access control

Linear Access Base cardholder creation

How to create a new cardholder in Linear Access base?

1. To Create New linear access base Cardholder first you need to open the Cardholder set of your location (1).

Click on the Create New Cardholder icon (2). The name of the linear access cardholder set (e.g., “Staff”) will appear above the boxes where the name is entered

Linear access control, Linear pro access, Linear access, base access,linear access base

3. Fill in the cardholder’s First name (3), Last name (4), etc. in the cardholder data fields. Assign Expiration date and fill in account holder access controller panel fields if needed.

4. In the credentials area (6), you may assign credentials to the base access cardholder. Credentials can be transmitters, cards, entry codes, or telephone linear access control directory codes. You may assign more than one credential type and more than one of each credential to a access control Miami cardholder. For example, a cardholder could have two entry codes and three cards.

4.1 In case you need to add a base access transmitter first go to the transmitter section (7), then click on assign new individual transmitter (8), Then enter the data for the individual transmitter (9) and click ok to save it (10). 

Linear access control, Linear pro access, Linear access, base access,linear access base

4.2 In case you need to add a linear access base card first go to the card section (7), then click on assign new individual card (8), Then enter the access control servers data for the individual card (9) and click ok to save it (10). 

Linear access control, Linear pro access, Linear access, base access,linear access base

4.3 In case you need to add an entry linear access code first go to the entry codes section (7), then enter the data for the entry code (8) and finally click on assign (9).

Linear access control, Linear pro access, Linear access, base access,linear access base

5. Click APPLY to save the linear access control cardholder. Now you need to send the changes to the intercom, first, you need to connect to the network.

How to connect to network?

1. Click on the On/Off-line with installation button:

2. When connecting to access control Miami network A the Connecting to [A] (YOUR INSTALLATION NAME) dialog box will appear:

3. Once the linear access base is connected, the SD & RD lights will flash indicating that AccessBase 2000 is polling the network and that the network is responding. Click on the next button to have base access 2000 automatically disconnect from the network upon completion of programming duties:

4. Then click on  this button to send the changes:

How to delete cardholder?

You may delete a linear access control cardholder by selecting the cardholder and clicking on:

Millenium operator levels steps creation:

Millennium operator levels steps installation:

Go to the Millenium operator system administration section, and then go to the operation level panel (2).

Millenium operator, Millennium security, full access, millennium management, millennium management data

Click on new to add a new operator level (2):

The next step is to name it (3) and selects all the permissions that this level will contain. In this case, for the Millenium operator manager level in the Common windows.

You need to exclude the full access to Add the next points:

New Site (4), Database Restore (5), Operator Defined Fields (5), Operator Event Filter (5), Operator (5), and Operator Level:

Millenium operator, Millennium security, full access, millennium management, millennium management data

Now in the DCD window of the Millennium access control, you only grant read access to Doors (7), Elevator Cards (7), and Floors (7):

Then in the Report window, you grant Millenium access controls to all the permissions (8, 9) and click on save (10) to finally add the Millenium operator level:

Once this step is done, you’ll need to create the following Millennium management data operator levels:

For the Frontdesk Millenium Operator Level:

The first step is to name it (1). Then, in the window you’ll need to grant full access only to Advanced Operator Commands (2), Operator Control (3):

Later in the DCD window, you only grant read Millennium access control to Doors (5), Elevator Cards (5), and Floors (5), finally, in the Report window, you will deny access to all reports as shown below (6, 7):

Millenium operator, Millennium security, full access, millennium management, millennium management data
Millenium operator, Millennium security, full access, millennium management, millennium management data
Millenium operator, Millennium security, full access, millennium management, millennium management data

To work in the security operation level:

The first step is to name it (1). Then, in the Common window you’ll need to grant full access only to: Advanced Millenium Operator Commands (2), Operator Control (3), and Historical Log (3):

Later in the DCD window, you only grant read Millenium access control to Doors (5), Elevator Cards (5), and Floors (5),  Then in the Report window, you grant access to all the permissions (6, 7):

Millenium operator, Millennium security, full access, millennium management, millennium management data
Millenium operator, Millennium security, full access, millennium management, millennium management data

And the office data entry Millenium operator level:

The first step is to name it (1). Then, in the Common window you’ll need to grant full access only to:

Access Level, Advanced Operator Commands, Cardholder Batch Adding, Cardholder Custom Fields Setup, Cardholder, Cardholder Import, Cardholder Export, Cardholder Search, Historical Log, Holidays, Operator Control, and Time Periods of the Millenium access controls (2, 3, 4):

Later in the DCD window, you only grant read Millennium security access to Doors: (5), Elevator Cards (5), and Floors (5). Then, in the Report window, you grant access to all the permission (6, 7) .

