Dicsan blog section

Linear Access Base cardholder creation

How to create a new cardholder in Linear Access base?

1. To Create New linear access base Cardholder first you need to open the Cardholder set of your location (1).

Click on the Create New Cardholder icon (2). The name of the linear access cardholder set (e.g., “Staff”) will appear above the boxes where the name is entered

Linear access control, Linear pro access, Linear access, base access,linear access base

3. Fill in the cardholder’s First name (3), Last name (4), etc. in the cardholder data fields. Assign Expiration date and fill in account holder access controller panel fields if needed.

4. In the credentials area (6), you may assign credentials to the base access cardholder. Credentials can be transmitters, cards, entry codes, or telephone linear access control directory codes. You may assign more than one credential type and more than one of each credential to a access control Miami cardholder. For example, a cardholder could have two entry codes and three cards.

4.1 In case you need to add a base access transmitter first go to the transmitter section (7), then click on assign new individual transmitter (8), Then enter the data for the individual transmitter (9) and click ok to save it (10). 

Linear access control, Linear pro access, Linear access, base access,linear access base

4.2 In case you need to add a linear access base card first go to the card section (7), then click on assign new individual card (8), Then enter the access control servers data for the individual card (9) and click ok to save it (10). 

Linear access control, Linear pro access, Linear access, base access,linear access base

4.3 In case you need to add an entry linear access code first go to the entry codes section (7), then enter the data for the entry code (8) and finally click on assign (9).

Linear access control, Linear pro access, Linear access, base access,linear access base

5. Click APPLY to save the linear access control cardholder. Now you need to send the changes to the intercom, first, you need to connect to the network.

How to connect to network?

1. Click on the On/Off-line with installation button:

2. When connecting to access control Miami network A the Connecting to [A] (YOUR INSTALLATION NAME) dialog box will appear:

3. Once the linear access base is connected, the SD & RD lights will flash indicating that AccessBase 2000 is polling the network and that the network is responding. Click on the next button to have base access 2000 automatically disconnect from the network upon completion of programming duties:

4. Then click on  this button to send the changes:

How to delete cardholder?

You may delete a linear access control cardholder by selecting the cardholder and clicking on:

Millenium operator levels steps creation:

Millennium operator levels steps installation:

Go to the Millenium operator system administration section, and then go to the operation level panel (2).

Millenium operator, Millennium security, full access, millennium management, millennium management data

Click on new to add a new operator level (2):

The next step is to name it (3) and selects all the permissions that this level will contain. In this case, for the Millenium operator manager level in the Common windows.

You need to exclude the full access to Add the next points:

New Site (4), Database Restore (5), Operator Defined Fields (5), Operator Event Filter (5), Operator (5), and Operator Level:

Millenium operator, Millennium security, full access, millennium management, millennium management data

Now in the DCD window of the Millennium access control, you only grant read access to Doors (7), Elevator Cards (7), and Floors (7):

Then in the Report window, you grant Millenium access controls to all the permissions (8, 9) and click on save (10) to finally add the Millenium operator level:

Once this step is done, you’ll need to create the following Millennium management data operator levels:

For the Frontdesk Millenium Operator Level:

The first step is to name it (1). Then, in the window you’ll need to grant full access only to Advanced Operator Commands (2), Operator Control (3):

Later in the DCD window, you only grant read Millennium access control to Doors (5), Elevator Cards (5), and Floors (5), finally, in the Report window, you will deny access to all reports as shown below (6, 7):

Millenium operator, Millennium security, full access, millennium management, millennium management data
Millenium operator, Millennium security, full access, millennium management, millennium management data
Millenium operator, Millennium security, full access, millennium management, millennium management data

To work in the security operation level:

The first step is to name it (1). Then, in the Common window you’ll need to grant full access only to: Advanced Millenium Operator Commands (2), Operator Control (3), and Historical Log (3):

Later in the DCD window, you only grant read Millenium access control to Doors (5), Elevator Cards (5), and Floors (5),  Then in the Report window, you grant access to all the permissions (6, 7):

Millenium operator, Millennium security, full access, millennium management, millennium management data
Millenium operator, Millennium security, full access, millennium management, millennium management data

And the office data entry Millenium operator level:

The first step is to name it (1). Then, in the Common window you’ll need to grant full access only to:

Access Level, Advanced Operator Commands, Cardholder Batch Adding, Cardholder Custom Fields Setup, Cardholder, Cardholder Import, Cardholder Export, Cardholder Search, Historical Log, Holidays, Operator Control, and Time Periods of the Millenium access controls (2, 3, 4):

Later in the DCD window, you only grant read Millennium security access to Doors: (5), Elevator Cards (5), and Floors (5). Then, in the Report window, you grant access to all the permission (6, 7) .

