revision d1 product training & certification browser managed security platform
TRANSCRIPT
Revision d1
Product Training & Certification
Browser Managed Security Platform
Revision d1
What is a network?
Network Bandwidth
IP Addresses & Subnet Masks
Ports & Port Usage
Networking Basics
Browser Managed Security Platform
Planning a Network
Revision d1
Networking Basics
What is a Network?
Network
Internet
WAN side
LAN side
A Network is a collection of devices linked by a common communications infrastructure. The most widely used type is known as Ethernet.
Revision d1
Networking Basics
What is a Network?
A network can be a Local Area Network (LAN) or a Wide Area Network (WAN).
Network
Internet
WAN side
LAN side
Revision d1
Networking Basics
What is a Network?
Networks are often drawn as a pipe, as in a “data pipe” because data flows through it.
Network
Internet
WAN side
LAN side
Revision d1
Networking Basics
What is a Network?
The “cloud” typically represents wide area network components
such as the Internet
Network
Internet
WAN side
LAN side
Revision d1
Bandwidth is the amount of data that can be transmitted through the network (“data pipe”)
Network Bandwidth (Capacities)
Networking Basics
• There are many pieces that make up the network. Generally, there is a PC, network connection, network wiring, network hardware (routers, switches) and if there is external communication, an ISP (internet service provider).
• NOTE: throughput through the network is only as fast as the slowest segment because many factors effect the actual amount of data that can be carried.
Revision d1
Network Bandwidth – SpeedUnderstanding the speeds of
networking
Networking Basics
• Speeds are generally expressed in terms of millions of bits per second as megabit.
• Typical Ethernet networks are 100 megabits.
• Newer Ethernet networks are 1 gigabit and can carry 1,000,000,000 (billion) bits per second.
Revision d1
Typical bandwidth usage by eMerge
Networking Basics
• Network Controller to Expansion Node Programming = 1 megabit per second maximum
• Network Controller to Expansion Node normal operation =25 kb per second maximum
• Network Controller to computer=75 kb per second maximum
Revision d1
Networking Basics
Network
Your Internet connection
Your computer Another computer
325 kilobitoutbound
1.5 megabitinbound
100 megabitsymmetrical
The Internet comes in through a DSL or Cable connection
A typical bandwidth situationThe connection can supply data inbound at 1.5 megabits per second –
good for surfing the web.
The outbound connection is only 325 kilobits per second –
not so good for transmitting video
Revision d1
MAC Address: this is a unique number set at the factory for each Ethernet device. The MAC Address cannot be defined by a user or Network Admin. It is hard- coded.
TCP/IP Address information
TCP/IP Addressing, commonly referred to as IP Addressing is how devices known as Hosts (PC, Server, Router, eMerge) are identified on a Ethernet Network.
The components of IP Addressing;
IP Address: a unique 32-bit binary number that identifies the Host on a network.
Subnet Mask: a 32-bit binary number that identifies which portion of the IP Address is the Network ID and which is the Host ID.
Networking Basics
Revision d1
Lab Exercise: View/Change IP address
Step 1: To change the IP address of the PC we need to open the Network Connections menu in the Control Panel.The Control Panel can be found in the Settings option of the Windows Start Menu.
Revision d1
TCP/IP settings on PC
Step 2: Double Click on Network Connections
Revision d1
TCP/IP settings on PC
The Network Connections window contains defined network connections for this computer. You may have several, but we are only concerned with the Local Area Connection.
Step 3:
Double click on “Local Area Connection”.
Revision d1
TCP/IP settings on PC
Step 4:
• Select the Internet Protocol/(TCP/IP) adapter
• Click Properties
Revision d1
TCP/IP settings on PC
Step 5:
• Set to Obtain an IP address automatically by default.
• Click on the radio button “Use the following IP address”
Revision d1
TCP/IP settings on PC
Step 6:
• Enter the IP address and Subnet Mask.