Millenium operator, Millennium security, full access, millennium management, millennium management data

How to create a cardholders record

How to create a millennium access Cardholder´s record?

We want to show you these steps to create a new Cardholders record in your millennium access control system. To do this, please, read below:

First step:

To create a new millenium access control  Cardholder’s record, first, we need to access the Cardholder windows in the home menu as shown below (1,2):

Millenium access control access control card access systems

Second step:

Millenium access control access control card access systems

Once this step it’s done, you’ll see the following panel showing a list of all the existing cardholders in the millennium access control system. The only next step is going to the NEW option as shown below (3):

Thirt step:

Millenium access control access control card access systems

The following step is going to the identification panel of the millenium access controls (4) and typing the data fields as it’s shown in the next step. First, we complete the First Name (5), middle name (optional), and Last Name (6), and we can change the employee ID also (7 optional).

Fourth step:

Following this, we go to the Cards tab in your millennium access control systems software (8) and enter the data in the fields shown below. First, we enter the encoded Card No. (9), and we mark in the active (10). The Facility code (FC-1-256 Encoded Card: 0-65535) (11), we select in card Format the one that says Wiegand 26 FC 1 (12), and finally, to assign the access Level, we double left click in the box marked under access control Level as shown in the figure (13).

Fifth step:

And this opens the following menu in your millennium access control systems. We click on the drop-down menu marked in the following figure and select among the available ones assigned to the user (14) and then click ok to save (15).


Sixth step:

Finally, we click save (16), and you will see the new cardholder added to the access control solution system.

ZKaccess access level and Personnel

zkteco access control level and access personnel steps creation:

We want to show you the steps to optimally configure these two sections in zkteco access control. Please follow these steps so, that you have optimal performance:

First step:

To create a zk access control level, all we must do later is go to the zkteco access control Level panel in the access control windows (1).

zksoftware access control zkteco access control zk access control

Second step:

Before, remember, the access level mentions what the users with verification can unlock at a specific time door or a certain number of entries. In this step, Click on the add option (2) in the zkteco access control software:

zksoftware access control zkteco access control zk access control

Thirth step:

zksoftware access control zkteco access control zk access control

after that, we enter the data in the fields, starting with zkaccess software Name (3). Following this, select a Time Zone from the Time Zones List (4) and all the doors that we’ll open with this zk access control level from the Door Combination list (5), and finally click ok to save (6).

Fourth step:

Then, to create personnel in the ZKAccess software, we must go to the Personnel panel in the Personnel windows (1).

zksoftware access control zkteco access control zk access control

Sixth step:

So, click on the Add option (2) in the zk access software; this will take you to the register of parameters that we will have to fill in yet:

zksoftware access control zkteco access control zk access control

Seventh step

zksoftware access control zkteco access control zk access control

Once we the following section in zkaccess software, we must complete the fields, Personnel Number (3 whatever you desired), First Name (4), Last Name (5), Card Number (6), select Department (7), and select the zk access control Level from the list (8), and finally click ok to save (9).

Eighth step:

At last, to see the events all we must do is go to the Real-Time Monitoring panel in the zk access control windows (1,2). So, lets try, and see the final result.

How to install Millenium access level and time periods

How to install Millenium ultra access level and time periods

To optimally configure the milennium ultra access level time periods and level accesses, we recommend that you follow these steps:

First Step:

To be able to configure the Time Periods, we move in the menu to the Millenium access controls Systems Administration option (1) and in this, we open the Time Periods panel (2) as shown below.

Millenium access control access control card access systems

Second step:

Once in the panel of your Millenium ultra access control system, we touch the New option to add a new Time Periods.

