Access Control Systems

Linear Access Base cardholder creation

How to create a new cardholder in Linear Access base?

1. To Create New linear access base Cardholder first you need to open the Cardholder set of your location (1).

Click on the Create New Cardholder icon (2). The name of the linear access cardholder set (e.g., “Staff”) will appear above the boxes where the name is entered

Linear access control, Linear pro access, Linear access, base access,linear access base

3. Fill in the cardholder’s First name (3), Last name (4), etc. in the cardholder data fields. Assign Expiration date and fill in account holder access controller panel fields if needed.

4. In the credentials area (6), you may assign credentials to the base access cardholder. Credentials can be transmitters, cards, entry codes, or telephone linear access control directory codes. You may assign more than one credential type and more than one of each credential to a access control Miami cardholder. For example, a cardholder could have two entry codes and three cards.

4.1 In case you need to add a base access transmitter first go to the transmitter section (7), then click on assign new individual transmitter (8), Then enter the data for the individual transmitter (9) and click ok to save it (10). 

Linear access control, Linear pro access, Linear access, base access,linear access base

4.2 In case you need to add a linear access base card first go to the card section (7), then click on assign new individual card (8), Then enter the access control servers data for the individual card (9) and click ok to save it (10). 

Linear access control, Linear pro access, Linear access, base access,linear access base

4.3 In case you need to add an entry linear access code first go to the entry codes section (7), then enter the data for the entry code (8) and finally click on assign (9).

Linear access control, Linear pro access, Linear access, base access,linear access base

5. Click APPLY to save the linear access control cardholder. Now you need to send the changes to the intercom, first, you need to connect to the network.

How to connect to network?

1. Click on the On/Off-line with installation button:

2. When connecting to access control Miami network A the Connecting to [A] (YOUR INSTALLATION NAME) dialog box will appear:

3. Once the linear access base is connected, the SD & RD lights will flash indicating that AccessBase 2000 is polling the network and that the network is responding. Click on the next button to have base access 2000 automatically disconnect from the network upon completion of programming duties:

4. Then click on  this button to send the changes:

How to delete cardholder?

You may delete a linear access control cardholder by selecting the cardholder and clicking on:

Millenium operator levels steps creation:

Millennium operator levels steps installation:

Go to the Millenium operator system administration section, and then go to the operation level panel (2).

Millenium operator, Millennium security, full access, millennium management, millennium management data

Click on new to add a new operator level (2):

The next step is to name it (3) and selects all the permissions that this level will contain. In this case, for the Millenium operator manager level in the Common windows.

You need to exclude the full access to Add the next points:

New Site (4), Database Restore (5), Operator Defined Fields (5), Operator Event Filter (5), Operator (5), and Operator Level:

Millenium operator, Millennium security, full access, millennium management, millennium management data

Now in the DCD window of the Millennium access control, you only grant read access to Doors (7), Elevator Cards (7), and Floors (7):

Then in the Report window, you grant Millenium access controls to all the permissions (8, 9) and click on save (10) to finally add the Millenium operator level:

Once this step is done, you’ll need to create the following Millennium management data operator levels:

For the Frontdesk Millenium Operator Level:

The first step is to name it (1). Then, in the window you’ll need to grant full access only to Advanced Operator Commands (2), Operator Control (3):

Later in the DCD window, you only grant read Millennium access control to Doors (5), Elevator Cards (5), and Floors (5), finally, in the Report window, you will deny access to all reports as shown below (6, 7):

Millenium operator, Millennium security, full access, millennium management, millennium management data
Millenium operator, Millennium security, full access, millennium management, millennium management data
Millenium operator, Millennium security, full access, millennium management, millennium management data

To work in the security operation level:

The first step is to name it (1). Then, in the Common window you’ll need to grant full access only to: Advanced Millenium Operator Commands (2), Operator Control (3), and Historical Log (3):

Later in the DCD window, you only grant read Millenium access control to Doors (5), Elevator Cards (5), and Floors (5),  Then in the Report window, you grant access to all the permissions (6, 7):

Millenium operator, Millennium security, full access, millennium management, millennium management data
Millenium operator, Millennium security, full access, millennium management, millennium management data

And the office data entry Millenium operator level:

The first step is to name it (1). Then, in the Common window you’ll need to grant full access only to:

Access Level, Advanced Operator Commands, Cardholder Batch Adding, Cardholder Custom Fields Setup, Cardholder, Cardholder Import, Cardholder Export, Cardholder Search, Historical Log, Holidays, Operator Control, and Time Periods of the Millenium access controls (2, 3, 4):

Later in the DCD window, you only grant read Millennium security access to Doors: (5), Elevator Cards (5), and Floors (5). Then, in the Report window, you grant access to all the permission (6, 7) .