• Click OK
The Internet Protocol (TCP/IP) Properties window will close.
Click on “OK” on the Local Area Connection window to finish.
Revision d1
TCP/IP settings on PC
< End of Lab Exercise: View/Change IP address >
Revision d1
Ethernet
Workstation 1 Workstation 2
00-21-3A-BF-CD-04 00-21-45-2F-FD-08
02-32-30-00-BB-0124.122.43.21
192.168.0.21192.168.0.20
A MAC Address is PERMENANT
What is a MAC Address?
The MAC Address of an Ethernet device is programmed at the factory and is a unique number worldwide.
A 12 digit hexadecimal number (shown in black) that uniquely identifies an Ethernet Appliance from all others.
Networking Basics
Revision d1
What is an IP Address?
• An IP address is like your telephone number or your home address, each one is entirely unique. Every computer on the Internet has its very own IP address.
• The standard format is four groups of numbers called octets that are separated by periods, and each number is an integer between 0 and 255.
• For example, a typical IP address would look like this: 192.168.0.250
• In order for two devices on the same network to communicate with each other, they must have
the same first three octets (Network ID). In the example above, to communicate to that device, your PC must have the same first 3 octets and a unique 4th octet [192.168.0].251
Networking Basics
Revision d1
Network ID
In the diagram below there are 2 PCs on the same network segment.
The network segment has the IP Address scheme of 192.168.0.X
In this case the Network ID is composed of the first 3 octets of the IP Address.
Networking Basics
Revision d1
Host ID
In the diagram below there are 2 PCs on the same network segment.
The PCs or Network Hosts each have their own Host ID.
In this case the Host ID is composed of the last octet in the IP Address.
Networking Basics
Revision d1
A private address is local to the LAN or WAN of the facility and is determined by the DHCP server on the premises or the Network Administrator of the facility.
Ethernet
Workstation 1 Workstation 2
00-21-3A-BF-CD-04 00-21-45-2F-FD-08
02-32-30-00-BB-0124.122.43.21
192.168.0.21192.168.0.20
IP Addresses come in “public” and “private”
A public address is assigned by an Internet Service Provider (ISP) e.g. Verizon. This is the Internet connection for the facility.
Networking Basics
Revision d1
An IP Address may be DYNAMIC or STATIC
A Static IP Address is assigned by the Network Administrator. The Network Administrator will actually type in the IP Address of the Host device and this IP Address will not expire or change by itself. Usually needed for key network devices such as routers, servers and printers. The eMerge Network Controller will require a Static IP Address.
A Dynamic IP Address is assigned automatically by the DHCP Server of the network. This IP Address can be setup to expire requiring the Host to get a new IP Address from the DHCP server. This method is used in both Public and Private networks.
Networking Basics
Revision d1
Ports and Port Usage
• Ports allow multiple data streams to go to a single address
– Port numbers used by eMerge• 80 is the default for web servers
using HTTP
• 3306 is the default for database servers
• 7262 is for Network Controller auto recognition of nodes
– Routers can restrict which ports are available
– You may need to have the network administrator unblock or allow access on port 7262 for eMerge communication.
eMerge
Networking Basics
Ethernet
Workstation 2
24.122.43.21
192.168.0.21192.168.0.20
www.mycompany.com
Port 80 - web serverPort 3306 - ODBC
Port 23 - TelnetPort 7262 - eMerge
Revision d1
Network Port Usage
TCP Port 69
TCP Port 80
TCP Port 443
Must be open to the Network Controller for the on-board TFTP Server to pass software upgrades to the eMerge Expansion Nodes. This port can be opened temporarily for updates and then closed again.
Must be open to the Network Controller for Browsers to access the eMerge User Interface. The eMerge User Interface may be configured to a different port if using 80 is not possible or desired.
Must be open to the Network Controller for Browsers to access the eMerge User Interface using HTTPS (SSL). This can also be configured to a different port if desired.