Millenium access control access control card access systems

Third step:

The first thing we do is name it (5), and then we click on the (+) option to add the days and times in which the Time Periods will work in the Millennium access control, as shown below.(6,7)

Millenium access control access control card access systems
Millenium access control access control card access systems

Fourth step:

And finally, we proceed to save the Millenium ultra access control configuration (8)

Millenium access control access control card access systems

Fifth step:

Millenium access control access control card access systems

In case we want to add the Holidays in the Time periods control system, we can do it as shown below (1), entering the name (2) and configuring it on an annual or relative basis. (3)

Sixth step

Once the Time Periods and Holidays have been configured in your, we can configure the Access Levels by going to the Millenium ultra access Level panel in the Millenium access control System Administration menu as shown below (1)

Seventh step

Once located in the Millenium ultra access level menu, the first thing we must do is click on the New option to proceed to add a new one (2)

Eight step

Now, as shown below, the first thing we do in the Millenium ultra access level is name it (3), followed by this in the Available objects column that is located on the left (4), we select the doors to which we want to grant access control with this access level, and in the column of the right Time Periods the frequency with which it will be repeated (5) and then we give it to add (6) and once this is done we can give it save to add the Millenium ultra acces Level (7)

zksoftware access control zkteco access control zk access control

How to configure time zones and holidays

zk access control time zone and holidays configuration:

This blog will show you the essential steps to configure time zone and holidays in zk access control. For a correct installation, please follow these steps:

First step

Some functions of time zones can be beneficial for you. One is to specify when doors can usually open or give access control to some levels in a limited time. We can determine which entries can be accessed or not, only for specified users. So, to create a new Time Zone First go to the zk access control windows (1).

zksoftware access control zkteco access control

Second step

Note that by default, the system has an access control time zone named, which cannot be deleted but can be modified. The user can create more than one. After considering this, please go to the Time Zone panel (2) in your zk access controller:

zksoftware access control zkteco access control zk access control

Third step

Once this step it’s done, we click on the Add option in your zkaccess software system ,as shown below (3).

zksoftware access control zkteco access control zk access control

Fourth step

zksoftware access control zkteco access control zk access control

After completing the previous step in your zkteco access control, We enter the data in the fields below. First-time zone name (4), second establish the intervals (5), third copy to all days (6), or we can copy to specific days also, and finally click ok to save in your zkteco access control (7). 

Fifth step

Remember, we have functions to add, modify and remove holiday access controls. To create holidays, we access to holidays panel in the zkteco access control windows, as shown below (1).


Sixth step

Click on the Add option (2) in zk access controller system:

zksoftware access control zkteco access control zk access control

Seventh step

Then we enter the data in the fields, starting with Name (3), Type (4), Start Date (5), End Date (6), Recurring (7), and finally, we click ok to save the information in the zk access software (8).

Alternatives to cellular telephone entry systems

Alternatives to cellular telephone entry systems

Alternatives to cellular telephone entry systems

As the smartphone gets smarter, cellular telephone entry systems are becoming obsolete. They’re harder to install and offer fewer features than the latest property access control solutions. But there’s good news: You have better options.

Three possible  cell phone entry systems alternatives include:

  1. Cellular telephone entry systems with cameras :   

To accommodate technology innovations, some manufacturers have opted to offer the telephone entry system with a camera. These systems may have a built-in camera or may require you to purchase and install a camera separately.

However, telephone-based intercoms can’t handle two-way video transfers. As a result, residents can see videos of their visitors, but visitors can’t see residents.

       2. WiFi phone entry systems :  

Some companies have attempted to modernize the telephone entry system by using WiFi instead of cellular networks in recent years. WiFi telephone entry systems send data between residents’ cell phones and system hardware via WiFi instead of a telephone network.

WiFi telephone entry systems are a decent attempt at adapting cellular systems to the modern age. However, they fall short in crucial ways. WiFi networks and cellular networks are different. Because of that, consistent and rapid communication between them is difficult.

Cell phones, especially smartphones, can easily interpret data from WiFi networks. But cellular telephone entry systems can’t. Since cellular telephone systems can only handle specific data, adding WiFi capabilities to a telephone entry system.

