Manual Del Sistema de Seguridad 0
Manual Del Sistema de Seguridad 0
Table of Contents
SecurOS NVR User Guide .................................................................... 2
AXIS A4120-E Reader with Keypad ................................................ 180
AXIS A82 Network Video Door Station Series ................................ 187
AXIS A1001 & AXIS Entry Manager .............................................. 215
CONTROL PANEL Integra Manual................................................ 287
1/1
METKA EGN Headquarters
99 White Lion Street, Islington, London, N1 9PF, United Kingdom
T: +44 20 80013341 E: [email protected]
www.metka-egn.com
Version 10
Printed in US.
Intelligent Security Systems reserves the right to make changes to both this Manual and to the products it describes. System
specifications are subject to change without notice. Nothing contained within this Manual is intended as any offer, warranty, promise
or contractual condition, and must not be taken as such.
No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system or translated into any human or
computer language in any form by any means without the express written permission of the copyright holder. Unauthorized copying
of this publication may not only infringe copyright but also reduce the ability of Intelligent Security Systems to provide accurate and
up-to-date information to both users and operators.
SecurOS 3 Quick User Guide
Contents
Contents
1 Preface 7
1.1 Scope
........................................................................... 7
1.2 Target
. . . Audience
........................................................................ 7
1.3 Using
. . .This
. . . .Manual
.................................................................... 7
1.4 Getting
. . . .Technical
. . . . . . . . .Support
.............................................................. 7
1.5 SecurOS
. . . . . Editions
. . . . . . . .Naming
. . . . . . .Convention
....................................................... 8
1.6 Design
. . . .Convention
....................................................................... 9
1.7 Design
. . . . .Elements
...................................................................... 10
3 User Interface 14
3.1 Changing
. . . . . . .User
. . . . .and
. . . Logging
. . . . . . . .Off
.................................................... 15
4 Control Panel 17
4.1 Control
. . . . .Panel
. . . . . Activation
................................................................. 17
4.2 Configuring
. . . . . . . . .Control
. . . . . . .Panel
........................................................... 18
4.3 Desktop
. . . . . .Administration
..................................................................... 20
4.4 Executing
. . . . . . . Macros
.................................................................... 20
4.5 Changing
. . . . . . .Operator
. . . . . . . . Workspace
............................................................ 20
4.6 Getting
. . . . .Help
...................................................................... 21
4.7 Hide
. . .Control
. . . . . . .Panel
................................................................. 22
www.issivs.com
SecurOS 4 Quick User Guide
Contents
5.8.3 Navigating
. . . . .Through
. . . . . . .Archive
......................................................................... 41
5.8.4 Playing. .Back
. . . . Records
............................................................................... 42
5.8.5 Fast Playback
. . . . . . . of
. . Last
....N . . Minutes
...................................................................... 43
5.8.6 Working. . .with
. . . .Group
. . . . . Archive
......................................................................... 44
5.8.7 Archive. .Export
................................................................................... 46
5.8.7.1 Record Saving. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
5.8.7.2 Group Archive .Export ......................................................................... 51
5.8.7.3 Digital Signature .......................................................................... 54
5.8.8 Searching
. . . .Alarms
. . . . . . and
. . . .Bookmarks,
. . . . . . . . . . .Smart
. . . . .Search
....................................................... 58
5.8.8.1 Searching Alarms . . . and
. . . .Bookmarks
................................................................... 59
5.8.8.2 Smart Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
5.8.9 Forensic
. . .Search
.................................................................................. 64
5.9 Working
. . . . . .with
. . . .Long-Term
. . . . . . . . . .Archive
....................................................... 67
5.10 Working
. . . . . . .with
. . . .Audio
................................................................ 68
5.10.1 Working
. . . .with
. . . .Live
. . . .Audio
......................................................................... 69
5.10.2 Start/Stop
. . . . .Audio
. . . . . Recording
........................................................................... 69
5.10.3 Working
. . . .with
. . . .Audio
. . . . .Records
........................................................................ 69
5.10.4 Working
. . . .with
. . . .a.Camera's
. . . . . . . . Speaker
.................................................................... 70
5.11 Controlling
. . . . . . . . . PTZ
. . . . Cameras
.............................................................. 71
5.11.1 Mouse. .Controls
................................................................................... 71
5.11.2 PTZ Control
. . . . . . .Panel
.............................................................................. 73
5.11.3 Joystick
. . . Control
.................................................................................. 74
5.11.4 Working
. . . .with
. . . .Presets
. . . . . . and
. . . .Tours
................................................................... 75
5.11.5 Shared
. . and
. . . .Exclusive
. . . . . . . . .PTZ
. . . .Control
.................................................................. 85
5.11.5.1 PTZ Control Request .......................................................................... 87
5.12 Working
. . . . . . .with
. . . .Other
. . . . . Camera
. . . . . . . .Devices
................................................... 88
5.12.1 Start/Stop
. . . . .Wiper
................................................................................ 89
5.12.2 Start/Stop
. . . . .Washing
................................................................................ 89
5.12.3 Turning
. . .Light
. . . . .On/Off
............................................................................. 90
5.13 Customizing
. . . . . . . . . . .Media
. . . . . Client
. . . . . .Appearance
..................................................... 91
5.13.1 Selecting
. . . . Layout
................................................................................. 91
5.13.2 Placing
. . .Cameras
. . . . . . . .on
. . Page
........................................................................ 91
5.13.3 Customizing
. . . . . . .Additional
. . . . . . . . .Panels
..................................................................... 93
5.14 Using
. . . . .Views
...................................................................... 94
5.14.1 Choosing
. . . . .View
. . . . in
. . Media
. . . . . .Client
.................................................................... 95
5.14.2 Temporarily
. . . . . . Changing
. . . . . . . . .View
...................................................................... 96
5.14.3 Setting
. . Up
. . . Views
. . . . . .Quick
. . . . . Access
. . . . . . .Panel
.............................................................. 97
5.14.4 Sequential
. . . . . Switching
. . . . . . . . . of
. . Views
..................................................................... 97
5.15 Object
. . . . . Controls
...................................................................... 98
5.15.1 Camera. . .Cell
. . . .Controls
.............................................................................. 98
5.15.2 Microphone
. . . . . . . .Cell
. . . Controls
.......................................................................... 102
5.16 Object
. . . . . . State
. . . . . Indicators
................................................................ 103
5.16.1 Camera
. . . .State
. . . . .Indicators
............................................................................ 103
5.16.2 Microphone
. . . . . . . .State
. . . . Indicators
......................................................................... 104
www.issivs.com
SecurOS 5 Quick User Guide
Contents
6.6 Jump
. . . . .to. .Viewing
. . . . . . .Video
. . . . . .in. .the
. . .Media
. . . . . Client
............................................. 115
6.7 Start/Stop
. . . . . . . . Video
. . . . . .Recording,
. . . . . . . . . .Arm/Disarm
. . . . . . . . . . Cameras
......................................... 115
6.8 Controlling
. . . . . . . . . Sensor
. . . . . . .and
. . . .Relay
. . . . .Objects
.................................................. 116
www.issivs.com
SecurOS 6 Quick User Guide
Contents
www.issivs.com
SecurOS 7 Quick User Guide
Preface
1 Preface
This section contains general information about the document, the means of its design and use, as well
as how to get additional technical support for the product.
1.1 Scope
This document describes SecurOS's basic features of the user interface on an Operator Workstation, as
well as procedures to perform common security tasks. It contains illustrated examples of working with
the system.
It is assumed that the user has already deployed the security network physically and installed the
SecurOS software on all servers of this network.
This manual is recommended to be read after a simple configuration of SecurOS, to get acquainted with
the product's basic functionalities.
If you have any questions after reading this manual, please address them to your system administrator
or supervisor.
For any further information you can contact the Intelligent Security Systems Technical Support Team:
Note. To get a quick response to a request use the Technical Support Portal, which www address is listed
below.
in USA:
phone: +1 732 855 1111 (Monday to Friday, 8:30am - 6pm EST);
e-mail: [email protected]
www: https:/ / support.issivs.com
www.issivs.com
SecurOS 8 Quick User Guide
Preface
in Russia:
phone: +7 (495) 645 21 21 (Monday to Thursday, 9am - 6pm MST; Friday 9am - 5pm MST);
www: https:/ / help.iss.ru
Note. See the https:/ / help.iss.ru/ user/ manual for the Portal User Guide.
in Brazil:
phone: +55 11 2262 2894 (Monday to Friday, 9am - 6pm BRT);
e-mail: [email protected]
www: https:/ / support.issivs.com
in Mexico:
phone: +52 1 551330 0181 (Monday to Friday, 9am - 6pm CDT);
e-mail: [email protected]
www: https:/ / support.issivs.com
in Colombia/ Ecuador:
phone: +57 300 442 2808 (Monday to Friday, 9am - 6pm COT/ECT);
e-mail: [email protected]
www: https:/ / support.issivs.com
in Chile:
phone: +56 9 6573 2993 (Monday to Friday, 9am - 6pm CLT);
e-mail: [email protected]
www: https:/ / support.issivs.com
in Ukraine:
phone: +380 (44) 299 08 10 (Monday to Friday, 9am - 6pm EET);
e-mail: [email protected]
www: https:/ / support.issivs.com
in Peru/ Bolivia:
phone: +51 997 111 678 (Monday to Friday, 9am - 6pm PET/BOT);
e-mail: [email protected]
www: https:/ / support.issivs.com
in Argentina:
phone: +54 91152528779 (Monday to Friday, 9am - 6pm ART);
e-mail: [email protected]
www: https:/ / support.issivs.com
www.issivs.com
SecurOS 9 Quick User Guide
Preface
Edition Supported OS
SecurOS Premium
SecurOS Lite
For product designation regardless of its edition the SecurOS general term is used in the framework of
the given document.
Sections that describe the functionality available for some editions are marked by a special footnote as
in the example below:
For Windows OS the functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium, SecurOS Prof essional, SecurOS Xpress, SecurOS Lite.
Sections that describe the functionalities not available or partially available for Linux OS are marked
with the following footnote:
On Linux platform (available only for SecurOS Enterprise edition) the functionality is not supported / limited.
Font Description
bold italic type Used to mark out the elements of homogeneous lists.
Used to mark out macro text and programming code, file names and
monospace their paths. Also it is used to specify the necessary options, to mark
out values specified by the user from the keyboard (manually).
www.issivs.com
SecurOS 10 Quick User Guide
Preface
Additional Information
Used to display additional information. These type of elements contain, for example, the description of options for
executing a task or reference to additional literature.
www.issivs.com
SecurOS 11 Quick User Guide
Launching SecurOS and Logging on System
Additional Information
Server receives and processes video, allows to connect different security devices and intelligent program Modules.
This component starts automatically on each Video Server after software installation is finished. When Server is
started, SecurOS user cannot stop it with the help of available SecurOS administrative tools.
Client is installed, as a rule, on separate Computer which role is Operator Workstation, but can be also started on any
Video Server within SecurOS network. Using Client one can work with SecurOS objects — Cameras, Maps etc. with the
help of SecurOS interface objects (Media Client, Map Window etc.). Using Client one can also administrate the system,
if user has required rights.
To start Client one can use Start menu (Programs SecurOS SecurOS, see Figure 1).
Additional Information
Client can also be launched with the help of Server Control Agent utility (see SecurOS Administration Guide),
by means of SecurOS shortcuts in the Start menu, on the Windows Desktop or in the Windows taskbar.
www.issivs.com
SecurOS 12 Quick User Guide
Launching SecurOS and Logging on System
Start and logging on procedure differs a little depending on role of the Computer, where Client is
installed. Details are described in the following section below:
Local Start on Video Server.
Remote Start on Operator Workstation.
Warning! The ability to log in automatically must be configured by the system administrator.
Specified user — fill the User and the Password fields manually.
2. Click the Login button (see figure 2).
www.issivs.com
SecurOS 13 Quick User Guide
Launching SecurOS and Logging on System
To get the Video Server's IP address contact the system administrator. If Automatically value is selected
from the list, then Client will try to connect to that Video Server, the last connection with which was
successful.
Additional Information
1. To get a User/Password of the personal account, contact the system administrator.
2. The option to log in automatically can be configured by the system administrator.
Note. If login attempts with the wrong login information are performed, the Authorization Error window
will be displayed. If the incorrect data is entered 3 times in a row, the system will enter a 30-second waiting
mode, then the next login attempt will be given.
www.issivs.com
SecurOS 14 Quick User Guide
User Interface
3 User Interface
After logging on system, the SecurOS Desktop is displayed on the operator's monitor. Like OS Desktop,
on this SecurOS Desktop several applications to work with SecurOS are located. With their help the
operator has the ability to work with video received from the camera, to control PTZ cameras, to work
with the video recordings, etc.
The system can have several independent Desktops, on which various applications are located.
Applications that belong only one Desktop can be used simultaneously. Number of Desktops and
applications, located on these desktops, are determined by the system administrator.
Example. For example, the administrator has set two operator Desktops. The first Desktop includes only one
application — Media Client (see Figure 4), the second Desktop consists of the Media Client and Map Window
applications (see Figure 5).
Figure 4. Desktop 1
www.issivs.com
SecurOS 15 Quick User Guide
User Interface
Figure 5. Desktop 2
Control Panel — application to manage Desktops, change SecurOS user and perform some other
operations.
Media Client — main application to work with video and audio. It allows you to monitor what is
happening in the protected area in real time, to make a records and work with these saved records.
Map Window — application, that represents a user interface to display the graphic plan of the
protected area with security devices placed on it. Any of these security devices can be controlled
with the help of the Map Window in the same way, as with the help of the Media Client.
Event Viewer — application, that allows to monitor the occurrence of special events within the
system. Usually, such event require quick actions of the operator.
Each of the applications is described in detail in the corresponding section, which can be accessed by
reference.
Note. Logging off from one user is done to give control to another user. When the new user logs in, Client
starts with the settings defined by the new user's User Rights Policy. Change user or shutdown does not stop
the Server.
www.issivs.com
SecurOS 16 Quick User Guide
User Interface
Additional Information
Log off and system shutdown operations can also be done by the commands of the SecurOS icon in the notification
field of the Windows task bar (system tray). One can log off system in Authorization window by clicking on
Shutdown button (see Launching SecurOS and Logging on System).
Warning! In all these cases the command/button Shutdown may be unavailable for the User depending on
the user rights, configured by the system administrator.
www.issivs.com
SecurOS 17 Quick User Guide
Control Panel
4 Control Panel
The Control Panel is designed to do the following:
Desktop Administration;
Executing Macro;
Changing Operator Workspace;
Getting Help;
Hide Control Panel;
Choosing Signature Certificate;
Changing User and Logging Off.
Only active Desktops and Macros are displayed on the Control Panel. The number of displayed Desktops
and Macros is defined by the system settings and changes dynamically. If the max value is exceeded, all
additional objects are hidden and can be activated from the appropriate menu:
When working with system, the panel can be completely or partially hidden (see Figure 8) depending
on its settings (see Setting Up Control Panel).
www.issivs.com
SecurOS 18 Quick User Guide
Control Panel
If Control Panel is not displayed on the desktop, press the Ctrl key, then move mouse pointer so it
touches the top of the screen. If panel is displayed partially, click on the button.
Additional Information
The Control Panel can also be activated by clicking on the application icon in the Windows taskbar (system tray), or
by means of the Show the Control Panel command from the application icon context menu.
2. Click on the (Change user/ Shutdown system) button and select the Configure Control
Panel command from the drop-down list (see Figure 9).
3. In the Control Panel settings window (see Figure 10) do the following:
www.issivs.com
SecurOS 19 Quick User Guide
Control Panel
Note. To get a quick access to the Control Panel in any modes, press and hold the CTRL key on your keyboard
while moving the mouse pointer to the top edge of the screen.
4. To save new settings and apply them within the system click on the OK button.
www.issivs.com
SecurOS 20 Quick User Guide
Control Panel
For switching between Desktops (or for Desktop activation if all Desktops are hidden) click on the
corresponding Desktop button, or select the Desktop from the menu (see Control Panel).
To hide current Desktop click on the (Hide Desktop) button on the Control Panel
Note. List of Operator Workspaces available to specific user is defined by system administrator.
Each Operator Workspace is intended to solve specific set of tasks. To swith between Operator Workspaces
click on the button on the Control Panel, then select Change Operator Workspace and
workspace, that must be loaded (see Figure 12). The current Operator Workspace is checked.
www.issivs.com
SecurOS 21 Quick User Guide
Control Panel
The new workspace will be applied immediately after the changing. Operator Workspace selected by the
operator in the last time will be automatically loaded when restarting operator interface.
Note. Local environment may be available in the Operator Workspaces list. It is created specifically for the
current computer and is not available on other Operator Workstations.
To get help click on the (Change user/Shutdown system) button on the Control Panel, select
Help (F1), then select a Manual to open (see Figure 13).
To quickly get help on working with some applications, for example, Media Client, make the window of
the desired application active, then press the F1 key.
www.issivs.com
SecurOS 22 Quick User Guide
Control Panel
In Automatic hide mode, the panel hides itself if the mouse pointer is no longer on top of the panel.
In the Manual hide mode, click on the (Minimize the Control Panel) button to hide panel.
Note. The Control Panel can also be minimized by clicking it's icon in the Windows Taskbar notification area
(system tray), on the Windows Taskbar or with the help of application icon context menu in the system tray.
www.issivs.com
SecurOS 23 Quick User Guide
Media Client - Application to Work with Video and Audio
Video from separate cameras is displayed in cells of which the central area (called Working area) of the
Media Client consists. The image from each camera is displayed in a separate cell that contains control
elements intended for performance of typical operations with a Camera. Along the edges of the Working
area, there are toolbars serving for performance of other operations.
Layout Bar — is used to select layout for the Working area (see Selecting Layout section);
Views Quick Access Panel — is intended for fast switching between Views (see Setting Up Views
Quick Access Panel);
Camera Control Bar — is used to control the Media Client's camera pages (see Selecting Layout
section);
Devices Panel — contains all Cameras and independent Microphones, selected to work with the given
Media Client. Is used to search and display current states of the cameras and microphones
(see Searching and Activating Object and Object State Indicators sections);
Views Panel — contains Views List, selected to work with the given Media Client. Also is used to
www.issivs.com
SecurOS 24 Quick User Guide
Media Client - Application to Work with Video and Audio
Warning! Controls are available on the Operator Workstation if this is specified in the Media Client settings by
the system administrator.
www.issivs.com
SecurOS 25 Quick User Guide
Media Client - Application to Work with Video and Audio
Note. Under certain system settings use double-click to activate a Camera or Microphone from the Media Client
Devices Panel.
Calling context menu — to open the context menu right click on an object. The context menu
duplicates object control commands and can contain additional commands that can not be executed
with the help of the standard object controls.
Drag-and-drop method — to drag-and-drop an object, left click and drag the object to the
required position. Using this method one can place cameras in the Working area, sort Lists, add objects
to the Archive Panel etc.
To search a Camera / Microphone by its name in the Devices Panel, type in the Search text box
(see Figure 15) any character (or character set) that is part of an object name.
Note. Cameras and Microphones, that are located on the displayed video page of the Working area/Microphone
Panel page, are marked in the Devices Panel with the icon. If a Camera is configured with a linked/connected
Microphone, it is marked with the icon.
To search for an object in the Devices Panel in manual mode use the scroll bar to the left of the list.
To activate a found object click on it. Depending on the system settings (see Basic Techniques and
Operations with Objects), use a single or double click. The system will display the activated object on
the appropriate page of the Working area or Microphone Panel.
All independent Microphones of SecurOS that are configured to work with the given Media Client are
also displayed on the Microphone Panel (see Figure 16).
www.issivs.com
SecurOS 26 Quick User Guide
Media Client - Application to Work with Video and Audio
To search for a microphone in manual mode use the and page scroll buttons.
2. To start/stop recording click the Start/ Stop Record button. When switching to the corresponding
www.issivs.com
SecurOS 27 Quick User Guide
Media Client - Application to Work with Video and Audio
mode, the recording indicators state mode and the Start/ Stop Record button change:
/ (Recording indicator) — the recording is turned on/off (see Figure 17).
/ (Start/ Stop Record button) — the recording is turned on/off (see Figure 17).
Note. Start/Stop record also can be done from the camera cell context menu that is called by right-clicking a
cell.
Depending on the system settings, there may be cases when recording is permanent or impossible. In
these cases the Start/ Stop Record button looks as follow:
www.issivs.com
SecurOS 28 Quick User Guide
Media Client - Application to Work with Video and Audio
2. To arm/disarm a camera click the Arm/ Disarm button. When switching to the corresponding mode
the arming indicator's state mode changes:
/ / (arm indicator in the staus bar) — camera is armed (recording is in progress)/camera is
armed (no recording is in progress)/disarmed (see Figure 19).
Note. Also one can Arm/Disarm the camera with the help of camera cell context menu that is opened by
right-clicking.
To maximize a Camera cell so that it would take up the entire Working area of the Media Client, double
click any area within the cell. To minimize cell double click it again.
Warning! Option if available, if Hardware acceleration checkbox is selected in the Media Client object settings
(see SecurOS Administration Guide).
Operator can change the following parameters of the image in the camera cell:
Brightness;
www.issivs.com
SecurOS 29 Quick User Guide
Media Client - Application to Work with Video and Audio
Contrast;
Hue;
Saturation.
For each camera one can set its own image settings. These settings will be applied to given camera on
any Media Client of this Computer.
Warning!
1. Image settings are saved only for Windows user.
2. When exporting video fragment, exporting and printing frame specified image settings are not taken
into account.
2. The system will display the Color adjustment window (see Figure 21).
Specify required values using sliders or specify them manually in corresponding fields.
www.issivs.com
SecurOS 30 Quick User Guide
Media Client - Application to Work with Video and Audio
It is possible to digitally zoom any area of the camera cell up to 16 times, both in live and archive mode.
Warning! For a small Camera cell size the Zoom scale is not displayed in the cell. To display the zoom scale,
increase the camera cell size (for example, select a different layout or expand the camera cell size to full
screen).
To zoom in/out with the help of the Zoom scale use one of the following methods:
Move scale slider in appropriate direction;
When changing zoom in the Camera cell the blue indicator of zoomed frame will be displayed instead
of Zoom button (see Figure 22).
4. To move the scaled image click, hold and move it around with the mouse.
To leave the digital zoom mode click the (Zoom) button again.
www.issivs.com
SecurOS 31 Quick User Guide
Media Client - Application to Work with Video and Audio
Notes:
1. In the digital zoom mode, depending on the settings specified by the system administrator, the
camera can be switched to a higher resolution stream. If such a camera is activated and scaled, then
the digital zoom mode for all other scaled cameras of the Media Client will be automatically switched
off and the image in their cells will come from the default stream. If streams are not switched, then
the images of several cameras can be scaled.
2. The current zoom value is saved when you change the Camera mode (Live/Archive).
3. When turning the digital zoom mode off, the current scale of the image is kept in the camera cell.
Warning!
1. The zoom mode does not affect motion detection. Even though the moving object is not seen when
zoomed in, it will still be detected and handled.
2. The zoom mode does not affect archive recording. The native frame format of the video stream will
not be changed when recording.
When playing back a recorded video sequence, any frame can be saved/exported to a standard image
format. One can save/export a frame both in live and archive mode. Frame exporting is done for the
image displayed in the camera cell at the moment of the operation.
To save/export a frame click the Export frame button in the camera cell (see Figure 23).
The system will display a window with information about the saved frame (see Figure 24).
www.issivs.com
SecurOS 32 Quick User Guide
Media Client - Application to Work with Video and Audio
Note. The frame will be saved in JPG format into the directory specified by the system administrator in a file
named <camera_name> (DD-MM-YYYY_HH-MM-SS.XXX).jpg.
Saved frame can contain additional information, if such feature is specified by system administrator.
Additional information will be displayed in the footer of the frame in the following format:
If there are subtitles over the frame, it will be also placed on the saved image.
Any frame can be printed when playing back the video record. One can print a frame both in live and
archive mode.
The frame, that is displayed in the camera cell at the moment of command execution, will be printed.
To print a frame call Camera's cell context menu, select the Frame print command (see Figure 25).
System will display the standard printing settings window. Specify print settings (orientation, frame
position etc.), then click the Print button.
www.issivs.com
SecurOS 33 Quick User Guide
Media Client - Application to Work with Video and Audio
Panoramic cameras are designed to provide a 360° field of view, allowing for a wide area coverage of
the surveillance area. In the event of an alarm situation in any part of the field of view, the operator can
zoom the camera to the specific area of interest and get a view similar to the conventional video
surveillance camera. Thus, one panoramic camera can be used instead of many cameras with a
directional field of view.
An example of an image obtained by a panoramic camera in the General view mode is illustrated in
Figure 26.
Dewarped mode allows to get the dewarped image of the surveillance area. To switch the camera to the
dewarped mode click the button (Dewarped camera mode). The button will change to the
following: . In this mode one can control the camera position with one of the methods available
within SecurOS (see Controlling PTZ Cameras).
Note. For the panoramic camera the following controls are available on the PTZ Panel: Zoom, Speed and
navigation buttons.
www.issivs.com
SecurOS 34 Quick User Guide
Media Client - Application to Work with Video and Audio
Recording and playing back archive of the panoramic camera is done in the usual way (see Start/ Stop
Recording and Working with Archive). Working with archive records is possible both in the General
view mode and the Dewarped mode. To switch between these camera modes in archive the and
buttons are also used.
Other operations with the camera are carried out in the standard ways (see Other Operations with
Camera).
5.6.7 Sending Emergency Ticket to the Emergency Service with the Help of
Media Client
On Linux platform (available only for SecurOS Enterprise edition) the functionality is not supported.
Using a Media Client operator can send Emergency ticket to an external Emergency service. A message
can be send both from on-line and archive video modes.
Warning!
1. Operation is available only for Camera object.
2. Emergency ticket can be sent only if this feature is configured by the system administrator.
www.issivs.com
SecurOS 35 Quick User Guide
Media Client - Application to Work with Video and Audio
3. In the Emergency Ticket window (see Figure 28) select from the list the Incident Type, select, if
necessary, the People in danger checkbox and fill out the Additional Info field.
www.issivs.com
SecurOS 36 Quick User Guide
Media Client - Application to Work with Video and Audio
Result of message sending can be viewed with the help of Event Viewer (see Sending Emergency ticket
to the Emergency service with the Help of Event Viewer).
Bookmark is a special mark added to the video record. Each bookmark marks appropriate time stamp,
that allows to find required frame or video fragment quickly, instead of to view archive in a whole.
Warning! When working in Live camera mode this button is displayed only if video recording is on.
Name of the added bookmark is created automatically and has the following format:
<Camera Name> <current frame time stamp>.
www.issivs.com
SecurOS 37 Quick User Guide
Media Client - Application to Work with Video and Audio
The borders of the time interval can be set manually or taken from the archive (specified with the help
of the time-line).
To set borders manually click the button, then moving on a calendar grid double click the
necessary date. To specify time, click the time setup field, then use keyboard to set the time. One can
also specify time using the mouse scroll wheel.
To specify the interval using the time-line move the cursor to the desired start position, then click the
(Take time-line position time) button. Move cursor to the end of the interval, then click the
button.
To set a bookmark with the specified parameters click the Save button. To cancel the operation and
close the bookmark settings window without saving click Cancel.
www.issivs.com
SecurOS 38 Quick User Guide
Media Client - Application to Work with Video and Audio
3. When working with PTZ (see Controlling PTZ Cameras), the buffering mode will be disabled
automatically immediately after the start of the user operations. Buffering mode is also activated
automatically. It will be activated in 10 seconds after the last control command was executed. In this
case, video playback will be paused for some time to fill the buffer.
4. When working with Presets and Tours (see Working with Presets and Tours) buffering mode in not
disabled.
In the archive mode one can watch video or listen to audio recordings. Each of the archive video or
audio records contains a set of files of specified size, which are played back sequentially starting from
the current archive position.
2. Click the (Live/ Archive) button in the upper right corner of the camera or microphone cell. The
system will go to the archive mode. The button will change to in the camera cell and to in
the microphone cell.
Additional Information
One can switch to archive mode using the appropriate command in the camera cell context menu.
When switching to the archive mode, the system will display the Archive Panel (see Figure 31). The
archive position pointer on the Time-Line will be automatically moved to the end of the archive.
Notes:
1. If any object (Camera/Microphone) of the given Media Client is already switched to the archive mode,
then switching the other objects to the archive mode will not change current position of the archive
pointer.
2. If the Camera is in full screen mode or the 1x1 layout is used when switching to the archive mode,
then the time in the Camera cell will be displayed in the HH:MM:SS.FFF format by viewing video
"frame-by-frame", or by scrolling through the records or stop playback. When playing back archive
the time will be displayed in usual format (HH:MM:SS).
www.issivs.com
SecurOS 39 Quick User Guide
Media Client - Application to Work with Video and Audio
Additional Information
The end of archive is specified as the last frame of the last record for the video record and the beginning of the last
file of the last record for the audio record.
To work with the archive records use standard media-player buttons that are displayed on the Archive
Panel (see Playing Back Records).
2. In the camera cell click the button (Archive Search). System will display the Archive Search
window to specify search conditions (see Figure 32).
www.issivs.com
SecurOS 40 Quick User Guide
Media Client - Application to Work with Video and Audio
3. Set the date and time interval for which it is necessary to find the recorded video. Click on the Search
button. The list of all video recordings corresponding to the given search conditions will be
displayed.
4. Select the line corresponding to the record start time (see Figure 33).
5. Click on the selected line. The system will move the archive position pointer to the first frame of the
selected record.
6. Activate the camera cell. Use playback controls. Use the Time-Line for local navigation.
www.issivs.com
SecurOS 41 Quick User Guide
Media Client - Application to Work with Video and Audio
Additional Information
To specify dates with the help of the calendar click the button in the search window. The system will display a
calendar in which all dates on which there are video recordings will be underlined (see Figure 34). Current date is
marked with a gray background. Select required date and click it. Selected date will be marked with turquoise
frame around. When the current date is selected, it will be marked with a gray background with a turquoise frame
around. Click the Search button. The system will display a list of all video recordings on that date.
For a quick search of dates that contain video recordings, click the Calendar button on the Archive Panel
(see Figure 35). Scroll through the calendar and select the necessary date by double clicking on it. Archive position
pointer will be moved to the first frame of the first record of the specified date.
2. In the Archive Panel click the (Calendar) button, see Figure 35. System will display the calendar
window (see Figure 34).
3. Scroll through the calendar and select the necessary date by double clicking on it. The archive
position pointer will be moved to the first file of the last record of the specified date. Use the
playback controls to listen to the audio recordings. Use the Time-Line for local navigation.
The Time-Line of the Archive Panel is used for a quick navigation through the video recordings.
www.issivs.com
SecurOS 42 Quick User Guide
Media Client - Application to Work with Video and Audio
Each video or audio record that corresponds to a certain time interval is designated on the Archive Panel
by a stripe of blue-green or pale yellow color; the archive position pointer is a turquoise colored vertical
marker (see Figure 36). Blue-green colored stripes correspond to records that were made by a camera in
a normal or armed mode when no motion was detected, and also by a microphone. Pale yellow colored
stripes correspond to records that were made by a camera when motion was detected in the frame
(see Arming/ Disarming Cameras). The Time-Line range is restricted to the earliest and latest dates of
the video or audio record stored on the recording hard drive(s).
To set the archive pointer position click a record on the required point. The date and time of the current
archive pointer position will be displayed to the left (see Figure 36).
On the Time-Line, video records of a limited time frame are displayed. To view records for a different
period of time, click the Time-Line and, while holding down the mouse button, move the mouse pointer
in the desired direction, or use the and navigation buttons. One can also move along the time-
line using the mouse scroll wheel if the pointer takes the form.
To change the scale of the Time-Line click the Increase timeline scale button ( ) or Decrease timeline
scale button ( ). Time-Line scaling can also be done using the mouse wheel if mouse pointer takes the
form.
Playback control is performed with the help of the media player buttons (see Figure 37 and Table 1).
Parameter Description
www.issivs.com
SecurOS 43 Quick User Guide
Media Client - Application to Work with Video and Audio
Parameter Description
Playing records
(Play)
Stop playing
(Pause)
Playback speed control buttons (current speed indicator is displayed to the left of the playback
buttons (see Figure 37))
When working with audio records the , , , buttons (Previous frame, Next frame,
Slower, Faster) are disabled.
To play the last N seconds/minutes of the record (starting from the current moment) do the following:
1. Select the required Camera in the Devices Panel of the Media Client or in the Working area of the Media
Client (see Media Client - Application to Work with Video and Audio).
2. In the Camera's right-click menu select the Playback N s/ min of record option (see Figure 38). Menu
option and shortcut can be used both in live and archive mode.
www.issivs.com
SecurOS 44 Quick User Guide
Media Client - Application to Work with Video and Audio
Depending on archive availability the system will set the archive pointer to the earliest frame of the
record within the specified interval and start playback automatically.
Archive records of multiple objects — Cameras, Microphones or Cameras and Microphones simultaneously
can be displayed in the Archive Panel at the same time. Such archive mode is called group archive
(see Figure 39).
www.issivs.com
SecurOS 45 Quick User Guide
Media Client - Application to Work with Video and Audio
When switching several objects to the Archive mode, the Archive Panel will display the List of objects in
archive mode and archive records of all these objects (see Figure 39). An archive position pointer will be
placed at the end of the archive record of the object that has been switched to the archive mode first.
This position will not be changed if other objects will be switched to the archive mode. The order of the
objects in the List of objects in archive mode will match the order of switching of objects to the archive
mode. The active object in the List of objects in archive mode is highlighted in turquoise.