Millenium operator, Millennium security, full access, millennium management, millennium management data

How to create a cardholders record

How to create a millennium access Cardholder´s record?

We want to show you these steps to create a new Cardholders record in your millennium access control system. To do this, please, read below:

First step:

To create a new millenium access control  Cardholder’s record, first, we need to access the Cardholder windows in the home menu as shown below (1,2):

Millenium access control access control card access systems

Second step:

Millenium access control access control card access systems

Once this step it’s done, you’ll see the following panel showing a list of all the existing cardholders in the millennium access control system. The only next step is going to the NEW option as shown below (3):

Thirt step:

Millenium access control access control card access systems

The following step is going to the identification panel of the millenium access controls (4) and typing the data fields as it’s shown in the next step. First, we complete the First Name (5), middle name (optional), and Last Name (6), and we can change the employee ID also (7 optional).

Fourth step:

Following this, we go to the Cards tab in your millennium access control systems software (8) and enter the data in the fields shown below. First, we enter the encoded Card No. (9), and we mark in the active (10). The Facility code (FC-1-256 Encoded Card: 0-65535) (11), we select in card Format the one that says Wiegand 26 FC 1 (12), and finally, to assign the access Level, we double left click in the box marked under access control Level as shown in the figure (13).

Fifth step:

And this opens the following menu in your millennium access control systems. We click on the drop-down menu marked in the following figure and select among the available ones assigned to the user (14) and then click ok to save (15).

 

Sixth step:

Finally, we click save (16), and you will see the new cardholder added to the access control solution system.

ZKaccess access level and Personnel

zkteco access control level and access personnel steps creation:

We want to show you the steps to optimally configure these two sections in zkteco access control. Please follow these steps so, that you have optimal performance:

First step:

To create a zk access control level, all we must do later is go to the zkteco access control Level panel in the access control windows (1).

zksoftware access control zkteco access control zk access control

Second step:

Before, remember, the access level mentions what the users with verification can unlock at a specific time door or a certain number of entries. In this step, Click on the add option (2) in the zkteco access control software:

zksoftware access control zkteco access control zk access control

Thirth step:

zksoftware access control zkteco access control zk access control

after that, we enter the data in the fields, starting with zkaccess software Name (3). Following this, select a Time Zone from the Time Zones List (4) and all the doors that we’ll open with this zk access control level from the Door Combination list (5), and finally click ok to save (6).

Fourth step:

Then, to create personnel in the ZKAccess software, we must go to the Personnel panel in the Personnel windows (1).

zksoftware access control zkteco access control zk access control

Sixth step:

So, click on the Add option (2) in the zk access software; this will take you to the register of parameters that we will have to fill in yet:

zksoftware access control zkteco access control zk access control

Seventh step

zksoftware access control zkteco access control zk access control

Once we the following section in zkaccess software, we must complete the fields, Personnel Number (3 whatever you desired), First Name (4), Last Name (5), Card Number (6), select Department (7), and select the zk access control Level from the list (8), and finally click ok to save (9).

Eighth step:

At last, to see the events all we must do is go to the Real-Time Monitoring panel in the zk access control windows (1,2). So, lets try, and see the final result.

How to install Millenium access level and time periods

How to install Millenium ultra access level and time periods

To optimally configure the milennium ultra access level time periods and level accesses, we recommend that you follow these steps:

First Step:

To be able to configure the Time Periods, we move in the menu to the Millenium access controls Systems Administration option (1) and in this, we open the Time Periods panel (2) as shown below.

Millenium access control access control card access systems

Second step:

Once in the panel of your Millenium ultra access control system, we touch the New option to add a new Time Periods.