3. Video intercom systems :

Video intercoms are the best alternative to a cellular telephone entry system.

Like cellular entry systems, intelligent video intercoms use phones as intercom substations that allow communication and guest entry. But unlike cellular entry systems, video intercoms are capable of more than just phone calls. The best video intercoms for apartments are fully smartphone-compatible and leverage the full power of the smartphone for a seamless property access experience.

Video intercoms let residents use their smartphones to video chat with visitors and open doors and gates remotely. They also offer other property access methods, which means visitors have more than one way to request access. The best systems may offer virtual keys for planned visits and delivery PINs and passes for courier access.

Pro tip: When shopping for a video intercom, choose a cloud-based system that lets you manage access and update your tenant directory remotely.

Here’s a comparison between intelligent video intercoms and cellular telephone entry systems:


Smart video intercom

Cellular telephone entry system

Remote door opening

Virtual keys for guest access

Video chat

Web-based dashboard

Integrations with other intelligent building systems











Cell phone entry systems may be a step up from the traditional telephone entry system. Still, they fail to offer the robust features and functionality of video intercoms. If you’re looking for a better multi-tenant entry system, choose a video intercom like ButterflyMX instead. Installed in more than 5,000 buildings, ButterflyMX is the industry’s leading property access control services.

How does a cellular telephone entry system work?

Work of cellular telephone entry system

How does a cellular telephone entry system work?

Cellular telephone entry systems work by using cellular networks to establish contact between guests and visitors.

These calls allow residents to speak to whoever is at the base station and grant guests an access control system. Since the system is cell phone-based, residents don’t even have to be building to let their guests onto the property.

Here’s how a cellular telephone entry system works: 

A guest seeking property access finds the resident they’re visiting in the entry system’s base station.

The telephone entry system places a call over a cellular network to the resident’s phone.

When the resident picks up, they can speak with the guest like any other phone call. Their guests can also hear and talk to them since the system’s base station has a microphone and speaker.

Finally, the resident can let the guest in by pressing ‘9’ on their cell phone.

Limitations of cellular telephone entry systems

Cellular telephone entry systems are more convenient than landline systems. But cellular systems fail to offer all the features that today’s residents expect from a modern building entry system.

Here are some limitations of cellular telephone entry systems:

Expensive. Using a cellular network for calls may require you to invest in a commercial-grade cellphone plan with an ongoing, high-bandwidth connection.

Inconvenient for you. Who’s going to be stuck with scheduling and managing a technician whenever a resident moves in or out? Those aren’t tasks you need to add to your busy schedule. Best to look for a system that automatically updates rent rolls, taking things off your plate instead of piling on.

They lack video. Cellular telephone entry systems don’t offer video functionality. That means residents can’t get video chat with visitors and visually confirm who’s requesting property access control system.

Few property access methods. When visitors arrive at a building with a cell phone entry system, they only call the resident. There are no virtual keys for guests or delivery PINs for couriers.

No cloud-based management. Cloud-based entry systems let property staff manage access and update the tenant directory with a web-based dashboard from anywhere, on any device. In contrast, cellular entry systems require you to download software onto one specific device to manage the system remotely.



Types of proximity card readers

While many proximity readers may look the same, they can function very differently depending on their power supply and connecting back to the access control system. There are four common types of proximity card readers available for access control. When installing proximity card readers, it’s essential to know which class provides the best security for your space.

Wired proximity card readers

The most common type of proximity card reader used in commercial HID access control applications, wired prox card readers include Weigand readers and RS-485 readers. Because they communicate using the Wiegand protocol, they are compatible with almost every type of access control system. However, the Wiegand protocol has been around since the 1970s, which means it’s more prone to hacking. To ensure proximity card readers using a Wiegand protocol are secure, choose readers with advanced end-to-end encryption and additional protections against tampering, such as the RS-485 readers from Openpath. These standard prox card readers sometimes include different options and usually support some combination of RFID, Bluetooth (BLE), or NFC formats. 