Networking Basics
Revision d1
TCP Port 7262
TCP Port 23
Must be open to the Network Controller for communications between the Controller and the eMerge Expansion Nodes. Be sure that this port is open through routers and firewalls for any Nodes on different subnets from the Network Controller. (Communications between Controller and Nodes are authenticated and credential downloads are encrypted for security.
Must be open to the Network Controller using a jumper/wire harness plugged into the Controller for Telnet access
Network Port Usage
Networking Basics
Revision d1
Network Attached Storage (NAS)
• An inexpensive way to share storage across networked systems.
• Makes storage (hard disk or memory stick) available online.
– Unit at right costs less then $150 with internal storage.
• eMerge can use NAS to to automatically store archived Activity Logs and store Database Backups. eMerge can also use an FTP Server for these features.
– Activity Logs are archived as CSV (comma separated value) files.
– Archived Logs cannot be accessed via the eMerge User Interface.
– Archived Logs can be viewed through a 3rd party reporting software.
Networking Basics
Revision d1
Planning a network: Basic configuration - used if there is no pre-existing network
• CAT-5 or greater will need to be used between router and PC & eMerge.
• Determine an IP addressing scheme, ie. 192.168.0.XXX.
• Connect the eMerge Controller to the router.
• Connect your computer to the router.
Router
LAN side
Laptop computer
Networking Basics
Revision d1
Basic network connected to the public Internet
• Same as previous system, but this time you can set:
– DNS server address(es)– Gateway address– Network time server over the
Internet– Cameras over the Internet
* An ISP will be required.
Router
LAN side
Laptop computer
Internet
Networking Basics
Revision d1
Corporate LAN with separate network for security devices
• This configuration isolates security equipment from the rest of the network.
– Need to exercise caution in assigning addresses.
– Note that the router at 192.168.0.24 creates the 192.168.1.x subnet.
– Need to open a port through the 192.168.0.24 router to permit HTTP traffic to the eMerge web server.
Security LAN
Corporate LAN
Internet
Corporate PC Corporate PC
24.11.223.62
192.168.0.x
192.168.1.x
192.168.0.24
Networking Basics
Revision d1
This concludes the networking basics of eMerge Product Training & Certification
Revision d1
Hardware Architecture
Browser Managed Security Platform
Hardware Architecture
Power Requirements
Panel and Circuit Board Layouts
Wiring Readers, Inputs and Outputs
System Overview
Revision d1
IP Network
Alarm
Door LockReader
Portal
654321
Elevator
Security Monitor
Remote Support
Internet
Security Administrator
IP Camera Video Recorder
Analog Camera
Alarm Panel
Temp Probe
IP Camera (PTZ)
Photo ID Camera Photo ID Badge
Printing
System Architecture Overview
Door Lock
Portal
Reader
Temp Probe
Door Lock
Portal
Expansion Node
IP Network
Reader
GateReader
Portal
Controller & Node
Expansion Node
Revision d1
Panel Led operation If the cabinet contains a CONTROLLER/NODE COMBO BLADE the LED states are as follows
Green Steady
Network communication is functioning and external power is on.
Green Flashing
Network communication is functioning and eMerge is using battery power.
Red Steady
Network communication is NOT functioning and external power is on.
Red Flashing
Network communication is NOT functioning and eMerge is using battery power.
If the cabinet contains a NODE ONLY COMBO BLADE the LED states are as follows
Green Steady
External Power is on.
OFFBattery power is on or the system has no power.
Revision d1
Panel layout
Power Supply
Tamper Switch
Controller & Node Combo
Access Blade Input Blade Output Blade Temp Blade
Ribbon cable
Blade Mounting Plate
Cable Tie-down
Power cable
Revision d1
Panel layout
Revision d1
Ribbon cable
Slot numbers are determined by the connector on the ribbon cable that is plugged into the module. The ribbon cable (see diagram below) is a bus and a module’s place on the bus determines the slot number. You will see that it is possible to place a module in physical slot 5 and yet attach ribbon cable connector 6 to the module. If this occurs the module will be in slot 6 on the bus.