To create a group archive, one can sequentially switch the required Cameras and/or Microphones to the
archive mode. All Cameras of the video page can be switched to the archive mode simultaneously with
the help of the appropriate command of the camera cell context menu. Any object selected to be used
with the given Media Client, including armed or recording objects, can be switched to the archive mode.
For the convenience of working with group archive, the records can be sorted on the Archive Panel in
such a way, as it is required by operator. The position of the object in the list can be changed by using
drag-and-drop method (see Basic Techniques and Operations with Objects). When sorting archive
objects, the order of Camera cells in the Media Client's Working area and the order of Microphones on the
Microphones Panel is not changed.
Searching records, navigating archive and playing back records are performed in the standard way
(see Searching Records in Archive, Navigating Through Archive and Playing Back Records sections).
Navigating archive with the playback control buttons is performed according to the record of the active
object only.
Note. When you are searching records in the group archive using the Calendar, then all the dates, on which
there is a record of at least one of the objects in the archive mode will be marked in the calendar window.
When playing back group archive, records of all cameras are played back synchronously (if such
records exist for the same time). At the same time, only one audio record from an independent
Microphone or microphone linked to a Camera can be played back synchronously with the video record.
To play back audio records activate the required object in the Object list.
To remove archive records from the Archive Panel the context menu of the List of objects in archive mode is
used (see Figure 40).
Warning! After executing the Hide all Cameras command all the Cameras are kept in the archive mode. To
switch a camera to Live mode use the button in the Camera cell. To quickly switch all Cameras to Live
mode select Switch all cameras to live mode command from context menu of any camera.
Switch all Microphones to live mode — remove records of all Microphones from the Archive Panel.
All Microphones are switched to Live mode automatically.
www.issivs.com
SecurOS 46 Quick User Guide
Media Client - Application to Work with Video and Audio
All Cameras of the video page can be switched to Live mode simultaneously with the help of
appropriate command of the camera cell context menu (see Camera Cell Controls). Records of all
Cameras are removed from the Archive Panel.
Archive export can be performed both for separate record (see Record Saving) and for group of records
simultaneously (see Group Archive Export).
Record can be saved as a file of default AVI/ASF format or as a file of special Evidence format:
Exporting a video or audio sequence to a AVI/ASF file allows to play back the records using any
standard media player, for example VLC Media Player.
When exporting record to Evidence format a file with .evi extension is being created. Such file
can be played with proprietary SecurOS Evidence Manager player (see SecurOS Evidence Manager
User Guide).
If necessary, one can use digital signature when exporting archive (see Digital Signature). Evidence file
can also be encrypted and protected with password to prevent unauthorized access.
Note. Format of the saved file is specified by the system administrator and can not be changed by the
operator.
Warning! When saving to a file of Evidence format records are being exported with no sound.
Note. Camera/ Microphone can be selected at any next step, but not later than export task starts. All specified
task export parameters will be applied to the selected Camera/ Microphone.
2. In the Media Client's toolbars area jump to the Export tab (see Figure 41).
www.issivs.com
SecurOS 47 Quick User Guide
Media Client - Application to Work with Video and Audio
The system will display the Export panel (see Figure 42).
www.issivs.com
SecurOS 48 Quick User Guide
Media Client - Application to Work with Video and Audio
Note. For fast filling in the Start time and End time text boxes use the button (Take time-line position
time). Move the archive pointer to the beginning of the fragment to be saved then click the button next to the
Start time text box. Then move archive pointer to the end of the fragment to be saved and click the button
next to the End time text box. When filling in the text boxes manually use the button to quickly enter the
date.
4. In the Export with text box select the converter that will be used to export. Depending on the selected
converter an archive will be saved either on the Video Server or on the local Computer.
Note. The Export with field is not displayed if the Media Client is configured to work only with the one
converter.
If the system is configured to digitally sign a file using a certificate (see Digital Signature) the
digital signature icon will be displayed on the right of converter (see Figure 43).
www.issivs.com
SecurOS 49 Quick User Guide
Media Client - Application to Work with Video and Audio
The icon will be displayed only for those converters that can be used for digital signature on this
Computer (see Digital Signature).
5. In the Export Directory field click the Browse button and using the file manager select the folder to
save the video records to.
Note. The Export with field is not displayed if the converter located on the remote Computer is used to
perform the export task. In this case the file is saved to the directory specified by the system administrator.
6. Select the Password protect checkbox to encrypt the file and protect it with password.
Note. The Password protect check box is displayed only if export is performed to the Evidence file format.
www.issivs.com
SecurOS 50 Quick User Guide
Media Client - Application to Work with Video and Audio
Note. When played with SecurOS Evidence Manager player (see SecurOS Evidence Manager User Guide) the
system will request defined password.
8. The window to display export tasks sent to the converter will be opened (see Figure 45).
If archive for specified period is not found for any selected object, then system will display error
message (see Figure 46).
9. To control export procedure click the Task Window button. System will display the Task Window
(see Figure 47), in which the state of the executed procedure and system messages about possible
errors will be displayed.
If export task is not finished it can be canceled. To cancel a task select appropriate row and click the
Cancel selected button. To cancel all unfinished tasks click the Cancel all button. When task is finished
appropriate rows can be deleted by clicking the Remove finished button.
The Archive Converter field displays information about converter used to perform the export task: the
Media Client or the Archive Converter.
After export task is finished the Export directory field displays the path to the folder where archive is
saved to (see Figure 48).
www.issivs.com
SecurOS 51 Quick User Guide
Media Client - Application to Work with Video and Audio
The path is represented as a link that can browse to the specified folder. To copy the path to the
clipboard, select the Copy command in the context menu. If archive has been saved on the remote
computer, then the path will be in the REMOTE_COMPUTER_NAME [IP address] format and will not
be a link that can be copied.
Procedure is launched by clicking the (Group export) button on the Export panel. Time
interval of the records to upload can be specified both working with archive with the help of Time-Line
(see Record Saving) and with no visual control, simply specifying date and time values in the
appropriate fields of the panel.
To perform group export of the video and/or audio archive do the following:
1. Select Media Client, that works with objects, archives of which must be uploaded.
www.issivs.com
SecurOS 52 Quick User Guide
Media Client - Application to Work with Video and Audio
4. Parameters, specified in the Export panel, and the Device Tree (tree of the Cameras and Microphones)
will be displayed in the window.
5. Define values of the following parameters: Start time, End time, Export with and Export Directory.
If necessary select the Password protect checkbox.
Note. Features of the parameter setting procedure are described in the Record Saving section.
6. In the Device Tree select devices, archive of which must be exported. To do this, select checkboxes on
the left of required device (see Figure 50).
www.issivs.com
SecurOS 53 Quick User Guide
Media Client - Application to Work with Video and Audio
By default all Cameras and Microphones selected to work with the given Media Client are displayed in
the Device Tree (the and buttons on the right of the Search field are pressed and displayed in
blue). To display in the tree only devices with required identifiers/names specify a part of the Camera
or Microphone name or ID in the Search field and release the appropriate button (inactive buttons are
displayed in gray).
7. To launch export procedure click the button at the bottom of the window.
Note. Depending on defined format there may be several export tasks (for AVI/ASF format) or just one task
(for Evidence format).
www.issivs.com
SecurOS 54 Quick User Guide
Media Client - Application to Work with Video and Audio
A digital signature with a certificate ensures that the signed file has not been replaced or edited after
creation. The PKCS#7 Signed data detached signature standard is used for digital signature within
SecurOS. One can confirm the authenticity of the file with most tools that support this standard.
Notes:
1. Due to restrictions on the conditions of the system operation, trusted time-stamp is not published
when creating digital signature. This can limit the list of supported third-party signature verification
tools.
2. To check and demonstrate how does digital signature work one can use self-signed certificate created
with the help of the Certif icate Generator utility (see SecurOS Administration Guide).
This section describes the features associated with the digital signature of audio- and video files:
Choosing signature certificate;
Rejection of the signature use;
Results of archive converting using digital signature;
Pointing out the fact of digital signature usage;
Digital signature verification utility.
The ability to sign files using a certificate is available on the Computers that have any role (Video Server
or Operator Workstation).
Digital signature on the Video Server is possible only if the converter specified within any Operator
Workspaces (exclude Local) is selected to perform the export task.
Digital signature on the Operator Workstation is possible if the converter specified on this Operator
Workstation or in any Operator Workspaces is selected to perform the export task.
To sign the files that have been exported an operator must select a digital certificate.
Note. List of available certificates is populated by those ones that are installed within the system
(see SecurOS Administration Guide).
2. Click on the (Change user/ Shutdown system) button and select the Digital Signature
Certificate command from the drop-down list (see Figure 51);
www.issivs.com
SecurOS 55 Quick User Guide
Media Client - Application to Work with Video and Audio
3. In Choosing a digital signature certificate window tick the Use digital signature certificate
checkbox (see Figure 52);
Additional Information
Choosing a digital signature certificate window can also be opened by the application icon context menu
command in the notification field of the Windows task bar (system tray).
After selecting the certificate, the digital signature of the converted files will be executed automatically.
Warning! Digital signature settings are saved only for Windows user.
Result of digital signature operation is a file with .p7s extension. Name of this file matches the name
of converted file. Further archive file must be copied and moved together with the corresponding
digital signature file.
www.issivs.com
SecurOS 56 Quick User Guide
Media Client - Application to Work with Video and Audio
Note. If selected certificate is protected by password, this password will be requested by Windows every time
after archive export task will be finished. This behavior is defined by OS settings and can not be changed with
the help of SecurOS tools.
Information, associated with digital signature, is displayed in Event Viewer (see Event Viewer) and
conversion Task Window:
Information concerning the fact of digital signature use will be displayed in the comments to the
Archive Converter events in the Event Viewer window (see Figure 53);
At the moment when export task will be generated the Export task has been sent event from the
Camera will be generated. This event also will be displayed in the Event Viewer (see Figure 53);
Pop up tooltip will be displayed in conversion Task Window to indicate problems, associated with
digital signature, if they will rise (see Figure 54).
Figure 54. Tooltip for a digital signature error in the conversion Task Window
To confirm file authenticity the Digital certificate verification utility, shipped with SecurOS is used
(see Figure 55).
Location:
<SecurOS root folder>\tools\DigSiVerU.exe
www.issivs.com
SecurOS 57 Quick User Guide
Media Client - Application to Work with Video and Audio
After selection utility will display verification results. Possible verification results are represented in
Table 2:
Result Description
File corresponds to digital signature The file has not been modified, and the certificate it
is signed with has a high degree of trust.
Certificate was issued by trusted
Certification Authority
File corresponds to digital signature The file has not been modified, and the certificate it
is signed with cannot not be trusted.
The certificate was issued by non-trusted
Certification Authority
The file does not match the digital The file does not match the signature file and
signature probably has been modified.
Error digital signature verification Authenticity of the file cannot be verified, for
example, because the signature file is damaged.
Additional info about certificate used for digital signature one can get by clicking on View certificate
button.
www.issivs.com
SecurOS 58 Quick User Guide
Media Client - Application to Work with Video and Audio
With the help of Media Client one can search Alarms and Bookmarks in archive, and also perform a Smart
Search (searching of motion in predefined area of the frame).
To activate search window click the button, located in the Media Client window on the Archive
Panel (see Figure 56).
The system will display the Search in archive window (see Figure 57).
www.issivs.com
SecurOS 59 Quick User Guide
Media Client - Application to Work with Video and Audio
Warning! If Forensic search feature is disabled these buttons are not displayed.
A form to specify search criteria is in the left part of the window and search results are displayed in the
right one.
Search parameters adjusting procedure, search results and working with search result are described in
appropriate sections:
Searching Alarms and Bookmarks;
Smart Search.
Found Alarms/ Bookmarks will be displayed in the right part of the window as a list (for example,
see Figure 58).
www.issivs.com
SecurOS 60 Quick User Guide
Media Client - Application to Work with Video and Audio
Search results will be displayed as a list (see Figure 58), entries of which will be grouped by Cameras or
by Date (depending on the Group results by parameter value, see above). By default, after search is
finished, this list is collapsed. To view list details consequently click the icon on the left of the
required element until list is completely expanded (see Figure 59).
www.issivs.com
SecurOS 61 Quick User Guide
Media Client - Application to Work with Video and Audio
Note. For more information about export parameters and export control operations see Saving Record.
Smart Search operations sequence is described in the Searching Alarms inside the detection area
section.
www.issivs.com
SecurOS 62 Quick User Guide
Media Client - Application to Work with Video and Audio
Note. Only Cameras, selected to work with the given Media Client, are displayed in the list. Zone object of these
Cameras must be configured to perform Smart Search, too.
2. Specify search area (mask) with the help of mouse (see Figure 61). By default, search area is equal to
whole frame.
www.issivs.com
SecurOS 63 Quick User Guide
Media Client - Application to Work with Video and Audio
Warning! Make sure that the selected search mask covers at least one of camera detection zones! The system
will search for motion events within the specified mask. To configure camera motion detection zone(s),
consult with a system administrator.
Found Alarms, for which motion was detected within specified area, will be displayed in the right part
of the window as a list (for example, see Figure 62).
www.issivs.com
SecurOS 64 Quick User Guide
Media Client - Application to Work with Video and Audio
Note. For more information about export parameters and export control operations see Saving Record.
www.issivs.com
SecurOS 65 Quick User Guide
Media Client - Application to Work with Video and Audio
Forensic (retrospective) search in the video archive is based on the use of metadata that accompanied
the video stream. Metadata means data that describes what is happening in the frame (for example,
information about moving objects and their tracks, speed, classification attributes, data on video stream
quality and camera malfunctions, etc.). Metadata is generated by video analytics detectors and recorded
and stored in SecurOS in its original form, i.e. before it has been processed by the algorithms of such
detectors. Any object’s attribute stored in the database can be used as a parameter of the forensic
search.
Forensic search is possible if a video analytics detector is configured to save metadata (see SecurOS
Administration Guide) and archive recording has been performed.
Results of the Forensic Search are represented by snapshots with required objects. Results of the forensic
search can be used to do the following:
Viewing fragment in the Media Client;
Other operations available in the archive mode (see Working with Archive).
Forensic search is performed in the archive mode in the Search in archive window of the Media Client.
To open Search in archive window click the button, located in the Media Client window on the
Archive Panel (see Searching Alarms and Bookmarks, Smart Search).
www.issivs.com
SecurOS 66 Quick User Guide
Media Client - Application to Work with Video and Audio
Unclassified Object.
Color — select the color of the required object from the list.
Start time/ End time — specify date and time of the start/end of the search period. Date can be
entered manually or specified with the help of the Calendar by clicking the button.
Camera — select a Camera, in archive of which it is necessary to perform the forensic search.
Note. The list displays the Cameras selected to work with video analytics detectors for which metadata
recording is configured.
Video Search Area — specify search area within the frame using left mouse button. Searching by
all parameters will be performed only within the specified frame area. By default, search area is
equal to the whole frame. To reset specified search area select the Reset Search Area command in
the context menu.
Time spent in the area (at least) — additional search parameter. Select this checkbox to search only
those frames on which the object has been in the specified area of the frame for at least the specified
period of time.
Objects in area (at least) — additional search parameter. Select this checkbox to search only those
frames that contain at least specified number of objects at the given area of the frame at the same
time.
3. To start search click the Search button.
Frames that match the specified search criteria will be displayed in the right part of the window
(see Figure 64).
The found object is highlighted in the frame with a white rectangular frame. The time interval during
which the object was in the frame is displayed under each frame.
www.issivs.com
SecurOS 67 Quick User Guide
Media Client - Application to Work with Video and Audio
Warning!
1. The ability to work with a Long-term archive is determined by the system administrator.
2. Long-term archive playback doesn't support audio.
The Media client is used to work with Long-term archive. When working with long-term archive, operator
can perform all operations, available for primary archive:
Switching to Archive Mode;
Searching Records in Archive;
Navigating Through Archive;
Playing back records;
Working with Group Archive;
Searching in Archive;
Archive Export.
Note. When working with Long-term archive several Media Client's controls will be marked with the icon.
To work with Long-term archive, select the appropriate type in the camera cell context menu (Select
archive type Long-term archive, see Figure 65). Media Client will switch to the Long-term archive
mode.
Warning! After switching all operations will be executed only with Long-term archive of given camera. To
return to the Primary archive mode, switch operation mode again.
www.issivs.com
SecurOS 68 Quick User Guide
Media Client - Application to Work with Video and Audio
Figure 65. Selecting archive type in the camera cell context menu
After Long-term archive is selected, the (Live/Archive) button in the Camera cell will look like .
Appropriate Camera in the list of cameras in archive mode will be marked with the icon, for example,
see Figure 66.
In Status Bar such cameras also will be marked with the icon.
Warning! To work with live/archive audio the appropriate sound devices should be installed and configured.
Note. The volume of the played back audio record is specified in the Operating System settings and cannot be
managed by SecurOS.
www.issivs.com
SecurOS 69 Quick User Guide
Media Client - Application to Work with Video and Audio
To listen to live audio from an independent microphone, find and activate the required Microphone on
the Microphone Panel or in the Devices Panel.
To listen to live audio from a microphone linked to a camera, find and activate the required Camera in
the Media Client's Working area or in the Devices Panel.
If a Camera is linked to a microphone, audio recording starts/stops automatically when video recording
starts/stops (see Start/ Stop Video Recording).
Note. If Bound parameter (see SecurOS Administration Guide) is specified in the Microphone object settings,
then recording will start only when specified sound threshold is reached. Otherwise, the recording will start
immediately after command is executed.
2. To start/stop recording click the Record button. When switching to the corresponding mode, the
recording indicators state mode and the Start/ Stop Record button change:
/ (Recording indicator) — the recording is turned on/off (see Figure 67).
/ (Start/ Stop Record) button) — the recording is turned on/off (see Figure 67).
The audio records archive is stored in folders on a storage device (e.g. SATA HDDs, NAS, SAN, etc..).
The actual partition/drive letter dedicated for the recordings is set by the administrator.
To listen to the audio recorded by an independent microphone, find the required Microphone on the
Microphone Panel or in the Devices Panel. Switch to the Archive mode and find the required audio
record. To play back the found record click the Play button.
www.issivs.com
SecurOS 70 Quick User Guide
Media Client - Application to Work with Video and Audio
To listen to the audio recorded by the microphone linked to a camera, find the required Camera in the
Media Client's Working area or in the Devices Panel. Switch to the Archive mode and find the required
video record. To play back a found record click the Play button.
Warning!
1. You can only listen to one microphone recording at the same time.
2. Audio records are played back only at the normal ( ) video playback speed. Otherwise, the audio
will not be played back.
3. To listen to the audio recorded by the microphone linked to a camera, one can activate the
appropriate Camera cell. Otherwise, the audio will not be played back.
Within SecurOS it is possible to transfer sound from an operator's microphone to a built-in Camera's
speaker.
Note. Operator's microphone is not a SecurOS object and is represented by an audio device connected to the
Mic input of the computer's sound card.
Note. If the button has a form, it means that the speaker is being used by another operator.
3. After transmitting the message click the Turn speaker off button ( ).
www.issivs.com
SecurOS 71 Quick User Guide
Media Client - Application to Work with Video and Audio
In the PTZ camera cell there will be a corresponding control button displayed — (PTZ).
Note. If user access rights to the Camera is limited by the View level, then PTZ control button is not displayed
in the camera cell.
Note. The ability to use mouse controls is set by the system administrator.
If mouse pointer takes the form, the following operations are available:
Pan/ Tilt;
Scaling frame.
If mouse pointer takes the form, the following operations are available:
Centering frame on the selected point;
Scaling selected frame area;
Scaling frame.
To exit PTZ mouse control mode click the (PTZ) button again.
www.issivs.com
SecurOS 72 Quick User Guide
Media Client - Application to Work with Video and Audio
Pan/ Tilt
To pan/tilt the PTZ camera/device (see Figure 70), click and hold the left mouse button and move the
pointer in the required direction (up/down, left/right). Release the mouse button to stop movement.
Note. The current center of the camera's field of view is marked by a red cross (see Figure above). Camera
rotation speed depends on how the mouse cursor is moved off from the camera center.
Scaling frame
Image scaling (approaching/moving away) is performed with the mouse wheel.
www.issivs.com
SecurOS 73 Quick User Guide
Media Client - Application to Work with Video and Audio
Note. Selected frame area may be scaled in the cell of the other camera if PTZ-camera is a hardware system
such as Axis Q6000-E or Hikvision PanoVU.
Notes:
1. The enabling/disabling of the display of the PTZ Control Panel is performed by the system
administrator.
2. The Media Client PTZ Control Panel is activated only when a PTZ enabled camera/device is selected.
For non-PTZ cameras, the PTZ Control Panel will stay deactivated.
3. If user access rights to the Camera is limited by the View level, then PTZ Control Panel is blocked.
www.issivs.com
SecurOS 74 Quick User Guide
Media Client - Application to Work with Video and Audio
2. To control a camera, click the corresponding navigation buttons. For the camera to quickly stop, click
the STOP button.
Additional Information
The additional functions of the panel are available depending on the camera model used and the system settings.
www.issivs.com
SecurOS 75 Quick User Guide
Media Client - Application to Work with Video and Audio
Operations with camera's presets and tours are performed with the help of PTZ control tab of the Media
Client. These operations are described in the following sections:
Working with Presets;
Working with Tours.
Warning! When working with presets with the help of other devices (fort example, joystick or CCTV-
keyboard) or scripts, it is necessary to use only identifier, assigned to a preset by SecurOS, i.e. the [ID]
value.
The context menu contains the following commands, that are duplicated with the control buttons:
www.issivs.com
SecurOS 76 Quick User Guide
Media Client - Application to Work with Video and Audio
Warning! For several camera models the buttons and context menu commands are not available.
To create a preset, move the camera to the required position and select the Add preset command in the
context menu or click the button. In the displayed window (see Figure 76) specify the preset name:
Warning! A preset's name restrictions (for example, name length or permitted characters) are defined by the
camera's type and model. The allowable number of presets also depends on the camera type and model.
To update a preset move the camera to required position, select the position you want to update in the
list and select the Update selected preset command in the context menu.
To remove preset select it in the list, then select Remove selected preset command in the context menu.
Click the OK button in the displayed window.
Warning! A preset may be preconfigured by camera manufacturer. In this case it can not be edited or deleted.
Nevertheless such presets are displayed in the list and have an effect on maximum camera preset count.
Tours by presets
Tours created by administrator on the base of the presets, existing in the own camera settings, are
called Tours by presets. The Tours panel of the PTZ control tab of the Media Client is used to work with
tours by presets in SecurOS (see Figure 77).
www.issivs.com
SecurOS 77 Quick User Guide
Media Client - Application to Work with Video and Audio
The panel consists of specified tours, tour control buttons and a context menu (see Figure 78) that can
be opened by right-clicking on a tour.
Warning! When working with tours with the help of other devices (for example, joystick or CCTV keyboard)
or scripts, it is necessary to use only identifier, assigned to tour by SecurOS, i.e. the [ID] value.
The context menu contains the following commands, that are duplicated with the control buttons:
To activate patrol mode select required tour in the list, then click the button (Start tour). To
deactivate patrol mode click the button (Stop tour).
Recorded tours
www.issivs.com
SecurOS 78 Quick User Guide
Media Client - Application to Work with Video and Audio
Warning!
1. The functionality of working with recorded tours and tour control buttons are available not for all
camera models.
2. The ability to record tours is determined by the system administrator.
3. For cameras that support the tour recording functionality, only a limited number of tours specified
by the manufacturer can be recorded.
A tour created by an operator using any PTZ camera controls is called Recorded. A special cells of the
Tours panel of the PTZ control tab of the Media Client is used to work with recorded tours in SecurOS
(see Figure 79). Number of such cells to record tours is specified in the own camera settings and cannot
be changed by the user. Each cell is intended for recording one tour of fixed duration. Recorded tours
are stored in the own camera settings.
Note. The number of cells for tour recording and the duration of the tour is determined by the camera
settings. For information on the tour duration contact the administrator.
The panel consists of the list of the cells to record tours, tour control buttons and a context menu
(see Figure 80) that can be opened by right-clicking on a tour.
www.issivs.com
SecurOS 79 Quick User Guide
Media Client - Application to Work with Video and Audio
Warning! When working with tours with the help of other devices (for example, joystick or CCTV keyboard)
or scripts, it is necessary to use only identifier, assigned to tour by SecurOS, i.e. the [ID] value.
The context menu contains the following commands, that are duplicated with the control buttons:
Delete tour ( ) — delete tour selected in the list. Clears the cell for recording a new tour.
Warning! The Delete tour ( ) button is available not for all camera models.
To record a tour:
1. Select a free cell in the tour list.
Note. If there are no free cells to record a tour, you can reuse one of the occupied cell for recording.
To activate patrol mode select required tour in the list, then click the (Start tour) button. To
deactivate patrol mode click the (Stop tour) button.
www.issivs.com
SecurOS 80 Quick User Guide
Media Client - Application to Work with Video and Audio
To delete tour select required tour in the tour list, then click the (Delete tour) button.
Warning! The Delete tour ( ) button is available not for all camera models.
Keypoint tours
Warning! The functionality of working with keypoint tours is available not for all camera models.
Keypoint tours are created with the help of the special Tour editor and stored in the SecurOS settings.
Working with this type of tours is described below in the following subsections:
Creating tour;
Editing tour;
Deleting tour;
Turning patrol mode on/ off;
Using context menu.
Creating tour
Warning! To create a tour the operator access level to the Camera object must be not less than Configure (
).
1. Click the (Create keypoint tour) button on the Tours panel of the PTZ control tab of the Media
Client (see Figure 82).
Warning! If the shared control mode is on for the camera (see Shared and Exclusive PTZ Control), then
camera telemetry control will be captured while working with the tour editor.
2. In the Tour creation window (see Figure 83) specify Tour name and Tour identifier (ID).
www.issivs.com
SecurOS 81 Quick User Guide
Media Client - Application to Work with Video and Audio
3. Use the PTZ controls panel to move camera to the tour start position.
4. If necessary, specify camera zoom (Zoom parameter) in this point using PTZ controls panel.
www.issivs.com
SecurOS 82 Quick User Guide
Media Client - Application to Work with Video and Audio
Warning! The time specified in the Delay parameter includes the time it takes for the camera to move from
the previous keypoint.
7. Move the camera to the next keypoint using the PTZ controls panel. Click the (Add keypoint)
button. Specify parameters of the new keypoint in the new entry (see Figure 85).
www.issivs.com
SecurOS 83 Quick User Guide
Media Client - Application to Work with Video and Audio
Editing tour
Warning! To edit a tour the operator access level to the Camera object must be not less than Configure ( ).
Warning! If the shared control mode is on for the camera (see Shared and Exclusive PTZ Control), then
camera telemetry control will be captured while working with the tour editor.
www.issivs.com
SecurOS 84 Quick User Guide
Media Client - Application to Work with Video and Audio
Edit Tour name, name of the Keypoint or Delay of the camera in this point.
Delete or add a new keypoint. To delete the keypoint click the (Remove from list) to the right
of the selected keypoint. To add a new keypoint click the (Add keypoint) button, specify point
parameters.
To check the position of the camera at an interested keypoint, click the (Go to keypoint) button
on the corresponding entry.
To change the patrol route, press and hold the button and drag the point to the required
position in the list.
4. After finishing tour editing, click the Save changes button.
Deleting tour
Warning! To delete a tour the operator access level to the Camera object must be not less than Configure (
).
To delete a tour select required tour in the tour list, then click the (Delete tour) button. Tour also
can be deleted via context menu command (see below).
Warning! To turn patrol mode on/off the operator access level to the Camera object must be not less than
Control ( ).
www.issivs.com
SecurOS 85 Quick User Guide
Media Client - Application to Work with Video and Audio
To activate patrol mode select required tour in the list, then click the (Start tour) button. To
deactivate patrol mode click the (Stop tour) button. Turning patrol mode on/off is also possible via
context menu commands (see below).
www.issivs.com
SecurOS 86 Quick User Guide
Media Client - Application to Work with Video and Audio
Figure 90. Blocked PTZ control elements in the exclusive telemetry control mode
The "yellow lock" ( ) is used as an icon of blocking. In addition, when mouse pointer is placed over
PTZ button or PTZ Control Panel, the PTZ control on hold tip is displayed.
Warning! This mode is available only if this feature is configured by the system administrator.
If long-term PTZ hold mode is configured, then the on/off button of the long-term telemetry hold
button is additionally displayed in the Camera cell (see Figure 91):
www.issivs.com
SecurOS 87 Quick User Guide
Media Client - Application to Work with Video and Audio
To capture and hold PTZ control for a long time, click on the (Hold/ Release PTZ control) button.
Button changes its appearance to . On the Media Clients of all other operators, depending on PTZ
control priority of these operators, this button will be displayed as follows:
— button is disabled for all operators, whose PTZ control priority is the same or lower. Such
operators will not be able to control telemetry until it will be released from outside (see PTZ
Control Request).
— button is enabled for all operators whose PTZ control priority is higher. Such operators can
both control PTZ, hold and release it.
To release telemetry control for other users when you finished your work, click on the Hold/ Release
To send a request select the PTZ control request command in the Camera cell context menu
(see Figure 92).
www.issivs.com
SecurOS 88 Quick User Guide
Media Client - Application to Work with Video and Audio
After that the PTZ control request sent message will be displayed on the computer of this operator
(see Figure 93) and the PTZ control request window will be displayed on the computer of the operator
who is holding PTZ control (see Figure 94).
Warning! If Media Client with the requested Camera is hidden on the Desktop of the operator who is holding
the PTZ control, then the PTZ control request window is not displayed on his monitor.
After receiving the request the operator of the remote computer makes a decision and clicks
corresponding button in the PTZ control request window.
PTZ control request window is displayed on the remote computer on top of all other windows and
automatically disappears in the following cases:
PTZ control is intercepted and held by operator with the higher priority after the PTZ control
request has been sent;
Operator released PTZ control on the remote computer;
PTZ control has been released automatically when timeout expired.
www.issivs.com
SecurOS 89 Quick User Guide
Media Client - Application to Work with Video and Audio
Warning! The ability to control camera wiper is determined by the system administrator.
Some models of cameras can be equipped with a wiper — device, which allows to clean the camera lens
from natural noise - dust, raindrops, snow. In the Cell Title of such camera on the Media Client the
icon is displayed. To turn wiper on select the Start wiper command in the camera cell context menu
(see Figure 95).
After the time specified in the camera settings has expired, wiper automatically turns off.
Warning! The ability to start the washing procedure is determined by the system administrator.
Several models of the cameras can be equipped with the washer that allows to execute lens cleaning. In
the Cell Title of such camera on the Media Client the icon is displayed. To start washing procedure
select the Start washing procedure command in the camera cell context menu (see Figure 96).
www.issivs.com
SecurOS 90 Quick User Guide
Media Client - Application to Work with Video and Audio
Warning! The washing procedure cannot be terminated by operator and will end itself after the entire cycle
has been completed.
Warning! The ability to control camera light is determined by the system administrator.
Some camera models can be equipped with a built-in light, that allows to further illuminate camera
scene. To on/off camera light, select Light in the camera cell context menu, then select Turn on/Turn
off command (see Figure 97).
www.issivs.com
SecurOS 91 Quick User Guide
Media Client - Application to Work with Video and Audio
Video received from all cameras, selected to work with the given Media Client, is displayed in the
Working area simultaneously, in a page mode. Each Media Client's page is the working area that contains
the number of cells which is defined by a current layout. The active layout is highlighted in the Layout
bar in light green (see Figure 98). To activate another layout click the corresponding button in the Layout
bar.
Note. The set of layouts available in the Layout bar is defined by the system administrator.
The number of Media Client pages depends both on the current layout, and from the total quantity of
cameras selected to work with the given Media Client. If the total quantity of cameras selected to work
with the given Media Client exceeds the allowed number of cells displayed on one page with the
selected layout, then the remaining cells are displayed on the next page. Switching to the next/previous
page (paging) in manual mode is carried out by clicking the and buttons in the Camera
Control Bar (see Figure 99). Paging in automatic mode (with no operator actions) is carried out by
Example. If the Media Client is configured to work with 20 cameras and the 3x3 layout is selected, then the
total number of Media Client pages is 3. The last page will contain only 2 Camera cells.
After a layout is selected each video page contains a specified number of camera cells. By default, the
camera order in the cells of the pages is set by the system and can be changed by the user. To change
the camera order in the page cells use one of the following methods:
To move a camera to a cell, select from the Devices Panel the camera which needs to be moved to the
selected page (see Figure 100).
www.issivs.com
SecurOS 92 Quick User Guide
Media Client - Application to Work with Video and Audio
Figure 100. Selecting camera from the Microphone and Camera List
Click and drag the selected camera icon to the necessary page cell.
Similarly, the camera can be moved to the cell from the Map Window.
Note. Camera can be moved from the Map Window only if it has been selected for working with given Media
Client in its settings.
To change a camera's location on the video page, left-click the cell of the camera that needs to be moved
and holding the button drag the camera to the new cell location (see figure 101).
www.issivs.com
SecurOS 93 Quick User Guide
Media Client - Application to Work with Video and Audio
Note. The camera can be moved both to a blank cell, and to a cell occupied by any other camera.
An operator can both display or hide additional panels of the Media Client and change their size.
Note. Additional panels are displayed only if they are enabled by an administrator.
To hide additional panels, click the button when the mouse pointer takes the form shown on
Figure 102.
www.issivs.com
SecurOS 94 Quick User Guide
Media Client - Application to Work with Video and Audio
To change panel size (width or height) click the button or the button, and holding it down,
move the mouse pointer in the required direction.
