zkteco access control level and access personnel steps creation:
We want to show you the steps to optimally configure these two sections in zkteco access control. Please follow these steps so, that you have optimal performance:
Before, remember, the access level mentions what the users with verification can unlock at a specific time door or a certain number of entries. In this step, Click on the add option (2) in the zkteco access control software:
after that, we enter the data in the fields, starting with zkaccess software Name (3). Following this, select a Time Zone from the Time Zones List (4) and all the doors that we’ll open with this zk access control level from the Door Combination list (5), and finally click ok to save (6).
Then, to create personnel in the ZKAccess software, we must go to the Personnel panel in the Personnel windows (1).
So, click on the Add option (2) in the zk access software; this will take you to the register of parameters that we will have to fill in yet:
Once we the following section in zkaccess software, we must complete the fields, Personnel Number (3 whatever you desired), First Name (4), Last Name (5), Card Number (6), select Department (7), and select the zk access control Level from the list (8), and finally click ok to save (9).
An electric strike lock is an access control device used for doors. It replaces the fixed strike faceplate often used with a keeper.). Like a fixed strike plate, it usually presents a ramped or beveled surface to the locking latch allowing the door to close and latch just like a limited electric door strike would. After the door is opening past the keeper, the keeper returns to its standard position and re-locks when power is removed or applied, depending upon the strike’s configuration.
The configurations of the electric strike are:
Fail-secure: In this configuration, the strike would remain locked in a power failure but typically can still use the mechanical lock to open the door from the inside for egress from the safe side.
Fail-safe: If there is a power failure, the door strike opens merely by being pushed or pulled.
Hold-open: the Hold-open function ease usage because the powering of the door strike and the opening of the strike do not need to be precisely synchronized.
Sometimes electric strike lock has buzzers that allow someone outside the electric door strike to listen when the door is opening. The alternating current creates this noise.
It’s necessary to consider many things if you want to buy an electric strike lock. However, in some cases, it’s an excellent option to choose a magnetic lock.
Electric strike locks work by replacing the standard strike with an energized door strike in which one side is cut out and replaced with a hinged piece of metal. When activated, the part of the metal swings like a saloon electric door strike and opens the entrance.
Electric strike locks remain locked from the outside at all times. With this type of lock, the door closes behind you and automatically fastens in a locked position.
Cellular Telephone Entry Systems: Your Questions Answered
What is the difference between a cellular telephone entry system and a landline entry system?
Cellular telephone entry systems work on cellular telephone networks, so they do not require landlines. They still provide the same voice-based functionality. A visitor can hit a “call” button on such a system, and it will ring a designated number where someone can speak to them and grant can entry in an access control system. But because most people today have “smart” cellular telephones that allow them to see video feed and download apps. Cellular telephone entry systems have many more capabilities than previous landline-based telephone entry systems ever could have.
In traditional landline telephone entry systems, the system connects via a wired landline. In contrast, cellular entry systems connect via a cellular connection, much like what your cell phone uses to make phone calls.
Landline entry systems require you to purchase and run a phone line to the base station installed at the entryway of your building. Now, cell phone entry systems have eliminated the need for telephone wiring. This lack of wiring also makes setting up an outdoor gate access control system more accessible. As you’ll no longer need to run wiring from your building to your gate.
Cellular monitoring services
Cellular monitoring is steadily becoming more popular for building security systems. Cellular monitoring services work through the cellular towers rather than routing through a landline. This flexible solution means your home security doesn’t rely on a landline property or an internet connection.
A cellular system is exceptionally versatile because there’s no need to run any wires. On the other hand, cellular systems often consume more battery energy because the wireless system requires energy to use. You can create an entirely wireless solution through the internet (when applicable) and cellular data.
Whether or cellular tower outages can disrupt a cellular building security system. Cellular-based systems also tend to be more expensive upfront. However, they may contain more advanced technologies and could even save money in the long term.
Advantages to cellular monitoring services include:
A versatile, wireless system that doesn’t need any additional connections.
Affordability, depending on whether the property owner has a landline.
Being able to place anywhere and easily take the plan with you if you move.
Landline Monitoring Services
Most traditional services are landline monitoring services, meaning they connect directly to a phone line. These monitoring services often require their dedicated landline to alert emergency services when something triggers the alarm.