Controller/Nodeconnector
Connectors for slots 1 2 3 4 5 6 7
Note: When connecting the modules to the ribbon cable be sure the connector is fully seated in the board
(push on cable do not rely on the tabs on the boards)
Revision d1
Power requirements
IEI eMerge systems must be AC powered using the grounded plug-in transformer provided. Power should come from a circuit with an isolated ground and must be wired to the power supply mounted inside the eMerge cabinet.
Transformer Input: 120 V AC 60 Hz 48W.
Transformer Output: 24V AC 50VA
The IEI eMerge includes a DC power supply. The eMerge power supply provides 12V DC and is rated up to 5A.
The recommended battery which is not included - 12V DC, 7 AH, SLA (sealed lead acid).
CAUTION!!! MAKE SURE ALL POWER IS OFF BEFORE CONNECTING OR DISCONNECTING MODULES IN THE IEI eMerge.
Revision d1
eMerge Hardware Architecture
The eMerge system is composed of a 3-tiered hardware architecture.
1. Network Controller
These tiers are named for the 3 components of the eMerge system.
These components are;
2. Expansion Node
3. Application Module
We will now examine each of these devices and their role in the
eMerge system.
Revision d1
1. PC connects to controller via IP and user programs the controller through the UI
2. Controller connects to Node via IP and downloads the programming done by the user on the controller to the node
3. The node then operates any and all application modules connected via the ribbon cable
4. Activity on application modules is detected by the node and the node reports the activity to the controller
5. Controller reports activity to the user via IP to the PC through the UI, i.e. the activity log
eMerge Hardware Architecture
Revision d1
eMerge Hardware Architecture
The eMerge Network Controller
The Network Controller is essentially a computer.This computer has a LINUX based operating system embedded into the product.
Also embedded into this product is;
POSTGRE SQL Database
Web Server
Security Application Software
Revision d1
eMerge Hardware Architecture
The eMerge Network Controller
The Network Controller has a built in Network Interface with a 2 port switch. The Network Controller is ready to be deployed across an existing LAN or WAN. The Network Controller MUST be programmed with a Static IP address.
The Network Controller is located on what is called the Combo Blade.
Static Address – This is a permanent address that has been allocated to the device by a Network Administrator.
Revision d1
1. The Network Controller is the component that is programmed via a web browser.
2. The Network Controller supports the eMerge Expansion Node.
3. The Network Controller can support up to 32 Expansion Nodes.
eMerge Hardware Architecture
The eMerge Network Controller
Revision d1
eMerge Hardware ArchitectureCombo Blade
The eMerge Network Controller and your 1st Node are located on the same circuit board.
i-button socketCompact Flash Socket
Revision d1
I-Button
Bottom View
Network Controller Node
I-button Socket
The controller I-button comes pre installed.
If additional licensing/features are purchased the I-Button is upgraded remotely.
Hexadecimal number required to update licensing.
Revision d1
eMerge Hardware ArchitectureCombo Blade
Controller LED’sLED 1 NC to NNLED 2 NC to NN SpeedLED 4 NN CountLED 5 N ComLED 6 Blink System OnAmber ConnectionGreen Activity
Node LED’sLED 7 Action on ModuleLED 8 Co-ProcessorLED 10 NN Com to NCLED 11 PowerLED 12 NN to NC SpeedLED 13 NN to NC Activity
Revision d1
Expansion Node only board
eMerge Hardware ArchitectureNode Blade
The Expansion Node allows the eMerge system as a whole to be “expanded” from 1-14 doors at a time per node.
The eMerge EXN is an enclosure with an Expansion Node only board.