To minimize/maximize a tab of the additional panel click the button or the on it.
Views allow to group Cameras and place them to Working Area of the Media Client as required. Views also
can contain Microphones.
Note. Privileges to create, delete, edit and rename Views are delegated by system administrator (more detailed
about these operations see SecurOS Administration Guide).
www.issivs.com
SecurOS 95 Quick User Guide
Media Client - Application to Work with Video and Audio
All Views available to operator are listed in the Views List on the Views Panel. The most frequently used
Views can be placed on the Views quick access panel.
A View with the All devices name exists always and includes all Cameras and Microphones available to
user. The All devices View, in difference of other Views, is a multi-page view.
Warning! Further operations with Views will be considered for Cameras only. Operations with Views for
Microphones are similar.
To choose a View in the Media Client click on this View in the Views List or on the Views quick access
panel.
Media Client will display contents of the selected View. Selected View will be marked with the rectangle
frame in the Views List and in blue on the Views quick access panel (see Figure 104).
www.issivs.com
SecurOS 96 Quick User Guide
Media Client - Application to Work with Video and Audio
Warning! If Camera, that not belongs to the current View is selected in the Device List, then All devices View
will be automatically displayed.
Warning!
1. Temporary View changes are not saved. When switching to the other View and returning to the
previously changed View, then the last one assumes its initial state.
2. Changed View is not specially highlighted in the Media Client window.
To add a Camera to the Media Client cell, drag-and-drop required Camera from the Device list to the
Media Client cell.
Warning! If you select the Camera from the Device List and do not drag it, the All devices View automatically
appears.
To delete a Camera from the Media Client cell, drag-and-drop Camera from the Media Client cell to the
Device List.
To change Cameras arrangement, drag-and-drop Camera from the Device List or from the Media Client
cell to the other cell of the Media Client.
To change layout of the Media Client Working Area, select required layout on the Layout Bar.
www.issivs.com
SecurOS 97 Quick User Guide
Media Client - Application to Work with Video and Audio
You can configure Views quick access panel by the following ways:
Adding View/ Views to the panel.
Deleting View/ Views from the panel.
Changing View position on the panel.
To delete View from the panel you can also drag-and-drop it from the panel to the Views List.
To change View position on the panel drag-and-drop required View to the new location.
You can alternately observe Views in the Media Client window by sequential switching.
Views can be can switched in auto-scroll mode or manually.
Warning! If your current View is All devices, then sequential switching of the Views is impossible. All Cameras
available to the user will be listed instead.
To switch Views in the auto scroll mode click on the (Auto scroll) button on the Camera
Control Bar (see Figure 106). Views will start switching in accordance with time interval, specified in
www.issivs.com
SecurOS 98 Quick User Guide
Media Client - Application to Work with Video and Audio
To switch Views manually use (Next page) and (Prev page) buttons on the Camera
Control Bar.
Note. When switching Views sequentially, the following cases are possible:
if there is only one View on the Views quick access panel, except All devices View, then sequential
switching of the Views listed in the Views List will start;
if there is more than one View on the Views quick access panel, except All devices View, then
sequential switching of the Views located on the Views quick access panel will start;
Each camera video frame is displayed in a certain cell in the SecurOS Media Client. Controls and
indicators are placed along the cell edges (see Figure 107). Camera state indicators are also displayed in
the Status Bar.
Notes:
1. Camera cell controls are displayed in the camera cell if such feature was configured by system
administrator.
2. If user access rights to the Camera is limited by the View level, then Camera controls are not displayed
in the camera cell/context menu. These controls are the record control, arm/disarm, PTZ control,
Wiper control, Speaker control buttons/commands, Washing Kit and lighting controls. In addition,
the PTZ Control Panel is blocked.
Playback of video archive is also performed from the camera cells. Each cell plays back video archive
made from the associated camera only. To simultaneously play back several archive records made from
different cameras, several camera cells are used.
A detailed description of the controls and indicators of the operating modes is given in the following
subsections:
www.issivs.com
SecurOS 99 Quick User Guide
Media Client - Application to Work with Video and Audio
A camera cell has the following control elements (numbered in Figure 107):
1. The camera frame. The following colors are used to define video mode and camera state:
no frame — live or archive video, camera is inactive;
turquoise — live video or archive video, camera is active or armed;
yellow — live or archive video, an alarm event was detected.
2. Arming/Disarming button;
3. Camera Identifier;
4. Camera Name;
5. Date and time of the displayed video frame;
6. Wiper or Washing device indicator;
7. Microphone indicator (built-in or connected to the camera);
8. Live video buffering mode and the current state of the buffering process. The following color scheme
is used to indicate the buffering process state:
www.issivs.com
SecurOS 100 Quick User Guide
Media Client - Application to Work with Video and Audio
Note. If the camera only works with external archive, the recording mode indicator in the cell title is replaced
with the external archive operation indicator. At the same time, archive recording in SecurOS is impossible.
Note. In Live mode is displayed only if record is started. In Archive mode is always available.
Archive mode
In archive mode the following controls are additionally displayed (see Figure 108):
www.issivs.com
SecurOS 101 Quick User Guide
Media Client - Application to Work with Video and Audio
Background and font color in the Camera Cell Title also depends on camera mode:
black background/white font — live video, camera is active/inactive;
blue-green background/white font — archive video, camera is active/inactive;
black background/yellow font — live video, an alarm event was detected;
blue-green background/yellow font — archive video, an alarm event was detected.
Cell control commands (including current video page mode control commands) are duplicated in the
cell context menu that can be opened by right-clicking anywhere in the cell. Depending on the mode
(live/archive) the context menu may contain different options.
When the mouse pointer is placed over an arbitrary camera cell, then in the Media Client Status Bar the
information about the corresponding Camera is displayed (see Figure 109).
Note. By default, status bar is hidden. To display/hide status bar press the F9 key.
www.issivs.com
SecurOS 102 Quick User Guide
Media Client - Application to Work with Video and Audio
Each microphone is placed in a separate cell in the Microphone Panel. Microphone controls and state
indicators are placed along the cell edges (see Figure 110). Microphone state indicators are also
displayed in the Status Bar.
A microphone cell has the following control elements (numbered in Figure 110):
1. Cell frame. The following colors are used to indicate microphone mode:
no frame — live or archive audio, microphone is inactive;
turquoise — live or archive audio, microphone is active.
www.issivs.com
SecurOS 103 Quick User Guide
Media Client - Application to Work with Video and Audio
When the mouse pointer is placed over an arbitrary microphone cell, then in the Media Client Status Bar,
the information about the corresponding Microphone is displayed (see Figure 111).
Camera state indicators are displayed in the Devices Panel. Each camera button (including icon inside)
reflects its camera's state by different colors (see table 3). If camera state changes, then not only its cell
changes (for example, border color, or buttons color), but also color and shape of its button on the
panel.
Indicator
State/Mode/Equipment
Live Archive
Active
Inactive
Recording
www.issivs.com
SecurOS 104 Quick User Guide
Media Client - Application to Work with Video and Audio
Arm
Arm + Recording
Microphone state indicators are displayed in the Microphone Panel. Each microphone button (including
icon inside) reflects its microphone's state by different colors (see table 4). If the microphone state
changes, then not only does its cell change (for example, border color, or buttons color), but also the
color and shape of its button in the list changes.
Indicator
State/Mode
Live Archive
Active
Inactive
Recording
www.issivs.com
SecurOS 105 Quick User Guide
Map Window - Application for Working with the Graphic Scheme of the Object
Warning! Displaying of the Levels and Alarms panels in the Map Window is configurable by the system
administrator.
www.issivs.com
SecurOS 106 Quick User Guide
Map Window - Application for Working with the Graphic Scheme of the Object
Warning! Displaying the Levels and Alarms panels in the Map Window is configurable by the system
administrator.
Click alarmed level name in the list on the Alarms panel (see Figure 114).
Click the level link icon on the level image in the Map Window (see Figure 115).
Note. Blinking level link icon indicates that an alarm is detected on the linked level.
www.issivs.com
SecurOS 107 Quick User Guide
Map Window - Application for Working with the Graphic Scheme of the Object
2. In the Search key field of the Search window type any character (or character set) that is part of an
object name (see Figure 117).
3. All objects whose names meet the search conditions will be displayed and grouped by levels in the
Object Tree of the window (see Figure 117).
www.issivs.com
SecurOS 108 Quick User Guide
Map Window - Application for Working with the Graphic Scheme of the Object
Each type of an object displayed on the Map has a unique icon (see Object Icons).
To change the order of an object's attributes displayed on a map (name/state), perform the following
steps:
1. Click the Options button in the Map Window (see Figure 119).
2. In the Options window (see Figure 120) select/deselect the appropriate checkboxes.
Warning! Settings will be applied to the currently displayed map level only. To apply settings to all Map
levels select the Apply to all levels checkbox.
www.issivs.com
SecurOS 109 Quick User Guide
Map Window - Application for Working with the Graphic Scheme of the Object
Notes:
1. Not initialized state is assigned to the object if the Video Server with which this object is
connected has no connection with the SecurOS core.
2. Icon blinking for certain states of the objects is specified in the system settings.
Icon State
Connected
Disconnected/Unknown
Not initialized
Icon State
States of the computer that has an Operator Workstation role are not monitored
Icon State
Disarmed
/
Disarmed. Recording is on
/
www.issivs.com
SecurOS 110 Quick User Guide
Map Window - Application for Working with the Graphic Scheme of the Object
Icon State
No signal/Unknown/Detached
/
Not initialized
/
Icon State
Off
On
Unknown
Not initialized
Icon State
Off
On
Unknown
Not initialized
www.issivs.com
SecurOS 111 Quick User Guide
Map Window - Application for Working with the Graphic Scheme of the Object
Icon State
Off
On
Unknown
Not initialized
Table 11. Sensor object icons (Glass, PIR, IR, Gerkon, Smoke)
Icon State
Disarmed
Armed
Alarm
Alarm confirmed
Sabotage
Unknown/Malfunction
Not initialized
www.issivs.com
SecurOS 112 Quick User Guide
Map Window - Application for Working with the Graphic Scheme of the Object
Icon State
Disarmed
Armed
Alarm
Alarm confirmed
Sabotage
Unknown/Malfunction
Not initialized
Icon State
Disarmed
Armed
Alarm
Alarm confirmed
Sabotage
Unknown/Malfunction
www.issivs.com
SecurOS 113 Quick User Guide
Map Window - Application for Working with the Graphic Scheme of the Object
Icon State
Not initialized
Icon State
Idle
Unknown/Malfunction
2. Place mouse pointer over the level image, press the CTRL key and turn the mouse wheel to set
required scale.
www.issivs.com
SecurOS 114 Quick User Guide
Map Window - Application for Working with the Graphic Scheme of the Object
Warning! Icons size is specified by administrator in the system settings. When the scale is from 25% to 200%,
icons of the specified size will be displayed in the Map Window. When a map level scale is less than 25%, small
icons will be automatically displayed. When a scale is more than 200% the large icons will be displayed.
Note. Camera can be moved from the Map Window only if it has been selected to work with the given Media
Client in its settings.
Figure 122. Moving Camera From Map Window To Media Client Cell
Note. This procedure is possible on a Desktop which includes both the Map Window application and the Media
Client.
www.issivs.com
SecurOS 115 Quick User Guide
Map Window - Application for Working with the Graphic Scheme of the Object
Warning!
1. Operation is available only for Camera and Sensor objects. Possibility to view video for the Sensor
object is specified by the system administrator separately.
2. Possibility to jump to the Media Client to viewing video is specified by system administrator.
To jump to the Media Client to view video click the icon of one of the following objects located in the
Map Window:
Camera — after jumping the cell of the corresponding Camera will be displayed in the 1x1 layout in
the live video mode;
Sensor — after jumping the cells of all Cameras specified in the selected Sensor object settings will be
displayed in the most appropriate layout in the live video mode.
Additional Information
The indicator of a camera's current mode is located in the status bar below the camera icon:
Disarmed — arm mode off;
Armed — arm mode on;
Alarm — arm mode on; alarm is raised.
If the camera is recording, the status bar updates to the new status description (Record).
2. Right-click the selected camera. The context menu will appear (see Figure 124).
www.issivs.com
SecurOS 116 Quick User Guide
Map Window - Application for Working with the Graphic Scheme of the Object
www.issivs.com
SecurOS 117 Quick User Guide
Event Viewer - Application for Viewing Information about System Events
The appearance of the Event Viewer window in the Events monitoring mode is shown in Figure 125.
Parameter Description
www.issivs.com
SecurOS 118 Quick User Guide
Event Viewer - Application for Viewing Information about System Events
Parameter Description
Click this button to create a new or edit current Event Viewer filter
Filter Editor (button) (see Customizing Filters).
List of all filters created with the help of Event Viewer object. Select
from the list a filter that will be used in Events monitoring mode and
Events search mode to display an events.
Filter
Note. Preliminary event filtration can be performed by Event Filter object
that is configured by system administrator (see SecurOS
Administration Guide).
Each record is highlighted in the Protocol window with one of the following colors:
White — standard record;
Yellow — alarm record. If it is specified in the system settings, operator have to acknowledge a
record during specified time period (see SecurOS Administration Guide);
Gray — acknowledged alarm or information record.
Note. Record color depends on event type and is specified by the system settings.
www.issivs.com
SecurOS 119 Quick User Guide
Event Viewer - Application for Viewing Information about System Events
Searching Events.
Viewing Event in the Media Client.
Sending Emergency ticket to the Emergency service with the Help of Event Viewer.
Warning! Possibility to acknowledge an alarm and time period for operator reaction on alarm event are
defined by system operator. If specified reaction time period is expired it is not possible to acknowledgment
an alarm further. After alarm acknowledgment, log entry changes its color. Operator field displays name of
the SecurOS user or Windows user (if Active Directory is used, see SecurOS Administration Guide), who
acknowledged this alarm.
You can search events in the system using the following parameters:
Time interval
Object type
Object name
Event name
Example: Search the alarms over the particular time interval attributed to Camera 1 and Camera 2.
Please, follow these steps to complete the task.
Set the time interval in the fields From and To
Choose Camera in the Object Type list
Tick Camera 1 and Camera 2 in the Names list
Tick Alarm in the Events list
www.issivs.com
SecurOS 120 Quick User Guide
Event Viewer - Application for Viewing Information about System Events
Note. Searching the events which occurred over a long time interval is time-consuming.
4. If you do not choose Object Type, the system will show all the events in the search results. Names
and Events will go gray. Vice versa, if you do choose Object Type, you may tick a particular object.
The rule is valid for the Events list.
5. Type in the relevant fields to find an parameter value quickly. For example, if you type "Entrance
Checkpoint" in the Names field, you will see each possible value comprising "Entrance Checkpoint".
6. If you need to find all the events of the particular type, tick Normal, Alarm or Information in the
Events list.
Warning!
1. Operation is available only for events that were generated by Camera, Sensor, LPR: logic module and
Cargo: logic module objects. Possibility to view Sensor's events is specified by the system administrator
separately.
2. Possibility to view an event in Media Client is specified by system administrator.
www.issivs.com
SecurOS 121 Quick User Guide
Event Viewer - Application for Viewing Information about System Events
1. In the Protocol window right click an event, video of which you want to view.
2. Select the View event in Media Client command in the context menu (see Figure 128).
Note. Archive video can also be opened in a Media Client by double clicking or using hot keys.
3. In the Media Client selected to work with that Event Viewer, an appropriate Camera will be switched to
archive mode. Archive pointer will be set in position corresponding an event time. At the same time
all other cameras of the Media Client will be switched to on-line mode.
Warning! Automatic jump to the Media Client window is not performed. It must be activated manually.
Notes:
1. When working with Sensor's event all Cameras associated with this object will be switched to archive
mode. Minimal layout, that allows to place all cameras associated with given Sensor, will be
automatically selected on the Media Client.
2. If working with archive is not allowed by system settings, then appropriate camera of the Media
Client will display on-line video.
7.5 Sending Emergency Ticket to the Emergency Service with the Help
of Event Viewer
On Linux platform (available only for SecurOS Enterprise edition) the functionality is not supported.
Using an Event Viewer operator can send Emergency ticket to an external Emergency service.
Warning!
1. Operation is available only for events that were generated by Camera object.
2. Emergency ticket can be sent only if this feature is configured by the system administrator.
www.issivs.com
SecurOS 122 Quick User Guide
Event Viewer - Application for Viewing Information about System Events
2. To view a video record and make a decision if this event is an incident select the View event in
Media Client context menu command (see Figure 129).
Note. To quickly jump to the Media Client to view an event double click required event from the list.
3. If after of examination an event is classified as an incident, return to appropriate entry in the Event
Viewer. In the context menu select the Fill out Ticket and send it to Emergency Service command
(see Figure 129).
4. In the Emergency Ticket window (see Figure 130) select from the list the Incident Type, select, if
necessary, the People in danger checkbox and fill out the Additional Info field.
After message is sent two events of the Emergency ticket sending are added to the Protocol window:
Event of sending by User Account — is generated by User Account object.
www.issivs.com
SecurOS 123 Quick User Guide
Event Viewer - Application for Viewing Information about System Events
If emergency ticket was successfully sent by Emergency Service then sent data are displayed in the
comment window. If sending failure occured the reasons of the error are displayed (for example,
see Figure 131).
Event Viewer object allows to create any number of filters. When the Event Viewer is started for the first
time the filter list contains the only Default filter which permits the conclusion of all events from all
objects SecurOS without restrictions.
www.issivs.com
SecurOS 124 Quick User Guide
Event Viewer - Application for Viewing Information about System Events
Parameter Description
Name of the currently used filter. When creating a new filter, type
Filter name
its name in this field.
www.issivs.com
SecurOS 125 Quick User Guide
Event Viewer - Application for Viewing Information about System Events
Parameter Description
Select from the list the event type that must be displayed in the
Event Viewer window if given filter is used. Possible values:
Type any characters that are a part of an object name. The object tree
will display only those objects whose names contain specified
Filter
characters. If the field is empty then all SecurOS objects, including
disabled in the SecurOS Object tree, will be displayed in the tree.
Buttons (Select all)/ Click the appropriate button to select/deselect checkbox for all
(Clear all) objects of the tree simultaneously.
Tree of the objects the events of which can be displayed in the Event
Viewer window. The structure of the tree depends on the Filter
parameter value. To enable displaying object's events select
checkbox on the left of the object name. To disable displaying
object's events deselect checkbox.
Object tree
Note. All object in the tree are grouped by object type. The name of the
grouping object is the same as type name. To select all object of the same
type, select checkbox on the left of grouping object. If not all object of the
same type are selected, then the icon is displayed on the left of the
grouping object.
Buttons
www.issivs.com
SecurOS 126 Quick User Guide
Event Viewer - Application for Viewing Information about System Events
3. To save filter with the same name click the Save button. To save filter with a new name specify it in
the Filter field, then click the Save button.
Warning! When filter that is being edited is saved with a new name, the initial filter is completely removed
and can not be restored.
Each operator can customize Event Viewer window appearance. The following components can be
adjusted in the window:
Order of the protocol columns;
Width of the protocol columns;
Protocol entries font size;
Position of the protocol window and comment window delimiter.
To change the order of the table columns click required column by the left mouse button and holding
button down move column to the required position.
To change column width place mouse pointer over column delimiter. Mouse pointer will be as
presented in Figure 133.
Click and hold the left mouse button, then move a pointer into required direction.
To change font size for the entries displayed in the Event Viewer window use the following shortcuts:
- (Num Pad) — decrease font size;
+ (Num Pad) — increase font size.
Note. All shortcuts available in the Event Viewer window are described in the Keyboard Shortcuts section
(see Event Protocol Window).
To change a position of the protocol window and comment window delimiter place mouse pointer
over it. Mouse pointer will be as presented in Figure 134.
www.issivs.com
SecurOS 127 Quick User Guide
Event Viewer - Application for Viewing Information about System Events
Figure 134. Changing protocol window and comment window delimiter position
Click and hold the left mouse button move delimiter to the required direction.
To save GUI changes press the Ctrl + S keys. Otherwise all changes will be lost when Event Viewer
window will be started next time.
Warning! All settings of the Event Viewer window are saved only for Windows user account.
www.issivs.com
SecurOS 128 Quick User Guide
Subsystem for Working with SIP Devices
External SIP Devices (intercoms) are devices for emergency communication, for example, with a
situation monitoring center or emergency assistance. Such devices can be located in crowded places, in
places of increased danger, etc. In an emergency, a person can use the intercom to call the monitoring
center for assistance, etc. On the other hand, the operator of such a center can visually monitor the
situation in the area of the intercom installation and, if necessary, make an outgoing call on the
intercom. Visual control is carried out by the operator using a camera built into the intercom, or
cameras installed in the immediate vicinity of it.
The SIP: GUI application is intended for making calls from SecurOS to external SIP Devices (intercoms)
and receiving calls from them.
The appearance of the SIP: GUI window in call standby mode is shown in Figure 135.
www.issivs.com
SecurOS 129 Quick User Guide
Subsystem for Working with SIP Devices
The window contains the following main elements (the serial number of the element corresponds to the
numbering in the figure):
1. Operator information block — contains the operator's login and current state.
2. SIP Devices block — contains SIP Devices tree, that the current operator can work with and the SIP
Device search field.
3. Selected SIP Device information block — contains the name of the SIP Device selected in the Devices
tree and its current state.
4. Current call block — contains detailed description of the SIP Device, selected in the Devices tree and
the state of the current call. Also contains call control tools.
Some operations with SIP Devices are available to the operator from the Map Window (see Working
with SIP Devices from Map Window).
SIP: GUI window consists of 4 blocks. The horizontal size of each block can be changed using the
vertical divider by moving it with the mouse.
www.issivs.com
SecurOS 130 Quick User Guide
Subsystem for Working with SIP Devices
The list displays the current states of SIP Devices and the corresponding icons (for some states):
1. SIP Device with which the SecurOS operator is currently communicating (outgoing or incoming
connection established).
2. Idle SIP Device (no outgoing or incoming calls).
3. SIP Device with which there is no connection, for which no contact is specified, or the device settings
are incorrect.
4. SIP Device that calls SecurOS.
5. SIP Device that is currently used by other operator.
www.issivs.com
SecurOS 131 Quick User Guide
Subsystem for Working with SIP Devices
— button to jump to viewing video in the Media Client. It is displayed if at least one Camera
is linked to the device.
— hang up button.
www.issivs.com
SecurOS 132 Quick User Guide
Subsystem for Working with SIP Devices
To change the operator's state click the icon to the right of the current state and select the required
one from the list (see Figure 141).
To quickly search for a SIP Device in the list, enter any character (or set of characters) of the device
name, including device identifier, in the Search field (see Figure 142).
All SIP Devices that meet the search conditions will be displayed in the list (see Figure 142).
www.issivs.com
SecurOS 133 Quick User Guide
Subsystem for Working with SIP Devices
The SIP: GUI window will look as follows (see Figure 143):
When the connection is established (i.e. if the SIP Device answered the call), the window will look like
this (see Figure 144):
Figure 144. External SIP device answered outgoing call from SecurOS
www.issivs.com
SecurOS 134 Quick User Guide
Subsystem for Working with SIP Devices
By default, after the call is answered the SecurOS operators microphone is on. To temporarily turn the
microphone off while talking to a caller, click the button. The appearance of the button will
change to . Click the button again to turn the microphone back on.
When a call comes from an external intercom to SecurOS, the SIP: GUI window as follows
(see Figure 145):
Note. After dialing the number on the intercom, the call is placed in the call queue in SecurOS. If no SecurOS
operator answers within 40 seconds, the call is declined by the timed out.
When the connection is established (i.e. if the SecurOS operator answered the SIP Device call), the
window will look like this (see Figure 146):
www.issivs.com
SecurOS 135 Quick User Guide
Subsystem for Working with SIP Devices
By default, after the call is answered the SecurOS operators microphone is on. To temporarily turn the
microphone off while talking to a caller, click the button. The appearance of the button will
change to . Click the button again to turn the microphone back on.
To display on the Media Client all Cameras linked to the current SIP Device from the list, select the
required device in the list and click the (Show cameras) button, see Figure 147.
www.issivs.com
SecurOS 136 Quick User Guide
Subsystem for Working with SIP Devices
The most suitable layout will be selected on the Media Client. The layout cells will display all Cameras
linked to this SIP Device. The primary Camera of the SIP Device will be located in the upper left cell.
Note. Primary Camera of the SIP Device is specified by the system administrator.
Warning! Automatic jump to the Media Client window is not performed. The window must be activated
manually.
Note. To make such a call, a Camera displayed on the Media Client must be linked to at least one SIP Device.
Note. If this Camera is linked to several SIP Devices, click the arrow to the right of the command (see the figure
above) and select the required device from the list.
— SIP Device with which the SecurOS operator is currently communicating (outgoing or
incoming connection established). Also a SIP Device receiving a call from SecurOS.
www.issivs.com
SecurOS 137 Quick User Guide
Subsystem for Working with SIP Devices
— SIP Device with which there is no connection, for which no contact is specified, or the
device settings are incorrect.
When making a call from SecurOS (see Calling SIP Device) to a SIP Device displayed in the Map
Window, the map will be automatically centered relative to this device (if possible).
Note. If the SIP Device icon is located in the border areas of the map, the map is not centered.
www.issivs.com
SecurOS 138 Quick User Guide
Subsystem for Working with SIP Devices
The most suitable layout will be selected on the Media Client. The layout cells will display all Cameras
linked to this SIP Device. The primary Camera of the SIP Device will be located in the upper left cell.
Note. Primary Camera of the SIP Device is specified by the system administrator.
www.issivs.com
SecurOS 139 Quick User Guide
Using CCTV Keyboards and Joysticks
Note. See SecurOS Administration Guide for information about SecurOS system integration with CCTV
keyboards and joysticks.
SecurOS system ignores commands with invalid input values when working with CCTV keyboards
and joysticks. Examples of invalid input in commands:
ID of a Camera is not available in the Cameras list of the active Media Client.
The selected camera working mode is prohibited by the Media Client working mode (for example,
switching camera to archive mode when Media Client is working in Live only mode).
www.issivs.com
SecurOS 140 Quick User Guide
Using CCTV Keyboards and Joysticks
Note. The set of available functions depends on the active camera model, working mode and settings of the
active Media Client (see Working modes of Media Client section).
AXIS T8310 overview with specified device components is shown in Figure 151:
Warning! Only the objects of current SecurOS Desktop are available while working with AXIS T8312 (see
Desktop Administration section for details).
The AXIS T8312 keypad (see Figure 152) can be used to:
Activate Media Client.
Activate camera.
Turn archive mode on/ off.
Warning! SecurOS executes a command when a key is released. If one of the keyboard keys is pressed,
pressing of other keys will be ignored.
www.issivs.com
SecurOS 141 Quick User Guide
Using CCTV Keyboards and Joysticks
Note. To reset input made on the AXIS T8312 keypad, press the F1 key.
To activate Media Client, specify the required Media Client ID with the 0...9 keys and press the
key.
Note. Contact the system administrator to obtain the IDs of Media Clients.
Active Media Client has light blue frame (see Figure 153).
To activate camera, enter the required ID with 0...9 keys and press the key. Use Camera IDs,
displayed in the Camera cell headers (see Camera Cell Controls section for details).
Figure 153. Active Media Client and the active camera cell
Warning! The functions described below are available for active camera depending on the Media Client
working mode (see section Working modes of Media Client).
To switch all cameras of active Media Client to archive mode, press the F3 key.
To switch active camera to archive mode, use playing recording from the specified time feature.
To switch all cameras of active Media Client to live mode, press the F2 key.
www.issivs.com
SecurOS 142 Quick User Guide
Using CCTV Keyboards and Joysticks
Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).
The AXIS T8311 joystick (see Figure 154) can be used to:
Control camera PTZ.
Moving the camera to presets.
Controlling focal length of the camera.
Controlling the camera iris.
Note. The movement speed depends on the joystick's deflection angle. The zoom speed depends on the knob
rotation angle.
Presets IDs are displayed on the Presets panel on the PTZ control tab of the Media Client (see
section Working with Presets and Tours for details).
www.issivs.com
SecurOS 143 Quick User Guide
Using CCTV Keyboards and Joysticks
Warning! The functions described below are available for active camera working in archive mode (see
section Working with AXIS T8312 Keypad).
The AXIS T8313 jogdial (see Figure 155) can be used to:
Play back records.
Export video frame in standard format.
Note. Turning the jogdial stop playback and then starts playing frame by frame.
www.issivs.com
SecurOS 144 Quick User Guide
Using CCTV Keyboards and Joysticks
Warning! If the shuttle ring is held in turned position, SecurOS system will ignore pressing keys of the AXIS
T8310. SecurOS system will respond to pressing keyboard keys after the shuttle ring is released.
To play recording from the specified time, specify the time in HHMM format with the 0...9 keys of AXIS
T8312 numeric panel and press the key. The archive pointer will be set to the first archive frame after
the specified time.
Example. Entering 1100 and pressing sets the archive pointer to the first frame after 11:00 time mark.
To export video frame in standard format (see the Exporting Video Frame In Standard Format section
for details), press the L key. The system will display a window with information about the saved frame
(see Figure 156).
Note. The set of available functions depends on the active camera model, working mode and settings of the
active Media Client (see Working modes of Media Client section).
www.issivs.com
SecurOS 145 Quick User Guide
Using CCTV Keyboards and Joysticks
Number Description
2 Display
3 Functional keys
Initially the main menu of Bosch IntuiKey displays commands, specified by the system administrator
(see SecurOS Administration Guide). The default main menu is displayed in Figure 158.
www.issivs.com
SecurOS 146 Quick User Guide
Using CCTV Keyboards and Joysticks
The menu contents changes depending on selected command. Selecting the Other commands
command opens the new menu with the commands not assigned to the main menu. The default Other
commands menu contains the following functions:
Start tour.
Stop tour.
Arm camera.
Disarm camera.
Start recording video.
Stop recording video.
Note. The Other commands item is always located in the right bottom.
To execute a command, press the programmatic key near the required menu item.
If the entered command requires additional input, the main menu displays the hint text.
Example. If the Activate camera command is selected, the menu will display the hint "Specify Camera ID
and press [Enter]. Press [Clr] to Exit".
www.issivs.com
SecurOS 147 Quick User Guide
Using CCTV Keyboards and Joysticks
Warning! Media Clients available for usage with Bosch IntuiKey are specified in the keyboard settings (see
SecurOS Administration Guide for details). If a command is sent to unavailable Media Client, it will be
ignored by SecurOS system.
Note. When SecurOS starts, Media Client, specified for default control by the keyboard, will be active
(see SecurOS Administration Guide).
Note. When a Media Client is activated, the system switches to Desktop, containing activated Media Client.
Active Media Client has light blue frame (see Figure 159).
Figure 159. Active Media Client and the active camera cell
www.issivs.com
SecurOS 148 Quick User Guide
Using CCTV Keyboards and Joysticks
To activate camera:
1. Select the Activate camera command in the menu.
2. Specify the required Camera ID with 0...9 keys and press the key. Use camera IDs,
displayed in the camera cell headers (see Camera Cell Controls section for details).
Warning! To delete numbers entered by the numeric keys, press the key.
Use the main menu commands Up, Down, Left and Right to change active camera.
All available Media Client layouts are switched in their order of appearance in the Layouts panel.
Selected layout is highlighted in the Layouts panel (see Selecting Layout section).
Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).
Note. The movement speed depends on the joystick's deflection angle. The zoom speed depends on the knob
rotation angle.
To start tour:
1. Select the Start tour command in the menu.
2. Enter the tour ID using the 0...9 keys and press the key. Use tour IDs, specified on
the Tours panel of the PTZ control tab of the Media Client (see the Working with Presets and Tours
www.issivs.com
SecurOS 149 Quick User Guide
Using CCTV Keyboards and Joysticks
Warning! To delete numbers entered by the numeric keys, press the key.
Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).
Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).
Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).
www.issivs.com
SecurOS 150 Quick User Guide
Using CCTV Keyboards and Joysticks
To export video frame in standard format (see the Exporting Video Frame In Standard Format section
for details), select the Save image command in the menu. The system will display a window with
information about the saved frame (see Figure 160).
To set a bookmark on a frame (see the Setting Bookmarks section for details), select the Set bookmark
command in the menu. Name of the added bookmark is created automatically and has the following
format: <Camera Name> <current frame time stamp>. The system will display a window with
information about the created bookmark (see Figure 161).
To execute Macro:
1. Select the Macro command in the menu.
2. In the new menu select the Macro.
Note. The set of available functions depends on the active camera model, working mode and settings of the
active Media Client (see Working modes of Media Client section).
www.issivs.com
SecurOS 151 Quick User Guide
Using CCTV Keyboards and Joysticks
Note. Keys without icons are reserved and are not used when working with SecurOS system.
Warning! Only the objects of current SecurOS Desktop are available while working with Bosch KBD-Universal
XF (see Desktop Administration section for details).
www.issivs.com
SecurOS 152 Quick User Guide
Using CCTV Keyboards and Joysticks
To activate Media Client, switch between all available Media Clients of the current Desktop with the
key. Active Media Client has light blue frame (see Figure 163).
Figure 163. Active Media Client and the active camera cell
To activate camera:
1. Enter the required camera ID with the 0...9 keys. Use camera IDs, displayed in the camera cell
headers (see Camera Cell Controls for details). To cancel input, press the ESC key.
Note. ID input will be reset in 10 seconds. If the input is not confirmed within this interval, input must be
repeated.