Landline services aren’t disrupted by weather the way cellular telephone entry systems are, but they still can potentially go down. When they do, they may create a false alarm.
Advantages to landline monitoring services include:
Stability of monitoring. These systems are less likely to experience outages.
Ease of setup since many homes already have landline technology in place for the monitoring system.
Being less likely to require or run on battery power
The affordability, both in terms of technology and monitoring cost.
Cellular vs. landline monitoring
Many security companies offer both cellular and landline monitoring systems, depending on your specific needs. If you want to run wires, a landline system may prove more affordable and durable. But if you want a versatile design that doesn’t need hard-wired connections, you may prefer a cellular system.
Some companies recommend you have both cellular and wired systems. That way, if the wired landline system goes down, the cellular operates as a backup — or vice versa —especially in places with intermittent connections, like rural areas.
Due to similarities in the equipment, it’s purely the connection you need to consider. You can access the same features and the same monitoring experience through either cellular or landline monitoring. You’ll need to determine which is best for you based on reliability and cost, which will depend on your area and the system you choose.
How landline systems became cellular systems
They have developed cellular telephone entry systems during the shift from landline phones to cell phones.
Before they used cellular networks, telephone entry systems used copper wires to connect an entryway’s door station to each resident’s apartment. Installing one of these entry systems meant modifying existing phone lines or purchasing and laying new wiring.
Even today, running wire throughout a building means tearing out walls and rebuilding them again, and those costs add up. What’s more, residents could only answer calls from guests when they were in their properties. As a result, landline phone entry systems caused residents to miss visitors and deliveries.
When cell phone popularity exploded in the 2000s, the landline system quickly became outdated. Intercom providers turned to cellular technology as a better, more efficient alternative to wired landlines. In contrast to landline systems, cell phone-based systems use cellular networks, eliminating the need for wiring.
Cellular Telephone Entry Systems
Cellular Telephone Entry Systems: Your Questions Answered
For decades, telephone entry systems were physical landline-based systems—a property or business owner who wished to install a telephone entry system outside another entry point. Help screen and grant visitors access would first have to have their telephone landline that the telephone entry system could connect to and call. From the 1980s to the 2000s, this type of landline connection was usually possible in most urban areas since the masses still used landline telephones. But purchasing such a system for use in a more rural area was still challenging because the cost to have telephone landlines laid was often cost-prohibitive.
Whether you manage a gated community or own an apartment building, the entry system you install affects how visitors, delivery carriers, and even residents access your property. Suppose you’re seeking a wireless access control system for your gate or door. In that case, you might be considering a cellular telephone entry system.
Although telephone entry systems have historically required landlines, some systems now operate over cellular connections. Read this post for a quick guide to cellular telephone entry systems. Find out if a cell phone entry system is the right solution to meet your property access control system needs.
As landline telephone installations became less frequently requested during that time, the older, existing landlines installed decades before were also starting to degrade and needed to be replaced. Unfortunately, the cost of replacing or installing a new landline had invariably gone up as well. That suddenly made it cost-prohibitive to install a landline telephone entry system in an urban area and helped pave the way for the development of newer, cellular-based telephone entry systems.
What is a cellular telephone entry system?
A cellular telephone entry system is a multi-tenant intercom that allows residents to use their cell phones to communicate with visitors and grant property an access control system to guests.
The cellular telephone entry system improves traditional telephone entry systems by using cellular networks instead of physical landlines. Many cellular telephone entry systems are modified landline entry systems.
Landline and cellular telephone entry systems function in the same way. They are both designed to enable a tenant to grant property access to their visitor at their core. The difference between the two systems is their connection: one is based on cellular signals, and the other occurs through a landline.
Let’s go over a bit of intercom terminology to help us fully understand the differences between cellular telephone entry systems and landline entry systems.
Access Control Models
Access Control Models
Access control plays an essential role in the security of many businesses by allowing personnel to restrict or grant access to specified locations or resources. Currently, there are four primary types of access control models: mandatory access control (MAC), role-based access control (RBAC), discretionary access control (DAC), and role-based access control (RBAC). Each model outlines different levels of permissions and how they are assigned. To learn more about the four main types of access control for businesses and determine which ones best suit your company’s needs, continue reading.