Millenium access control access control card access systems

Third step:

The first thing we do is name it (5), and then we click on the (+) option to add the days and times in which the Time Periods will work in the Millennium access control, as shown below.(6,7)

Millenium access control access control card access systems
Millenium access control access control card access systems

Fourth step:

And finally, we proceed to save the Millenium ultra access control configuration (8)

Millenium access control access control card access systems

Fifth step:

Millenium access control access control card access systems

In case we want to add the Holidays in the Time periods control system, we can do it as shown below (1), entering the name (2) and configuring it on an annual or relative basis. (3)

Sixth step

Once the Time Periods and Holidays have been configured in your, we can configure the Access Levels by going to the Millenium ultra access Level panel in the Millenium access control System Administration menu as shown below (1)

Seventh step

Once located in the Millenium ultra access level menu, the first thing we must do is click on the New option to proceed to add a new one (2)

Eight step

Now, as shown below, the first thing we do in the Millenium ultra access level is name it (3), followed by this in the Available objects column that is located on the left (4), we select the doors to which we want to grant access control with this access level, and in the column of the right Time Periods the frequency with which it will be repeated (5) and then we give it to add (6) and once this is done we can give it save to add the Millenium ultra acces Level (7)

zksoftware access control zkteco access control zk access control

How to configure time zones and holidays

zk access control time zone and holidays configuration:

This blog will show you the essential steps to configure time zone and holidays in zk access control. For a correct installation, please follow these steps:

First step

Some functions of time zones can be beneficial for you. One is to specify when doors can usually open or give access control to some levels in a limited time. We can determine which entries can be accessed or not, only for specified users. So, to create a new Time Zone First go to the zk access control windows (1).

zksoftware access control zkteco access control

Second step

Note that by default, the system has an access control time zone named, which cannot be deleted but can be modified. The user can create more than one. After considering this, please go to the Time Zone panel (2) in your zk access controller:

zksoftware access control zkteco access control zk access control

Third step

Once this step it’s done, we click on the Add option in your zkaccess software system ,as shown below (3).

zksoftware access control zkteco access control zk access control

Fourth step

zksoftware access control zkteco access control zk access control

After completing the previous step in your zkteco access control, We enter the data in the fields below. First-time zone name (4), second establish the intervals (5), third copy to all days (6), or we can copy to specific days also, and finally click ok to save in your zkteco access control (7). 

Fifth step

Remember, we have functions to add, modify and remove holiday access controls. To create holidays, we access to holidays panel in the zkteco access control windows, as shown below (1).

 

Sixth step

Click on the Add option (2) in zk access controller system:

zksoftware access control zkteco access control zk access control

Seventh step

Then we enter the data in the fields, starting with Name (3), Type (4), Start Date (5), End Date (6), Recurring (7), and finally, we click ok to save the information in the zk access software (8).

How to fix your Hickvision camera connector if it gets wet?

How to fix your Hickvision camera connector if it gets wet?

Firstly to Hikvision connector repair, you should have clarified that you need an RJ45 connector to solve the problem when your camera of your CCTV in Miami doesn’t work. But also, you should bear in mind that the original camera doesn’t come with this connector because this comes with a regular female connector. Those actual IP camera connectors are broken or don’t work because they got wet. That could happen with damp weather and affect the devices like Miami surveillance cameras; we must cut the cable. Then we are going to find the cable like this:

To work well with the security cameras Miami the next step is to consider the numerological order in the chart to Hikvision connector repair, we must organize the cable’s color in that order and introduce it on the RJ45 connector, ignoring the two power cables.

https://securitycamcenter.com/hikvision-ip-camera-rj45-pin-out-wiring/  

After all this, we cut off the cables that protruded from the connector. Then, we already have our fix in the connector for our security camera Miami. Next to this, we proceed to prove the functioning of the IP camera connector.

Whit this switch device, we test to check that the camera turns on. If so, it is because it remains correctly fixed of Hikvision connector repair.

We should have a male as a female RJ45 connector for the installation time and create a new surveillance cameras Miami system.

Types-of-Access-Control-System

5 different types of access control

Manual access control

For manual access control, people are used to securing specific access points, such as doormen, stewards, or customer service agents. They identify people who want to enter the premises and decide based on predefined criteria whether or not they can – for example, a person presenting a ticket before entering a concert venue. This is often practiced at highly frequented access points such as cinemas, theatres, zoos, and theme parks where it is difficult to get information from people beforehand and identification isn’t required.

Mechanical access control

For mechanical access control scenarios, mechanical technology is used to secure an access point. A common example of this would be a cylinder lock with a suitable key – so this would be used typically in homes or garages.

Electronic access systems

For buildings with advanced security requirements, electronic access control can be used to secure access points. For these types of access, a card, chip or other fobs with the correct credentials must be presented to a reader in order for a person to pass through. This will also keep a record of who has passed through the area and when.