All available Media Client Views are switched in their order of appearance in the Views list or Views quick
access panel (see section Using Views).
www.issivs.com
SecurOS 153 Quick User Guide
Using CCTV Keyboards and Joysticks
Selected View is highlighted in the Views list and Views quick access panel (see section Choosing View in
Media Client).
1. Press and hold the ESC key and press the or the keys to switch to layout operations
mode.
2. Press and hold the key and press the key to select the next layout.
Press and hold the key and press the key to select the previous layout.
All available Media Client layouts are switched in their order of appearance in the Layouts panel. Selected
layout is highlighted in the Layouts panel (see Selecting Layout section).
Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).
Note. The movement speed depends on the joystick's deflection angle. The zoom speed depends on the knob
rotation angle.
To start tour, enter the tour ID using the 0...9 keys and press the key. Use tour IDs, specified on
the Tours panel of the PTZ control tab of the Media Client (see the Working with Presets and Tours
section for details).
Note. ID input will be reset in 10 seconds. If the input is not confirmed within this interval, input must be
repeated.
www.issivs.com
SecurOS 154 Quick User Guide
Using CCTV Keyboards and Joysticks
To stop tour, press and hold the ESC key and press the key.
To move camera to a preset, enter the tour ID using the 0...9 keys and press the key. Use tour
IDs, specified on the Presets panel of the PTZ control tab of the Media Client (see the Working with
Presets and Tours section for details).
Note. ID input will be reset in 10 seconds. If the input is not confirmed within this interval, input must be
repeated.
Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).
www.issivs.com
SecurOS 155 Quick User Guide
Using CCTV Keyboards and Joysticks
Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).
Press the key to switch the camera cell to the previous size.
To export video frame in standard format (see the Exporting Video Frame In Standard Format section
for details), press the key. The system will display a window with information about the saved
frame (see Figure 164).
www.issivs.com
SecurOS 156 Quick User Guide
Using CCTV Keyboards and Joysticks
To set a bookmark on a frame (see the Setting Bookmarks section for details), press the key.
Name of the added bookmark is created automatically and has the following format: <Camera Name>
<current frame time stamp>. The system will display a window with information about the
created bookmark (see Figure 165).
To turn the camera speaker on/ off (see the Working with a Camera's Speaker section for details),
Warning! To use the keyboard in SecurOS, you must switch it to SSM mode. To do this select the Recorder
command in the keyboard main menu, then the SSM command.
To start using SecurOS system with Hanwha SPC-7000 it is required to select active camera.
Note. The set of available functions depends on the active camera model, working mode and settings of the
active Media Client (see Working modes of Media Client section).
Hanwha SPC-7000 overview with keys layout is displayed in Figure 166. Device keys, used in SecurOS
system are in the table 18.
www.issivs.com
SecurOS 157 Quick User Guide
Using CCTV Keyboards and Joysticks
Number Description
1 Joystick with built-in button and keys for working with presets
and tours.
2 Numeric keys
Warning! Only the objects of current SecurOS Desktop are available while working with Hanwha SPC-7000
(see Desktop Administration section for details).
www.issivs.com
SecurOS 158 Quick User Guide
Using CCTV Keyboards and Joysticks
To activate the Media Client switch between all available Media Clients of the current Desktop using
the MON.|CON key. Active Media Client has light blue frame (see Figure 167).
Figure 167. Active Media Client and the active camera cell
To activate camera:
1. Enter the required camera ID with the 0...9 keys. Use camera IDs, displayed in the camera cell
headers (see Camera Cell Controls for details). To cancel input, press the ESC|SETUP key.
2. Confirm input with the CAM key.
To stop automatic paging of the Views press the same keys again.
All available Media Client Views are switched in their order of appearance in the Views list or Views quick
access panel (see section Using Views).
www.issivs.com
SecurOS 159 Quick User Guide
Using CCTV Keyboards and Joysticks
Selected View is highlighted in the Views list and Views quick access panel (see section Choosing View in
Media Client).
Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).
Note. The movement speed depends on the joystick's deflection angle. The zoom speed depends on the knob
rotation angle.
To start tour, specify the tour ID with the 0...9 keys and press the GROUP|TOUR key. Use the tour
IDs displayed on the Tours panel on the PTZ control tab of the Media Client (see section Working with
Presets and Tours for details).
Warning! To delete digits entered with the help of the keys, press the ESC|SETUP key.
To move camera to a preset, specify the preset ID with the 0...9 keys and press the PRESET key. Use
presets IDs displayed on the Presets panel on the PTZ control tab of the Media Client (see Working
with Presets and Tours section for details).
www.issivs.com
SecurOS 160 Quick User Guide
Using CCTV Keyboards and Joysticks
Press the Right arrow key to close iris (make the image darker).
Press the Left arrow key to open iris (make the image lighter).
Press the ESC|SETUP key to exit the iris control mode.
Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).
To switch to the archive mode/ return to the live video, press the SEARCH key.
Note. Turning the jogdial stop playback and then starts playing frame by frame.
www.issivs.com
SecurOS 161 Quick User Guide
Using CCTV Keyboards and Joysticks
Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).
To export video frame in standard format (see the Exporting Video Frame In Standard Format section
for details), press the button located on the joystick handle. The system will display a window with
information about the saved frame (see Figure 168).
Note. The set of available functions depends on the active camera model, working mode and settings of the
active Media Client (see Working modes of Media Client section).
Hikvision DS-1100KI overview with specified device components is shown in Figure 169:
www.issivs.com
SecurOS 162 Quick User Guide
Using CCTV Keyboards and Joysticks
Number Description
www.issivs.com
SecurOS 163 Quick User Guide
Using CCTV Keyboards and Joysticks
Warning! Media Clients available for usage with Hikvision DS-1100KI are specified in the keyboard settings
(see SecurOS Administration Guide for details). If a command is sent to unavailable Media Client, it will be
ignored by SecurOS system.
Warning! To cancel input made from the keyboard, press the ESC key of Hikvision DS-1100KI.
Note. When SecurOS starts, Media Client, specified for default control by the keyboard, will be active
(see SecurOS Administration Guide).
To activate Media Client, enter the required Media Client ID with the 0...9 keys and press the MON
key.
www.issivs.com
SecurOS 164 Quick User Guide
Using CCTV Keyboards and Joysticks
Note. Contact the system administrator to obtain the IDs of Media Clients.
Warning! If the Layouts panel is not displayed, switching layouts is not available.
Selected layout is highlighted in the Layouts panel (see Selecting Layout section).
To activate a cell of the Media Client's Working Area, enter the cell number with the 0...9 keys and
press the WIN key. Working area cell are numbered left to right and top to bottom, starting with top left
cell (see Figure 173).
To place the required camera to the active cell, enter the required Camera ID with the 0...9 keys and
press the CAM key. Use Camera IDs, displayed in the Camera cell headers (see Camera Cell Controls for
details).
Note. If the Media Client's cell number was not specified, active camera will be placed into the previous active
cell.
www.issivs.com
SecurOS 165 Quick User Guide
Using CCTV Keyboards and Joysticks
Figure 173. Media Client cells numbering and the active camera cell
Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).
Warning! To cancel input made from the keyboard, press the ESC key of Hikvision DS-1100KI.
Note. The movement speed depends on the joystick's deflection angle. The zoom speed depends on the knob
rotation angle.
www.issivs.com
SecurOS 166 Quick User Guide
Using CCTV Keyboards and Joysticks
To start tour, specify the tour ID with the 0...9 keys and press the PATROL key. Use the tour IDs
displayed on the Tours panel on the PTZ control tab of the Media Client (see section Working with
Presets and Tours for details).
To create a preset:
1. Set the camera PTZ to the required position.
2. Enter the preset name with the 0...9 keys and press the PRESET key.
The created preset will be added to the Presets panel on the PTZ control tab of the Media Client (see
section Working with Presets and Tours for details).
To move camera to a preset, specify the preset ID with the 0...9 keys and press the CALL key. Use
presets IDs displayed on the Presets panel on the PTZ control tab of the Media Client (see Working
with Presets and Tours section for details).
Note. The set of available functions depends on the active camera model, working mode and settings of the
active Media Client (see Working modes of Media Client section).
Panasonic WV-CU950 overview with keys layout is displayed in Figure 174. Device keys, used in
SecurOS system are in the table 20.
www.issivs.com
SecurOS 167 Quick User Guide
Using CCTV Keyboards and Joysticks
Number Description
4 SHIFT key
5 CLEAR key
8 ALARM key
18 MARK key
21 SEARCH key
24 STOP key
26 REC key
27 Shuttle ring
www.issivs.com
SecurOS 168 Quick User Guide
Using CCTV Keyboards and Joysticks
Number Description
30 “-" key
31 "+" key
33 PRESET key
35 Numeric keys
36 MON key
37 CAM key
41 Functional buttons
57 Joystick
Note. Keys 41 and 56 are programmatic. Contact the system administrator for the information about these
keys' functions.
The following commands can be executed with the F1-F4 keys (and their combinations with the SHIFT
key) and the A and B joystick keys:
Arm camera.
Disarm camera.
Start recording video.
Stop recording video.
Stop tour.
Export video frame in stadard format.
Set bookmark.
Execute Macro.
Camera auto focus.
Automatic iris control.
Warning! Media Clients available for usage with Panasonic WV-CU950 are specified in the keyboard settings
(see SecurOS Administration Guide for details). If a command is sent to unavailable Media Client, it will be
ignored by SecurOS system.
www.issivs.com
SecurOS 169 Quick User Guide
Using CCTV Keyboards and Joysticks
Note. When SecurOS starts, Media Client, specified for default control by the keyboard, will be active
(see SecurOS Administration Guide).
Warning! To delete numbers entered by the numeric keys of Panasonic WV-CU950, press the CLEAR key.
To activate Media Client, enter the required Media Client ID with the 0...9 keys and press the MON
(ESC) key.
Note. Contact the system administrator to obtain the IDs of Media Clients.
If needed:
Change layout/ View of Media Client.
Select Media Client's page.
Place the required camera into the selected Working Area cell.
To activate camera, enter the required Camera ID with the 0...9 keys and press the CAM (SET) key.
Use Camera IDs, displayed in the Camera cell headers (see Camera Cell Controls for details).
If the required camera is not displayed in the current layout page, active Media Client will switch to the
layout's page containing the required camera. Active camera cell has blue frame (see Figure 174).
Figure 175. Active Media Client and the active camera cell
www.issivs.com
SecurOS 170 Quick User Guide
Using CCTV Keyboards and Joysticks
To select View/ layout of Media Client, enter the number of View/layout with the 0...9 keys and press
the GO TO LAST key, to select a specific View/layout.
Selected View is highlighted in the Views list and Views quick access panel (see section Choosing View in
Media Client). Selected layout is highlighted in the Layouts panel (see Selecting Layout section).
All available Media Client Views/layouts are switched in their order of appearance in the Views list or
Views quick access panel (if switching Views) or in the Layouts panel (if switching layouts).
Note. If working with Views is allowed in the active Media Client, then the instructions above are used to
switch Views of the Media Client. If working with Views is not allowed, then the instructions above are used to
switch Media Client's layouts.
To select Media Client's page, press and hold the SHIFT key and press the +/- keys.
To place the required camera into the selected Working Area cell:
1. Enter the Working area cell number with the 0...9 keys and press the CAM POSI key. Working area
cell are numbered left to right and top to bottom, starting with top left cell (see Figure 176).
2. To activate camera, enter the required Camera ID with the 0...9 keys and press the CAM (SET) key.
Use Camera IDs, displayed in the Camera cell headers (see Camera Cell Controls for details).
Video from required camera will be displayed in the selected Working Area cell of the Media Client. If the
selected cell already contains camera, it will be moved to another cell within the layout.
www.issivs.com
SecurOS 171 Quick User Guide
Using CCTV Keyboards and Joysticks
Warning! The functions described below are available for active camera depending on the Media Client
working mode (see section Working modes of Media Client).
Note. Functions, described in this section, can be assigned to programmatic keys by the system administrator
(see the Panasonic WV-CU950 section).
Note. The movement speed depends on the joystick's deflection angle. The zoom speed depends on the knob
rotation angle.
To stop tour, press and hold the SHIFT key and press the SEQ PAUSE key or use a programmatic key.
Warning! To delete numbers entered by the numeric keys, press the CLEAR key.
To move camera to a preset, specify the preset ID with the 0...9 keys and press the PRESET key.
Use presets IDs displayed on the Presets panel on the PTZ control tab of the Media Client (see
section Working with Presets and Tours for details).
www.issivs.com
SecurOS 172 Quick User Guide
Using CCTV Keyboards and Joysticks
Press the IRIS CLOSE key to close iris (make the image darker).
Use a programmatic key for automatic iris control.
Warning! The functions described below are available for active camera depending on the Media Client
working mode (see section Working modes of Media Client).
Note. Functions, described in this section, can be assigned to programmatic keys by the system administrator
(see the Panasonic WV-CU950 section).
To arm the camera, press and hold the SHIFT key and press the ALARM key or use a programmatic
key.
To disarm the camera, press and hold the SHIFT key and press the ALM RESET key or use a
programmatic key.
Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).
Note. Functions, described in this section, can be assigned to programmatic keys by the system administrator
(see the Panasonic WV-CU950 section).
To start recording video, press the REC key. Press and hold the REC key for longer than 1 sec to stop
recording video. Starting and stopping recording video can be performed by the programmatic keys.
To switch to the live mode, press and hold the SHIFT key and press the SEARCH key.
www.issivs.com
SecurOS 173 Quick User Guide
Using CCTV Keyboards and Joysticks
Note. Turning the jogdial stop playback and then starts playing frame by frame.
Press the SHUTTLE HOLD key, while holding the shuttle ring in required position, and release the
shuttle ring to set the constant playback speed. To restore original playback speed, press the
SHUTTLE HOLD key again.
Warning! The functions described below are available for active camera depending on the Media Client
working mode (see Working modes of Media Client).
Note. Functions, described in this section, can be assigned to programmatic keys by the system administrator
(see the Panasonic WV-CU950 section).
To switch camera cell between full-screen mode and back, press the MULTI SCREEN key.
To export video frame in standard format (see the Exporting Video Frame In Standard Format section
for details), press a programmatic key. The system will display a window with information about the
saved frame (see Figure 177).
www.issivs.com
SecurOS 174 Quick User Guide
Using CCTV Keyboards and Joysticks
To set a bookmark on a frame (see the Setting Bookmarks section for details), press the MARK key or
a programmatic key. Name of the added bookmark is created automatically and has the following
format: <Camera Name> <current frame time stamp>. The system will display a window with
information about the created bookmark (see Figure 178).
www.issivs.com
SecurOS 175 Quick User Guide
Keyboard Shortcuts
10 Keyboard Shortcuts
Note. All keyboard shortcuts work with the English keyboard layout only.
Note. In the Event Protocol window, keyboard shortcuts are only used.
Shortcuts Description
www.issivs.com
SecurOS 176 Quick User Guide
Keyboard Shortcuts
Shortcuts Description
Warning! Shortcuts can only be used if corresponding commands/buttons are available in user interface.
F10 Display/Hide the Titles of all cells in the Media Client main window.
Enable/Disable full screen mode for the Media Client. If full screen
F11 mode is on, the Media Client works only in View mode (all Media
Client controls are not available).
Ctrl+
Ctrl+
Turn PTZ camera in the specified direction.
Ctrl+
Ctrl+
CTRL++ (plus)
Change zoom of PTZ camera.
CTRL+- (minus)
www.issivs.com
SecurOS 177 Quick User Guide
Keyboard Shortcuts
Shortcuts Description
Shortcuts Description
Working with the Map objects tree (in the Levels and Alarms panels)
www.issivs.com
SecurOS 178 Quick User Guide
Keyboard Shortcuts
Shortcuts Description
www.issivs.com
AXIS A4x20-E Readers
AXIS A4020-E Reader
AXIS A4120-E Reader with Keypad
User Manual
AXIS A4x20-E Readers
Installation
Installation
www.axis.com/products/online-manual/70685#t10171383
2
AXIS A4x20-E Readers
The device works as a standard OSDP reader out-of-the-box. You can access specific features and change settings in
AXIS Camera Station Secure Entry. Below is an example of how to configure the device through AXIS Camera Station Secure Entry.
Encrypted communication
AXIS Camera Station Secure Entry supports OSDP (Open Supervised Device Protocol) Secure Channel to enable line encryption
between controller and AXIS A4020-E Reader.
2. Specify your main encryption key and click OK. To change the main encryption key, click .
3. Turn on OSDP Secure Channel. This option is only available after you have set the main encryption key.
4. By default, the OSDP Secure Channel key is generated by the main encryption key. To manually set the OSDP Secure
Channel key:
4.2 Clear Use main encryption key to generate OSDP Secure Channel key.
4.3 Type the OSDP Secure Channel key and click OK.
To turn on or turn off OSDP Secure Channel for a specific reader, see .
3
AXIS A4x20-E Readers
Troubleshooting
Troubleshooting
1. Remove the device from the backplate. This disconnects power from the device.
2. Use a blunt instrument to press and hold the control button while you reconnect power by connecting the terminal block
to the pins in the device. See Product overview on page 5 . You will hear a beep when you reconnect power.
4. Release the control button. The device has been reset to the factory default settings.
6. Hook the device onto the backplate and close the unit slowly.
4
AXIS A4x20-E Readers
Specifications
Specifications
Product overview
DIP switches
DIP switch Default setting Function
1 Off OSDP address:
Off + Off = 0*
2 Off Off + On = 1
On + Off = 2
On + On = 3
3 Off RS485 termination, Off = active
4 Off -
5 Off -
5
AXIS A4x20-E Readers
Specifications
Buttons
Control button
The control button is used for:
• Resetting the product to factory default settings. See Reset to factory default settings on page 4 .
Baud rate
The default baud rate is 9600. To change it, use the command osdp_COMSET.
6
User Manual Ver. M1.11
AXIS A4x20-E Readers Date: September 2021
© Axis Communications AB, 2021 Part No. T10171378
AXIS A82 Network Video Door Station Series
AXIS A8207-VE Network Video Door Station
AXIS A8207-VE Mk II Network Video Door Station
User Manual
AXIS A82 Network Video Door Station Series
Table of Contents
Solution overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Product overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Get started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Find the device on the network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Access the device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Secure passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Additional settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Change the root password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Set up direct SIP (P2P) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Set up SIP through a server (PBX) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Create an organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Create a contact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Configure the call button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Set up as card reader - network connection . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Set up as card reader - wired connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Use DTMF to unlock the door for a visitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Transmit live video to a monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Print a contact list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Learn more . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
The phone book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Voice over IP (VoIP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Set up rules and alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Daily use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Use the keypad . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Reset to factory default settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Check the current firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Upgrade the firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Technical issues, clues and solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Performance considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Front panel indicators and controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
LED indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
SD card slot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Connectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Safety information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Hazard levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Other message levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2
AXIS A82 Network Video Door Station Series
Solution overview
Solution overview
1 Door station
2 Door station combined with AXIS A9801
3 Door station combined with AXIS A9161
4 Door station combined with an access control system, for example AXIS A1001 or AXIS A1601
3
AXIS A82 Network Video Door Station Series
Product overview
Product overview
1 Speaker
2 Camera
3 Call indicator icons on page 23
4 Card reader indicator stripe on page 23
5 Keypad
6 Call button on page 23
7 Card reader icon
8 Microphone
9 PIR-sensor
10 T-coil icon
4
AXIS A82 Network Video Door Station Series
Product overview
5
AXIS A82 Network Video Door Station Series
Installation
Installation
www.axis.com/products/online-manual/44899#t10170588
www.axis.com/products/online-manual/44899#t10170587
6
AXIS A82 Network Video Door Station Series
Get started
Get started
For more information about how to find and assign IP addresses, go to How to assign an IP address and access your device.
If you do not know the IP address, use AXIS IP Utility or AXIS Device Manager to find the device on the network.
2. Enter the username and password. If you access the device for the first time, you must set the root password. See Set a
new password for the root account on page 7 .
Secure passwords
Important
Axis devices send the initially set password in clear text over the network. To protect your device after the first login, set
up a secure and encrypted HTTPS connection and then change the password.
The device password is the primary protection for your data and services. Axis devices do not impose a password policy as they
may be used in various types of installations.
www.axis.com/products/online-manual/44899#t10098905
1. Type a password. Follow the instructions about secure passwords. See Secure passwords on page 7 .
7
AXIS A82 Network Video Door Station Series
Get started
8
AXIS A82 Network Video Door Station Series
Additional settings
Additional settings
This section will cover all the important configurations that an installer needs to do to get the product up and running after
the hardware installation has been completed.
In this product VoIP is enabled through the SIP protocol. For more information about SIP, see Session Initiation Protocol (SIP) on
page 16
There are two types of setups for SIP. Peer-to-peer is one of them. Use peer-to-peer when the communication is between a few user
agents within the same IP network and there is no need for extra features that a PBX-server could provide. For information on
how to set it up, see Peer-to-peer SIP (P2PSIP) on page 16.
2. In Call timeout, set the number of seconds that a call will last before it ends if there is no answer.
3. To allow the device to receive incoming calls, select Allow incoming calls.
NOTICE
NO TICE
When you allow incoming calls, the device accepts calls from any device connected to the network. If the device is accessible
from a public network or the internet, we recommend you to disable incoming calls.
5. Click Save.
6. In Port settings, enter the SIP port number and SIP TLS port number.
Note
• SIP port – for SIP sessions. Signalling traffic through this port is non-encrypted. The default port number is 5060.
• SIP TLS port – for SIPS and TLS secured SIP sessions. Signalling traffic through this port is encrypted with Transport Layer
Security (TLS). The default port number is 5061.
• RTP start port – Enter the port used for the first RTP media stream in a SIP call. The default start port for media transport is
4000. Some firewalls might block RTP traffic on certain port numbers. A port number must be between 1024 and 65535.
7. Click Save.
8. In NAT traversal, select the protocols you want to enable for NAT traversal.
Note
Use NAT traversal when the device is connected to the network from behind a NAT router or a firewall. For more information
see .
9
AXIS A82 Network Video Door Station Series
Additional settings
In this product VoIP is enabled through the SIP protocol. For more information about SIP, see Session Initiation Protocol (SIP) on
page 16
There are two types of setups for SIP. A PBX-server is one of them. Use a PBX-server when the communication should be between an
infinite number of user agents within and outside the IP network. Additional features could be added to the setup depending on the
PBX-provider. For more information see, Private Branch Exchange (PBX) on page 16.
- User ID
- Domain
- Password
- Authentication ID
- Caller ID
- Registrar
4. Select Registrar.
7. Click Save.
8. Set up the SIP settings the same way as for peer-to-peer. See Set up direct SIP (P2P) on page 9 for more information.
Create an organization
Note
Every contact in the phone book must belong to an organization.
2. Click New.
4. Click Save.
Create a contact
This example explains how to create a new contact in the phone book. This contact:
• belongs to an organization
10
AXIS A82 Network Video Door Station Series
Additional settings
• belongs to a department
• Create the organization in the phone book. To find out how to create it, see Create an organization on page 10.
2. Click Edit next to the name of the organization to which the contact belongs.
3. Click New.
Note
The speed dial number is used to call the contact from the door station. If you enter a speed dial number which is already
assigned to another contact, a warning message appears and you cannot save the contact.
6. Under Department, select New and enter the name of the department.
Note
For information about SIP addresses, see Session Initiation Protocol (SIP) on page 16.
Note
A fallback is a contact, to whom the call is forwarded if the original contact does not reply.
This example explains how to set up the system to call a contact in the phone book when a visitor presses the call button.
1. Go to VoIP > Phone book > Call button and click Add.
4. Click Save.
3. Click Save.
11
AXIS A82 Network Video Door Station Series
Additional settings
Important
The network connection only works with Axis door controllers. To connect to a non-Axis door controller, you need to
physically connect the devices with wires. See Set up as card reader - wired connection on page 12.
Configure the door controller’s hardware, using the Wiegand protocol for the reader. See the door controller’s user manual for
instructions.
1. Go to Hardware > Reader > Reader protocol > Protocol and select VAPIX reader.
3. In the pop-up, select the protocol for communicating with the door controller.
5. Click Save.
7. Click Save.
Note
You can keep the default set of card types or modify the list according to your needs.
9. Click Save.
Important
Use I/O ports that are not already in use. If you use I/O ports already in use, any events created for these ports will stop
working.
• Physically connect the door station to a door controller. Use the electrical wiring drawings available at
axis.com/products/axis-a8207-ve
• Configure the door controller’s hardware, using the Wiegand protocol for the reader. See the door controller’s user
manual for instructions.
1. Go to Hardware > Reader > Reader protocol > Protocol and select Wiegand.
12
AXIS A82 Network Video Door Station Series
Additional settings
7. Click Save.
Note
You can keep the default set of card types or modify the list according to your needs.
9. Click Save.
• Allow SIP calls from the device and set up a SIP account. See Set up direct SIP (P2P) and Set up SIP through a server (PBX).
3. Click Add.
Set up the door station to request the door controller to unlock the door
3. From the list of triggers, select Call, DTMF and Unlock door.
13
AXIS A82 Network Video Door Station Series
Additional settings
6. Enter the details for the door controller and click OK.
7. Click Retrieve doors and select the door from the list.
9. Click OK.
Set up the door station to unlock the door using the internal relay
1. Follow the steps under Define the DTMF signal in the door station
4. From the list of triggers, select Call, DTMF and Unlock door.
7. Select Duration.
8. Select Go to opposite state after and set it to 7 seconds, which means that the door is open for 7 seconds.
9. Click OK.
1. Go to VoIP > Phone book > Contacts and click Print contact list.
5. Click Print.
14
AXIS A82 Network Video Door Station Series
Learn more
Learn more
• Organizations – companies or organizations located in the building where the door station is placed.
• Contacts – persons belonging to an organization and sometimes also a department. You assign a speed dial number to each
contact. For each contact you can assign a fallback, to whom the call is forwarded if the original contact does not answer.
• Departments – a contact can belong to a department. You create a department when you create a contact.
• Call groups – consists of several contacts or SIP addresses. You call all recipients in a call group simultaneously, and
any recipient can answer the call.
You can print a list of all the contacts in the phone book to place next to the door station.
In the phone book you can also configure the call button, to decide where the call will go when a visitor presses it.
In the Axis product, VoIP is enabled through the Session Initiation Protocol (SIP) and Dual-Tone Multi-Frequency (DTMF) signaling.
Example
When you press the call button on an Axis door station, a call is initiated to one or more predefined recipients. When a recipient
replies, a call is established. The voice and video is transferred through VoIP technologies.
15
AXIS A82 Network Video Door Station Series
Learn more
The actual audio or video is exchanged between the SIP user agents with a transport protocol, for example RTP (Real-Time
Transport Protocol).
You can make calls on local networks using a peer-to-peer setup, or across networks using a PBX.
Example
SIP
You can set up the Axis door station to call for example a SIP-enabled phone on the same network using a peer-to-peer SIP setup.
The PBX SIP server can be set up as a local entity or offsite. It can be hosted on an intranet or by a third party provider. When you
make SIP calls between networks, calls are routed through a set of PBXs, that query the location of the SIP address to be reached.
Each SIP user agent registers with the PBX, and can then reach the others by dialing the correct extension. A typical SIP address in
this case would be sip:<user>@<domain> or sip:<user>@<registrar-ip>. The SIP address is independent of its IP
address and the PBX makes the device accessible as long as it is registered to the PBX.
Example
16
AXIS A82 Network Video Door Station Series
Learn more
SIP SIP
SIP
1 sip:[email protected]
2 sip:[email protected]
3 PBX sip.company.com
4 sip:[email protected]
When you press the call button on an Axis door station, the call is forwarded through one or more PBXs to a SIP address either on the
local IP network or over the internet.
Applications
AXIS Camera Application Platform (ACAP) is an open platform that enables third parties to develop analytics and other applications
for Axis products. To find out more about available applications, downloads, trials and licenses, go to axis.com/applications.
www.axis.com/products/online-manual/44899#t10001688
17
AXIS A82 Network Video Door Station Series
Learn more
www.axis.com/products/online-manual/44899#t10001688
18
AXIS A82 Network Video Door Station Series
Daily use
Daily use
19
AXIS A82 Network Video Door Station Series
Troubleshooting
Troubleshooting
2. Press and hold the control button while reconnecting power. See Product overview on page 4 .
3. Keep the control button pressed for 15–30 seconds until the status LED indicator flashes amber.
4. Release the control button. The process is complete when the status LED indicator turns green. The product has been reset
to the factory default settings. If no DHCP server is available on the network, the default IP address is 192.168.0.90
5. Use the installation and management software tools to assign an IP address, set the password, and access the product.
The installation and management software tools are available from the support pages on axis.com/support
It is also possible to reset parameters to factory default through the web interface. Go to Maintenance > Maintenance actions and
click Restore to reset to factory default values but keep the IP address, or Default to reset all values including the IP address.
Important
Make sure the device remains connected to the power source throughout the upgrade process.
Note
When you upgrade the device with the latest firmware, the device receives the latest functionality available. Always read the
upgrade instructions and release notes available with each new release before you upgrade the firmware. To find the latest
firmware and the release notes, go to axis.com/support/firmware
1. Download the latest firmware file to your computer, available free of charge at axis.com/support/firmware
20
AXIS A82 Network Video Door Station Series
Troubleshooting
3. Go to System > Maintenance > Firmware upgrade and follow the instructions on the page. When the upgrade has
finished, the device restarts automatically.
If the password for the user root is lost, the device must be reset to the factory default settings.
See Reset to factory default settings on page 20.
The IP address has been IP addresses obtained from a DHCP server are dynamic and may change. If the IP address has been
changed by DHCP changed, use AXIS IP Utility or AXIS Device Manager to locate the device on the network. Identify
the device using its model or serial number, or by the DNS name (if the name has been configured).
• AXIS Companion: free of charge, ideal for small systems with basic surveillance needs.
• AXIS Camera Station: 30-day trial version free of charge, ideal for small to mid-size systems.
For instructions and download, go to axis.com/vms.
Performance considerations
When setting up your system, it is important to consider how various settings and situations affect the performance. Some factors
affect the amount of bandwidth (the bitrate) required, others can affect the frame rate, and some affect both. If the load on the
CPU reaches its maximum, this also affects the frame rate.
21
AXIS A82 Network Video Door Station Series
Troubleshooting
• High image resolution or lower compression levels result in images containing more data which in turn affects the
bandwidth.
• Access by large numbers of Motion JPEG or unicast H.264 clients affects the bandwidth.
• Simultaneous viewing of different streams (resolution, compression) by different clients affects both frame rate and
bandwidth.
Use identical streams wherever possible to maintain a high frame rate. Stream profiles can be used to ensure that
streams are identical.
• Accessing Motion JPEG and H.264 video streams simultaneously affects both frame rate and bandwidth.
• Heavy usage of event settings affects the product’s CPU load which in turn affects the frame rate.
• Using HTTPS may reduce frame rate, in particular if streaming Motion JPEG.
• Viewing on poorly performing client computers lowers perceived performance and affects frame rate.
• Running multiple AXIS Camera Application Platform (ACAP) applications simultaneously may affect the frame rate and
the general performance.
22
AXIS A82 Network Video Door Station Series
Specifications
Specifications
Call button
You can use the built-in light around the call button to light up the faces of visitors.
LED indicators
Status LED Indication
Green Steady green for normal operation.
SD card slot
NOTICE
NO TICE
• Risk of damage to SD card. Do not use sharp tools, metal objects, or excessive force when inserting or removing the
SD card. Use your fingers to insert and remove the card.
• Risk of data loss and corrupted recordings. Do not remove the SD card while the product is running. Unmount the SD card
from the product’s webpage before removal.
microSD, microSDHC, and microSDXC Logos are trademarks of SD-3C LLC. microSD, microSDHC, microSDXC are
trademarks or registered trademarks of SD-3C, LLC in the United States, other countries or both.
23
AXIS A82 Network Video Door Station Series
Specifications
Buttons
Control button
The control button is used for:
• Resetting the product to factory default settings. See Reset to factory default settings on page 20.
Connectors
HDMI connector
Use the microHDMITM connector to connect a display or public view monitor.
Network connector
RJ45 Ethernet connector with Power over Ethernet Plus (PoE+).
Audio connector
4-pin terminal block for audio input and output.
Relay connector
8-pin terminal block for solid state relays that can be used in the following ways:
• To control a lock through a safety relay. Using a safety relay on the secure side of the door prevents hotwiring.
24
AXIS A82 Network Video Door Station Series
Specifications
COM 2 Common
24 V DC 3 For powering auxiliary equipment. Output voltage 24 V DC
Note: This pin can only be used as power out. Max current 50 mA1
Max current 350 mA2
DC ground 4 0 V DC
NO/NC 5 Normally open/normally closed Max current 1 A
For connecting relay devices. Max voltage 30 V DC
The two relay pins are galvanically separated from the
rest of the circuitry.
COM 6 Common
12 V DC 7 For powering auxiliary equipment. Output voltage 12 V DC
Note: This pin can only be used as power out. Max current 100 mA3
Max current 700 mA4
DC ground 8 0 V DC
1. When powered through Power over Ethernet IEEE 802.3af/802.3at Type 1 Class 3.
2. When powered through Power over Ethernet Plus (PoE+) IEEE 802.3at Type 2 Class 4 or DC power input.
3. When powered through Power over Ethernet IEEE 802.3af/802.3at Type 1 Class 3.
4. When powered through Power over Ethernet Plus (PoE+) IEEE 802.3at Type 2 Class 4 or DC power input.
Reader connector
4–pin terminal block for connecting external reader.