Wireless proximity readers

Wireless proximity readers are battery-powered to eliminate the need to wire back to a control panel. They are most often used for large deployments in hotels and apartment complexes where it would be cost-prohibitive to wire each door. They usually require localized access points throughout the building to communicate with an Internet-connected central control panel. One of the downsides of this type of proximity card reader is checking and replacing batteries to ensure proper functionality.

Standalone proximity card readers

 These decentralized card readers are limited in functionality as they do not connect back to a control panel. Because they have no data connection, they cannot be managed or programmed remotely, which is why they often include a PIN pad. When installed on the unsecured side of the door, they’re also prone to tampering and hacking, as they store sensitive user and credential access control data locally. These proximity card readers are best-suited for small internal deployments that won’t need added security features, such as a supply closet.

IP-connected proximity readers

This more advanced reader has no direct connection between the reader and controller. The Ethernet connection allows them to integrate into IT systems for a more automated, flexible security system. However, it’s important to note that this type of system should meet high-level encryption and cybersecurity standards to ensure your space is secure. If your IP is compromised, your building security is also at risk.

Benefits of proximity card readers for access control

There’s a good reason why proximity card readers are so familiar with offices and commercial spaces worldwide. First, they are reasonably simple to implement. Proximity card reader technology has been around for decades. People are familiar with using them, so they require little training or ramp-up time once installed.

Proximity cards can also provide a contactless access experience. Unlike swipe cards, prox cards don’t need to be inserted into or swiped through a reader to work. The proximity card has a metallic antenna coil embedded inside that holds encoded data. The proximity card readers use an electromagnetic field to detect nearby cards and transmit data through the reader to the HID access control panel. The control panel sends a signal back to the reader to trigger a door unlock if the card is authorized. You can also use proximity technology in critical fobs, clamshell cards, or stickers. That is great for implementing touchless technology to create healthier spaces.

Proximity card systems can provide businesses with trackable entry activity and data analytics for their space depending on the access control software. A cloud-based access control platform like Openpath will give the most flexibility, giving administrators and facilities teams remote access to manage their HID access control system from anywhere.

Security concerns and pitfalls of proximity card readers

As with any good physical security measure, your proximity card reader needs to be secure and reliable. A well-known legacy access control system may seem like an intelligent choice. Still, because this technology has been around for many decades, there are some security vulnerabilities to be aware of. When looking at how someone would compromise a proximity reader, there are a surprising number of exposures. For example, almost anyone could hack an HID proximity card reader with a device purchased online. If your proximity card reader has any of the following vulnerabilities, it’s time to upgrade.

  • Short read range — The read range is the distance the reader can detect a nearby credential. The read range will vary by device. Distance is an important consideration when installing a security system. For example, a turnstile or front door should have a shorter read range so that people need to be close to the reader to request an unlock. That will help prevent tailgating incidents. However, for parking garage deployments, the read range needs to be farther to account for vehicle size and users’ credentials to communicate with the reader from inside the vehicle. 
  • Hackable backend hardware  Door access readers are unfortunately a popular target for criminals who want to steal data and vandalize businesses. One thing to keep in mind when installing new readers is backward compatibility. Suppose you’re running your security system on outdated legacy backend hardware. In that case, even the most advanced prox card readers could be exposed to security vulnerabilities. One way to combat this on a hybrid access control system model is to use a system with end-to-end encryption at every level of communication, with extra protection against hardware hacking.
  • Data stored locally — Some proximity readers store data at the local level, making it easy for potential criminals to gain access to it. This often-overlooked security pitfall could compromise your entire system. Openpath’s card readers are setting up as a blind proxy between the credential and control unit, so they offer no value to hackers looking for a way in. They also have built-in alerts against tampering. 
  • No backups or fail-safes — In the case of a power or Internet outage, a backup power source is essential to keeping your system up and running. Without a backup option or a failsafe protocol, people could be locking out of the building, or the doors could remain unlocked without you even knowing. Make sure your system offers offline functionality so you don’t get locked out in an emergency and a way to connect to an alternative power source or backup battery. 
  • Key cards are quickly coping — Key cards are one of the most widely used access methods for businesses worldwide. However, some key fobs and cards pose a serious security risk. Like those with low-frequency HID proximity card readers, they can easily copy many standard vital cards with a $10 device. Instead, look for systems that offer more secure prox cards. Openpath uses DESFire EV1 128-bit AES cryptographic cards with digitally signed identifiers. They provide the most robust encryption and security available, with no publicly known vulnerabilities.