There are two types of Electronic access systems:

Standalone systems

These are used for single access points. The access decision is made on the basis of access permissions locally in the standalone component. These systems are not wired, which means the installation requirements are less than wired controls, saving time-on-site, and allowing for easy retrofitting of components. Using standalone access components vs wired online access control, for sites where access control would traditionally not be possible due to location or existing site infrastructure, a standalone component can be used to implement an access control solution more effectively. Standalone components can also be integrated into a larger access control system with a combination of both online and standalone components. In addition, it is easy to integrate offsite access points and provides the possibility of integration into bigger systems. Examples of standalone components include Digital Cylinders, Mechatronic (Electronic and Mechanical combination) Cylinders, and Electronic Door Locks.

Online systems

Used for larger sites with high access rates, these are wired and connected to the host system’s access control software. High-security levels can be achieved with these systems due to the real-time message exchange between the components and the software. In addition, there are interfaces to many other systems that can be incorporated, such as an alarm system, elevator control, etc.

Mechatronic access control

A combination of electronic and mechanical can also be used to offer further security. In this instance, the electronic system first checks the card/code/other media used, and only after passing this can a key be used on the mechanical lock to open the door. This sort of combination is typically used in offices with high-security requirements, private residential buildings, and server rooms.

Physical access systems

Physical access systems play an important role in access control and security – no matter how high quality a lock or access control system is, if the door or physical access system can be overpassed then it is of little importance. Thus, the physical access system must be viewed holistically and in line with safety requirements. Examples of physical access systems include:

  • Sensor barriers
  • Half-height turnstiles
  • Full-height turnstiles
  • Tripod turnstiles
  • Revolving doors
  • Security interlocks

Whether residential or commercial, access control systems are vital to protect premises from unauthorized persons. It is important to take a broad look at the security required and consult with a leading manufacturer of access control solutions to ensure the safety of a place, its occupants, and the items inside.

structured cabling solutions, structured cabling systems, benefits of structured caling

Benefits of structured cabling systems for your business

Structured cabling is the design and installation of a cabling system that will support multiple hardware uses and be suitable for today’s needs and those of the future. With a correctly installed system, current and future requirements can be met, and hardware that is added in the future will be supported.

Structured cabling design and installation is governed by a set of standards that specify wiring data centers, offices, and apartment buildings for data or voice communications using various kinds of cable, most commonly category 5e (Cat 5e), category 6 (Cat 6), and fiber optic cabling and modular connectors. These standards define how to lay the cabling in various topologies in order to meet the needs of the customer, typically using a central patch panel (which is normally 19-inch rack-mounted), from where each modular connection can be used as needed. Each outlet is then patched into a network switch (normally also rack-mounted) for network use or into an IP or PBX (private branch exchange) telephone system patch panel.

The importance of organised cabling systems will vary dependoing on your business needs, it can ensure a highly reliable cost-effective network infrastructure. Here we are going to briefly explain five main beenefits that strucutred wiring solutions can bring to your business

1 Lowers the risk of downtime

In case you had a problem with your wiring structure it won’t be solved as easily just as if you had a structured system for your business and reducing downtime. You will notoriously spend more time identifying which cable has caused the problem when using multiple wiring infrastructure, therefore, your employees and business productivity will be affected.

2 Simplicity and easy to manage

By controling everything using one single system eliminates the complexity of having multiple wiring infrastructures in place. This will reduce downtime and less money in the long-term.

3 Enhanced flexibility

A structured wiring system solution holds a high level of flexibility due it can quickly accomodate new changes, any addition or moves. This ensures your business experiences improved performance which translates to increased business growth. It also reduces the time taken during installation as well as increases adaptability to network infrastructure changes, making it easy to relocate to a new office.

4 Adaptability

Structure cabling systems come with very high bandwidth. With high bandwidth, the system can support any future applications that may be introduced to your business, video conferencing or multimedia, without interruption of the current system. Therefore, you will always be assured that your cabling system won’t become outdated in the future.

5 Future proof investment

Having an adaptable IT team that is reliable and provides a quick response when it comes to facing industry changes is vital. Future proof investment is the most significant benefit an structured wiring system can provide you a good structure for supporting your business growth. With structured cabling, you can rest assured your network infrastructure won’t become outdated and will support all emerging applications as your business grows.