I/O connector
Use the I/O connector with external devices in combination with, for example, motion detection, event triggering, and alarm
notifications. In addition to the 0 V DC reference point and power (DC output), the I/O connector provides the interface to:
Digital input - For connecting devices that can toggle between an open and closed circuit, for example PIR sensors, door/window
contacts, and glass break detectors.
Digital output - For connecting external devices such as relays and LEDs. Connected devices can be activated by the VAPIX®
Application Programming Interface, trough an event or from the product’s webpage.
25
AXIS A82 Network Video Door Station Series
Specifications
Example
1 DC ground
2 DC output 12 V, max 50 mA
3 I/O configured as input
4 I/O configured as output
5 Configurable I/O
6 Configurable I/O
Power connector
2-pin terminal block for DC power input. Use a Safety Extra Low Voltage (SELV) compliant limited power source (LPS) with either
a rated output power limited to ≤100 W or a rated output current limited to ≤5 A.
26
AXIS A82 Network Video Door Station Series
Safety information
Safety information
Hazard levels
DANGER
Indicates a hazardous situation which, if not avoided, will result in death or serious injury.
WARNING
Indicates a hazardous situation which, if not avoided, could result in death or serious injury.
CAUTION
Indicates a hazardous situation which, if not avoided, could result in minor or moderate injury.
NOTICE
NO TICE
Indicates a situation which, if not avoided, could result in damage to property.
Note
Indicates useful information which helps in getting the most out of the product.
27
User Manual Ver. M7.3
AXIS A82 Network Video Door Station Series Date: January 2020
© Axis Communications AB, 2019 - 2020 Part No. T10121755
AXIS A1001 & AXIS Entry Manager
User Manual
AXIS A1001 & AXIS Entry Manager
Table of Contents
Product overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
.............................................................. 4
.............................................................. 5
.............................................................. 6
LED Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Connectors and buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
How to access the product . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Access the device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
About the mobile landing page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
How to access the product from the internet . . . . . . . . . . . . . . . . . . . . . . . . . 10
How to set the root password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
The Overview page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
System configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Configuration – step by step . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Select a language . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Set the Date and Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Configure the Network Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Configure the hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Verify the Hardware Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Configure cards and formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Configure Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Manage Network Door Controllers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Configuration mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Maintenance Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Access Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
About Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
The Access Management Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Choose a Workflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Create and Edit Access Schedules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Create and Edit Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Manage Doors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Manage floors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Create and edit users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Example Access Schedule Combinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Alarm and Event Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
View the event log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
View the Alarm Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Configure the Event and Alarm Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
How to set up action rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Reader feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
View, Print, and Export Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
System options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Date & Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Ports & Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Backup the application data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Advanced . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Reset to factory default settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
How to check the current firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
How to upgrade the firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Emergency Recovery Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Symptoms, possible causes and remedial actions . . . . . . . . . . . . . . . . . . . . . . 63
Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Connectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Connection Diagrams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
2
AXIS A1001 & AXIS Entry Manager
Table of Contents
Safety information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Hazard levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Other message levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
3
AXIS A1001 & AXIS Entry Manager
Product overview
Product overview
4
AXIS A1001 & AXIS Entry Manager
Product overview
I/O interface:
1 Reader data connector (READER DATA 1)
10 Reader data connector (READER DATA 2)
3 Reader I/O connector (READER I/O 1)
8 Reader I/O connector (READER I/O 2)
4 Door connector (DOOR IN 1)
7 Door connector (DOOR IN 2)
6 Auxiliary connector (AUX)
5 Audio connector (AUDIO) (not used)
Power outputs:
9 Power lock connector (LOCK)
11 Power & Relay connector (PWR, RELAY)
5
AXIS A1001 & AXIS Entry Manager
Product overview
LED Indicators
LED Color Indication
Network Green Steady for connection to a 100 MBit/s network. Flashes for network activity.
Amber Steady for connection to a 10 MBit/s network. Flashes for network activity.
Unlit No network connection.
Status Green Steady green for normal operation.
Amber Steady during startup and when restoring settings.
Red Slow flash for failed upgrade.
Power Green Normal operation.
Amber Flashes green/amber during firmware upgrade.
6
AXIS A1001 & AXIS Entry Manager
Product overview
Note
• The Status LED can be configured to flash while an event is active.
• The Status LED can be configured to flash for identifying the unit. Go to Setup > Additional Controller Configuration >
System Options > Maintenance .
• Digital output – For connecting, for example, reader beepers and reader LEDs.
Door Connectors
Two 4-pin terminal blocks for connecting door monitoring devices and request to exit (REX) devices. For specifications, see page 66.
Auxiliary Connector
4-pin configurable I/O terminal block. Use with external devices, in combination with, for example tampering alarms, event triggering
and alarm notifications. In addition to the 0 V DC reference point and power (DC output), the auxiliary connector provides the
interface to:
• Digital input – An alarm input for connecting devices that can toggle between an open and closed circuit, for example PIR
sensors or glass break detectors.
• Digital output – For connecting external devices such as burglar alarms, sirens or lights. Connected devices can be
activated by the VAPIX® application programming interface or by an action rule.
Power Connector
2-pin terminal block for DC power input. Use a Safety Extra Low Voltage (SELV) compliant limited power source (LPS) with either a
rated output power limited to ≤100 W or a rated output current limited to ≤5 A. For specifications, see page 67.
Network Connector
RJ45 Ethernet connector. Supports Power over Ethernet (PoE). For specifications, see page 68.
7
AXIS A1001 & AXIS Entry Manager
Product overview
Power Outputs
Power Lock Connector
4-pin terminal block for connecting one or two locks. The lock connector can also be used to power external devices. For
specifications, see page 68.
6-pin terminal block for connecting power and the door controller’s relay to external devices such as locks and sensors. For
specifications, see page 68.
Control Button
The control button is used for:
• Connecting to an AXIS Video Hosting System service. See page 55. To connect, press and hold the button for about 1
second until the Status LED flashes green.
• Connecting to AXIS Internet Dynamic DNS Service. See page 56. To connect, press and hold the button for about 3 seconds.
8
AXIS A1001 & AXIS Entry Manager
Installation
Installation
www.axis.com/products/online-manual/19467#t10170589
9
AXIS A1001 & AXIS Entry Manager
To install the Axis product, see the Installation Guide supplied with the product.
If you do not know the IP address, use AXIS IP Utility or AXIS Device Manager to find the device on the network.
2. Enter the username and password. If you access the device for the first time, you must set the root password. See .
3. AXIS Entry Manager opens in your browser. If you are using a computer, you will reach the Overview page. If you are using
a mobile device, you will reach the mobile landing page.
Note
• Axis Entry Manager doesn’t support mobile devices.
• If you continue to Axis Entry Manager, there is no link back to the mobile landing page.
Most routers are pre-configured to stop attempts to access the private network (LAN) from the public network (internet).
If the Axis product is located on an intranet (LAN) and you want to make it available from the other (WAN) side of a NAT (Network
Address Translator) router, turn on NAT traversal. With NAT traversal properly configured, all HTTP traffic to an external HTTP port
in the NAT router is forwarded to the product.
• Go to Setup > Additional Controller Configuration > System Options > Network > TCP/IP > Advanced.
• Click Enable.
• Manually configure your NAT router to allow access from the internet.
Note
• In this context, a “router” refers to any network routing device such as a NAT router, network router, internet gateway,
broadband router, broadband sharing device, or a software such as a firewall.
• For NAT traversal to work, NAT traversal must be supported by the router. The router must also support UPnP®.
10
AXIS A1001 & AXIS Entry Manager
To prevent network eavesdropping, the root password can be set via an encrypted HTTPS connection, which requires an HTTPS
certificate. HTTPS (Hypertext Transfer Protocol over SSL) is a protocol used to encrypt traffic between web browsers and servers. The
HTTPS certificate ensures encrypted exchange of information. See HTTPS on page 52.
The default administrator user name root is permanent and cannot be deleted. If the password for root is lost, the product must be
reset to the factory default settings. See Reset to factory default settings on page 61.
The first time you access the Axis product, the Overview page will prompt you to configure the hardware, to set date and time, to
configure the network settings, and to configure the door controller as part of a system or as a standalone unit. For more information
about configuring the system, see Configuration – step by step on page 12.
To return to the Overview page from the product’s other webpages, click Overview in the menu bar.
11
AXIS A1001 & AXIS Entry Manager
System configuration
System configuration
To open the product’s setup pages, click Setup in the top right-hand corner of the Overview page.
The Axis product can be configured by administrators. For more information about users and administrators, see page 31, page 39,
and page 52.
1. If English is not your first language, you may want AXIS Entry Manager to use a different language. See Select a language
on page 12.
4. Configure the door controller and connected devices such as readers, locks and request to exit (REX) devices. See Configure
the hardware on page 14.
7. Configure the door controller system. See Manage Network Door Controllers on page 26.
For information about how to configure and manage the system's doors, schedules, users and groups, see Access Management on
page 31.
For information about maintenance recommendations, see Maintenance Instructions on page 29.
Note
To add or remove door controllers, to add, remove, or edit users, or to configure the hardware, more than half of the door
controllers in the system must be online. To check the door controller status, go to Setup > Manage Network Door
Controllers in System.
Select a language
The default language of AXIS Entry Manager is English, but you can switch to any of the languages that are included in the product’s
firmware. For information about the latest available firmware, see www.axis.com
To switch languages, click the language drop-down list and select a language. All the product’s web pages and help pages are
displayed in the selected language.
Note
• When you switch languages, the date format also changes to a format commonly used in the selected language. The
correct format is displayed in the data fields.
• If you reset the product to factory default settings, AXIS Entry Manager switches back to English.
• If you restore the product, AXIS Entry Manager will continue to use the selected language.
• If you restart the product, AXIS Entry Manager will continue to use the selected language.
• If you upgrade the firmware, AXIS Entry Manager will continue to use the selected language.
12
AXIS A1001 & AXIS Entry Manager
System configuration
To set the date and time of the Axis product, go to Setup > Date & Time.
You can set the date and time in the following ways:
• Get the date and time from a network time protocol (NTP) server. See page 13.
• Get the date and time from the computer. See page 13.
Current controller time displays the door controller’s current date and time (24h clock).
The same options for date and time are also available in the System Options pages. Go to Setup > Additional Controller
Configuration > System Options > Date & Time.
Get the Date and Time from a Network Time Protocol (NTP) Server
1. Go to Setup > Date & Time.
3. If daylight saving time is used in your region, select Adjust for daylight saving .
5. Select the default DHCP address or enter the address of a NTP server.
6. Click Save.
When synchronizing with an NTP server, date and time are updated continuously because the data is pushed from the NTP server. For
information about NTP settings, see NTP Configuration on page 56.
If you use a host name for the NTP server, a DNS server must be configured. See DNS Configuration on page 56.
2. If daylight saving time is used in your region, select Adjust for daylight saving .
5. Click Save.
When setting the date & time manually, date and time are set once and will not be updated automatically. This means that if the
date or time needs to be updated, the changes must be made manually because there is no connection to an external NTP server.
2. If daylight saving time is used in your region, select Adjust for daylight saving .
13
AXIS A1001 & AXIS Entry Manager
System configuration
When using the computer time, date and time are synchronized with the computer time once and will not be updated automatically.
This means that if you change the date or time on the computer you use to manage the system, you should synchronize again.
For more information about network settings, see Network on page 54.
You can connect readers, locks and other devices to the Axis product before you complete the hardware configuration. However,
it will be easier to connect devices if you complete the hardware configuration first. This is because a hardware pin chart will be
available when the configuration is complete. The hardware pin chart is a guide on how to connect devices to the pins and can be
used as a reference sheet for maintenance. For maintenance instructions, see page 29.
If configuring the hardware for the first time, select one of the following methods:
Note
If the product’s hardware has not been configured before or has been deleted, Hardware Configuration will be available in
the notification panel in the Overview page.
By exporting the file from one product and importing it to others, you can make multiple copies of the same hardware setup without
having to repeat the same steps over and over again. You can also store exported files as backups and use them to restore previous
hardware configurations. For more information, see How to export a hardware configuration file on page 14.
2. Click Import hardware configuration or, if a hardware configuration already exists, Reset and import hardware
configuration.
3. In the file browser dialog that appears, locate and select the hardware configuration file (*.json) on your computer.
4. Click OK.
Note
The hardware configuration of floors is not possible to export.
Wireless lock settings are not included in the hardware configuration export.
14
AXIS A1001 & AXIS Entry Manager
System configuration
3. Depending on the browser, you may need to go through a dialog to complete the export.
Unless otherwise specified, the exported file (*.json) is saved in the default download folder. You can select a download
folder in the web browser’s user settings.
• How to create a new hardware configuration with elevator control (AXIS A9188) on page 19
4. Configure the door monitors (door position sensors) and locks according to your requirements and click Next. For more
information about the available options, see How to configure door monitors and locks on page 15.
5. Configure the readers and REX devices that will be used and click Finish. For more information about the available options,
see How to configure readers and REX devices on page 17.
6. Click Close or click the link to view the hardware pin chart.
1. If a door monitor will be used, select Door monitor and then select the option that matches how the door monitor
circuits will be connected.
2. If the door lock shall lock immediately after the door has been opened, select Cancel access time once door is opened.
If you want to delay the relock, set the time of the delay in milliseconds in Relock time.
3. Specify the door monitor time options or, if no door monitor will be used, the lock time options.
4. Select the options that match how the lock circuits will be connected.
5. If a lock monitor will be used, select Lock monitor and then select the options that match how the lock monitor circuits
will be connected.
6. If the input connections from readers, REX devices, and door monitors shall be supervised, select Enable supervised inputs.
For more information, see How to use supervised inputs on page 18.
15
AXIS A1001 & AXIS Entry Manager
System configuration
Note
• Most lock, door monitor, and reader options can be changed without resetting and starting a new hardware configuration.
Go to Setup > Hardware Reconfiguration.
• You can connect one lock monitor per door controller. So if you use double-lock doors, only one of the locks can have a lock
monitor. If two doors are connected to the same door controller, lock monitors cannot be used.
• Motorized locks must be configured as secondary locks.
• Door monitor – Selected by default. Each door has its own door monitor that, for example, will signal when the door has
been forced open or open too long. Deselect if no door monitor will be used.
- Open circuit = Closed door – Select if the door monitor circuit is normally open. The door monitor gives the door
open signal when the circuit is closed. The door monitor gives the door closed signal when the circuit is open.
- Open circuit = Open door – Select if the door monitor circuit is normally closed. The door monitor gives the door
open signal when the circuit is open. The door monitor gives the door closed signal when the circuit is closed.
• Cancel access time once door is opened – Select to prevent tailgating. The lock will be locked as soon as the door
monitor indicates that the door has been opened.
• Access time – Set the number of seconds the door shall remain unlocked after access has been granted. The door remains
unlocked until the door has been opened or until the set time has been reached. The door will lock when it closes regardless
of whether the access time has expired or not.
• Long access time – Set the number of seconds the door shall remain unlocked after access has been granted. Long
access time overrides the already set access time and will be enabled for users with long access time selected, see
User Credentials on page 40
Select Door monitor to make the following door time options available:
• Open too long time – Set the number of seconds the door is allowed to stay open. If the door is still open when the set
time has been reached, the door open too long alarm is triggered. Set up an action rule to configure which action the
open too long event shall trigger.
• Pre-alarm time – A pre-alarm is a warning signal that is triggered before the open too long time has been reached. It
informs the administrator and warns, depending on how the action rule has been set up, the person entering the door
that the door needs to be closed to avoid the door open too long alarm to go off. Set the number of seconds before the
door open too long alarm is triggered the system shall give the pre-alarm warning signal. To disable the pre-alarm, set
the pre-alarm time to 0.
16
AXIS A1001 & AXIS Entry Manager
System configuration
For information about how to set up an action rule, see How to set up action rules on page 45.
• 12 V
- Fail-secure – Select for locks that remain locked during power outages. When applying electric current, the
lock will unlock.
- Fail-safe – Select for locks that unlock during power outages. When applying electric current, the lock will lock.
• Relay – Can only be used on one lock per door controller. If two doors are connected to the door controller, a relay can
only be used on the lock of the second door.
- Relay open = Locked – Select for locks that remain locked when the relay is open (fail-secure). When the
relay closes, the lock will unlock.
- Relay open = Unlocked – Select for locks that unlock during power outages (fail-safe). When the relay closes,
the lock will lock.
• None – Only available for Lock 2. Select if only one lock will be used.
The following lock monitor options are available for single-door configurations:
• Lock monitor – Select to make the lock monitor controls available. Then select the lock that shall be monitored. A lock
monitor can only be used on double-lock doors and cannot be used if two doors are connected to the door controller.
- Open circuit = Locked – Select if the lock monitor circuit is normally closed. The lock monitor gives the door
unlocked signal when the circuit is closed. The lock monitor gives the door locked signal when the circuit is open.
- Open circuit = Unlocked – Select if the lock monitor circuit is normally open. The lock monitor gives the door
unlocked signal when the circuit is open. The lock monitor gives the door locked signal when the circuit is closed.
1. If a reader will be used, select the checkbox and then select the options that match the reader’s communication protocol.
2. If a REX device such as a button, sensor, or push bar will be used, select the checkbox and then select the option that
matches how the REX device’s circuits will be connected.
If the REX signal does not influence door opening (for example for doors with mechanical handles or push bars), select
REX does not unlock door.
3. If connecting more than one reader or REX device to the door controller, do the previous two steps again until each
reader or REX device has the correct settings.
17
AXIS A1001 & AXIS Entry Manager
System configuration
• Wiegand – Select for readers that use Wiegand protocols. Then select the LED control that is supported by the reader.
Readers with single LED control usually toggle between red and green. Readers with dual LED control use different wires
for the red and green LEDs. This means that the LEDs are controlled independently of each other. When both LEDs are on,
the light appears to be amber. See the manufacturer’s information about which LED control the reader supports.
• OSDP, RS485 half duplex – Select for RS485 readers with half duplex support. See the manufacturer’s information
about which protocol the reader supports.
• Active low – Select if activating the REX device closes the circuit.
• Active high – Select if activating the REX device opens the circuit.
• REX does not unlock door – Select if the REX signal does not influence door opening (for example for doors with
mechanical handles or push bars). The door forced open alarm will not be triggered as long as the user opens the door
within the access time. Deselect if the door shall unlock automatically when the user activates the REX device.
Note
Most lock, door monitor, and reader options can be changed without resetting and starting a new hardware configuration.
Go to Setup > Hardware Reconfiguration.
1. Install end of line resistors on all the used supervised inputs. See the connection diagram on page 70.
2. Go to Setup > Hardware Reconfiguration and select Enable supervised inputs. You can also enable supervised inputs
during the hardware configuration.
Readers and switches that can be used with supervised inputs include:
4. If you want to connect a wired door, select the 1 Door checkbox and click Next. If no door is included, click Finish.
5. Depending on what lock manufacturer you got, proceed according to one of the bullets:
18
AXIS A1001 & AXIS Entry Manager
System configuration
- ASSA Aperio: Click the link to view the hardware pin chart or click Close and go to Setup > Hardware
Reconfiguration to complete the configuration, see Add Assa AperioTM doors and devices on page 19
- SmartIntego: Click the link to view the hardware pin chart or click Click here to select wireless gateway and
configure doors to complete the configuration, see How To Configure SmartIntego on page 26.
4. In the ID field under Lock: Enter the six-character-long address of the device that you want to add. The device address is
printed on the product label.
5. Optionally, under Door position sensor: Choose Built in door position sensor or External door position sensor.
Note
If using an external door position sensor (DPS), make sure that the Aperio lock device has support for door handle state
detection before configuring it.
6. Optionally, in the ID field under Door position sensor: Enter the six-character-long address of the device that you want to
add. The device address is printed on the product label.
7. Click Add.
How to create a new hardware configuration with elevator control (AXIS A9188)
Important
Before creating a HW configuration you need to add a user in AXIS A9188 Network I/O Relay Module. Go to the A9188 web
interface > Preferences > Additional device configuration > Basic setup > Users > Add > User setup.
Note
Max 2 AXIS 9188 Network I/O Relay Modules can be configured with each Axis Network Door Controller
1. In A1001, go to Setup > Hardware Configuration and click Start new hardware configuration.
3. In the list of peripherals, select Elevator control to include an AXIS A9188 Network I/O Relay Module and click Next.
5. Select the reader protocol that will be used and click Finish.
6. Click Network Peripherals to complete the configuration see How to add and setup network peripherals on page 20 or
click the link to go to the hardware pin chart.
19
AXIS A1001 & AXIS Entry Manager
System configuration
6. Click Add.
Note
You can manually add network periphals by entering MAC address or IP address in the Manually add device dialog.
Important
If you want to delete a schedule, first make sure it’s not used by the network I/O relay module.
1. Go to Setup > Network Periphals and click on the Added devices row.
4. Click Add.
The floor is now visible in the Floor tab under Access Management.
Note
In AXIS Entry Manager you can add maximum 16 floors.
To verify the configuration and access the verification controls, go to Setup > Hardware Connection Verification.
• Lock – Manually trigger the lock. Both primary locks and secondary locks if there are any will be affected. Click Lock or
Unlock.
• Lock – Manually trigger the lock to grant access. Only primary locks will be affected. Click Access.
20
AXIS A1001 & AXIS Entry Manager
System configuration
• Reader: Feedback – Verify the reader feedback, for example sounds and LED signals, for different commands. Select the
command and click Test. Which types of feedback that are available depends on the reader. For more information, see
Reader feedback on page 49. See also the manufacturer’s instructions.
• Reader: Tampering – Get information about the last tampering attempt. The first tampering attempt will be registered
when the reader is installed. Click Get last tampering.
• Reader: Card swipe – Get information about the last swiped card or other type of user token accepted by the reader.
Click Get last credential.
• REX – Get information about the last time the request to exit (REX) device was pressed. Click Get last REX.
• Floor lock & unlock – Manually trigger the floor access. Both primary locks and secondary locks if there are any will
be affected. Click Lock or Unlock.
• Floor access – Manually grant temporary access to the floor. Only primary locks will be affected. Click Access.
• Elevator Reader: Feedback – Verify the reader feedback, for example sounds and LED signals, for different commands.
Select the command and click Test. Which types of feedback that are available depends on the reader. For more
information, see Reader feedback on page 49. See also the manufacturer’s instructions.
• Elevator Reader: Tampering – Get information about the last tampering attempt. The first tampering attempt will be
registered when the reader is installed. Click Get last tampering.
• Elevator Reader: Card swipe – Get information about the last swiped card or other type of user token accepted by the
reader. Click Get last credential.
• REX – Get information about the last time the request to exit (REX) device was pressed. Click Get last REX.
2. Select one or more card formats that match the card format used by the connected readers.
3. In the Add card format dialog, enter a name, a description, and the bit length of the card format. See Card format
descriptions on page 22.
4. Click Add field map and enter the required information in the fields. See Field maps on page 22.
To expand an item in the Card formats list and view the card format descriptions and field maps, click .
To edit a card format, click and change the card format descriptions and field maps as required. Then click Save.
21
AXIS A1001 & AXIS Entry Manager
System configuration
To delete a field map in the Edit card format or Add card format dialog, click
Important
• All changes to card formats apply to the whole system of door controllers.
• You can only enable and disable card formats if at least one door controller in the system has been configured with at least
one reader. See Configure the hardware on page 14 and How to configure readers and REX devices on page 17.
• Two card formats with the same bit length cannot be active the same time. For example, if you have defined two 32-bit
card formats, “Format A” and “Format B”, and you have enabled “Format A”, you cannot enable “Format B” without
disabling “Format A” first.
• If no card formats have been enabled, you can use the Card raw only and Card raw and PIN identification types to
identify a card and grant access to users. However, we do not recommend this since different reader manufacturers
or reader settings can generate different card raw data.
• Description – Enter additional information as desired. This information is only visible in the Edit card format and Add
card format dialogs.
• Bit length (required) – Enter the bit length of the card format. This has to be a number between 1 and 1000000000.
Field maps
• Name (required) – Enter the field map name unspaced, for example OddParity.
- Parity – Parity bits are used for error detection. Parity bits are usually added to the beginning or end of a
binary code string and indicate if the number of bits is even or odd.
- EvenParity – Even parity bits make sure that there is an even number of bits in the string. The bits that have
the value 1 are counted. If the count is already even, the parity bit value is set to 0. If the count is odd, the
even parity bit value is set to 1, making the total count an even number.
- OddParity – Odd parity bits make sure that there is an odd number of bits in the string. The bits that have
the value 1 are counted. If the count is already odd, the odd parity bit value is set to 0. If the count is even,
the parity bit value is set to 1, making the total count an odd number.
- FacilityCode – Facility codes are sometimes used for verifying that the token matches the ordered end user
credential batch. In legacy access control systems, the facility code was used for a degraded validation, allowing
entry to every employee in the credential batch that had been encoded with a matching site code. This field map
name, which is case sensitive, is required for the product to validate on facility code.
- CardNr – The card number or user ID is what is most commonly validated in access control systems. This field
map name, which is case sensitive, is required for the product to validate on card number.
- CardNrHex – The card number binary data is encoded as hex-lowercase numbers in the product. It is primarily
used for troubleshooting why you are not getting the expected card number from the reader.
• Range (required) – Enter the bit range of the field map, for example 1, 2–17, 18–33, and 34.
- BinLE2Int – Binary data is encoded as integer numbers in little endian bit order. Integer means that it needs to
be a whole number (no decimals). Little endian bit order means that the first bit is the smallest (least significant).
- BinBE2Int – Binary data is encoded as integer numbers in big endian bit order. Integer means that it needs to be
a whole number (no decimals). Big endian bit order means that the first bit is the biggest (most significant).
22
AXIS A1001 & AXIS Entry Manager
System configuration
- BinLE2Hex – Binary data is encoded as hex-lowercase numbers in little endian bit order. The hexadecimal
system, also known as the base-16 number system, consists of 16 unique symbols: the numbers 0–9 and the
letters a–f. Little endian bit order means that the first bit is the smallest (least significant).
- BinBE2Hex – Binary data is encoded as hex-lowercase numbers in big endian bit order. The hexadecimal system,
also known as the base-16 number system, consists of 16 unique symbols: the numbers 0–9 and the letters a–f.
Big endian bit order means that the first bit is the biggest (most significant).
- BinLEIBO2Int – Binary data is encoded in the same way as for BinLE2Int, but the card raw data is read with
inverted byte order in a multiple-byte sequence before field maps are taken out to be encoded.
- BinBEIBO2Int – Binary data is encoded like for BinBE2Int, but the card raw data is read with inverted byte order
in a multiple-byte sequence before the field maps are taken out to be encoded.
For information about which field maps your card format uses, see the manufacturer’s instructions.
Configure Services
The Configure Services in the Setup page is used to access the set up for the external services that can be used with the door controller.
• Part a number (for your mobile credentials) associated with your HID account.
• The product needs access to the HID Mobile Access cloud servers, using outgoing HTTPS encrypted communication. Please
update your IT infrastructure accordingly. This includes an eventual DNS server connection.
5. Click Set as current to select the part number you want to use for this installation.
23
AXIS A1001 & AXIS Entry Manager
System configuration
- creating and edit users manually (see Create and edit users on page 39 on page page 39)
Note
Each user that is given access to HID Mobile Access gets an email with a link to the app to continue the installation on
their device.
• an Axis door controller with AXIS Entry Manager and firmware version 1.65.2 or higher
• an Axis network camera or door station, with the QR scanner application installed
The user creates an invitation in AXIS Visitor Access (1) and sends the invitation to the visitor’s email address. At the same time the
credentials to unlock the door are created and stored in the connected Axis door controller (4). The visitor shows the QR code included
in the invitation at the network camera or door station (3), which asks the door controller (4) to unlock the door for the visitor.
24
AXIS A1001 & AXIS Entry Manager
System configuration
• an Axis network camera or door station connected to the same network as the door controller, and placed accessible
to the visitor by the door
• the AXIS Visitor Access installation package. You can find it at axis.com
• two additional user accounts in the door controller, only to be used by the AXIS Visitor Access service. You need one for the
AXIS Visitor Access application, and the other for the QR scanner application. To find out how to create user accounts,
see Users on page 52
Important
• You can only connect the AXIS Visitor Access service to a single door controller in the entire system.
• With the AXIS Visitor Access service, you can only address doors that are controlled by the connected door controller.
You cannot address other doors in the system.
• Use the AXIS Visitor Access application to modify and delete visitors. Do not use AXIS Entry Manager.
• If you change the password of the user account used for AXIS Visitor Access, you need to update it also in AXIS Visitor Access.
• If you change the password of the user account used for the QR scanner application, you need to set up the QR scanner again.
You install the QR scanner application on the Axis network camera or door station when you set up the AXIS Visitor Access service.
You don’t need to make any separate installation.
1. In the door controller’s webpage, go to Setup > Configure Services > Settings.
Important
If you want to enforce HTTPS, make sure that the door controller communicates through HTTPS. Otherwise the application
will not be able to communicate with the door controller.
4. On the computer that will be used for creating temporary credentials, install and set up the AXIS Visitor Access application.
SmartIntego
SmartIntego is a wireless solution that increases the number of doors a door controller can handle.
Prerequisites SmartIntego
The following prerequisites needs to be met before proceeding with the SmartIntego configuration:
25
AXIS A1001 & AXIS Entry Manager
System configuration
• A csv-file needs to be created. The csv-file contains information about what GatewayNode and doors that are used in your
SmartIntego solution. The file is created in a standalone software provided by a SimonsVoss partner.
• The Hardware Configuration of SmartIntego has been done, see How to create a new hardware configuration for wireless
locks on page 18.
Note
• SmartIntego Configuration tool must be version 2.1.6452.23485, build 2.1.6452.23485 (8/31/2017 1:02:50 PM) or later.
• The Advanced Encryption Standard (AES) is not supported for SmartIntego, and must therefore be disabled in the
SmartIntego Configuration tool.
3. A preview of the new configuration is shown. Disable the door monitors if needed.
4. Click Configure.
5. An overview of the doors included in the configuration is shown. Click Settings to configure each door individually.
3. Click Re-configure.
6. A preview of the new configuration is shown. Disable the door monitors if needed.
Note
The door monitor settings come from the imported CSV file. You shouldn't need to change this setting in a normal installation.
7. Click Configure.
8. An overview of the doors included in the configuration is shown. Click Settings to configure each door individually.
Important
All door controllers in a system must be connected to the same network, and be setup for use at a single site.
26
AXIS A1001 & AXIS Entry Manager
System configuration
To manage door controllers, go to Setup > Manage Network Door Controllers in System.
The Manage Network Door Controllers in System page includes the following panels:
• System status of this controller – Shows the door controller's system status and enables switching between system and
standalone modes. For more information, see Door Controller System Status on page 27.
• Network door controllers in system – Shows information about the door controllers in the system and includes controls
for adding and removing a controller from the system. For more information, see Connected Door Controllers in the
System on page 27.
If the door controller is not in standalone mode and you want to protect the door controller from being added to a system, click
Activate standalone mode to enter standalone mode.
If the door controller is in standalone mode but you intend to add the door controller to a system, click Deactivate standalone
mode to leave the standalone mode.
System Modes
• This controller is not part of a system and not in standalone mode – The door controller has not been configured as
part of a system and it is not in standalone mode. This means that the door controller is open and can be added to a
system by any other door controller within the same network. To protect the door controller from being added to a
system, activate the standalone mode.
• This controller is set to standalone mode – The door controller is not part of a system. It cannot be added to a
system by other door controllers in the network or add other door controllers itself. Standalone mode is typically used
in small setups with one door controller and one or two doors. To allow the door controller to be added into a system,
deactivate the standalone mode.
• This controller is part of a system – The door controller is part of a distributed system. In the distributed system, users,
groups, doors, and schedules are shared between the connected controllers.
• Add a door controller to a system, see Add Door Controllers to the System on page 28.
• Remove a door controller from a system, see Remove Door Controllers from the System on page 28.
• Name – The user-defined name of the door controller. If the administrator has not set a name when configuring the
hardware, the default name will be shown.
• IP address
• MAC address
• Status – The door controller from which you access the system will show status This controller. The other door controllers
in the system will show status Online.
• Firmware version
27
AXIS A1001 & AXIS Entry Manager
System configuration
To open the webpages of another door controller, click the controller’s IP address.
Note
All controllers in a system always need to have the same firmware version. Use Axis Device Manager to do a parallel
firmware upgrade on all controllers in the entire system.
To add a door controller to the system from the list of door controllers:
4. Click Add.
To add a door controller to the system by its known IP address or MAC address:
1. Go to Manage Devices.
4. Click Add.
When the pairing is completed, all users, doors, schedules, and groups are shared by all door controllers in the system.
1. Access the system through the door controller that you want to remove and go to Setup > Hardware Configuration.
3. After the hardware configuration has been reset, go to Setup > Manage Network Door Controllers in System.
4. In the Network door controllers in system list, identify the door controller that you want to remove and click Remove
from system.
5. A dialog opens reminding you to reset the door controller’s hardware configuration. Click Remove controller to confirm.
28
AXIS A1001 & AXIS Entry Manager
System configuration
6. A dialog opens prompting you to confirm that you want to remove the door controller. Click OK to confirm. The removed
door controller is now in standalone mode.
Note
• When a door controller is removed from the system, all its access management settings are deleted.
• Only door controllers that are online can be removed.
Configuration mode
Configuration mode is the standard mode when you access the device for the first time. When configuration mode is disabled
most of the configuration features for the device are hidden.
Important
To disable configuration mode should not be considered a security feature. It is intended to stop configuration mistakes
and not to stop malicious users changing vital settings.
Note
PIN is not mandatory.