Consider one of the most crucial assets in a company, and access control systems hold significant value. The term ‘access control’ refers to “the control of access to system resources after a user’s account credentials and identity has been authenticated, and access to the system has been granted.” Access control is used to identify a subject (user/human) and authorize the issue to access an object (data/resource) based on the required task. These controls are used to protect resources from unauthorized access. Three main types of access control systems are Discretionary Access Control (DAC), Role-Based Access Control (RBAC), and Mandatory Access Control (MAC).
Discretionary Access Control (DAC)
Discretionary access control is the least restrictive type of access control. Under this system, individuals are granted complete control over any objects they own and any programs associated with such entities. The individuals can then determine who has access to their things by programming security level settings for other users.
DAC is a type of access control system that assigns access rights based on rules specified by users. The principle behind DAC is that subjects can determine who has access to their objects. The DAC model takes advantage of using access control lists (ACLs) and capability tables. Capability tables contain rows with ‘subject’ and columns containing ‘object.’ The security kernel within the operating system checks the tables to determine if access is allowed. Sometimes a subject/program may only have access to read a file; the security kernel makes sure no unauthorized changes occur.
This popular model is utilized by some of the most popular operating systems, like Microsoft Windows file systems.
Role-Based Access Control (RBAC)
RBAC, also known as non-discretionary access control, is used when system administrators assign rights based on organizational roles. It presents an opportunity for the organization to address the principle of ‘least privilege.’ That gives individuals the access needed to do their job since the key connects to their job.
In these systems, predefined roles are associated with specific permissions. Because of its simplicity, this type of access control system is one of the most popular forms used in businesses. However, RBAC does have some drawbacks. For example, RBAC can’t grant one-time permissions when an exception to the standardized licenses is necessary.
Windows and Linux environments use something similar by creating ‘Groups.’ Each group has individual file permissions. Each user is assigned to groups based on their work role. RBAC sets access based on roles. That is different from groups since users can belong to multiple groups but only be assigned one role. Example roles are accountants, developers, among others. An accountant would only gain access to resources that an accountant would need on the system. That requires the organization to constantly review the role definitions and have a process to modify roles to segregate duties. If not, role creep can occur. Role creep is when an individual is transferring to another job/group, and their access from their previous job stays with them.
Mandatory Access Control (MAC)
Mandatory access control is widely considered the most restrictive access control model in existence. This type of access control allows only the system’s owner to control and manage access based on the settings laid out by the system’s programmed parameters. Such parameters can’t be altered or bypassed. The end-user doesn’t have control over any of the permissions or privileges. They can only access points that the system owners allow them to access. Because of its high level of restriction, MAC is usually used for facilities or organizations that require maximum security, such as government facilities.
Considered the strictest of all levels of access control systems, the government commonly uses the design and implementation of MAC. It uses a hierarchical approach to control access to files/resources. Under a MAC environment, access to resource objects is held by the settings defined by a system administrator. That means access to resource objects is governed by the operating system based on what the system administrator configured in the settings. Users can’t change access control of a resource. MAC uses “security labels” to assign resource objects to a system. There are two pieces of information connected to these security labels: classification (high, medium, low) and category (specific department or project – provides “need to know”). Each user account is also assigned classification and category properties. This system provides users access to an object if both properties match. Suppose a user has high classification but is not part of the category of the thing. In that case, the user cannot access the object. MAC is the most secure access control system but requires considerable planning and high system management due to constantly updating things and account labels.
Other than the government’s implementation of MAC, Windows Vista-8 used a variant of MAC with what they called, Mandatory Integrity Control (MIC). This MAC system added integrity levels (IL) to process/files running in the login session. The IL represented the level of trust the object would have. Subjects were assigned an IL level, which was set to their access token. IL levels in MIC were: low, medium, high, and system. In that system, access to an object was prohibited unless the user had the same level of trust. Windows limited the user not to being able to write or delete files with a higher IL. This system took advantage of the Windows DAC system ACLs. It first compared IL levels, then checked the ACLs to ensure the correct permissions were in place. It combined it with integrity levels to create a MAC environment.