Planning, costs, and installation for proximity card readers

There are a surprising amount of factors that go into choosing the right access control system for your space. When it comes to finding a proximity card reader that works for your building, an HID access control installer will look at the locks on your doors. The wiring needed for the system, the amount of space you have, and other desired security features before installing new readers.

Door locking mechanisms

Not all HID access control providers are compatible with all door locks. However, proximity card readers are designed to work with the electric, wired locking mechanisms common in most commercial spaces. Your access control system installer will tell you what type of security systems are compatible. If you’re starting construction from scratch, consult a security expert to get the best door locks installed in your building.


Mounting specs for prox readers

One of the things an HID access control consultant will check before recommending a product is the space required to install your desired prox card reader. Depending on your area, some proximity card readers may not fit, especially if you’re working with a narrow doorway. Aesthetics are also something to consider at this time. The incumbent HID proximity readers can look bulky and dated in a modern office environment. Openpath Smart Readers are award-winning for their sleek, elegant design, which can be mounted flush with the wall to blend right into your space. The Openpath readers come in Standard size and a slimmer Mullion option for space-saving installation.


Wiring architecture

One of the top concerns with upgrading an existing system is having to rip and replace all the old wiring for the new hardware when it comes to HID access control. One of the benefits of proximity card readers like Openpath’s Smart Readers is standard wiring architecture. That means installation is quick and straightforward and won’t require tearing out the existing wiring. Not all proximity card readers use standard wiring, so it’s essential to work with an integrator when planning your access control installation to understand the full scope of the project.


Proximity card reader cost

It’s essential to have a budget in mind before you start an access control project. The cost of your system will depend on your existing infrastructure, how many readers you need, and the type of credentials you choose. Remember that crucial cards can be costly to maintain, and you’ll need to order replacement cards frequently. Choose a product designed to be future-proof with a more flexible reader that can accommodate different access methods (like mobile credentials) and connect to other building systems. You’re less likely to need to replace the system every few years to keep up with the most recent security developments.

Is a proximity card reader system suitable for your space?

Proximity card readers are an excellent choice for commercial spaces that need convenient, contactless access control. A proximity reader system allows you to secure office spaces, lobby turnstiles, and parking garages with modern access control solutions.

Before deciding on a system, ask yourself what is most important for your building security. If you want a combination of mobile access control credentials and prox cards, ensure the proximity readers you choose can support flexible credential types. Openpath offers encrypted DESFire EV2 access cards, which can be used alongside convenient mobile credentials; plus, Openpath is backward compatible with many legacy access cards. That means that once you install Openpath Smart Readers, you won’t have to re-issue new prox cards to your entire organization.

Additionally, security experts recommend HID access control solutions that run on a cloud platform, which is often more secure and easier to manage remotely. Openpath’s cloud-based access control software ensures a smooth transition, seamlessly integrating with leading directory management platforms to sync users automatically. Plus, the remote platform allows admins to issue or revoke credentials at any time instantly.

Schedule a site walk with a security expert if you’re thinking about installing a proximity card reader with an access control system for your space. They’ll perform a security audit, evaluate your area, and identify where and what type of system is best for you. Contact the security experts at Openpath today to get started with a custom price quote.

How to wire Power

How to wire Power, Grounding, EIA-485, and Ethernet

Power and Grounding (ESCU / Net DCD-n and EDCD)

The PS1 Power Supply includes a line conditioner for the EIA-485 (RS-485) chain that is important to get optimal distance and baud rate for the EDCDs.

The ESCU / Net DCD-n and EDCDs must share standard Power GNDs.

If the number of devices connected to the power supply is ten or fewer, may use a smaller cable.

Local electrical codes may require plenum-rated cable or conduit.

Always check local codes before running any cable.

For UL Listed systems, the power supply shall wire through a conduit.

EIA-485 (RS-485) (ESCU and EDCD)

The ESCU and EDCD use Half Duplex EIA-485 (RS-485). Connect to J1, as shown in Figure 3-2. Use shielded twisted pair cable with the shield grounded to chassis ground at one end only. (Recommended to use equivalent to Belden 3106A.