Look no forward and get a quote to get your structured cabling system solution for yous business with a reliable team that will fit for your needs in the area of Miami. Whether your staff can’t afford to lose time dealing with computers or you are in need of experienced advise, we are the company to call. We have implemented a proactive approach to free your business fast from unexpected downtimes and optimize responsiveness and perfomance with or without an internal IT staff. We offer services to support and maintain your systems 24/7 contact us at 786-622-2221.

barbed-wire-video-camera-monitoring-1670222.jpg

What are the different types of CCTV cameras?

Security cameras provide us a higher level of security. There are many different types of surveillance systems you can find in the market which suits different situations or premises, selecting an appropriate security camera system and security systems installer is vital.

Different Types of CCTV

Dark Fighter Technology

Dark fighter security technology cameras get to pick up colored cameras in low-light conditions. Dark fighter security cameras offer optical performance thanks to its wide range of capabilities. They are equipped with ½” CMOS progressive scan sensors which allow the device to pick up high-quality images and don’t require an extra light source.

Benefits of dark fighter technology

  • Smart features: line crossing, audio, and face detection.
  • High definition
  • Multitude of purposes

LPR Cameras

LPR stands for license plate cameras and these devices help to obtain copious information in a high traffic area to keep any premises secure. They offer simple and efficient solutions to many organizations including tolling, hotel overstay management, and its main purpose car parking.

Benefits of LPR cameras

  • Information storage
  • Identify cars banned from the premises

Benefits of LPR cameras

  • Information storage
  • Identify cars that have been banned from the premise
  • Helps a business to run smoothly

Internal and External Dome Cameras

Internal and external dome cameras. The form factor of the camera makes it difficult for onlookers to tell which way the camera is facing, which is a strong piece of design, deterring criminals by creating an air of uncertainty.

Internal and external dome cameras benefits

  • Ease of installation
  • IR night vision
  • Vandal-resistant

Bullet Camera

Bullet cameras are long and cylindrical in shape and are ideal for outdoor use. Their strengths lie specifically in applications that require long-distance viewing. The cameras can be easily be mounted with a mounting bracket, and come fitted with either fixed or varifocal lenses depending on the requirements of its intended application.

Bullet camera benefits

  • IR night vision
  • High-quality images
  • Compact installations

C-mount Camera

c-mount-camera.jpg

C-mount security cameras allow some different lenses to fit different applications. C-mount cameras can cover distances beyond 40 ft thanks to the possibility to use special lenses with these cameras, whereas standard CCTV lenses can only cover distances of 35-40 ft.

C-mount cameras benefits

  • Can support changes in technology
  • Indoor use
  • The bulky size acts as a deterrent

Day/Night Camera

Day/night cameras are ideal for outdoor surveillance applications in which IR cameras are unable to function optimally. These types of cameras are capable of operates in both normal and poorly light environments. Day-night cameras don’t require infrared illuminators as they can capture cleat video images in the dark thanks to their extra sensitive imaging chips.

Benefits

  • Records in black and white
  • IR capability
  • Different sizes available

PTZ (Pan, tilt, zoom) Camera

PTZ cameras are usually used when a live guard operates the security camera in real-time. These type of cameras have three different main features such as panning (move left or right), up and down (tilting), and zooming closer or further.

Benefits of PTZ cameras

  • High-quality images
  • X36 optical zoom
  • 200m IR night vision

Discreet CCTV

discreet-cctv.jpg

Discreet CCTV cameras are beneficial because criminals will be less likely to spot them and less likely to de damaged. These types of cameras capture good footage of theft and criminal damage.

  • Can be propped up or mounted
  • Indoor use

Thermal Image Cameras/Infrared Cameras

Thermal and infrared security cameras are the best option at airports, seaports, and other critical infrastructures with quality images, no matter what time of the day it is. Infrared cameras have small LEDs surrounding the lens to help pick up moving figures in low-light

Infrared cameras benefits

  • Thermal features
  • Low-light environments
  • Detect intruders up 250-300 meters away

Network Cameras

Network cameras share live footage across the internet so images can be easily accessed from anywhere on the globe.

Network cameras benefits

  • Footage can be viewed online from anywhere in the world
  • Easily accessible archive footage
  • Easy setups as coaxial cables and a computer is not required.
  • Low maintenance

High Definition Cameras

HD CCTV surveillance systems offer an unrivalled picture quality that delivers high clarity images. Depending on your budget, they can deliver resolutions of 720p, all the way up to 4K.

Benefits

  • HD security cameras capture subjects in perfect clarity
  • Available on most CCTV models such as domes and bullets
  • Crystal clea imagery provides undeniable