Rule-based access control
The last of the four main types of access control for businesses is rule-based access control. This system assigns or denies user access based on dynamic rules and limitations defined by the owner or system administrator. Such rules may limit access based on several unique situations, such as the individual’s location, the time of day, or the device being used. The ability to customize rules and permissions makes RBAC an ideal form of access control for businesses that require a dynamic security solution.
What is Web based access?
What is Web based access?
First, what is web-based access control? Web-based access systems connect all security devices via an internet connection and allow users to manage the system using a web-based interface. That eliminates the complex software installations on an onsite server necessary for a traditional, “client-based” access control system.
Moreover, implementing web-based access control solutions is significantly more straightforward because there is no need to install complex server equipment onsite.
That means that all web-based access control solutions share several immediate benefits compared with traditional client-based systems:
- High initial costs for servers and related infrastructure spending are eliminated.
- Installing web-based systems takes less time and is easier to scale to include further sites
- Browser-based software is upgraded automatically by the vendor, so end users don’t need to worry about updates
- Systems are less complex to maintain on the front end, so end users require less intensive systems training to manage web-based systems effectively
Type 1: For single or temporary sites
That is the most straightforward variation of a web-based access control solution and is most suited for single sites with few access control doors.
This type of solution makes electronic access control system accessible to small sites without incurring significant capital investment. Specific solutions on the market today offer support for up to 30 doors and 5000 user credentials.
One-off sporting and music event venues may also make effective temporary use of this kind of system.
Type 2: For more significant high-security sites
Even though this solution also uses the internet to connect the system, all system data is kept on a dedicated onsite server on one of the client’s sites.
This solution is ideal for larger organizations with strict security standards for data storage. It allows data from multiple sites to connect to a single server while allowing users to manage all data onsite.
Typical solutions on the market allow users to manage 1000 doors through their web browser and add up to 500 000 users per control panel.
Type 3: Data hosted on the "Cloud"
In the last type of web-based access control system, all data is hosted externally on dispersed data centers provided by the solution vendor. That eliminates geographical constraints on expanding companies’ security systems and provides users with comprehensive data redundancy measures.
This type of solution allows multiple users to share the same data management infrastructures in the same way as an electric power utility. That enables end-users to share costs and pay according to how much they use the vendor’s facilities, bringing considerable cost-saving opportunities.
While web-based access control systems often represent a superior value-proposition to traditional systems, there are several potential disadvantages to bear in mind. First, all web-based solutions are too dependent on network stability. That means that systems in specific geographic locations may share the same vulnerabilities as the regional network infrastructure required to use. Data security is also a significant issue for web-based access control, even for users that manage security system data onsite. Therefore, users must take precautions to implement firewalls, VPNs, and other measures to protect their web-based systems.
Many internet-based access control solutions on the market today still need to expand their integration capabilities with other systems such as building management, fire security, and mapping systems before becoming a viable addition to a company’s facility management systems.
Lastly, many companies may find that strict global corporate security standards. It will limit their scope for deploying relatively new technologies like internet-based access control systems. Though this will no doubt change as the technology becomes more established and widely adopted.
So is internet-based access control the same as "cloud-based" security?
Many security professionals will no doubt be aware of another security technology buzzword: “cloud-based security” or “security as a service (SaaS).” In comparison, cloud-based security solutions are indeed all IP-based. It is important not to assume that internet-based access control solutions are all cloud based access control. Some solutions sell internet-based hardware, including dedicated server devices specific to the individual client. On the other hand, accurate cloud-based access control security solutions make their data management infrastructures available as continuous service. Host their data on an indeterminate number of servers shared by multiple users. We will explore the range of cloud-based security services currently available in a future article.
Introduction to Cloud-Based Access Systems
New technology is modernizing and improving access control system as the security industry expands to keep up with modern businesses’ needs. While access control solutions are still satisfactory for many companies, cloud based access control systems are growing steadily. Many access control experts predict a sharp increase in the number of customers who will request cloud based systems in the next few years, but why? Isn’t all access control designed the same way?
