GSM LTE module you can use a command controlling the
sending of USSD codes to send an SMS message. The SMS message must have the
following form:
xxxx=tttt:cccc=
where “xxxx” is the control command, “tttt” is the phone number to which the SMS message
is to be send, and “cccc” is the content of SMS message to be sent.

12. Operating the alarm system by means of keyfob

Fig. 6. APT-200 [light gray enclosure] / APT-100 [dark gray enclosure] keyfob. A - numeration
of LEDs. B – numeration of keyfob buttons.

You can control the alarm system by using a keyfob in case of:
• INTEGRA 128-WRL control panel (ABAX).
• any control panel to which connected is:
– ABAX 2 (ACU-220 / ACU-280) / ABAX (ACU-120 / ACU-270 / ACU-100 (firmware
version 2.00 or newer) / ACU-250) controller,
– INT-RX-S / INT-RX module.
SATEL INTEGRA 47

The user can have 2 keyfobs:


• bidirectional keyfob: APT-200 (supported by the ABAX 2 and ABAX system) or APT-100
(supported by the ABAX system).
• 433 MHz keyfob (supported by the INT RX and INT-RX-S modules).
The keyfob can start up to 6 functions. Consult the person who has configured the keyfob
settings and get information about:
• functions assigned to individual buttons / button combinations,
• information conveyed by the LEDs (APT-200 / APT-100 keyfobs only).
See also “Adding keyfob” p. 29.

Fig. 7. T-4 keyfob (433 MHz keyfob). A – numeration of keyfob buttons.

Fig. 8. MPT-300 [black enclosure] / MPT-350 [light gray enclosure] keyfob (433 MHz keyfob).
A – numeration of keyfob buttons. The button designated with digit 6 corresponds to the
combination of buttons 1 and 3 in other 433 MHz keyfobs.

13. Manual update history


Firmware
Date Introduced changes
version
2013-08 1.12 • Information on INT-TSG keypad has been added (p. 5).
• Note about the user having SIMPLE USER right has been added (p. 10).
• List of user functions has been supplemented (p. 11).
• Description of CHANGE TELEPHONE CODE user function has been added
(p. 18).
48 User Manual SATEL

• Description of SIMPLE USER right has been added (p. 27).


• Description of ADMINISTRATOR right has been added (p. 27).
• Information on maximum duration of zone testing has been modified (p. 35).
• Section “Audio alarm verification” has been added (p. 45).
2013-12 1.12 • Information on the INT-KLFR (p. 4, 5 and 9) and INT-TSI (p. 5) keypads has
been added.
• Description of IP/MAC ETHM-1 user function has been modified (p. 22).
2014-10 1.13 • Information on the ETHM-1 Plus module has been added.
• List of user functions has been supplemented (p. 11).
• Note on the possibility to disable user menu shortcuts by the installer has
been added (p. 15).
• Information on new functionality of the key 0 when editing the multiple-
selection list in text mode has been added (p. 16, 24, 32 and 32).
• Description of GPRS MONIT.TEST user function has been added (p. 21).
2015-10 1.14 • Notes have been added to the effect that the installer should provide
information on how to operate the alarm system (p. 3).
• Section on technical reliability of the alarm system has been modified (p. 3).
• Information on INT-TSH keypad has been added (p. 5).
• Information on single zone testing ability has been added (p. 14 and p. 35).
• Description of KEYPAD CHIME function has been modified (p. 19).
• Description of IP/MAC ETHM-1 function has been updated (p. 22).
• Information on automatic synchronization of control panel clock with time
server after control panel restart has been added (p. 22).
• Information on shortening the exit delay time from the keypad has been
supplemented (p. 25).
• Section on zone bypassing has been modified (p. 31).
2018-06 1.18 • List of user functions has been supplemented (p. 11).
• List of user functions that can be run using shortcuts has been supplemented
(p. 15).
• Description of DLOADX IP function has been updated (p. 20).
• Description of GUARDX IP function has been updated (p. 20).
• Name of IP/MAC ETHM-1 function has been changed to IP/MAC/IMEI/ID and
function description has been modified (p. 22).
• Description of functions available in DOWNLOADING submenu has been
modified (p. 22).
• Description of INT-GSM DLOADX function has been added (p. 23).
• Description of INT-GSM GUARDX function has been added (p. 23).
• Section “SMS control” has been modified (p. 45).
2018-10 1.18 • Information on REPLACE BATTERY function has been added (p. 13, 19 and 34).
2019-05 1.19 • Information about wireless keypads has been added.
• Information about ABAX 2 system devices has been added.
• Description of functions started by long press of a numeric key on the keypad
has been modified (p. 8).
• Description of TEMPERATURES function has been modified (p. 21).
• Section “Operating the alarm system by means of keyfob” has been modified
(p. 46).
2021-08 1.20 • Information on the INT-GSM LTE module has been added.
• Information on the INT-TSG2 and INT-TSH2 keypads has been added.
14. Brief description of operating the system from keypad

flashing – trouble or trouble memory / Grade 2: – 1. group (numbers: 1-32 / addresses 00-1F)
trouble or trouble memory, bypassed zones or – 2. group (numbers: 33-64 / addresses 20-3F)
alarm – 3. group (numbers: 65-96)
– 4. group (numbers: 97-128)
( – LED OFF; – LED ON

ON – all partitions operated by the keypad are


armed
flashing – some partitions are armed flashing – service mode started

ON or flashing – alarm or alarm memory

[CODE] – arming / disarming / alarm clearing

Quick arming:
0 - full arming
1 - full arming + bypasses
2 - arming without interior
3 - arming without interior and without entry
delay

9 – end of exit delay countdown

8 – quick control of outputs

[CODE] – enter the user menu


User menu shortcuts:
1 Change own code
2 Users [Masters]
21 New user [New master]
22 Edit user [Edit master]
23 Remove user [Remove master]
4 Zone bypasses
41 Inhibit
42 Isolate
5 Events
51 Selected events
52 All events
6 Set time
7 System state
8 Outputs control Shortcut keys (press for approx. 3 seconds):
9 Service mode 1 – check zone status
0 Downloading 4 – check partition status
01 Start DWNL-RS 5 – view alarms in event log
02 Finish DWNL-RS 6 – view troubles in event log
03 Start DWNL-MOD. 7 – view troubles
04 Start DWNL-TEL 8 – CHIME signal ON/OFF
05 Start DWNL-CSD [INTEGRA 128-WRL] 9 – toggle display between standby mode and partition
06 Start DWNL-GPRS [INTEGRA 128-WRL] status mode
07 ETHM-1 DLOADX
– trigger medical (aux) alarm
08 ETHM-1 GUARDX
– trigger fire alarm
09 INT-GSM DLOADX
00 INT-GSM GUARDX – trigger panic alarm

You might also like