The ESCU / Net DCD-n and EDCDs must share common EIA-485 GNDs.

EIA-485 Specifications

The maximum Speed, Cable Length, and Number of EIA-485 nodes are dependent upon each other and

many other factors.

less than 5-10 feet, preferably about 3 feet. More extended stubs will attenuate the signals if the node’s connection point (stub) is excessively long. A long stub causes a significant impedance mismatch and signal reflections. Should keep all stubs as short as possible.

  • The maximum cable length is 4000 feet (1200 M).

 The baud rate is a function of the quality of the EIA-485 (RS-485) wiring:

  • Distance
  • Cable type (twisted pair, shielded)
  • Wire gauge
  • Number of T-taps
  • Number of EDCDs.

 Possible need for termination. A termination resistor of 120 ohms on each end across the Data+ and Data- pins on long cable runs can improve the signal distortion.

Ethernet (ESCU and Net DCD-n Only)

Network Adapter in J13 supports:

  • 10/100 bits/sec. Use minimum CAT 5, CAT 5E preferred.
  • Auto Speed detect
  • Auto Crossover detect
  • Half duplex.
  • Yellow LED indicates Carrier connection. No communication will occur unless the YEL LED is lit.
  • Green LED indicates TCP/IP activity over Ethernet.

ESCU, EDCD, and Net DCD-n Install Guide 3–5

How to Wire Readers, Inputs, Outputs

This section describes how to wire the following supported Reader interfaces:

 Wiegand Signaling (Data 1 and Data 0)

 Magnetic ABA Signaling (Clock and Data)

 MARLOK Signaling (Clock with two Data tracks)

Readers - Wiegand signaling

J6 has the Power, Data One, and Data Zero signals. Power can be either 12VDC or 5VDC. For UL compliance, the recorded range for compatibility on the outputs is 5 – 13VDC.

J1 has Red and Green LED drives. (GND when true)

J7 provides for the REX input if required.

Readers - Magnetic signaling (ABA Track 2)

  • J6 has the Power, Clock, and Data signals. Power can be either 12 VDC or 5 VDC. Reader Power has PTC short circuit protection at 200mA.
  • J1 has Red and Green LED drives. (GND when true)
  • J7 provides for the REX input if required.

Readers - MARLOK Signaling

UL DID NOT EVALUATE the MARLOK wiring setup and shall not be enabled in a UL 294 compliant system.

J6 has the Clock and Data signals.

J5 has Power (MAR VSOL), the VSOL signal and the Green MAR VLED drive.

Connect access control System reader device to Door Control Device (DCD) board.

Use six-conductor Leader Cable, supplied by Millennium access control Group for Keyloks and Keyreaders (unshielded).

May also use the unshielded Millennium access control Group leader cable with specific Wiegand devices and card readers that do not require SHIELDED cable.

Recommended cable length for Keyreaders and Keyloks is 15 feet–maximum.

Length MUST NOT exceed 35 feet. To avoid interference at this higher limit, must run the cable. Separately—not bundled with other wires.


  • Inputs 1 through 4 are supervising with 1K ohm resistors, a
  • Inputs 5, 6, and 7 are non-supervised, Normally Closed circuits. Input 7 is used for the Door State Monitor (DSM) and can use inputs 5 or 6 for a UPS battery low signal. There is a particular input for the External Tamper. Use any one of the GND Returns for the External Tamper Return.

Relays (Outputs)

J2 and J3 provide the Common (C), Normally Closed (NC), and Normally Open (NO) pins for the two relays.

These Dry relays (Dry = requires external power) are typically used for the Door Latch and possibly an

automatic door opener.

For UL 294compliance, the relays are to be loaded to a maximum of 24VDC, 4 Amps. (Suitable for inductive loads.)

Relays are rated at 10 Amps with PTC thermistor over current protection at 4 Amps.

Use the Suppression Kit supplied with EDCDs to provide strike protection.

Install a diode across the door lock if the power supply is DC to suppress the energy surge. The cathode must be on the positive side of the strike.

If the power supply is AC, install a varistor across the door electric strike.