Millenium operator, Millennium security, full access, millennium management, millennium management data

How to create a cardholders record

How to create a millennium access Cardholder´s record?

We want to show you these steps to create a new Cardholders record in your millennium access control system. To do this, please, read below:

First step:

To create a new millenium access control  Cardholder’s record, first, we need to access the Cardholder windows in the home menu as shown below (1,2):

Millenium access control access control card access systems

Second step:

Millenium access control access control card access systems

Once this step it’s done, you’ll see the following panel showing a list of all the existing cardholders in the millennium access control system. The only next step is going to the NEW option as shown below (3):

Thirt step:

Millenium access control access control card access systems

The following step is going to the identification panel of the millenium access controls (4) and typing the data fields as it’s shown in the next step. First, we complete the First Name (5), middle name (optional), and Last Name (6), and we can change the employee ID also (7 optional).

Fourth step:

Following this, we go to the Cards tab in your millennium access control systems software (8) and enter the data in the fields shown below. First, we enter the encoded Card No. (9), and we mark in the active (10). The Facility code (FC-1-256 Encoded Card: 0-65535) (11), we select in card Format the one that says Wiegand 26 FC 1 (12), and finally, to assign the access Level, we double left click in the box marked under access control Level as shown in the figure (13).

Fifth step:

And this opens the following menu in your millennium access control systems. We click on the drop-down menu marked in the following figure and select among the available ones assigned to the user (14) and then click ok to save (15).

 

Sixth step:

Finally, we click save (16), and you will see the new cardholder added to the access control solution system.

ZKaccess access level and Personnel

zkteco access control level and access personnel steps creation:

We want to show you the steps to optimally configure these two sections in zkteco access control. Please follow these steps so, that you have optimal performance:

First step:

To create a zk access control level, all we must do later is go to the zkteco access control Level panel in the access control windows (1).

zksoftware access control zkteco access control zk access control

Second step:

Before, remember, the access level mentions what the users with verification can unlock at a specific time door or a certain number of entries. In this step, Click on the add option (2) in the zkteco access control software:

zksoftware access control zkteco access control zk access control

Thirth step:

zksoftware access control zkteco access control zk access control

after that, we enter the data in the fields, starting with zkaccess software Name (3). Following this, select a Time Zone from the Time Zones List (4) and all the doors that we’ll open with this zk access control level from the Door Combination list (5), and finally click ok to save (6).

Fourth step:

Then, to create personnel in the ZKAccess software, we must go to the Personnel panel in the Personnel windows (1).

zksoftware access control zkteco access control zk access control

Sixth step:

So, click on the Add option (2) in the zk access software; this will take you to the register of parameters that we will have to fill in yet:

zksoftware access control zkteco access control zk access control

Seventh step

zksoftware access control zkteco access control zk access control

Once we the following section in zkaccess software, we must complete the fields, Personnel Number (3 whatever you desired), First Name (4), Last Name (5), Card Number (6), select Department (7), and select the zk access control Level from the list (8), and finally click ok to save (9).

Eighth step:

At last, to see the events all we must do is go to the Real-Time Monitoring panel in the zk access control windows (1,2). So, lets try, and see the final result.

How to install Millenium access level and time periods

How to install Millenium ultra access level and time periods

To optimally configure the milennium ultra access level time periods and level accesses, we recommend that you follow these steps:

First Step:

To be able to configure the Time Periods, we move in the menu to the Millenium access controls Systems Administration option (1) and in this, we open the Time Periods panel (2) as shown below.

Millenium access control access control card access systems

Second step:

Once in the panel of your Millenium ultra access control system, we touch the New option to add a new Time Periods.

Millenium access control access control card access systems

Third step:

The first thing we do is name it (5), and then we click on the (+) option to add the days and times in which the Time Periods will work in the Millennium access control, as shown below.(6,7)

Millenium access control access control card access systems
Millenium access control access control card access systems

Fourth step:

And finally, we proceed to save the Millenium ultra access control configuration (8)

Millenium access control access control card access systems

Fifth step:

Millenium access control access control card access systems

In case we want to add the Holidays in the Time periods control system, we can do it as shown below (1), entering the name (2) and configuring it on an annual or relative basis. (3)

Sixth step

Once the Time Periods and Holidays have been configured in your, we can configure the Access Levels by going to the Millenium ultra access Level panel in the Millenium access control System Administration menu as shown below (1)

Seventh step

Once located in the Millenium ultra access level menu, the first thing we must do is click on the New option to proceed to add a new one (2)

Eight step

Now, as shown below, the first thing we do in the Millenium ultra access level is name it (3), followed by this in the Available objects column that is located on the left (4), we select the doors to which we want to grant access control with this access level, and in the column of the right Time Periods the frequency with which it will be repeated (5) and then we give it to add (6) and once this is done we can give it save to add the Millenium ultra acces Level (7)

zksoftware access control zkteco access control zk access control

How to configure time zones and holidays

zk access control time zone and holidays configuration:

This blog will show you the essential steps to configure time zone and holidays in zk access control. For a correct installation, please follow these steps:

First step

Some functions of time zones can be beneficial for you. One is to specify when doors can usually open or give access control to some levels in a limited time. We can determine which entries can be accessed or not, only for specified users. So, to create a new Time Zone First go to the zk access control windows (1).

zksoftware access control zkteco access control

Second step

Note that by default, the system has an access control time zone named, which cannot be deleted but can be modified. The user can create more than one. After considering this, please go to the Time Zone panel (2) in your zk access controller:

zksoftware access control zkteco access control zk access control

Third step

Once this step it’s done, we click on the Add option in your zkaccess software system ,as shown below (3).

zksoftware access control zkteco access control zk access control

Fourth step

zksoftware access control zkteco access control zk access control

After completing the previous step in your zkteco access control, We enter the data in the fields below. First-time zone name (4), second establish the intervals (5), third copy to all days (6), or we can copy to specific days also, and finally click ok to save in your zkteco access control (7). 

Fifth step

Remember, we have functions to add, modify and remove holiday access controls. To create holidays, we access to holidays panel in the zkteco access control windows, as shown below (1).

 

Sixth step

Click on the Add option (2) in zk access controller system:

zksoftware access control zkteco access control zk access control

Seventh step

Then we enter the data in the fields, starting with Name (3), Type (4), Start Date (5), End Date (6), Recurring (7), and finally, we click ok to save the information in the zk access software (8).

Hikvision intercom kit installation model: DS-KIS603-P

Hikvision intercom kit installation model: DS-KIS603-P.

This model, “DS-KIS603-P(B), is an Hikvision Intercom kit System access control systems Miami that allow you to visually access controller panel of the residential and commercial entrance to communicate with visiting people.

What is the "Hikvision intercom kit" system of ip video?

UNBOXING:

1: Touch screen - Door station
2: kit of connectors
3: Brakets
4: Two power supplies
Previous
Next

We have a intercom Hikvision Kit that is easy to install and operate and It consists:

1. A touch screen Model “DS-KH6320-QTE1” and a Door station model “DS-KV61113-WPE(B)” with Hikvision camera to communicate at the cell phone level with these devices and the marlock access control.
2. It comes with a kit of connectors in case you want to be connected and give it a power-reset supply of your access control systems companies.
3. it comes with brackets.
4. It comes with one some power supply of 12 volts.

INSTRUCTIONS

The most important thing when the Hikvision intercom Door station is installed with the internal station to access control systems Miami, together they must be on the same Network.

1. Connect Hikvision video intercom device’s internet plug, join the network cable and then,  connect it to the POE switch.

2. Proceed to do the same with the Door Station, disconnect these two screws to access the interface below.

3. Install the connection cable for the Door Station, the first thing that appears here on the access control systems companies screen as what the password will be.

4. It will ask for the second step, which is the network. In this case, “DHCP” for the network and must be enabled.

5. That will ask you is the “SIP password” to be able to continue. This would be another essential step where you must enter a password.

6. A device recognizing the touch screen and Hikvision camera , and if you can tell, it is the model that matches the unit we have installed on the same “switch.” In this case, we proceed to the activation.

7. Refresh the image configuration And this make sure that the Hikvision intercom equipment takes an IP that is not the basic one.

8. Finish it, it will take us to the main screen of the unit station, enter live view and check the quality of your security first cameras.

What is an electric strike?

Electric Strike

An electric strike lock is an access control device used for doors. It replaces the fixed strike faceplate often used with a keeper.). Like a fixed strike plate, it usually presents a ramped or beveled surface to the locking latch allowing the door to close and latch just like a limited electric door strike would. After the door is opening past the keeper, the keeper returns to its standard position and re-locks when power is removed or applied, depending upon the strike’s configuration. 

The configurations of the electric strike are: 

Fail-secure: In this configuration, the strike would remain locked in a power failure but typically can still use the mechanical lock to open the door from the inside for egress from the safe side.

Fail-safe: If there is a power failure, the door strike opens merely by being pushed or pulled.

Hold-open: the Hold-open function ease usage because the powering of the door strike and the opening of the strike do not need to be precisely synchronized.

Sometimes electric strike lock has buzzers that allow someone outside the electric door strike to listen when the door is opening. The alternating current creates this noise.

It’s necessary to consider many things if you want to buy an electric strike lock. However, in some cases, it’s an excellent option to choose a magnetic lock

Electric strike locks work by replacing the standard strike with an energized door strike in which one side is cut out and replaced with a hinged piece of metal. When activated, the part of the metal swings like a saloon electric door strike and opens the entrance. 