Note
If you don not remember your PIN you can enable configuration mode by entering http://[IP-
address]/webapp/pacs/index.shtml#resetConfigurationMode.
Maintenance Instructions
To keep the access control system running smoothly, Axis recommends regular maintenance of the access control system, including
door controllers and connected devices.
Do maintenance at least once a year. The suggested maintenance procedure includes, but is not limited to, the following steps:
• Make sure all the connections between the door controller and the external devices are secure.
• Verify all the hardware connections. See Verification Controls Doors on page 20.
• Verify that the system, including the connected external devices, functions correctly.
- If the system includes REX devices, sensors or other devices, test them as well.
If the results from any of the steps above indicate faults or unexpected behavior:
- Test the signals of the wires using appropriate equipment and check if the wires or cables are damaged
in any way.
29
AXIS A1001 & AXIS Entry Manager
System configuration
- Once the cables and wires have been replaced, verify all the hardware connections again. See Verification
Controls Doors on page 20.
• Make sure all access schedules, doors, groups, and users are up to date.
• If the door controller is not behaving as expected, see Troubleshooting on page 62 and Maintenance on page 59 for
more information.
30
AXIS A1001 & AXIS Entry Manager
Access Management
Access Management
About Users
In AXIS Entry Manager, users are people who have been registered as owners of one or more tokens (identification types). Each
person must have a unique user profile to be granted access to doors in the access control system. The user profile consists of
credentials that tell the system who the user is and when and how they are granted access to doors. For more information, see
Create and edit users on page 39.
Users in this context should not be confused with administrators. Administrators have unrestricted access to all settings. And in the
context of managing the access control system, the product’s web pages (AXIS Entry Manager), administrators are also sometimes
referred to as users. For more information, see Users on page 52.
To add users to groups and apply access schedules and doors, drag the items to their respective destination in the Groups and
Doors lists.
Note
Messages that require action are shown in red text.
Choose a Workflow
The access management structure is flexible, allowing you to develop a workflow that suits your needs. The following is a workflow
example:
4. Add identification types to doors or floors. See page 34 and page 35.
31
AXIS A1001 & AXIS Entry Manager
Access Management
For applied examples of this workflow, see Example Access Schedule Combinations on page 41.
1. Go to Access Management.
5. Click Save.
To expand an item in the Access Schedules list, click . Addition schedules are shown in green text and subtraction schedules
are shown in dark red text.
To edit an access schedule’s name or a schedule item, click and make the changes. Then click Save.
Note
The door controller has a few predefined commonly used access schedules that can be used as examples or modified as
required. However, the predefined access schedule Always cannot be modified or deleted.
• Addition schedule – Regular access schedules that define when doors can be accessed. Typical addition schedules are
office hours, business hours, after hours, or night time hours.
• Subtraction schedule – Exceptions to regular access schedules. They are generally used to restrict access during a specific
time period that occurs within the time period of a regular schedule (addition schedule). For example, subtraction
schedules can be used to deny users access to the building during public holidays that occur on weekdays.
• Identification type schedules – Determine when and how readers grant users access to a door. Each identification
type must be connected to an access schedule that tells the system when to grant users access with that particular
identification type. Multiple addition schedules and subtraction schedules can be added to each identification type.
For information about identification types, see page 35.
• Group schedules – Determine when, but not how, members of a group are granted access to a door. Each group must be
connected to one or more access schedules that tell the system when to grant its members access. Multiple addition
schedules and subtraction schedules can be added to each group. For information about groups, see page 34.
Group schedules can restrict entry access rights but not extend entry or exit access rights beyond what the identification type
schedules allow. In other words, if an identification type schedule restricts entry or exit access at certain times, a group schedule
32
AXIS A1001 & AXIS Entry Manager
Access Management
cannot override that identification type schedule. However, if a group schedule is more restrictive about access than the identification
type schedule, the group schedule overrides the identification type schedule.
Identification type schedules and group schedules can be combined in several ways to achieve different results. For example access
schedule combinations, see page 41.
5. Set the duration in the time fields. See Time Options on page 33.
6. For recurring schedule events, select the Recurrence pattern and Range of recurrence parameters. See Recurrence Pattern
Options on page 33 and Range of Recurrence Options on page 33.
7. Click Save.
Time Options
The following time options are available:
• All day – Select for events that last for all 24 hours of the day. Then enter the desired Start date.
• Start – Click the time field and select the desired time. If required, click the date field and select the desired month, day,
and year. You can also type the date directly in the field.
• End – Click the time field and select the desired time. If required, click the date field and select the desired month, day,
and year. You can also type the date directly in the field.
• Recurs every week on Monday, Tuesday, Wednesday, Thursday, Friday, Saturday, and Sunday – Select which days to repeat.
• First occurrence – Click the date field and select the desired month, day, and year. You can also type the date directly
in the field.
• End by – Click the date field and select the desired month, day, and year. You can also type the date directly in the field.
33
AXIS A1001 & AXIS Entry Manager
Access Management
Each user must belong to one or more groups. To add a user to a group, drag and drop the user to the desired group in the Groups list.
For more information, see Create and edit users on page 39.
1. Go to Access Management.
3. In the Add Group dialog, enter the group’s credentials. See Group Credentials on page 34.
4. Click Save.
To expand an item in the Groups list and view its members, door access rights and schedules, click .
To edit a group’s name or validity date, click and make the changes. Then click Save.
To verify when and how a group can access certain doors, click .
Group Credentials
The following credentials are available for groups:
• Name (required)
• Valid from and Valid to – Enter the dates between which the group’s credentials shall be valid. Click the date field and
select the desired month, day, and year. You can also type the date directly in the field.
• Whitelist – Users in a whitelist group can always access the doors in the group, even in case of network or power
failure. Since the users in the group always have access to the doors, schedules or valid to and valid from do not apply.
Long access time is not supported for a user that opens a door in a whitelist group. Only doors with wireless locks that
support whitelist functionality can be added to the group.
Note
• To be able to save the group, you must enter the group’s Name.
• Valid to and valid from for a user do not apply when adding the user to whitelist group.
• To sync whitelisted credentials to a wireless lock takes some time and interferes with normal door opening procedures.
Avoid adding or removing large numbers of credentials in a system during peak hours. When the sync of updated credentials
to the lock is done, the event log will show SyncOngoing: false for the lock.
Manage Doors
The general rules for each door are managed in the Doors tab. The rules include adding identification types that determine how users
will be granted access to the door and access schedules that determine when each identification type is valid. For more information,
see Identification Types on page 35 and Create and Edit Access Schedules on page 32.
Before you can manage a door, you must add it to the access control system by completing the hardware configuration, see
Configure the hardware on page 14.
To manage a door:
34
AXIS A1001 & AXIS Entry Manager
Access Management
2. In the Doors list, click next to the door you want to edit.
3. Drag the door to at least one group. If the Groups list is empty, create a new group. See Create and Edit Groups on page 34.
4. Click Add identification type and select which credentials users need to present to the reader to be granted access to the
door. See Identification Types on page 35.
If both identification types Card number only and PIN only are added, users can choose to either swipe their card or enter
their pin to access the door. But if, instead, only the identification type Card number and PIN is added, users must both
swipe their card and enter their PIN to access the door.
6. To define when the credentials are valid, drag a schedule to each identification type.
To manually unlock doors, lock doors, or grant temporary access, click one of the manual door actions as required. See Use Manual
Door Actions on page 36.
Note
Controls to manually unlock doors, lock doors, or grant temporary access, are not available for wireless doors/devices.
To edit a door or reader name, click and make the changes. Then click Save.
To verify the reader, identification type, and access schedule combinations, click .
To verify the function of the locks connected to the doors, click the verification controls. See Verification Controls Doors on page 20.
Identification Types
Identification types are portable credential storage devices, pieces of memorized information, or various combinations of the two that
determine how users will be granted access to the door. Common identification types include tokens such as cards or key fobs,
personal identification numbers (PINs), and request to exit (REX) devices.
For more information about credentials, see User Credentials on page 40.
• Facility code only – The user can access the door using a card or other token with the facility code accepted by the reader.
• Card number only – The user can access the door using only a card or other token accepted by the reader. The card
number is a unique number that is usually printed on the card. See the card manufacturer’s information about where to
locate the card number. The card number can also be retrieved by the system. Swipe the card on a connected reader,
select the reader in the list, and click Retrieve.
• Card raw only – The user can access the door using only a card or other token accepted by the reader. The information is
stored as raw data on the card. The card raw data can be retrieved by the system. Swipe the card on a connected reader,
select the reader in the list, and click Retrieve. Only use this identification type if a card number cannot be located.
• PIN only – The user can access the door using only a four-digit personal identification number (PIN).
• Facility code and PIN – The user needs both the card or other token with the facility code accepted by the reader, and a
PIN to access the door. The user must present the credentials in the specified order (card first, then PIN).
• Card number and PIN – The user needs both the card, or other token accepted by the reader, and a PIN to access the door.
The user must present the credentials in the specified order (card first, then PIN).
35
AXIS A1001 & AXIS Entry Manager
Access Management
• Card raw and PIN – The user needs both the card, or other token accepted by the reader, and a PIN to access the door. Only
use this identification type if a card number cannot be located. The user must present the credentials in the specified
order (card first, then PIN).
• REX – The user can access the door by activating a request to exit (REX) device, such as a button, sensor, or push bar.
• License plate only – The user can access the door using only a license plate number for a vehicle.
• HID Mobile Access – The user can access the door using a mobile phone with the HID Mobile Access app.
4. Select the Unlock state (unlocked or unlock both locks depending on whether the door has one or two locks).
5. Click OK.
6. Apply the predefined Office hours access schedule to the Scheduled unlock state.
2. In the Doors list, click next to the door that you want to control.
3. Click the required door action. See Manual Door Actions on page 36.
Note
To use the manual door actions, you need to open the Access Management page through the door controller the specific
door is connected to. If you open the Access Management page through a different door controller, instead of the manual
door actions there will be a link to the Overview page of the door controller the specific door is connected to. Click the
link, go to Access Management, and select the Doors tab.
• Get door status – Verify the current state of the door monitor, door alarms, and locks.
• Access – Grant users access to the door. The given access time applies. See How to configure door monitors and locks
on page 15.
36
AXIS A1001 & AXIS Entry Manager
Access Management
• Unlock (one lock) or Unlock both locks (two locks) – Unlock the door. The door remains unlocked until you press Lock or
Lock both locks, a scheduled door state is activated, or the door controller is restarted.
• Lock (one lock) or Lock both locks (two locks) – Lock the door.
• Unlock second lock and lock primary – This option is only available if the door has been configured with a secondary lock.
Unlock the door. The secondary lock remains unlocked until you press Double lock or a scheduled door state is activated.
Manage floors
If you have installed an AXIS 9188 Network I/O Relay Module to your system, floors can be managed in a similar way to managing
doors.
Note
If you use an A1001 in cluster mode with global events enabled, make sure you use unique descriptive names for each floor.
For example “Elevator A, Floor 1”.
Note
Max 2 AXIS 9188 Network I/O Relay Modules can be configured with each A1001 Network Door Controller.
The general rules for each floor are managed in the Floors tab. The rules include adding identification types that determine how users
will be granted access to the floor and access schedules that determine when each identification type is valid. For more information,
see Identification Types Floors on page 38 and Create and Edit Access Schedules on page 32.
Before you can manage a floor, you must add it to the access control system by completing the hardware configuration, see
Configure the hardware on page 14.
To manage a floor:
2. In the Floors list, click next to the floor you want to edit.
3. Drag the floor to at least one group. If the Groups list is empty, create a new group. See Create and Edit Groups on page 34.
4. Click Add identification type and select which credentials users need to present to the reader to be granted access
to the floor. See Identification Types Floors on page 38.
If both identification types Card number only and PIN only are added, users can choose to either swipe their card or enter
their pin to access the door. But if, instead, only the identification type Card number and PIN is added, users must both
swipe their card and enter their PIN to access the door.
6. To define when the credentials are valid, drag a schedule to each identification type.
To manually unlock floors, lock floors, or grant temporary access, click one of the manual door actions as required. See Use Manual
Floor Actions on page 39.
Note
Controls to manually unlock floors, lock floors, or grant temporary access, are not available for wireless doors/devices.
To edit a floor or reader name, click and make the changes. Then click Save.
To verify the reader, identification type, and access schedule combinations, click .
37
AXIS A1001 & AXIS Entry Manager
Access Management
To verify the function of the locks connected to the floors, click the verification controls. See Verification Controls Floors on page 21.
For more information about credentials, see User Credentials on page 40.
• Facility code only – The user can access the floor using a card or other token with the facility code accepted by the reader.
• Card number only – The user can access the floor using only a card or other token accepted by the reader. The card
number is a unique number that is usually printed on the card. See the card manufacturer’s information about where to
locate the card number. The card number can also be retrieved by the system. Swipe the card on a connected reader,
select the reader in the list, and click Retrieve.
• Card raw only – The user can access the floor using only a card or other token accepted by the reader. The information is
stored as raw data on the card. The card raw data can be retrieved by the system. Swipe the card on a connected reader,
select the reader in the list, and click Retrieve. Only use this identification type if a card number cannot be located.
• PIN only – The user can access the floor using only a four-digit personal identification number (PIN).
• Facility code and PIN – The user needs both the card or other token with the facility code accepted by the reader, and a
PIN to access the floor. The user must present the credentials in the specified order (card first, then PIN).
• Card number and PIN – The user needs both the card, or other token accepted by the reader, and a PIN to access the floor.
The user must present the credentials in the specified order (card first, then PIN).
• Card raw and PIN – The user needs both the card, or other token accepted by the reader, and a PIN to access the floor.
Only use this identification type if a card number cannot be located. The user must present the credentials in the specified
order (card first, then PIN).
• REX – The user can access the floor by activating a request to exit (REX) device, such as a button, sensor, or push bar.
For example, to keep a floor accessible for anyone during office hours:
4. Select the Unlock state (unlocked or unlock both locks depending on whether the floor has one or two locks).
5. Click OK.
6. Apply the predefined Office hours access schedule to the Scheduled unlock state.
38
AXIS A1001 & AXIS Entry Manager
Access Management
2. In the Floors list, click next to the floor that you want to control.
3. Click the required floor action. See Manual Floor Actions on page 39.
Note
To use the manual floor actions, you need to open the Access Management page through the floor controller the specific
door is connected to. If you open the Access Management page through a different floor controller, instead of the manual
floor actions there will be a link to the Overview page of the floor controller the specific floor is connected to. Click the
link, go to Access Management, and select the Floors tab.
• Get floor status – Verify the current state of the relay connected to a floor.
• Access – Grant users access to the floor. The given access time applies. See How to configure door monitors and locks
on page 15.
• Unlock – The floor gets fully accessible for everyone until you press Lock , a scheduled floor state is activated, or the
door controller is restarted.
• Lock – The floor gets inaccessible for everyone until you press Unlock , a scheduled floor state is activated, or the door
controller is restarted.
To be able to manage the user access rights efficiently, each user must belong to one or more groups. For more information,
see Create and Edit Groups.
1. Go to Access Management.
3. In the Add User dialog, enter the user’s credentials. See User Credentials on page 40.
4. Click Save.
5. Drag the user to one or more groups in the Groups list. If the Groups list is empty, create a new group. See Create
and Edit Groups on page 34.
To expand an item in the Users list and view a user’s credentials, click .
To find a specific user, enter a filter in the filter users field. To force exact matches, surround the filter text with double quotation
marks, for example “John” or “potter, virginia”.
To edit a user’s credentials, click and change the credentials as required. Then click Save.
39
AXIS A1001 & AXIS Entry Manager
Access Management
Important
If a user was created through AXIS Visitor Manager, do not edit or delete it in AXIS Entry Manager. For more information
about AXIS Visitor Manager and the QR code reader service, see AXIS Visitor Access on page 24.
User Credentials
The following credentials are available for users:
• Last name
• Valid from and Valid until – Enter the dates between which the user’s credentials shall be valid. Click the date field and
select the desired month, day, and year. You can also type the date directly in the field.
• Suspend credential – Select to suspend the credential. When suspended, the user cannot access any doors in the system
through this credential. Deselect to give the user access again. Suspension is intended to be temporary. If the user shall be
denied access permanently, it is better to delete the user profile.
• PIN (required if no card number or card raw) – Enter the four-digit personal identification number (PIN) selected by or
assigned to the user.
• Facility code – Enter a code to verify the facility’s access control system. If a preset facility code is entered this field is
filled in automatically, see Preset facility code on page 23
• Card number (required if no PIN or card raw) – Enter the card number. See the card manufacturer’s information about
where to locate the card number. The card number can also be retrieved by the system. Swipe the card on a connected
reader, select the reader in the list, and click Retrieve.
• Card raw (required if no PIN or card number) – Enter the card raw data. The data can be retrieved by the system. Swipe
the card on a connected reader, select the reader in the list, and click Retrieve. Only use this identification type if a
card number cannot be located.
• Long access time – Select to override existing access time and allow the door to be open for the Long access time for the
user, see About door monitor and time options on page 16
• License plate (this credential is not available in a default door controller installation) – When this credential is activated by
partner software, enter the license plate number for the user's vehicle.
This credential can only be used together with Axis partner software and a camera with license plate recognition software.
For more information, contact your Axis partner or your local Axis sales representative.
• HID Mobile Access – The user can access the door using a mobile phone with the HID Mobile Access app.
Note
The Retrieve button is only available if the hardware configuration has been completed and one or more readers are
connected to the controller.
Import Users
Users can be added to the system by importing a text file in comma-separated value (CSV) format. It is recommended to import
users when you need to add many users at a time.
Before you can import users, you must create and save a file (*.csv or *.txt) in the correct CSV format. Separate values by commas, no
spaces, and separate each user with a line break.
Example
jane,doe,1234,12345678,abc123
john,doe,5435,87654321,cde321
To import users:
40
AXIS A1001 & AXIS Entry Manager
Access Management
2. Locate and select the *.csv or *.txt file that holds the list of users.
6. If the columns are correct, click Start importing users. If the columns are incorrect, click Cancel and start over.
• First name
• Last name
• PIN code
• Card number
• License plate
• Unassigned – Values that will not be imported. Select this option to skip a particular column.
For more information about credentials, see Create and edit users.
Export Users
The Export page shows a comma-separated value (CSV) list of all the users in the system. The list can be used to import the
users to another system.
5. Save the document as a comma-separated value file (*csv) or as a text (*.txt) file.
Example
To create a schedule combination that
- using their card during day shift hours (Monday–Friday, 6 a.m. to 4 p.m.), while
- using their card and PIN before and after day shift hours, and that
41
AXIS A1001 & AXIS Entry Manager
Access Management
1. Create an Addition schedule called Day shift hours. See page 32.
2. Create a day shift hours Schedule item that recurs Monday–Friday, 06:00–16:00.
3. Create two groups, one Group called Guards and one Group called Day shift personnel. See page 34.
5. Drag the Day shift hours access schedule to the Day shift personnel group.
6. Add the Card number and PIN and Card number only identification types to the door’s reader.
7. Drag the predefined Always access schedule to the Card number and PIN identification type.
8. Drag the Day shift hours access schedule to the Card number only identification type.
9. Drag the door to both groups. Then add users to the groups as required. See page 39.
Example
To create a schedule combination that
- using their card during day shift hours (Monday–Friday, 6 a.m. to 4 p.m.), while
- using their card and PIN before and after day shift hours, and that
• grants day shift personnel access to the same door every day between 6 a.m. and 4 p.m.,
1. Create an Addition schedule called Day shift hours. See page 32.
2. Create a day shift hours Schedule item that recurs Monday–Friday, 06:00–16:00.
4. Create a nights and weekends Schedule item that recurs Sunday–Saturday 16:00–06:00.
5. Drag the predefined Always schedule and the Nights & weekends access schedule to the Day shift personnel group.
6. Create two groups, one Group called Guards and one Group called Day shift personnel. See page 34.
7. Drag the predefined Always access schedule to the Guards group and the Day shift personnel group.
8. Drag the Nights & weekends access schedule to the Day shift personnel group.
9. Add the Card number and PIN and Card number only identification types to the door’s reader.
10. Drag the predefined Always access schedule to the Card number and PIN identification type.
11. Drag the Day shift hours access schedule to the Card number only identification type.
12. Drag the door to both groups. Then add users to the groups as required. See page 39.
42
AXIS A1001 & AXIS Entry Manager
Events that occur in the system, for example when a user swipes a card or a REX device is activated, are logged in the event log.
Logged events can be configured to trigger alarms and such alarms are logged in the alarm log.
Alarms can also be configured to trigger actions such as email notifications. For more information, see How to set up action
rules on page 45.
If global events is enabled, you can open the event log from any door controller in the system. For more information about global
events, see Configure the Event and Alarm Logs on page 44.
To expand an item in the event log and view the event details, click .
Applying filters to the event log makes it easier to find specific events. To filter the list, select one or several event log filters and click
Apply filters. For more information, see Event Log Filters on page 43.
As an administrator, you might have more interest in some events than others. Therefore, you can choose which events that shall be
logged, and for which controllers. For more information, see Event log options on page 44.
• Door & floor – Filter on events that relates to a specific door or floor.
• Source – Filter on events from a selected controller. Available only in a controller cluster and when global events are
enabled.
• Date and time – Filter the event log by a date and time span.
1. Click .
2. Select export format from the pop up menu to start the export.
Note
CSV format is supported in all browsers, XLSX format is supported in ChromeTM and Internet Explorer®.
43
AXIS A1001 & AXIS Entry Manager
Note
After a completed export the export button changes from to . To initiate another export, refresh the
webpage. The export button changes back to .
To expand an item in the alarm log and view the alarm details, for example door identity and state, click .
To remove an alarm from the list after verifying the cause of the alarm, click Acknowledge. To remove all alarms click Acknowledge
all alarms.
As an administrator, you might need some events to trigger alarms. Therefore, you can choose which events shall trigger alarms
and for which controllers. For more information, see Alarm log options on page 44.
To share events and alarms between all connected controllers, select Global events. When global events is enabled, you only need
to open one Event Log page and one Alarm Log page to simultaneously manage the events and alarms of all door controllers in
the system. Global events is enabled by default.
If you disable global events, you will have to open one Event Log page and one Alarm Log page for each individual door controller
and manage their events and alarms separately.
Important
Each time that you enable or disable global events, the event log is cleared. This means that all events before that moment
are removed and the event log starts over.
Alarms can also be configured to trigger actions such as email notifications. For more information, see How to set up action
rules on page 45.
• No logging – Disable event logging. The event will not be registered or included in the event log.
• Log for all sources – Enable event logging in all door controllers. The event will be registered for all controllers and
included in the event log.
• Log for selected sources – Enable event logging in selected door controllers. The event will be registered for all selected
controllers and included in the event log. Select this option for events that will be combined with either the alarm log
option No alarms or Log alarm for selected controllers.
In the Configure event logging list, click Select controllers under the event log item you want to enable. The Device
Specific Event Logging dialog opens. Under Log event, select the controllers that shall have alarm logging enabled
and click Save.
44
AXIS A1001 & AXIS Entry Manager
The following options for triggering and logging alarms are available:
• No alarms – Disable alarm logging. The event will not trigger any alarms or be included in the alarm log.
• Log alarm for all sources – Enable alarm logging in all door controllers. The event will trigger an alarm and be included in
the alarm log.
• Log alarm for selected sources – Enable alarm logging in selected door controllers. The event will trigger an alarm
and be included in the alarm log.
In the Configure alarm logging list, click Select sources under the alarm log item you want to enable. The Device
Specific Alarm Triggering dialog opens. Under Trigger alarm, select the door controllers that shall have alarm logging
enabled and click Save.
For more information about available triggers and actions, see Triggers on page 46 and Actions on page 48.
This example describes how to set up an action rule to send an email notification when any alarm is triggered.
1. Configure the alarms. See Configure the Event and Alarm Logs on page 44.
2. Go to Setup > Additional Controller Configuration > Events > Action Rules and click Add.
3. Select Enable rule and enter a descriptive name for the rule.
6. Under Actions, select Send Notification from the Type drop-down list.
7. Select an email recipient from the drop-down list. See How to add recipients on page 48.
This example describes how to set up an action rule to activate an output port when the door is forced open.
1. Go to Setup > Additional Controller Configuration > System Options > Ports & Devices > I/O Ports.
2. Select Output from the desired I/O Port Type drop-down list and enter a Name.
10. Under Actions, select Output Port from the Type drop-down list.
11. Select the desired output port from the Port drop-down list.
13. Select Duration and Go to opposite state after. Then enter the desired duration of the action.
45
AXIS A1001 & AXIS Entry Manager
To use more than one trigger for the action rule, select Additional conditions and click Add to add additional triggers. When using
additional conditions, all conditions must be met to trigger the action.
To prevent an action from being triggered repeatedly, a Wait at least time can be set. Enter the time in hours, minutes and seconds,
during which the trigger should be ignored before the action rule can be activated again.
Triggers
Available action rule triggers and conditions include:
• Access Point
- Access Point Enabled – Triggers an action rule when an access point device such as a reader or REX device is
configured, for example when the hardware configuration is completed or an identification type is added.
• Configuration
- Access Point Changed – Triggers an action rule when the configuration of an access point device such as a
reader or REX device is changed, for example when hardware is configured or an identification type is edited,
changing the ways through which a door can be accessed.
- Access Point Removed – Triggers an action rule when the hardware configuration of an access point device
such as a reader or REX device is reset.
- Area Changed – Not supported by this version of AXIS Entry Manager. Must be configured by a client such as an
access management system, through the VAPIX® application programming interface, that supports this feature
and use devices that can provide the required signals. Triggers the action rule when an access area is changed.
- Area Removed – Not supported by this version of AXIS Entry Manager. Must be configured by a client such
as an access management system, through the VAPIX® application programming interface, that supports this
feature and use devices that can provide the required signals. Triggers the action rule when an access area is
removed from the system.
- Door Changed – Triggers an action rule when the door configuration settings, for example door name, are
changed or when a door is added to the system. This can for example be used to send a notification when a
door is installed and configured.
- Door Removed – Triggers an action rule when a door is removed from the system. This can for example be used
to send a notification when a door is removed from the system.
• Door
- Battery Alarm – Triggers an action rule when a wireless door battery is low and when it is flat.
- Door Alarm – Triggers an action rule when the door monitor indicates that the door has been forced open, the
door is open too long, or if the door is faulty in any way. This can for example be used to send a notification
when someone is forcing an entry.
- Door Double-Lock Monitor – Triggers an action rule only when the secondary lock changes state to either
locked or unlocked.
- Door Lock Monitor – Triggers an action rule when the normal lock changes state to either locked or unlocked.
For example, a fault is triggered when the door monitor detects that the door is open although the lock is locked.
- Door Mode – Triggers an action rule when the door changes states, for example, when the door has been
accessed or blocked, or the door is in lockdown mode. For more detailed descriptions of these modes, see the
online help.
- Door Monitor – Triggers an action rule when the door monitor state changes. This can for example be used to
send a notification when a door monitor indicates that the door is opened or closed.
46
AXIS A1001 & AXIS Entry Manager
- Door Tamper – Triggers an action rule when the door monitor detects that the connection is interrupted, for
example if someone cuts the wires to the door monitor. To use this trigger, make sure that Enable supervised
inputs is selected and that end of line resistors are installed on the relevant door connector input ports. For
more information, see How to use supervised inputs on page 18.
- Door Warning – Triggers an action rule before the door open too long alarm goes off. This can be used to, for
example, send a warning signal that the door controller will send the real alarm, the door open too long alarm, if
the door is not closed within the specified door open too long time. For more information about door open
too long time, see How to configure door monitors and locks on page 15.
- Lock Jammed – Triggers an action rule when a wireless door lock is physically blocked.
• Event Logger – Keeps track of all events in the door controller, for example when a user swipes a card or opens a door. If
Global events is enabled, the event logger keeps track of all the events in every controller in the system. To set which
alarms and events that can trigger an action rule, go to Setup > Configure Event and Alarm Logs. The event logger is
shared by the system and can store up to 30 000 events. When the limit is reached, the event logger uses the first in first
out (FIFO) rule. This means that the first event is the first to be overwritten.
- Alarm – Triggers an action rule when one of the specified alarms has been triggered. The system administrator
can configure which events are more important than others and select whether a particular event should
trigger an alarm or not.
- Dropped Alarms – Triggers an action rule when new alarm records cannot be written to the alarm logs. For
example if there are so many simultaneous alarms that the event logger cannot keep up. When an alarm is
dropped, a notification can be sent to the operator.
- Dropped Events – Triggers an action rule when new event records cannot be written to the event logs. For
example, if there are so many simultaneous events that the event logger cannot keep up. When an event is
dropped, a notification can be sent to the operator.
• Hardware
- Network – Triggers an action rule when the network connection is lost. Select Yes to trigger the action rule when
the network connection is lost. Select No to trigger the action rule when the network connection is restored.
Select IPv4/v6 address removed or New IPv4/v6 address to trigger an action when the IP address changes.
- Peer Connection – Triggers an action rule when the Axis product has established a connection with another
door controller, if the network connection between the devices is lost, or if the pairing of door controllers has
failed. This can for example be used to send a notification that a door controller has lost its network connection.
• Input Signal
- Digital Input Port – Triggers an action rule when an I/O port receives a signal from a connected device. See I/O
Ports on page 59.
- Manual Trigger – Triggers an action rule when the manual trigger is activated. It can be used by a client such
as an access management system, through the VAPIX® application programming interface, to manually start
or stop the action rule.
- Virtual Inputs – Triggers an action rule when one of the virtual inputs changes states. It can be used by a client
such as an access management system, through the VAPIX® application programming interface, to trigger
actions. Virtual inputs can, for example, be connected to buttons in the management system's user interface.
• Schedule
- Interval – Triggers an action rule at the schedule’s start time and remains active until the schedule’s end time
is reached.
- Pulse – Triggers an action rule when a one-time event occurs. That is, an event that happens at a specific
time and has no duration.
• System
47
AXIS A1001 & AXIS Entry Manager
- System Ready – Triggers an action rule when the system is in state ready. For example, the Axis product can
detect the system state and send a notification when the system has started.
Select Yes to trigger the action rule when the product is in state ready. Note that the rule will only trigger when
all necessary services, such as the event system, has started.
• Time
- Recurrence – Triggers an action rule by monitoring the recurrences that you have created. You can use this
trigger to initiate recurring actions such as sending notifications every hour. Select a recurrence pattern or create
a new one. For more information about setting up a recurrence pattern, see How to set up recurrences on page 49.
- Use Schedule – Triggers an action rule according to the selected schedule. See How to create schedules
on page 49.
Actions
You can configure several actions:
• Status LED – The status LED can be set to flash for the duration of the action rule or for a set number of seconds. The
status LED can be used during installation and configuration to visually validate if the trigger settings, for example the
door open too long trigger, work correctly. To set the status LED flash color, select an LED Color from the drop-down list.
To add a recipient:
1. Go to Setup > Additional Controller Configuration > Events > Recipients and click Add.
6. Click OK.
Recipient types
The following recipient types are available:
HTTP
HTTPS
TCP
48
AXIS A1001 & AXIS Entry Manager
Note
Some email providers have security filters that prevent users from receiving or viewing large attachments, from receiving
scheduled emails and similar. Check the email provider’s security policy to avoid delivery problems and locked email accounts.
3. Enter the email addresses to send emails to in the To field. Use commas to separate multiple addresses.
To set up an email recipient using for example a corporate email server, follow the instructions above but select User defined as
Provider. Enter the email address to appear as sender in the From field. Select Advanced settings and specify the SMTP server
address, port and authentication method. Optionally, select Use encryption to send emails over an encrypted connection. The server
certificate can be validated using the certificates available in the Axis product. For information on how to upload certificates,
see Certificates on page 53.
1. Go to Setup > Additional Controller Configuration > Events > Schedules and click Add.
2. Enter a descriptive name and the information needed for a daily, weekly, monthly or yearly schedule.
3. Click OK.
To use the schedule in an action rule, select the schedule from the Schedule drop-down list in the Action Rule Setup page.
To set up a recurrence:
1. Go to Setup > Additonal Controller Configuration > Events > Recurrences and click Add.
3. Click OK.
To use the recurrence in an action rule, first select Time from the Trigger drop-down list in the Action Rule Setup page and then
select the recurrence from the second drop-down list.
To modify or remove recurrences, select the recurrence in the Recurrences List and click Modify or Remove.
Reader feedback
Readers use LEDs and beepers to send feedback messages to the user (the person accessing or trying to access the door). The door
controller can trigger a number of feedback messages, some of which are preconfigured in the door controller and supported by
most readers.
49
AXIS A1001 & AXIS Entry Manager
Readers have different LED behaviors, but typically they use different sequences of steady lights and flashing lights in red, green, and
amber.
Readers can also use one-pitch beepers to send messages, using different sequences of short and long beeper signals.
The table below shows the events that are preconfigured in the door controller to trigger reader feedback and their typical reader
feedback signals. Feedback signals for AXIS readers are presented in the Installation Guide supplied with the AXIS reader.
Feedback messages other than the above must be configured by a client such as an access management system, through the VAPIX®
application programming interface, that supports this feature and use readers that can provide the required signals. For more
information, see the user information supplied by the access management system developer and reader manufacturer.
50
AXIS A1001 & AXIS Entry Manager
Reports
Reports
The Reports page allows you to view, print, and export reports that contain different types of information about the system. For
more information about which reports that are available, see Report Types on page 51.
To print a report:
2. Select the columns that shall be included in the report. All columns are selected by default.
3. If you want to narrow the scope of the report, enter a filter in the relevant filter field. For example, you can filter users by
which group they belong to, doors by their schedules, or groups by the doors they have access to.