While they may seem small, the differences will have enormous implications for the security industry in the future. Learning about them now can help businesses transition to these new systems and make the switch even easier for access control companies. Some of the most prominent features to look out for in these new cloud based systems include:
CONVENIENCE FOR USERS
One of the main benefits of cloud based access control is how quick and easy it is to set up. Overall, these systems are more streamlined, which helps speed up installation, and intuitive, which helps companies adjust and learn them quickly. They also make access control more accessible; if a system is easy enough to use, anyone in the office can interact with it daily. No training sessions are necessary. In addition, many companies that offer cloud based access control also provide free remote tech support. So, managers and employees can troubleshoot and update their systems without needing technicians to be physically present. Finally, customers can use their mobile phones to access a system instead of a physical key card. Meaning no more lost or stolen cards that need replacing –yet another added convenience.
Over time, cloud based access control systems have proven to be cheaper for the customer. Many of the features listed above already contribute to lower costs (for example, not having to buy new vital cards every so often). The cloud based system can automatically update itself every time the access control security company releases new software at no extra cost. There are no routine maintenance appointments to schedule and pay for. There is also no need to redesign a cloud access control, even if a company triples in size. These systems are scalable and can be easily adjusted to handle any number of employees without rewiring an entire setup. Not only is this good news for customers, but it’s also great news for integrators. These extra services are no longer necessary, proving that the features in a cloud based system aren’t just cost-effective – they’re time-effective, too.
At first glance, a cloud based system may not seem more secure than current access control systems. Who guards the data up there? Isn’t it easier to hack? These questions are valid, but cloud based systems have been proven to store data safely and securely. Instead of on a local server, a company’s data is stored on a secure remote server up in the cloud. Managers and employees can access the database from anywhere via their mobile phones. The information itself is backing up, meaning that if the cloud server were ever to crash, the data would remain safe. This extra layer of security can provide both customers and installers with peace of mind in times of emergency or a power outage. Additionally, if a security breach does happen, having data in the cloud makes it easier to retrieve. The company can access analytics faster than ever to identify where the infringement occurred and fix it.
OPPORTUNITIES FOR CUSTOMIZATION
Cloud based access control makes customizing your system more accessible than ever. A business with more than one location can monitor every site from one device using one infrastructure. There’s no need to set up servers in each building or spend time installing more costly hardware. Customers can also personalize their security reports. Many cloud based systems offer the option to send texts or other alerts when systems detect suspicious activity, such as increased traffic through a particular door. When setting up their plans, companies can install products that mesh well with their specific security goals. For example, suppose the business prioritizes activity logs and grants or denies individuals access to particular rooms. In that case, the design of their security system can reflect those goals. Companies can also integrate many software solutions they already use into their systems, which helps further smooth the transition into using cloud-based technology. Many systems also offer the ability to designate different levels of control to other people within an organization. All these options make cloud based access control easy to customize and simple to use in the workplace.
ASSISTANCE IN COMPLYING WITH REGULATIONS
A cloud based access control ability to regularly update itself means a business’s security is always modern and state-of-the-art. Suppose a company needs to submit access logs or other data periodically. In that case, a cloud based system makes that information easy to find and transmit. Also, automating security processes, like granting or denying access, can help with onboarding and terminating employees. Streamlining the onboarding process means businesses stay compliant. By ensuring the termination process goes smoothly, companies prevent potential human resource disasters from occurring.
Slowly but surely, customers are gravitating toward access control system companies that offer these new features in their systems. Cloud based systems solve problems in the workplace and the security industry – they can increase collaboration between employees and make it easier for customers to communicate with integrators. Installing and maintaining a cloud based system requires fewer person-hours. That means access control security companies can raise their prices, makes the access control market more competitive, and create job security. While the transition can seem awkward at times, shifting to cloud based systems is proving to be a better idea for businesses and access control companies alike.
PROVIDES STRATEGIC VALUE
Since cloud based systems are growing in popularity, businesses can use them as selling points to attract more customers. In addition, the added benefits of storing data in the cloud mean companies can devote more time and energy to other issues, which can give them a competitive edge. It is increasing collaboration, saving money, and reducing the number of headaches in a day. It can help businesses stay ahead of the curve and modernize their approach to customers as cloud based technologies become more mainstream. It will be easier for integrators to install and fix newer systems because most clients will already be on the same page.
9 Best Cloud-Based Access Control Systems
4. Openpath 5. SALTO KS 6. Genetec
7. STANLEY Security 8. S2 9. Millennium
Firmware Update ESCU, Net DCD-n, and EDCD
How to update the ESCU/EDCD firmware with SCU Configuration Utility.