The Node Only board is fitted with a single NETWORK PORT.
Revision d1
eMerge Hardware Architecture Node Blade
The eMerge Expansion Node
1. The Expansion Node is the part of the eMerge system that directly connects to and supports the Application Modules (Blades).
2. Each Expansion Node can support up to 7 Application Modules.
3. Each Expansion Node is an Ethernet device which means that it has its own IP address.
Revision d1
eMerge Hardware Architecture Node Blade
The eMerge Expansion Node
The Expansion Node has a built in Network Interface. The Expansion Node needs to be programmed with an IP address. This IP address may be Static, Dynamic or Network Controller provided.
Static – This is a permanent address that has been allocated to the device by a Network Administrator.
Dynamic – This is a temporary address that has been allocated to the device by the DHCP server of the network.
Network Controller Provided – This is a permanent address that has been allocated to the device by the eMerge Network Controller.
Revision d1
Lab Exercise: Initializing eMergeA laptop running Windows XP Pro with IE – 6 or greater will be needed
• Step 1: Setup Hardware– Power up the eMerge panel by connecting 3 conductor wire to the power supply and then to the plug-in
transformer. Connect the transformer to the wall. Next connect the red & black braided wire harness to the NODE side of the Combo board. After 2-3 minutes you will hear a single beep indicating that eMerge is ready.
– Use a CAT5 patch cable to connect the PC to the 2-port switch located on the Combo board.• Step 2: Establish initial connection to eMerge
– Set the laptop to a static IP address of 192.168.0.249 using the TCP/IP adapter.– Launch a browser window on the laptop and connect to emerge by typing in address http://192.168.0.250. This
is the default IP address for eMerge from the factory. You should be connected to the Initmode screen.• Step 3: Turn off Initmode
– In the Time Settings section, enter the current date and time and time zone.– In the Initmode Settings section, change the drop down menu to NO.– Click Save.– Once the Data saved message appears, scroll to the bottom and click the Reboot button.– eMerge will beep twice to indicate the Shut Down process has begun, then after the reboot has completed wait
for the single beep to acknowledge System Ready.• Step 4: Login
– Connect to emerge by typing in address http://192.168.0.250 into your browser window.– Login using: User Name= admin, Password= admin.
<END OF LAB EXERCISE: INITIALZING eMerge>
Revision d1
The Initmode page is where the basic settings for eMerge are maintained. The controller IP address, controller date & time, email server settings and the web server port.
Initmode
Revision d1
Input Module (eMergeINP)The eMerge will refer to this unit as INPUT BLADE
eMerge Hardware Architecture
There are 4 eMerge Application Modules/Blades currently available
Access Control Module (eMergeACM)The eMerge will refer to this unit as an ACCESS BLADE
Output Module (eMergeOUT)The eMerge will refer to this unit as OUTPUT BLADE
Temp Module (eMergeTMP)The eMerge will refer to this unit as TEPERATURE BLADE
Revision d1
Access Control Module (ACM Blade)
Lock (output)
Portal ACM Blade
Revision d1
Access Control Module (ACM Blade)
• Two Wiegand reader connectors– Readers using standard Wiegand output
up to 128 bits are supported.
• Four Supervised Inputs– Door contacts and REX devices.– Standard two wire inputs.– Wide variety of input supervision types.
• Four Form C Relay Outputs– Lock output, door opener, buzzer.– Standard 3 pin normally open or normally
closed dry contact.
NOTE: Inputs and Outputs not used for door hardware can be used for other functions.
2 Wiegand Readers
An ACM blade is capable of handling two doors, or one door with two readers
Revision d1
CAUTION!!! Each eMerge Access module can supply 12VDC@200 milliamps of power per reader. If the reader(s) connected to the ACM Blade draw more than 400 milliamps combined, then an external power source must be supplied to these readers.