To force exact matches, surround the filter text with double quotation marks, for example “John”.
4. If you want to sort the report items in a different order, click in the relevant column. To change between standard
and reverse order, toggle the sorting buttons.
The report is exported as a a comma-separated value (CSV) file and includes all possible columns and items for the report type.
Unless otherwise specified, the exported file (*.csv) is saved in the default download folder. You can select a download folder
in the web browser’s user settings.
Note
Only users that have credentials are shown in reports.
Report Types
The following report types are available:
• Access schedules. For more information about access schedule types and options, see page 32 and page 33.
• Groups. For more information about group credentials, see page 34.
• Doors. For more information about doors and identification types, see page 34 and page 35.
• Users. For more information about user credentials, see page 40.
• Door controllers. For more information about connected controllers and their ID types, see page 27. For more information
about door monitor time options, see page 17.
51
AXIS A1001 & AXIS Entry Manager
System options
System options
Security
Users
User access control is enabled by default and can be configured under Setup > Additional Controller Configuration > System
Options > Security > Users. An administrator can set up other users by giving them user names and passwords.
The user list displays authorized users and user groups (access levels):
• Administrators have unrestricted access to all settings. The administrator can add, modify and remove other users.
Note
Note that when the option Encrypted & unencrypted is selected, the webserver will encrypt the password. This is the default
option for a new unit or a unit reset to factory default settings.
Under HTTP/RTSP Password Settings, select the type of password to allow. You may need to allow unencrypted passwords if there are
viewing clients that do not support encryption, or if you upgraded the firmware and existing clients support encryption but need
to log in again and be configured to use this functionality.
ONVIF
ONVIF is an open industry forum that provides and promotes standardized interfaces for effective interoperability of IP-based
physical security products.
By creating a user you automatically enable ONVIF communication. Use the user name and password with all ONVIF communication
with the product. For more information see www.onvif.org
IP Address Filter
IP address filtering is enabled on the Setup > Additional Controller Configuration > System Options > Security > IP Address
Filter page. Once enabled, the listed IP address are allowed or denied access to the Axis product. Select Allow or Deny from the list
and click Apply to enable IP address filtering.
The administrator can add up to 256 IP address entries to the list (a single entry can contain multiple IP addresses).
HTTPS
HTTPS (HyperText Transfer Protocol over Secure Socket Layer, or HTTP over SSL) is a web protocol providing encrypted browsing.
HTTPS can also be used by users and clients to verify that the correct device is being accessed. The security level provided by
HTTPS is considered adequate for most commercial exchanges.
The Axis product can be configured to require HTTPS when administrators log in.
To use HTTPS, an HTTPS certificate must first be installed. Go to Setup > Additional Controller Configuration > System Options >
Security > Certificates to install and manage certificates. See Certificates on page 53.
1. Go to Setup > Additional Controller Configuration > System Options > Security > HTTPS
3. Optionally, click Ciphers and select the encryption algorithms to use for SSL.
4. Set the HTTPS Connection Policy for the different user groups.
52
AXIS A1001 & AXIS Entry Manager
System options
To access the Axis product via the desired protocol, in the address field in a browser, enter https:// for the HTTPS protocol
and http:// for the HTTP protocol.
The HTTPS port can be changed on the System Options > Network > TCP/IP > Advanced page.
IEEE 802.1X
IEEE 802.1X is a standard for port-based Network Admission Control providing secure authentication of wired and wireless network
devices. IEEE 802.1X is based on EAP (Extensible Authentication Protocol).
To access a network protected by IEEE 802.1X, devices must be authenticated. The authentication is performed by an authentication
server, typically a RADIUS server, examples of which are FreeRADIUS and Microsoft Internet Authentication Service.
In Axis implementation, the Axis product and the authentication server identify themselves with digital certificates using EAP-TLS
(Extensible Authentication Protocol - Transport Layer Security). The certificates are provided by a Certification Authority (CA).
You need:
To create and install certificates, go to Setup > Additional Controller Configuration > System Options > Security > Certificates.
See Certificates on page 53.
1. Go to Setup > Additional Controller Configuration > System Options > Security > IEEE 802.1X.
2. Select a CA Certificate and a Client Certificate from the lists of installed certificates.
3. Under Settings, select the EAPOL version and provide the EAP identity associated with the client certificate.
Note
For authentication to work properly, the date and time settings in the Axis product should be synchronized with an NTP
server. See Date & Time on page 54.
Certificates
Certificates are used to authenticate devices on a network. Typical applications include encrypted web browsing (HTTPS), network
protection via IEEE 802.1X and notification messages for example via email. Two types of certificates can be used with the Axis
product:
Server/Client certificates - To authenticate the Axis product. A Server/Client certificate can be self-signed or issued by a Certificate
Authority (CA). A self-signed certificate offers limited protection and can be used before a CA-issued certificate has been obtained.
CA certificates - To authenticate peer certificates, for example the certificate of an authentication server in case the Axis product is
connected to an IEEE 802.1X protected network. The Axis product is shipped with several preinstalled CA certificates.
Note
• If the product is reset to factory default, all certificates, except preinstalled CA certificates, will be deleted.
• If the product is reset to factory default, all preinstalled CA certificates that have been deleted will be reinstalled.
53
AXIS A1001 & AXIS Entry Manager
System options
2. Go to Setup > Additional Controller Configuration > System Options > Security > Certificates.
3. Click Create certificate signing request and provide the requested information.
5. When the signed certificate is returned, click Install certificate and upload the certificate.
Current Server Time displays the current date and time (24h clock).
To change the date and time settings, select the preferred Time mode under New Server Time:
• Synchronize with computer time – Sets date and time according to the computer’s clock. With this option, date and
time are set once and will not be updated automatically.
• Synchronize with NTP Server – Obtains date and time from an NTP server. With this option, date and time settings are
updated continuously. For information on NTP settings, see NTP Configuration on page 56.
If using a host name for the NTP server, a DNS server must be configured. See DNS Configuration on page 56.
If using an NTP server, select your Time zone from the drop-down list. If required, check Automatically adjust for daylight saving
time changes.
Network
Basic TCP/IP Settings
The Axis product supports IP version 4 (IPv4).
The Axis product can get an IPv4 address in the following ways:
• Dynamic IP address – Obtain IP address via DHCP is selected by default. This means that the Axis product is set to get
the IP address automatically via Dynamic Host Configuration Protocol (DHCP).
DHCP allows network administrators to centrally manage and automate the assignment of IP addresses.
• Static IP address – To use a static IP address, select Use the following IP address and specify the IP address, subnet mask
and default router. Then click Save.
DHCP should only be enabled when using dynamic IP address notification, or if the DHCP can update a DNS server that makes
it possible to access the Axis product by name (host name).
If DHCP is enabled and the product cannot be accessed, run AXIS IP Utility to search the network for connected Axis products, or
reset the product to the factory default settings and then perform the installation again. For information about how to reset to
factory default, see page 61.
54
AXIS A1001 & AXIS Entry Manager
System options
ARP/Ping
The product’s IP address can be assigned using ARP and Ping. For instructions, see Assign an IP address using ARP/Ping on page 55.
The ARP/Ping service is enabled by default but is automatically disabled two minutes after the product is started, or as soon as an IP
address is assigned. To re-assign IP address using ARP/Ping, the product must be restarted to enable ARP/Ping for an additional
two minutes.
To disable the service, go to Setup > Additional Controller Configuration > System Options > Network > TCP/IP > Basic and clear
the option Enable ARP/Ping setting of IP address.
1. Acquire a free static IP address on the same network segment as the computer.
Linux/Unix syntax
Linux/Unix example
Windows syntax (this may require that you run the command prompt as an administrator)
Windows example (this may require that you run the command prompt as an administrator)
5. Close the command prompt when the device responds with Reply from 192.168.0.125:... or similar.
For other methods of assigning the IP address, see the document How to assign an IP address and access your device at
www.axis.com/support
Note
• To open a command prompt in Windows, open the Start menu and search for cmd.
• To use the ARP command in Windows 8/Windows 7/Windows Vista, right-click the command prompt icon and select
Run as administrator.
• To open a command prompt in Mac OS X, open the Terminal utility from Application > Utilities.
55
AXIS A1001 & AXIS Entry Manager
System options
The AVHS settings are configured under Setup > Additional Controller Configuration > System Options > Network > TCP IP >
Basic. The possibility to connect to an AVHS service is enabled by default. To disable, clear the Enable AVHS box.
One-click enabled - Press and hold the product’s control button (see Product overview on page 4 ) for about 3 seconds to connect to
an AVHS service over the Internet. Once registered, Always will be enabled and the Axis product stays connected to the AVHS service.
If the product is not registered within 24 hours from when the button is pressed, the product will disconnect from the AVHS service.
Always - The Axis product will constantly attempt to connect to the AVHS service over the Internet. Once registered, the product will
stay connected to the service. This option can be used when the product is already installed and it is not convenient or possible to
use the one-click installation.
Note
AVHS support is dependent on the availability of subscriptions from service providers.
To register the Axis product with AXIS Internet Dynamic DNS Service, go to Setup > Additional Controller Configuration > System
Options > Network > TCP/IP > Basic. Under Services, click the AXIS Internet Dynamic DNS Service Settings button (requires access to
the Internet). The domain name currently registered at AXIS Internet Dynamic DNS service for the product can at any time be removed.
Note
AXIS Internet Dynamic DNS Service requires IPv4.
DNS Configuration
DNS (Domain Name Service) provides the translation of host names to IP addresses. The DNS settings are configured under Setup >
Additional Controller Configuration > System Options > Network > TCP/IP > Advanced.
Select Obtain DNS server address via DHCP to use the DNS settings provided by the DHCP server.
To make manual settings, select Use the following DNS server address and specify the following:
Domain name - Enter the domain(s) to search for the host name used by the Axis product. Multiple domains can be separated by
semicolons. The host name is always the first part of a fully qualified domain name, for example, myserver is the host name in the
fully qualified domain name myserver.mycompany.com where mycompany.com is the domain name.
Primary/Secondary DNS server - Enter the IP addresses of the primary and secondary DNS servers. The secondary DNS server is
optional and will be used if the primary is unavailable.
NTP Configuration
NTP (Network Time Protocol) is used to synchronize the clock times of devices in a network. The NTP settings are configured under
Setup > Additional Controller Configuration > System Options > Network > TCP/IP > Advanced.
Select Obtain NTP server address via DHCP to use the NTP settings provided by the DHCP server.
To make manual settings, select Use the following NTP server address and enter the host name or IP address of the NTP server.
Select Obtain host name via IPv4 DHCP to use host name provided by the DHCP server running on IPv4.
56
AXIS A1001 & AXIS Entry Manager
System options
Select Use the host name to set the host name manually.
Select Enable dynamic DNS updates to dynamically update local DNS servers whenever the Axis product’s IP address changes. For
more information, see the online help.
This function can be disabled under Setup > Additional Controller Configuration > System Options > Network > TCP/IP
> Advanced.
HTTP
The HTTP port used by the Axis product can be changed under Setup > Additional Controller Configuration > System Options >
Network > TCP/IP > Advanced. In addition to the default setting, which is 80, any port in the range 1024–65535 can be used.
HTTPS
The HTTPS port used by the Axis product can be changed under Setup > Additional Controller Configuration > System Options >
Network > TCP/IP > Advanced. In addition to the default setting, which is 443, any port in the range 1024–65535 can be used.
To enable HTTPS, go to Setup > Additional Controller Configuration > System Options > Security > HTTPS. For more information,
see HTTPS on page 52.
Use NAT traversal when the Axis product is located on an intranet (LAN) and you wish to make it available from the other (WAN) side
of a NAT router. With NAT traversal properly configured, all HTTP traffic to an external HTTP port in the NAT router is forwarded to
the product.
NAT traversal is configured under Setup > Additional Controller Configuration > System Options > Network > TCP/IP > Advanced.
Note
• For NAT traversal to work, this must be supported by the router. The router must also support UPnP®.
• In this context, router refers to any network routing device such as a NAT router, Network router, Internet Gateway,
Broadband router, Broadband sharing device, or a software such as a firewall.
Enable/Disable - When enabled, the Axis product attempts to configure port mapping in a NAT router on your network, using
UPnP. Note that UPnP must be enabled in the product (see Setup > Additional Controller Configuration > System Options
> Network > UPnP).
Use manually selected NAT router - Select this option to manually select a NAT router and enter the IP address for the router in
the field. If no router is specified, the product automatically searches for NAT routers on your network. If more than one router is
found, the default router is selected.
Alternative HTTP port - Select this option to manually define an external HTTP port. Enter a port in the range 1024–65535. If the
port field is empty or contains the default setting, which is 0, a port number is automatically selected when enabling NAT traversal.
57
AXIS A1001 & AXIS Entry Manager
System options
Note
• An alternative HTTP port can be used or be active even if NAT traversal is disabled. This is useful if your NAT router does not
support UPnP and you need to manually configure port forwarding in the NAT router.
• If you attempt to manually enter a port that is already in use, another available port is automatically selected.
• When the port is selected automatically it is displayed in this field. To change this, enter a new port number and click Save.
FTP
The FTP server running in the Axis product enables upload of new firmware, user applications, etc. The FTP server can be disabled
under Setup > Additional Controller Configuration > System Options > Network > TCP/IP > Advanced.
RTSP
The RTSP server running in the Axis product allows a connecting client to start an event stream. The RTSP port number can be changed
under Setup > Additional Controller Configuration > System Options > Network > TCP/IP > Advanced. The default port is 554.
Note
Event streams will not be available if the RTSP server is disabled.
SOCKS
SOCKS is a networking proxy protocol. The Axis product can be configured to use a SOCKS server to reach networks on the other
side of a firewall or proxy server. This functionality is useful if the Axis product is located on a local network behind a firewall, and
notifications, uploads, alarms, etc need to be sent to a destination outside the local network (for example the Internet).
SOCKS is configured under Setup > Additional Controller Configuration > System Options > Network > SOCKS. For more
information, see the online help.
The QoS settings are configured under Setup > Additional Controller Configuration > System Options > Network > QoS. Using
DSCP (Differentiated Services Codepoint) values, the Axis product can mark event/alarm traffic and management traffic.
SNMP
The Simple Network Management Protocol (SNMP) allows remote management of network devices. An SNMP community is the
group of devices and management station running SNMP. Community names are used to identify groups.
To enable and configure SNMP in the Axis product, go to the Setup > Additional Controller Configuration > System Options
> Network > SNMP page.
Depending on the level of security required, select the version on SNMP to use.
Traps are used by the Axis product to send messages to a management system on important events and status changes. Check Enable
traps and enter the IP address where the trap message should be sent and the Trap community that should receive the message.
Note
If HTTPS is enabled, SNMP v1 and SNMP v2c should be disabled.
Traps for SNMP v1/v2 are used by the Axis product to send messages to a management system on important events and status
changes. Check Enable traps and enter the IP address where the trap message should be sent and the Trap community that
should receive the message.
• Cold start
58
AXIS A1001 & AXIS Entry Manager
System options
• Warm start
• Link up
• Authentication failed
SNMP v3 provides encryption and secure passwords. To use traps with SNMP v3, an SNMP v3 management application is required.
To use SNMP v3, HTTPS must be enabled, see HTTPS on page 52. To enable SNMP v3, check the box and provide the initial user
password.
Note
The initial password can only be set once. If the password is lost, the Axis product must be reset to factory default, see
Reset to factory default settings on page 61.
UPnP
The Axis product includes support for UPnP®. UPnP is enabled by default and the product is automatically detected by operating
systems and clients that support this protocol.
UPnP can be disabled under Setup > Additional Controller Configuration > System Options > Network > UPnP.
Bonjour
The Axis product includes support for Bonjour. Bonjour is enabled by default and the product is automatically detected by operating
systems and clients that support this protocol.
Bonjour can be disabled under Setup > Additional Controller Configuration > System Options > Network > Bonjour.
The I/O ports are configured under Setup > Additional Controller Configuration > System Options > Ports & Devices > I/O Ports.
Select the port direction (Input or Output). The ports can be given descriptive names and their Normal states can be configured as
Open circuit or Grounded circuit.
Port Status
The list on the System Options > Ports & Devices > Port Status page shows the status of the product’s input and output ports.
Maintenance
The Axis product provides several maintenance functions. These are available under Setup > Additional Controller Configuration
> System Options > Maintenance.
Click Restart to perform a correct restart if the Axis product is not behaving as expected. This will not affect any of the current
settings.
Note
A restart clears all entries in the Server Report.
Click Restore to reset most settings to the factory default values. The following settings are not affected:
59
AXIS A1001 & AXIS Entry Manager
System options
Click Default to reset all settings, including the IP address, to the factory default values. This button should be used with caution. The
Axis product can also be reset to factory default using the control button, see Reset to factory default settings on page 61.
For information about firmware upgrade, see How to upgrade the firmware on page 62.
Important
You can't create a backup of the application data if it includes HID mobile credentials
Go to Setup > Upload a backup to use a previously created backup file to restore the application data. Before you can upload the
backup file, you have to reset the device to factory default settings. For instructions, see Reset to factory default settings on page 61.
Support
Support Overview
The Setup > Additional Controller Configuration > System Options > Support > Support Overview page provides information on
troubleshooting and contact information, should you require technical assistance.
System Overview
To get an overview of the Axis product’s status and settings, go to Setup > Additional Controller Configuration > System Options
> Support > System Overview. Information that can be found here includes firmware version, IP address, network and security
settings, event settings, and recent log items.
Access Log - Lists all failed attempts to access the product. The access log can also be configured to list all connections to the
product (see below).
View Server Report - Provides information about the product status in a pop-up window. The access log is automatically included
in the server report.
Download Server Report - Creates a .zip file that contains a complete server report text file in UTF–8 format. Select the Include
snapshot from Live View option to include a snapshot of the product’s Live View. The .zip file should always be included when
contacting support.
Parameter List - Shows the product's parameters and their current settings. This may prove useful when troubleshooting or
when contacting Axis Support.
60
AXIS A1001 & AXIS Entry Manager
System options
Connection List - Lists all clients that are currently accessing media streams.
Crash Report - Generates an archive with debugging information. The report takes several minutes to generate.
The log levels for the system and access logs are set under Setup > Additional Controller Configuration > System Options
> Support > Logs & Reports > Configuration. The access log can be configured to list all connections to the product (select
Critical, Warnings & Info).
Advanced
Scripting
Scripting allows experienced users to customize and use their own scripts.
NOTICE
NO TICE
Improper use may cause unexpected behavior and loss of contact with the Axis product.
Axis strongly recommends that you do not use this function unless you understand the consequences. Axis Support does not provide
assistance for problems with customized scripts.
To open the Script Editor, go to Setup > Additional Controller Configuration > System Options > Advanced > Scripting. If a
script causes problems, reset the product to its factory default settings, see page 61.
File Upload
Files, for example webpages and images, can be uploaded to the Axis product and used as custom settings. To upload a file, go to
Setup > Additional Controller Configuration > System Options > Advanced > File Upload.
Uploaded files are accessed through http://<ip address>/local/<user>/<file name> where <user> is the
selected user group (administrator) for the uploaded file.
2. Press and hold the control button while reconnecting power. See Product overview on page 4 .
3. Keep the control button pressed for 25 seconds until the status LED indicator turns amber for the second time.
4. Release the control button. The process is complete when the status LED indicator turns green. The product has been reset
to the factory default settings. If no DHCP server is available on the network, the default IP address is 192.168.0.90.
5. Use the installation and management software tools, assign an IP address, set the password, and access the product.
It is also possible to reset parameters to factory default through the web interface. Go to Setup > Additional Controller
Configuration > Setup > System Options > Maintenance and click Default.
61
AXIS A1001 & AXIS Entry Manager
Troubleshooting
Troubleshooting
The current firmware version in the Axis product is displayed in the Overview page.
Note
• After the upgrade process has completed, the product restarts automatically. If you restart the product manually after
the upgrade, wait 5 minutes even if you suspect that the upgrade has failed.
• Because the database of users, groups, credentials, and other data are updated after a firmware upgrade, the first start-up
could take a few minutes to complete. The time required is dependent on the amount of data.
• When you upgrade the Axis product with the latest firmware, the product receives the latest functionality available. Always
read the upgrade instructions and release notes available with each new release before upgrading the firmware.
1. Download the latest firmware file to your computer, available free of charge at www.axis.com/support
2. Go to Setup > Additional Controller Configuration > System Options > Maintenance in the product’s webpages.
3. Under Upgrade Server, click Choose file and locate the file on your computer.
4. If you want the product to automatically restore to factory default settings after the upgrade, check the Default checkbox.
5. Click Upgrade.
6. Wait approximately 5 minutes while the product is being upgraded and restarted. Then clear the web browser's cache.
You can use AXIS Device Manager or AXIS Camera Station to upgrade all door controllers in a system. See www.axis.com for more
information.
Important
• Do not select sequential upgrade.
Note
• All controllers in a system must always be on the same firmware version.
• Upgrade all controllers in a system at the same time, using the parallel option in AXIS Device Manager or
AXIS Camera Station.
62
AXIS A1001 & AXIS Entry Manager
Troubleshooting
In Windows, type the following from a command/DOS prompt (this may require that you run the command prompt as
an administrator):
2. If the product does not reply in 30 seconds, restart it and wait for a reply. Press CTRL+C to stop Ping.
3. Open a browser and type in the product’s IP address. In the page that opens, use the Browse button to select the upgrade
file to use. Then click Load to restart the upgrade process.
4. After the upgrade is complete (1–10 minutes), the product automatically restarts and shows a steady green on the
Status indicator.
If the emergency recovery procedure does not get the product up and running again, contact Axis support at www.axis.com/support
63
AXIS A1001 & AXIS Entry Manager
Troubleshooting
If the password for the user root is lost, the product must be reset to the factory default settings.
See Reset to factory default settings on page 61.
The IP address has been IP addresses obtained from a DHCP server are dynamic and may change. If the IP address has been
changed by DHCP changed, use AXIS IP Utility or AXIS Device Manager to locate the product on the network. Identify
the product using its model or serial number, or by the DNS name (if the name has been configured).
If required, a static IP address can be assigned manually. For instructions, see the document How to
assign an IP address and access your device on the product page at axis.com
Certificate error when using For authentication to work properly, the date and time settings in the Axis product should be
IEEE 802.1X synchronized with an NTP server. See Date & Time on page 54.
64
AXIS A1001 & AXIS Entry Manager
Specifications
Specifications
Connectors
For information about the connectors’ positions, see .
For connection diagrams and information about the hardware pin chart generated through the hardware configuration, see
Connection Diagrams on page 69 and Configure the hardware on page 14.
• Two-wire Wiegand
Important
The RS485 ports have a fixed baudrate of 9600 Bit/s.
Important
The recommended maximum cable length is 30 m (98.4 ft).
Important
The output circuits in this section are Class 2 power limited.
• Digital Input
65
AXIS A1001 & AXIS Entry Manager
Specifications
• Digital Output
• 0 V DC (-)
Pin 3 on the reader I/O connectors can be supervised. If the connection is interrupted, an event is activated. To use supervised inputs,
install end of line resistors. Use the connection diagram for supervised inputs. See page 70.
Important
The recommended maximum cable length is 30 m (98.4 ft).
Important
The output circuits in this section are Class 2 power limited.
Door Connector
Two 4-pin terminal blocks for door monitoring devices (digital input).
All door input pins can be supervised. If the connection is interrupted, an alarm is triggered. To use supervised inputs, install end of
line resistors. Use the connection diagram for supervised inputs. See page 70.
Important
The recommended maximum cable length is 30 m (98.4 ft).
66
AXIS A1001 & AXIS Entry Manager
Specifications
Auxiliary Connector
4-pin configurable I/O terminal block for:
• Digital Input
• Digital Output
• 0 V DC (-)
Important
The recommended maximum cable length is 30 m (98.4 ft).
Important
The output circuits in this section are Class 2 power limited.
Power connector
2-pin terminal block for DC power input. Use a Safety Extra Low Voltage (SELV) compliant limited power source (LPS) with either
a rated output power limited to ≤100 W or a rated output current limited to ≤5 A.
67
AXIS A1001 & AXIS Entry Manager
Specifications
Network Connector
RJ45 Ethernet connector. Use Category 5e cables or higher.
Function Specifications
Power and Ethernet Power over Ethernet IEEE 802.3af/802.3at Type 1 Class 3, 44–57 V DC
Connect locks and loads to the pins according to the hardware pin chart generated through the hardware configuration.
NOTICE
NO TICE
If the lock is non-polarized, we recommend you to add an external flyback diode.
Important
The output circuits in this section are Class 2 power limited.
• External devices
• 0 V DC (-)
Connect locks and loads to the pins according to the hardware pin chart generated through the hardware configuration.
68
AXIS A1001 & AXIS Entry Manager
Specifications
24 V DC 6 Not used
NOTICE
NO TICE
If the lock is non-polarized, we recommend you to add an external flyback diode.
Important
The output circuits in this section are Class 2 power limited.
Note
Both the front and back tampering alarms are connected by default. The casing open trigger can be configured to perform an
action if the door controller is opened or if the door controller is removed from the wall or ceiling. For information about how
to configure alarms and events, see Alarm and Event Configuration on page 43.
Connection Diagrams
Connect devices according to the hardware pin chart generated through the hardware configuration. For more information about
hardware configuration and the hardware pin chart, see Configure the hardware on page 14.
69
AXIS A1001 & AXIS Entry Manager
Specifications
Auxiliary Connector
1 0 V DC (-)
2 DC output: 3.3 V, max 100 mA
A I/O configured as input
B I/O configured as output
Supervised inputs
To use supervised inputs, install end of line resistors according to the diagram below.
i Input
ii 0 V DC (-)
Note
It is recommended to use twisted and shielded cables. Connect shielding to 0 V DC.
70
AXIS A1001 & AXIS Entry Manager
Safety information
Safety information
Hazard levels
DANGER
Indicates a hazardous situation which, if not avoided, will result in death or serious injury.
WARNING
Indicates a hazardous situation which, if not avoided, could result in death or serious injury.
CAUTION
Indicates a hazardous situation which, if not avoided, could result in minor or moderate injury.
NOTICE
NO TICE
Indicates a situation which, if not avoided, could result in damage to property.
Note
Indicates useful information which helps in getting the most out of the product.
71
User Manual Ver. M23.3
AXIS A1001 & AXIS Entry Manager Date: May 2021
© Axis Communications AB, 2013 - 2021 Part No. T10010336
Firmware version 1.20
Alarm Control Panels
INTEGRA
USER
MANUAL
SATEL aims to continually improve the quality of its products, which may result in changes in
their technical specifications and software. Current information about the changes being
introduced is available on our website.
Please visit us at:
https://support.satel.eu
- caution.
CONTENTS
1. General ............................................................................................................................. 3
2. Technical reliability of the alarm system ........................................................................... 3
3. Alarm system operating costs ........................................................................................... 3
4. Authorization of users ....................................................................................................... 4
4.1 Authorization with two identifiers ............................................................................... 4
4.2 Factory default codes ................................................................................................ 4
4.3 Operation under duress ............................................................................................. 5
5. Operating the alarm system by means of LCD keypad..................................................... 5
5.1 Keypads description .................................................................................................. 5
5.1.1 LCD display ........................................................................................................ 5
5.1.2 LED indicators .................................................................................................... 7
5.1.3 Keys ................................................................................................................... 8
5.1.4 Built-in proximity card reader .............................................................................. 9
5.1.5 Sound signaling .................................................................................................. 9
5.2 [Code] – arming / disarming menu ........................................................................ 10
5.2.1 Arming menu .................................................................................................... 10
5.2.2 Disarming menu ............................................................................................... 10
5.3 [Code] – user menu.............................................................................................. 10
5.3.1 Functions list .................................................................................................... 11
5.3.2 Starting functions.............................................................................................. 15
5.3.3 Menu shortcuts ................................................................................................. 15
5.3.4 Entering data by means of the LCD keypad ..................................................... 16
5.3.5 Description of user functions ............................................................................ 17
5.4 Arming ..................................................................................................................... 23
5.4.1 Full arming without partition selection .............................................................. 23
5.4.2 Full arming the selected partitions .................................................................... 23
5.4.3 Arming in the selected mode ............................................................................ 24
5.4.4 Quick arming .................................................................................................... 24
5.4.5 Denial of arming ............................................................................................... 24
5.4.6 Failure of arming procedure ............................................................................. 25
5.4.7 Shortening the exit delay time .......................................................................... 25
5.5 Disarming and alarm clearing .................................................................................. 25
5.5.1 Alarm clearing without disarming...................................................................... 25
5.6 Two-code arming / disarming .................................................................................. 25
5.7 Triggering the alarm from keypad ............................................................................ 26
5.8 Users ....................................................................................................................... 26
5.8.1 User types ........................................................................................................ 27
5.8.2 Adding new user............................................................................................... 28
5.8.3 Edit user ........................................................................................................... 28
5.8.4 Removing a user .............................................................................................. 29
5.8.5 Adding proximity card / DALLAS iButton .......................................................... 29
5.8.6 Adding keyfob................................................................................................... 29
5.8.7 Removing keyfob.............................................................................................. 30
5.9 Master users (administrators) .................................................................................. 31
5.10 Zone bypassing ....................................................................................................... 31
5.10.1 Zone inhibiting .................................................................................................. 31
5.10.2 Zone isolating ................................................................................................... 32
5.10.3 Unbypassing..................................................................................................... 32
5.11 Viewing the event log .............................................................................................. 32
2 User Manual SATEL
1. General
Thank you for choosing the product offered by the SATEL Company. Wishing you full
satisfaction with the choice you made, we are always ready to provide you with professional
assistance and information on our products.
The SATEL Company is manufacturer of a broad range of devices dedicated for use in
security alarm systems. Further information is available on our website www.satel.eu or at
the points of sale offering our products.
It is recommended that that the installers prepare their own user manual for the alarm
system installed by them. The manual must include all changes and modifications in
relation to the factory default settings.
The installer should train the users in the rules of operating the alarm system.
4. Authorization of users
Operation of the alarm system is possible after the user authorization, which allows the
control panel to verify that the user is authorized to perform the given operation. The
authorization can be done on the basis of:
• code,
• proximity card (125 kHz passive transponder, which can be in the form of card, tag, etc.),
• DALLAS iButton (chip),
• keyfob.
You can not assign the same identifier (code, proximity card, DALLAS iButton or
keyfob) to two users.
For safety reasons, different people should not use the same identifier.
The installer can configure the panel so that it will not accept codes that contain less
than three digits (e.g. 1111 or 1212) or consist of consecutive digits (3456).
The installer may permit the use of certain functions without the need for user
authorization.
Using an invalid code, proximity card or DALLAS iButton three times may:
− trigger an alarm,
− block the keypad / reader for 90 seconds.
The control panel can inform the user that the code change is necessary, if the code is
known to other users.
The master code should not be used on a daily basis because of the risk of its being
captured. It is recommended that the administrator enter for himself an ordinary user's
code.
SATEL INTEGRA 5
The INT-TSG, INT-TSG2, INT-TSH, INT-TSH2, INT-TSI and INT-KSG keypads are
described in separate manuals, which are delivered with these keypads.
If some predefined events occur, additional messages may appear on the display (e.g.
arming, disarming, auto-arm delay countdown, entry/exit delay countdown, alarm, etc.).
Entering the user code, i.e. the user authorization, will open a menu containing the functions
that are available to the user. The functions are presented in two lines. The currently selected
function is indicated by the arrow on the left-hand side. How the function related information
is presented depends on the specific character of the given function.
The way of display backlighting is programmed by the installer.
INT-KLCDS INT-KLCDL
LED
Data type Information
left side/upper right side/lower
OFF OFF numbers 1-32
OFF ON numbers 33-64
Zones/Outputs
ON OFF numbers 65-96
ON ON numbers 97-128
OFF OFF system addresses 0-31 (00-1F HEX)
Expanders
OFF ON system addresses 32-63 (20-3F HEX)
Table 2. Information presented by the LEDs.
Information about the armed state can be extinguished after a time period defined by
the installer.
5.1.3 Keys
The keys designated with digits and letters enable entering the code and data, when using
the functions available in the menu. Additionally, if you press and hold down the selected digit
keys for approx. 3 seconds, you can (if the keypad has been so configured by the installer):
1 - check the state of zones,
4 - check the state of partitions,
5 - view the alarm log (based on the event log),
6 - view the trouble log (based on the event log),
7 - view the troubles,
8 - turn on/off CHIME in the keypad,
9 - toggle the display between the standby mode and partition state display mode.
The other keys enable you to:
- enter the user menu (after entering the code),
- cancel the started operation.
or - arm / disarm and clear alarm (after entering the code),
- start the selected function,
- confirm the entered data.
- navigate through the display (scroll through the displayed messages, functions
and options, and move the cursor),
- run the installer selected functions (after entering the code).
- trigger the fire alarm.
- trigger the medical (auxiliary) alarm.
- trigger the panic alarm.
SATEL INTEGRA 9
Alarms are being signaled throughout the time programmed by the installer.
In wireless keypads, the audible signaling is disabled when the keypad is in the sleep
mode (except for the CHIME signal).
5 short beeps – zone violation (CHIME).
Long beep every 3 seconds, followed by a series of short beeps for 10 seconds
and 1 long beep – countdown of exit delay (if the time is shorter than 10 seconds, only
the final sequence of short beeps will be generated).
10 User Manual SATEL
Information given in the section below do not apply to users having the SIMPLE USER
right (see p. 27).