Electric strike locks remain locked from the outside at all times. With this type of lock, the door closes behind you and automatically fastens in a locked position.

Alternatives to cellular telephone entry systems

Alternatives to cellular telephone entry systems

Alternatives to cellular telephone entry systems

As the smartphone gets smarter, cellular telephone entry systems are becoming obsolete. They’re harder to install and offer fewer features than the latest property access control solutions. But there’s good news: You have better options.

Three possible  cell phone entry systems alternatives include:

  1. Cellular telephone entry systems with cameras :   

To accommodate technology innovations, some manufacturers have opted to offer the telephone entry system with a camera. These systems may have a built-in camera or may require you to purchase and install a camera separately.

However, telephone-based intercoms can’t handle two-way video transfers. As a result, residents can see videos of their visitors, but visitors can’t see residents.

       2. WiFi phone entry systems :  

Some companies have attempted to modernize the telephone entry system by using WiFi instead of cellular networks in recent years. WiFi telephone entry systems send data between residents’ cell phones and system hardware via WiFi instead of a telephone network.

WiFi telephone entry systems are a decent attempt at adapting cellular systems to the modern age. However, they fall short in crucial ways. WiFi networks and cellular networks are different. Because of that, consistent and rapid communication between them is difficult.

Cell phones, especially smartphones, can easily interpret data from WiFi networks. But cellular telephone entry systems can’t. Since cellular telephone systems can only handle specific data, adding WiFi capabilities to a telephone entry system.

3. Video intercom systems :

Video intercoms are the best alternative to a cellular telephone entry system.

Like cellular entry systems, intelligent video intercoms use phones as intercom substations that allow communication and guest entry. But unlike cellular entry systems, video intercoms are capable of more than just phone calls. The best video intercoms for apartments are fully smartphone-compatible and leverage the full power of the smartphone for a seamless property access experience.

Video intercoms let residents use their smartphones to video chat with visitors and open doors and gates remotely. They also offer other property access methods, which means visitors have more than one way to request access. The best systems may offer virtual keys for planned visits and delivery PINs and passes for courier access.

Pro tip: When shopping for a video intercom, choose a cloud-based system that lets you manage access and update your tenant directory remotely.

Here’s a comparison between intelligent video intercoms and cellular telephone entry systems:

Feature

Smart video intercom

Cellular telephone entry system

Remote door opening

Virtual keys for guest access

Video chat

Web-based dashboard

Integrations with other intelligent building systems

Yes

Yes

Yes

Yes

Yes

Yes

No

No

No

No

Cell phone entry systems may be a step up from the traditional telephone entry system. Still, they fail to offer the robust features and functionality of video intercoms. If you’re looking for a better multi-tenant entry system, choose a video intercom like ButterflyMX instead. Installed in more than 5,000 buildings, ButterflyMX is the industry’s leading property access control services.

How does a cellular telephone entry system work?

Work of cellular telephone entry system

How does a cellular telephone entry system work?

Cellular telephone entry systems work by using cellular networks to establish contact between guests and visitors.

These calls allow residents to speak to whoever is at the base station and grant guests an access control system. Since the system is cell phone-based, residents don’t even have to be building to let their guests onto the property.

Here’s how a cellular telephone entry system works: 

A guest seeking property access finds the resident they’re visiting in the entry system’s base station.

The telephone entry system places a call over a cellular network to the resident’s phone.

When the resident picks up, they can speak with the guest like any other phone call. Their guests can also hear and talk to them since the system’s base station has a microphone and speaker.

Finally, the resident can let the guest in by pressing ‘9’ on their cell phone.

Limitations of cellular telephone entry systems

Cellular telephone entry systems are more convenient than landline systems. But cellular systems fail to offer all the features that today’s residents expect from a modern building entry system.

Here are some limitations of cellular telephone entry systems:

Expensive. Using a cellular network for calls may require you to invest in a commercial-grade cellphone plan with an ongoing, high-bandwidth connection.

Inconvenient for you. Who’s going to be stuck with scheduling and managing a technician whenever a resident moves in or out? Those aren’t tasks you need to add to your busy schedule. Best to look for a system that automatically updates rent rolls, taking things off your plate instead of piling on.

They lack video. Cellular telephone entry systems don’t offer video functionality. That means residents can’t get video chat with visitors and visually confirm who’s requesting property access control system.

Few property access methods. When visitors arrive at a building with a cell phone entry system, they only call the resident. There are no virtual keys for guests or delivery PINs for couriers.

No cloud-based management. Cloud-based entry systems let property staff manage access and update the tenant directory with a web-based dashboard from anywhere, on any device. In contrast, cellular entry systems require you to download software onto one specific device to manage the system remotely.