Wiring Wiegand Readers
Reader Ports are only found on the Access Control Module (ACM)
Front End Reader Terminal Blocks
Access Control Module
Revision d1
Wiring Wiegand Readers
Wiring Wiegand readers to the Access Control Module (ACM)
+12VDC(red)
-12VDC(black)
D1(white)
D0(green)
RED led GRN
led
BPR control
Pin-out of Front End Terminal Block
Twisted, shielded, 22 gauge cable is required with a maximum run of 500 feet
Revision d1
• 8 standard two wire inputs– Used to monitor door position, REX, etc…
• Supervision Types– Dual Resistor NO or NC
• Four States: Normal, Alarm, Short, Open– Parallel Resistor NO or NC
• Three States: Normal, Alarm, Open/Short
– Series Resistor NO or NC• Three States: Normal, Alarm,
Open/Short– Unsupervised NO or NC
• Two States: Normal, Alarm
Input Module (Blade)
Note: Twisted, shielded, 22 gauge gives you a maximum run of 2000 feet and 1K ohm resistor is used for supervision
Revision d1
Input Blade
Input State Resistance Values Normal 1k Ohms Alarm 0.5k Ohms or 2k Ohms Short 0 Ohms Open No Current
Supervision Types
Revision d1
Input State Resistance Values Normal 0 Ohms Alarm 1k Ohms Open No Current
Input BladeSupervision Types
Revision d1
Input State Resistance Values Normal 1k Ohms Alarm No Current Short 0 Ohms
Input BladeSupervision Types
Revision d1
Input State Resistance Values Normal 0 Ohms Alarm No Current
Input BladeSupervision Types
Revision d1
Input State Resistance Values Normal 1k Ohms Alarm 0 Ohms Open No Current
Input BladeSupervision Types
Revision d1
Input State Resistance Values Normal No Current Alarm 1 Ohms Short 0 Ohms
Input BladeSupervision Types
Revision d1
Input State Resistance Values Normal No Current Alarm 0 Ohms
Input BladeSupervision Types
Revision d1
Temperature Module (Blade)
• 8 Standard two wire inputs.
• eMerge Temperature Monitoring probe (eMergeTMPPB)
• Temperature blade barcode numerals begin with “08.”
Revision d1
Output Module (Blade)
Output devices: Strikes,Mag locks, door closers, sounders, etc…
Eight 3-pin SPDT dry contact output relays
– Standard normally open or normally closed Form C Relays
– Suitable for controlling many strikes, but a step up relay should be used for magnetic locks.
– Requires appropriate suppression: MOVs or diodes
Revision d1
Wiring Outputs
Pin-out of 3-pin Output Terminal Blocks
3-pin Output Terminal Block
Normally Closed (NC)
Common (C)
Normally Open (NO)
The outputs of the eMerge application modules are form C dry contact relays
Relay schematically
Revision d1
Output Relay ConnectorsOutput States
Normally EnergizedNormally Not Energized
Revision d1
Installing a blade
standoff tube
lock washer
Boardgoes down
into slot
Standoff comesflush to flange
1. Power down the eMerge.
2. Thread the standoff tube provided down onto the threaded post on the chassis next to the slot where you will insert the additional module.
3. Be sure that you are grounded and insert the additional module into the slot on the chassis with the ribbon cable connector toward the left of the eMerge cabinet. See diagram below.
4. Place the lock washer provided over the top of the standoff and thread the screw provided through the flange and down into the top of the standoff and snugly down onto the lock washer. See diagram below.
5. Connect the ribbon cable from the Controller/Node module in the topmost slot to the newly installed module. The connector is polarized. Make sure that the center bump fits into the opening for it on the connector on the module. Press the connector firmly into place until you hear the click of the extraction levers snapping into vertical position. You may have to press the extraction levers into full vertical position before you will hear the click.
Revision d1
Wiring battery and power to controller
Batteryinput3-pin
Power supplyinput2-pin
Processor
pin 2ground
pin 1+12V DC
pin 1+12V DC
pin 3ground
The power supply is pre wired to the
network controller.