After you enter the code and confirm it with the key:
– a message on the need to change the code or a service note may be displayed,
– alarm will be cleared – if the user is authorized to clear the alarm and there is an alarm
in the system,
– one partition will be disarmed – if the user is authorized to disarm the partition, has
access to only one partition operated from the keypad and that partition is armed, or has
access to many partitions, but only one partition is armed,
– one partition will be armed – if the user is authorized to arm the partition, has access to
only one partition operated from the keypad and that partition is disarmed,
– the arming/disarming menu will be displayed.
Upon entering the code and confirming with the key, a message about the need to
change the code or a service note may be displayed.
INT-GSM DLOADX start communication with DLOADX via INT-GSM / INT-GSM LTE
INT-GSM GUARDX start communication with GUARDX via INT-GSM / INT-GSM LTE
Fig. 3. Example of how information is presented in the graphic programming mode. The blank
fields are not available for editing.
Entering names
Press the particular keys until the required character appears. The characters available in the
keypad are shown in Table 3. Hold down the key to display the digit assigned to the key.
Shown on the left side in the upper line of the display is information about the letter case:
[ABC] or [abc] (it will be displayed after pressing any key and will be visible for a few seconds
after the last keystroke).
The key moves the cursor to the right, and the key – to the left. The key deletes the
character on the left side of the cursor.
Set auto-arming delay – available when the auto-arming delay is programmed for at least
one partition and the auto-arming delay countdown is not currently running in that partition.
It allows to postpone by a programmed time period the auto-arming of the partition.
Arming mode – allows to select the arming mode which is to be used (the shortcut key is
shown in square brackets):
[0] full arming (to be used after everybody has left the protected area),
[1] full arming + bypasses (allows the users to stay in the protected area) – the zones for
which the BYPASSED IF NO EXIT option is enabled by the installer will be bypassed,
[2] arming without interior (allows the users to stay in the protected area):
− interior zones (3. INTERIOR DELAYED zone type) will be disarmed,
− violating the exterior zone (8. EXTERIOR zone type) will trigger a silent alarm,
− violating another alarm zone will trigger a loud alarm.
[3] arming without interior and without entry delay (allows the users to stay in the
protected area – to be used when nobody else is to enter the protected area) – this
arming mode is similar to the previous one, but the delayed zones operate as the
instant ones (no entry delay).
Cancel 1st code – if the partition is armed/disarmed by means of two codes and the first
code has already been entered, the user can still cancel the consent to arming/disarming.
Change own code – allows the user to change his/her own code.
Change telephone code – allows the user to change his/her own telephone code.
Change prefix – available to the administrator, if the use of prefixes in the system has been
made available by the installer (the prefix length has been defined). It enables to program
the prefixes and the time to remind about the need to change the prefix. Each code will
have to be preceded by a prefix:
normal – for everyday use. By default, it consists of a suitable number of digits 0 (e.g. if
the determined prefix length is 4, the default prefix is 0000),
DURESS – for use, when the user has been forced to enter the code. Using the code will
trigger a silent alarm. By default, it consists of a suitable number of digits 4 (e.g. if the
determined prefix length is 3, the default prefix is 444).
Users – the following functions are available in the submenu:
New user – allows to create a new user (see: “Adding new user” p. 28).
Edit user – allows to edit the existing users (see: “Edit user” p. 28).
Remove user – allows to remove the existing users (see: “Removing a user” p. 29).
The administrator defines whether the installer is to have access to the USERS
submenu (SERV. CAN EDIT option in the CHANGE OPTIONS submenu).
Masters – the submenu provides the following functions available to the installer:
New master – allows to create a new administrator.
Edit master – allows to edit the existing administrators.
Remove master – allows to remove the existing administrators.
Zone bypasses – the following functions are available in the submenu:
Inhibit – allows to temporarily bypass the zones (see: “Zone inhibiting” p. 31).
Isolate – allows to permanently bypass the zones (see: “Zone isolating” p. 32).
Set time – allows to program the control panel clock. The data are entered in the following
format:
time – hour:minute:second,
date – day:month:year.
SATEL INTEGRA 19
System state – allows to view the troubles and, if the GRADE 2 global option has been
enabled by the installer, also the alarms and bypassed zones, as well as to check the
partition status.
Events – the submenu contains functions which allow to view the events saved to the control
panel memory (see: “Viewing the event log” p. 32).
The content of received SMS messages is also saved to the events log of the
INTEGRA 128-WRL control panel.
Reset zones – running the function will result in a temporary deactivation of the
43. RESETABLE POWER SUPPLY type outputs, thus making it possible to reset the alarm
memory for detectors supplied from those outputs (e.g. fire detectors).
Clear latched outputs – allows to turn off some of the control panel outputs for which the
LATCH option is enabled, as well as the 9. DAY ALARM, 12. SILENT ALARM
and 116. INTERNAL SIREN type outputs.
Fin.f.door open – restores the normal operating mode in all modules executing the access
control functions (in case of fire, the doors controlled by these modules may be
automatically unlocked).
Change options – the following functions are available in the submenu:
Replace battery – allows to disable the tamper protection in the selected wireless keypad
for 3 minutes. During this time you can open the keypad enclosure and replace the
battery. The function is available if a wireless keypad is installed in the alarm system.
The function is supported by ACU-120 / ACU-270 controller with firmware version 5.03
and ACU-220 / ACU-280 controller.
Keypad chime – allows to turn on/off the CHIME in the keypad. The CHIME is five short
sounds by means of which the keypad will inform you e.g. that a door / window is open,
when the system is disarmed. The installer defines which zones of the alarm system
can trigger the CHIME.
Outputs chime – allows to block the chime signal from selected partitions on the
11. CHIME type output.
Timers – allows to program parameters of the timers, the editing of which is permitted by
the installer.
Partition timers – allows to program the partition timers (see: “Programming the partition
timer” p. 34).
No expanders tamper alarms – allows to temporarily disable the expansion module
tamper supervision. In case of any problems with the expansion modules, report the fact
to the installer.
Permanent service access – the option is available to the master user (administrator). If
enabled, the installer has permanent access to the alarm system, which, among other
things, enables the control panel to be programmed by using LCD keypad or DLOADX
program.
Enabling PERMANENT SERVICE ACCESS option will clear the installer access time
programmed with the SERVICE ACCESS function. On the other hand, programming the
installer access time will disable the PERMANENT SERVICE ACCESS option.
Service can edit – the option is available to the master user (administrator). If it is
enabled, the installer can add, edit and delete users in the administrator's object.
Service arm/disarm/clear/bypass – the option is available to the master user
(administrator). If it is enabled, the installer can arm/disarm the system, clear alarms
and bypass zones in the administrator object.
20 User Manual SATEL
Permanent DLOADX access – the option is available to the master user (administrator).
If it is enabled, the control panel can be programmed by means of the DLOADX
program, irrespective of whether or not the installer has access to the alarm system.
DLOADX IP – enables programming the address of the computer, on which the DLOADX
program is installed. If the address is programmed, the control panel users can start
from the keypad the communication with the DLOADX program via ETHM-1 Plus /
ETHM-1 / INT-GSM / INT-GSM LTE module (see description of the ETHM-1 DLOADX
and INT-GSM DLOADX functions, available in the DOWNLOADING submenu). The
address can be entered as a name or IP address.
GUARDX IP – enables programming the address of the computer, on which the GUARDX
program is installed. If the address is programmed, the control panel users can start
from the keypad the communication with the GUARDX program via ETHM-1 Plus /
ETHM-1 / INT-GSM / INT-GSM LTE module (see description of the ETHM-1
GUARDX and INT-GSM GUARDX functions, available in the DOWNLOADING
submenu). The address can be entered as a name or IP address.
Erase service message – allows the user to delete the service message.
Tests – the following functions are available in the submenu:
Partitions – allows to check the status of partitions accessible to the user and operated
from the keypad. The partition status is presented by means of a symbol. The numbers
placed on the glass allow you to identify the partition numbers. By factory default, the
partition status is shown using the following symbols (which can be changed by the
installer):
b - temporary blocked,
? - entry delay,
E - exit delay (less than 10 seconds),
e - exit delay (more than 10 seconds),
P - fire alarm,
A - alarm,
p - fire alarm memory,
a - alarm memory,
a - armed,
- disarmed, not ready to be armed (violated zones),
- disarmed, ready to be armed.
Zones – allows to check the status of zones in the partitions accessible to the user and
operated from the keypad. The zone status is presented by means of a symbol. The
numbers placed on the glass allow you to identify the zone numbers. On starting the
function, the status of zones 1-32 is displayed. Use the and keys to display the
status of other zones (see also description of the LEDs, p. 7). By factory default, the
zone status is shown using the following symbols (which can be changed by the
installer):
b - zone bypass,
l - trouble “long violation”,
f - trouble “no violation”,
T - tamper alarm,
A - alarm,
- zone tamper,
- zone violation,
t - tamper alarm memory,
SATEL INTEGRA 21
a - alarm memory,
- zone OK.
Supply voltages – available to the installer. Enables checking of the supply voltage for
individual expansion modules.
Temperatures – allows the user to check the temperature. The temperature information is
provided by wireless temperature detectors or ABAX 2 wireless devices equipped with a
temperature sensor.
Radio devices – allows to check the radio signal level for ABAX 2 / ABAX system wireless
devices supported by the control panel.
Zone Test – the submenu contains functions which allow to test the detectors connected
to the zones (see: “Zone testing” p. 35).
Battery test – available to the installer. Upon starting the function, the control panel will
generate events to inform about the status of batteries of the control panel and
hardwired expansion modules with power supply. Additionally, the status of 60. TECH.-
BATTERY LOW type zones will be analyzed.
Manual transmission test – generates an event, which starts the procedure of event
transmission to the monitoring station (a code sent with the system identifier).
Monitoring station test (1A, 1B, 2A, 2B) – allows to send a test transmission to the
monitoring station (separate functions for each of the telephone numbers). When
sending the transmission, messages are displayed to inform about the currently
performed operation. The function is useful when starting the reporting or in case of any
reporting trouble.
GPRS monit.test – sends a test transmission to the monitoring station via cellular data
network (GPRS). When sending the transmission, messages on the display provide
information on the currently performed operation. only INTEGRA 128-WRL
Messaging test – allows to test the messaging function. Upon starting the function:
1. Enter the number of the telephone (consecutive number on the telephone list).
2. Press the key.
3. Enter the number of voice message.
4. Press the key. The control panel will call the indicated number and play back the
message.
Answering test – if this function is started, information on the number of rings and going
off-hook is displayed when answering the telephone call.
Proximity card test – allows to check the number of proximity card and establish to whom
it belongs (if the card belongs to a user of the system).
CA-64 PTSA test – allows to test the mimic board.
View masters – available to the administrator. It makes it possible to check in which
objects the master users are created.
Keypad name – allows to check the given keypad name.
File in DLOADX – displays the date and time of writing the data to the control panel by
means of the DLOADX program and the name of file with control panel data.
Panel version – displays information on the control panel firmware version.
STM program version – displays information on the program version of the processor
used to operate ABAX system and control panel zones. only INTEGRA 128-WRL
GSM IMEI/v/sig. – allows to check the level of signal received by the GSM telephone
antenna, individual identification number of the telephone, and the telephone version.
The and keys are to be used for scrolling through the displayed information. only
INTEGRA 128-WRL
22 User Manual SATEL
Start DWNL-MOD. – enables communication with the DLOADX program via the external
modem (analog, GSM or ISDN).
Start DWNL-TEL – enables communication with the DLOADX program via the 300 bps
modem.
Start DWNL-CSD – enables CSD communication with the DLOADX program through the
built-in GSM communicator. only INTEGRA 128-WRL
Start DWNL-GPRS – enables GPRS communication with the DLOADX program through
the built-in GSM communicator. only INTEGRA 128-WRL
ETHM-1 DLOADX – enables communication with the DLOADX program using the
ETHM-1 (firmware version 1.03 or newer) / ETHM-1 Plus module. The communication
takes place over Ethernet. If the INT-GSM / INT-GSM LTE module is connected to the
ETHM-1 Plus module and an attempt to establish communication via Ethernet fails, an
attempt will be made to establish communication via the cellular data network.
ETHM-1 GUARDX – enables communication with the GUARDX program using the
ETHM-1 (firmware version 1.03 or newer) / ETHM-1 Plus module. The communication
takes place over Ethernet. If the INT-GSM / INT-GSM LTE module is connected to the
ETHM-1 Plus module and an attempt to establish communication via Ethernet fails, an
attempt will be made to establish communication via the cellular data network.
INT-GSM DLOADX – enables communication with the DLOADX program using the
INT-GSM / INT-GSM LTE module. The communication takes place via the cellular data
network.
INT-GSM GUARDX – enables communication with the GUARDX program using the
INT-GSM / INT-GSM LTE module. The communication takes place via the cellular data
network.
5.4 Arming
This section describes the operations that must be carried out by the user from the keypad in
order to initiate the arming procedure. The arming procedure is ended at the running out of
the exit delay time (if the procedure is ended successfully, the system becomes armed – see
also “Failure of arming procedure” p. 25). If the exit delay time is 0, the system becomes
armed instantly.
The installer can configure the alarm system so that the arming functions will not be
available after tamper. A message on the display will indicate that the user must call
for service. The arming functions will not be available until the service code is entered
and confirmed with the key.
3. Press the key. A list of partitions which can be armed will be displayed.
4. Using the and keys, find in the list the partition which is to be armed (or press 0 key
and enter the partition number).
5. Press one of the digit keys 1 to 9. The symbol in the upper right-hand corner will be
replaced by the symbol (see also “Selection from the multiple-choice list” p. 16).
6. Repeat the steps 4 and 5 for the next partitions which are to be armed.
7. Having selected the partitions which are to be armed, press the key.
You can also arm the selected partitions using of the ARM SELECTED function, available upon
entering the code and confirming with the key, but only when none of the partitions
accessible to you is armed and the keypad is signaling no alarm.
Forced arming
If the arming procedure could not be started, the displayed message can allow of the forced
arming (1=Arm). On pressing the 1 key, the system will be armed despite a violated zone or
a trouble.
5.8 Users
The users can be added, edited and removed by:
• master user (administrator),
• installer (if the SERV. CAN EDIT option is enabled by the administrator),
• user (if granted the USERS EDITING right).
The following data can be defined for the user:
Code – a sequence of digits for authorization of the user when using keypads and code
locks. The control panel supports codes consisting of 4 to 8 characters, however the
installer can define the minimum length of the code.
Telephone code – a sequence of digits for authorization of the user when using the
functions of telephone call answering and telephone control (see: “Call answering and
telephone control” p. 44).
Partitions – partitions to which the user has access (i.e. he is authorized to arm or disarm
them, clear alarms etc.).
Type – see: “User types” p. 27.
User schedule – parameter for the SCHEDULED type code (see: “User types” p. 27).
Validity time – parameter for the RENEWABLE, TEMPORARY or SCHEMATIC type codes (see:
“User types” p. 27).
Blocking time – parameter for the BLOCKING PARTITION type code (see: “User types” p. 27).
Rights – define which functions can be used by the user. The following rights (permissions)
are available:
– Arming
– Disarming
– Disarm, when other user arm [Can alw.disarm] – if the user does not have this right,
he/she can only disarm the system if it was armed by him/her
– Partition alarm clearing [Alarm clearing]
– Object alarm clearing [Object al.clr.]
– Other objects alarm clearing [Other al.clr.]
– Telephone messaging canceling [V.msg.clearing]
– Auto-arming defer [Arm deferring]
– First code for two codes partition [Enter.1st code]
– Second code for two codes partition [Enter.2nd code]
– Access temporary blocked partitions [Block p.access]
– Change access code [Code changing]
– Users editing
– Zones bypassing [Zones inhibit]
– Zone isolation [Zones isolate]
SATEL INTEGRA 27
– Clock setting
– Trouble state checking [Troubles view.]
– Event log reviewing [Events viewing]
– Detectors resetting [Zones resett.]
– Options programming [Options chang.]
– Access to menu TEST [Tests]
– Downloading starting [Downloading]
– Access to BI & MONO outputs [Outs control]
– System state review in GUARDX [GUARDX using]
– Resetting outputs [Clr.latch.outs]
– Simple user – having entered the code, confirmed with the key, the user never selects
the partitions which are to be armed / disarmed. All partitions the user has access will
be armed / disarmed.
– Administrator – the user has access to the menu functions which are reserved for the
administrator
Keypads etc. – additional modules from which the user will be able to operate the system
(proximity card arm/disarm devices, partition keypads, code locks, reader expanders).
Proximity cards / DALLAS chips – if the proximity card / DALLAS iButton reader is used in
the system, a proximity card / DALLAS iButton can be assigned to the user, which will
allow the user to operate the system by means of readers.
Keyfobs – in case of the INTEGRA 128-WRL control panel or any other control panel to
which a module with keyfob support is connected (ACU-220, ACU-280, ACU-120,
ACU-270, ACU-100, ACU-250, INT-RX or INT-RX-S), a keyfob can be assigned to the
user, which will allow to operate the system remotely. The user may have up to 2 keyfobs:
the APT-200 (supported by the ABAX 2 / ABAX system) or the APT-100 (supported by the
ABAX system) and the 433 MHz (supported by the INT-RX or INT-RX-S modules).
Buttons – the button functions are available, if a keyfob has been assigned to the user. It is
possible to assign a zone to a keyfob button or combination of buttons. The zone will be
violated upon pressing the button / combination of buttons. The assigned zone should not
exist physically.
Events (RX) / Events (ABAX) – if a keyfob has been assigned to the user, it is possible to
define whether pressing the appropriate keyfob button will result in logging an event which
informs that the keyfob has been used.
ABAX confirmation – if an ABAX 2 / ABAX system keyfob has been assigned to the user, it
is possible to determine the status of which outputs will be presented on the keyfob LEDs
on pressing any button.
Name – individual user name.
Temporary [Time not renew.] – the user has access to the system for a defined period of
time. The user validity time should be defined. After the validity time expires, the user will
have no access to the system.
Duress – code to be used in hold-up and duress situations. Use it to trigger a silent alarm
and send the event code to the monitoring station.
“Mono” output operating [Mono outputs] – code for control of the MONO SWITCH type
outputs.
“Bi” output operating [Bi outputs] – code for control of the BI SWITCH type outputs.
Blocking partition [Part.temp.block.] – the code enables access to the armed partitions.
Using the code will block the armed partition(s) (the partition zones will not trigger the
burglary alarm). The blocking time is defined individually for each user within the range
from 1 to 109 minutes. If, however, the time of blocking for guard round is defined for the
partition and its duration is longer, the blocking will last longer.
Cash machine zones bypassing [Acces.to cash m.] – the code to be used to unblock
access to the cash dispenser (the 24H CASH MACHINE type zones will be temporarily
bypassed in the partition).
Guard – using this code means having made the round (additionally, it can result in the
partition being temporarily bypassed for the duration of guard round). The installer defines
the modules which are used to confirm making the round and determines the time interval
between successive rounds. If such a user is granted access to the partition, he/she will
have the same possibilities as the NORMAL type user.
Scheduled – the user has access to the system as per the time schedule for a specified
period of time. It is necessary to select the schedule (the schedule is programmed by the
installer) and define the user validity period.
The new user may not be granted a higher authority level than the person who is
adding that user to the system.
4. Press the key.
5. When a prompt appears, asking you if the changes are to be saved, press the 1 key.
6. A message will inform you that a new user has been created. Press the key to return to
the USER submenu.
The user being edited may not be granted a higher authority level than the person who
is editing such a user.
1. Enter the code and confirm with the key.
2. Press the 2 key twice. The list of users will be displayed.
3. Using the and keys, find in the list the user who is to be edited.
4. Press the key. The list of functions for defining the user's parameters will be displayed.
5. Using appropriate functions, modify the user's parameters.
6. Press the key.
7. When a prompt appears, asking you if the changes are to be saved, press the 1 key.
8. A message will inform you that the user has been modified. Press the key to return to
the list of users.
4. If the keyfob number is to be read, press twice the keyfob button according to the
instructions displayed on the keypad. When the keyfob number is displayed, press the
key.
5. If the keyfob number is to be entered, enter it from the keypad, and then press the key.
6. You will be brought back to the list of functions for defining the user parameters. Instead
of the NEW RX KEY FOB / NEW ABAX KEYFOB function, the REM. RX KEY FOB / REM.ABAX
KEYFOB function will be available. Additionally, some functions appear to allow you to
configure the keyfob.
Prior to assigning the zones to buttons / combinations of buttons, consult the installer.
Numeration of the keyfob buttons and LEDs is described in section “Operating the
alarm system by means of keyfob” (p. 46).
7. Using the key, find the BUTTON 1 function in the list, and then press the key.
8. Using the and keys, select which zone is to be violated on pressing the 1 button in
the keyfob (you can also enter the zone number from the keypad), and then press the
key.
9. Repeat the steps 7 and 8 for other buttons / combinations of buttons which are to be
used.
10. Using the key, find the EVENTS (RX) / EVENTS (ABAX) function in the list.
11. Press the key. The list of buttons / combinations of buttons will be displayed. In the
upper right-hand corner of the display, an additional symbol is located:
– pressing the button / combination of buttons is written to the event log (default
setting),
– pressing the button / combination of buttons is not written to the event log.
12. Define whether pressing the button / combination of buttons will be written to the event log
(see: “Selection from the multiple-choice list” p. 16), and then press the key.
13. For the APT-200 (ABAX 2 / ABAX) / APT-100 (ABAX) keyfobs, use the key to find the
ABAX CONFIRMAT. function in the list, and then press the key.
14. A list will be displayed showing the outputs which have been assigned by the installer for
confirmation (maximum 8). Select up to 3 of them (see: “Selection from the multiple-
choice list” p. 16). Upon pressing any keyfob button, information on the status of selected
outputs will be presented on the keyfob LEDs for a few seconds. Thus you can get
confirmation that the function has been executed or information on the current status of
the system.
The installer can define the list of outputs by means of the keypad (ABAX CONFIRMAT.
function [SERVICE MODE STRUCTURE HARDWARE EXPANDERS ABAX CONFIRMAT.]
or a computer with the DLOADX program (“Keyfobs ABAX” window).
15. Press the key.
16. Press the key.
17. When a prompt appears, asking you if the changes are to be saved, press the 1 key.
Keyfobs are added to the master users (administrators) in the same way.
2. When the keyfob number and a prompt whether the keyfob is to be removed are
displayed, press the 1 key. You will be brought back to the list of functions for defining the
user parameters.
3. Press the key.
4. When a prompt appears, asking you if the changes are to be saved, press the 1 key.
Removal of a keyfob will not erase its settings (dependences between the buttons
and zones, confirmation rules, etc.). When added to the user, the new keyfob will have
the same settings as the deleted one.
The installer can remove all keyfobs, including their settings, by means of the functions
available in the service mode (STRUCTURE HARDWARE EXPANDERS REM.RX KEY
FOBS / REM.ABAX KEYFOB).
For security considerations, the installer may reduce the number of zones that the user
will be allowed to bypass.
3. Using the and keys, find in the list the zone which is to be inhibited (or press 0 key
and enter the zone number).
4. Press one of the digit keys 1 to 9 until the symbol appears in the upper right-hand
corner of the display.
5. Repeat the steps 3 and 4 for the next zones which are to be inhibited.
6. Press the key. A message will inform you that the zones are inhibited.
Having started the INHIBIT function (step 2), you can press the or key to switch
over the keypad to the graphic programming mode (see: “Selection from the multiple-
choice list” p. 16).
5.10.3 Unbypassing
The zones can be unbypassed by the users having the ZONES BYPASSING right. Proceed in
the same way as when inhibiting or isolating the zones (steps 1-3), but the symbol must be
shown in the upper right-hand corner of the display, if the zone is to be unbypassed upon
pressing the key.
The events viewing function, when started by the administrator or the ordinary user,
provides no information about:
− panic alarms,
− alarms triggered using the DURESS type code.
2. Press in turn the 5 and 2 keys. The last event which occurred in the system will be
displayed.
3. Using the key, scroll through the list of previous events.
If the GRADE 2 option is enabled in the system, the installer or administrator can use
the VIEW GRADE2 function instead of the VIEW function. In such a case, the events
selected among those required by the EN 50131 standard for Grade 2 will be
displayed.
Using the or key will block the automatic toggling between description of the event and
additional information on the event.
After the list of events has been scrolled through with the use of the or key, the
automatic toggling between description of the event and additional information on the event
will be restored.
15. After the arming time has been programmed, an additional function will be displayed,
which allows you to define which arming mode will be activated by the given timer. By
default, the timer activates the full arming mode. If another arming mode is to be
activated, run this function (for the daily timer or individually for each day of the week)
and, using the and keys, select another arming mode. Confirm, using the key.
16. Having programmed all parameters, press the key.
17. When a prompt appears, asking you if the changes are to be saved, press the 1 key.
If any detectors with remote LED ON/OFF function are connected to the control panel,
you can switch on the LEDs in them for the test duration (the installer can configure
the control panel so that this will take place automatically at the beginning of the test).
You can terminate the zone test before expiration of the programmed time, using the
FINISH TEST function (TESTS ZONE TEST FINISH TEST). Up to 6 seconds can elapse
between starting the function to the actual end of the test (during this the FINISH TEST
function will be still available).
12. Depending on the type of tested detector:
− magnetic contact – open and close the door or window protected by means of the
magnetic contact,
− motion detectors – pass in front of the detector,
− other detectors – follow the manufacturer's directions for the detector testing.
36 User Manual SATEL
13. Look through the test results. To do so, enter again the ZONES TEST submenu (see: steps
1-5) and start the VIEW RESULTS function. You can scroll through the list of results, using
the and keys. Press the or key to switch over the display to the graphic mode,
in which information is provided by means of symbols:
- zone was not violated,
- zone was violated.
Pressing the or key in the graphic mode will display information on another set of
zones (see also description of the LEDs, p. 7).
The test results can be deleted by means of the CLEAR RESULTS function (TESTS
ZONES TEST CLEAR RESULTS).
If permitted by the installer, the control function can be started without user
authorization, upon pressing in turn the 8 and keys.
1. Enter the code and confirm with the key.
2. Press the 8 key. Depending on how the control panel has been configured by the installer:
− a group of outputs will be displayed – using the and keys, find the group which
includes an output, and then press the key to display the list of outputs,
− the list of controllable outputs will be displayed at once.
3. Using the and keys, find in the list the output whose status you want to change to
control the device connected to the output. The output status is presented by means of
symbols:
- output inactive (disabled),
- output active (enabled).
The output status can be presented according to the zone status. The displayed
symbols should then be interpreted as follows:
- zone not violated (the device controlled by output is inactive),
- zone violated (the device controlled by output is active).
The way of presenting the status of roller shutter outputs differs from how the status of
other outputs is presented (see: “Controlling the roller shutter outputs”).
Fig. 4. Partition keypads (INT-S and INT-SK keypads are shown without flaps).
The main task of the partition keypad is to arm/disarm one partition. Additionally, it offers
a number of other functions, including e.g. the access control (supervision of a single door).
SATEL offers the following partition keypads:
INT-S,
38 User Manual SATEL
INT-SK,
INT-SCR (multifunction keypad, offering the partition keypad functionality).
The keypads are available with keys backlight in various color versions. The color version is
indicated by an additional letter symbol included in the keypad designation (e.g. INT-S-GR –
green backlight; INT-S-BL – blue backlight).
The and LEDs flashing alternately indicate that the system is waiting for the
second code during the two code arming / disarming.
All LEDs flashing in turn indicate that there is no communication with the control panel.
6.1.2 Keys
The keys enable authorization of the user by means of code and running of the functions
available from the partition keypad.
In the INT-SCR keypad, the button is additionally available. It controls the keypad OC
type output (the output is active, when the button is pressed).
1 short beep – pressing any digit key, confirmation that code has been entered or card has
been read.
2 short beeps – acceptance of the first code during two code arming / disarming.
3 short beeps – signaling of:
– starting the procedure of arming (there is exit delay in the partition) or arming (there is
no exit delay in the partition),
– disarming and/or alarm clearing.
4 short and 1 long beeps – confirmation that the function has been executed.
3 pairs of short beeps – the user should change his/her code.
1 long beep – refusal to arm (there are violated zones in the partition or there is a trouble).
2 long beeps – unknown code/card.
3 long beeps – unavailable function.
Events signaled by sounds
Only installer selected events are signaled.
6.2.1 [Code]
Depending on the user type and authority level, keypad settings and the alarm system status,
entering the code and confirming with the key will execute one or a few of the following
functions:
• unlocking the door (activating the relay),
• disarming the partition,
• clearing alarm,
• changing over the status of 25. BI SWITCH type outputs,
• turning on the 24. MONO SWITCH type outputs,
• guard round confirmation,
• enabling temporary partition blocking.
Most of the abovementioned functions are available after enabling the LOCK [LOCK
FEATURE] option for the partition keypad. Whether the functions are available may also
40 User Manual SATEL
depend on the other keypad options (e.g. if the lock operates in the ON IF PARTITION
ARMED [ON IF PART.ARMED] mode, most of the functions will be unavailable).
6.2.2 [Code]
Depending on the user type and authority level, keypad settings and the alarm system status,
entering the code and confirming with the key will execute one or a few of the following
functions:
• starting the partition arming procedure / arming,
• disarming the partition,
• clearing alarm,
• changing over the status of 25. BI SWITCH type outputs,
• turning on the 24. MONO SWITCH type outputs,
• guard round confirmation,
• enabling temporary partition blocking,
• unblocking cash machine access.
The installer can disable the sound signaling or replace it by flashing of keypad
backlight.
During operation, the keypad can generate the following sounds:
1 short beep – pressing any digit key, confirmation that code has been entered or card has
been read.
3 short beeps – confirmation of delay activation.
4 short and 1 long beeps – confirmation of the guard round or execution of the control for
24. MONO SWITCH or 25. BI SWITCH type outputs.
3 pairs of short beeps – the user should change his/her code.
2 long beeps – unknown code/card.
3 long beeps – activation the delay is impossible (the partition is disarmed or the delay has
already been started) or the function is unavailable.
Additionally, the keypad can audibly signal the DELAY ACTIVATION TIME.
The code locks are available with keys backlight in various color versions. The color version
is indicated by an additional letter symbol included in the code lock designation (e.g.
INT-SZ-GR – green backlight; INT-SZ-BL – blue backlight).
8.1.2 Keys
The keys enable user authorization by means of a code and starting of the functions
available from the code lock.
4 short and 1 long beeps – confirmation of door unlocking or execution of another function.
3 pairs of short beeps – the user should change his/her code.
2 long beeps – unknown code/card.
3 long beeps – unavailable function.
Events signaled by sounds
Only installer selected events are signaled.
5 short beeps – zone violation (CHIME).
Very short beeps – door open too long.
The installer can configure the control panel so that acknowledgement of receiving the
message by the user will:
− clear messaging other users,
− allow to get access to the INT-VG module voice menu.
The information below does not apply to the control panels to which the INT-VG
module is connected.
The call answering and telephone control functions are available to the users who have the
telephone code. These functions require that the DTMF dialing phone be used. The call
answering function allows to get information on the partition status (armed, disarmed). Owing
to the telephone control function, it is possible to control the REMOTE SWITCH type outputs
using the telephone.
After entering three wrong codes, the control panel will hang up.
Remote audio alarm verification is possible when the INT-AV module is connected to
the control panel.
1. Get access to the phone call answering function (steps 1-2 in section “Answering phone
calls”).
2. Within up to 15 seconds, press in turn the 3 and # keys on the telephone keypad. 4 short
beeps and 1 long beep will confirm that you have got access to the function of audible
alarm verification. The DTMF commands you can use after starting the listen-in / talk
session are described in the INT-AV module manual.
– sending USSD code to the operator of SIM card (e.g. to check the card balance or to
top it up). The reply received from the operator will be sent as an SMS message to the
phone number from which the control command was sent.
• other SMS control requirements (e.g. phone numbers from which it will be possible to send
control commands).
You can insert several control commands in one SMS message.
When sending the USSD codes, the SMS message must have the following form:
xxxx=yyyy=
where “xxxx” is the control command and “yyyy” is the USSD code supported by the cellular
network operator.
In the case of INT-GSM / INT-GSM LTE module you can use a command controlling the
sending of USSD codes to send an SMS message. The SMS message must have the
following form:
xxxx=tttt:cccc=
where “xxxx” is the control command, “tttt” is the phone number to which the SMS message
is to be send, and “cccc” is the content of SMS message to be sent.
Fig. 6. APT-200 [light gray enclosure] / APT-100 [dark gray enclosure] keyfob. A - numeration
of LEDs. B – numeration of keyfob buttons.
You can control the alarm system by using a keyfob in case of:
• INTEGRA 128-WRL control panel (ABAX).
• any control panel to which connected is:
– ABAX 2 (ACU-220 / ACU-280) / ABAX (ACU-120 / ACU-270 / ACU-100 (firmware
version 2.00 or newer) / ACU-250) controller,
– INT-RX-S / INT-RX module.
SATEL INTEGRA 47
Fig. 8. MPT-300 [black enclosure] / MPT-350 [light gray enclosure] keyfob (433 MHz keyfob).
A – numeration of keyfob buttons. The button designated with digit 6 corresponds to the
combination of buttons 1 and 3 in other 433 MHz keyfobs.
flashing – trouble or trouble memory / Grade 2: – 1. group (numbers: 1-32 / addresses 00-1F)
trouble or trouble memory, bypassed zones or – 2. group (numbers: 33-64 / addresses 20-3F)
alarm – 3. group (numbers: 65-96)
– 4. group (numbers: 97-128)
( – LED OFF; – LED ON
Quick arming:
0 - full arming
1 - full arming + bypasses
2 - arming without interior
3 - arming without interior and without entry
delay