Steps to Update ESCU Firmware
- Run SCU Configuration Utility (SCUConfigurationUtility.exe)
- log in to the software. The default Password is admin.
- Select Device > Upload
4. Select SCU in Hardware Type.
5. Browse for the firmware file (ELF.s19 extension) and select the file
- Press the Upload button
For EDCD firmware operator should enter the EDCD board address.
How to Factory Reset the ESCU or Net DCD-n
S5 Factory Reset Method
Use the S5-1 or S5-2 switch and the Tamper switch to reset the ESCU back to the factory shipped state (e.g., IP = 192.168.0.254). The process of resetting the ESCU using the S5 control is the ‘True’ factory reset. S5 and S4 will put the board back to the factory shipped state.
- With ESCU powered OFF, set S5-1 to the ON position.
- Power up the ESCU. The D3 Watchdog LED will be on.
- Press and release the Tamper Switch three times, then set S5-1 OFF.
- The Watchdog LED will go off for a few seconds, then flash slow.
- Setup screen will revert to the default settings:
IP address: 192.168.0.254
Subnet Mask: 0.0.0.0.0
The MAC address is permanent and does not reset.
Alternate Reset Method
C20 Board Reset – Alternate Method
The S5 and C20 resets are somewhat different. Shorting C20 deletes memory from the board (i.e., current configuration and history of transactions) and resets the ESCU’s Owner Name back to the default of Demo. Not for sale. Resetting using C20 retains IP address, Baud rate, Ping setting, and Gateway. The Owner Name is downloading to the ESCU. The ESCU will only communicate to the software if the Site Name in the software = Owner Name. C20 is useful if the ESCU previously spoke with a different Millennium system and the Owner Name needs to be reset to come online with the new system.
Steps to Reset using C20
- Turn POWER OFF
- Short across capacitor C20 (the small SMT cap between RAM chips U7 and U8 for Ten seconds.
- Turn the Power back on.
Greatly improved communication speeds. About 10 times faster than the original DCD, if used with the Enhanced Site Control Unit (ESCU) or NetDCD.
Millennium NetDCD Problems
Quick setup steps:
1) Connect power and the Ethernet connection to the board
2) Connect to the board using the Configuration Utility (admin/password=admin/admin)
3) Change the DHCP mode to no, and assign a pre-determined IP address
4) Assign the correct gateway & subnet mask addresses
5) Ensure remote host is set to 0.0.0.0 (used in 90% of installations) unless using controller to host function – if so, enter the IP address of the server as the remote host; in the software, use “controller to host.”
6) Change the “Owner ID” to what matches the “Controller Owner ID” precisely, or highlight the default “Owner ID,” “Demo. Not for resale”, delete it, then hit save. The board will then connect with any Millennium access control system that tries to communicate with it first.
(The “Controller Owner ID” can be found under Hardware Configuration)
“The IP address, subnet mask, and gateway are all set correctly, but the site still isn’t coming online in the software”
A) Check the “Owner ID” and ensure that it is, character for character, the same as the “Controller Owner ID” in the software.
B) Restart all Ultra services from the diagnostics menu.
C) Make sure that the “online” box is enabling for the site controller in the programming.
D) Check that another device hasn’t already taken the IP address on the network.
E) Check that the Mac Address / IP Address isn’t blocked/is allowed on the network.
F) Check the encryption settings, that they are off or matching the software correctly.
G) Check if the remote host is entered correctly in the board configuration.
“The configuration settings will not save after changing them, then clicking the save button.”
A) Instead of using the web interface, use the configuration utility.
B) If this error is happening with using the configuration utility, download the latest version.
“The board does not appear on the list of devices when hitting search in the configuration utility”
A) Factory default the board by following the complete install/hardware guide, Mgiaccess.com
B) Ensure that the network is not blocking the MAC address.
C) Ensure that the computer firewall trying to connect with the board is turning off.
D) Ensure the computer trying to connect with the board is within the IP range of 192.168.0.XXX as after the panel is factory defaulted. The IP address becomes static @ 192.168.0.254
“The doors or one door is not coming online.”
A) Ensure that the door address programmed in the NetDCD is not conflicting with the physical rotary address of another DCD, if a door, and SCU if a site.