Note: Do Not connect Battery to power supply board. Connect to the
controller board
Revision d1
The Portal
Portals are an access or an egress point. They can be a door, gate, turnstile, locker, etc… It combines all the inputs and outputs associated with granting access or locking the access point. All of the readers, inputs and outputs must be created before they can be added or referenced in a portal.
Revision d1
Lab Exercise: Enable valid access of a card holder
• Step 1: Connect the Reader– Connect the reader to the ACM blade into reader position #1. Depending on the type of reader, you may or
may not need to connect the red led wire.• Step 2: Setup a Reader
– Select Setup : Site Settings : Network Nodes– On the Blades tab, click the Access Blade link.– In the picture of the Access Blade, click the icon for the 7-pin reader connector in Position 1.– In the popup Reader/Keypads window complete the following fields:
• Name: Main Lobby Reader• Enabled: place a check• Network Node: select “Training Node”• Reader/Keypad Type: “Wiegand Card Reader”• Click Save
• Step 3: Setup a Door Lock– On the picture of the Access Blade, click the icon for the 3-pin outputs Position 1.– In the popup window complete the following fields:
• Name: “Front Door Lock”• Enabled: place a check• Network Node: select “Training Node”• Default State Code: “Not Energized”• Click Save
Revision d1
• Step 4: Define a Portal– Select Setup : Access Control : Portals – Enter the following information:
• Name: Main Lobby Portal• Network Node: select “Training Node”• In the Unlock/Request-to-Exit (REX) section
– Lock: Main Lobby Lock• In the Card Readers/Keypads section
– Reader 1: Main Lobby reader• Click Save
Revision d1
• Step 5: Define Credential Format• Select Setup : Access Control : Card/Keypad Formats • Select the “26 bit Wiegand” record (it should at the top of the list); click the rename link under the Name
field and change the name to “Wiegand 26 FC 11”.• Make sure the Bit Length is “26”• Make sure the Facility Code is “11”• Click Save
Revision d1
• Step 6: Setup an Access Level• Select Setup : Access Control : Access Levels • Complete the following fields:
– Name: “General Access Level”– Enabled: Place a check– Readers: “Individual” / “Main Lobby Reader”– Time Spec: “Always”
• Click Save
Revision d1
• Step 7: Add a Person– Select Administration : People : Add– Enter your last and first name in the name fields– Click the Next button
Revision d1
• Step 8: Assign a Card– In the Access Control tab insure that “<add new>” is selected in the Access Cards list box and the Card
Format is “Wiegand 26 FC 11”.– Click the Read Card button.– Click the Go button in the popup window and the prompt “waiting for card read: xx seconds” will appear.– Pass a credential over the reader and it should read it and fill in the Hot Stamp # and Encoded # fields.
• Step 9: Assign an Access Level– In the Access Levels section move the “General Access Level” from the Available to the Selected list.– Click Save.
• Step 10: Test Access– Select Monitor : Activity Log– Pass the credential you assigned over the reader.– The Reader LED should turn green momentarily and you should hear an output relay click indicating that the
lock output has operated successfully.– The Activity Log should show that access has been granted for that person.
<END of Lab Exercise: Enable valid access of a card holder>
Revision d1
Database (System) Backups
The database configuration of your eMerge should be backed up if you make changes to the setup, add or change personnel security records, apply a software service pack or upgrade your software level. As of version 3.0 any configuration changes and person records saved are written to ROM as well as RAM. So if you loose power you do not loose any changes since the last backup.
NOTE: Backups remain on the compact flash until they are deleted.
Revision d1
Email Address
eMerge may be configured to send email notifications of alert conditions. The Email Server used to send email indentified here should be set up by the network administrator so it will recognize the Network Controller’s email address.
Revision d1
Setting a Threat Level
Threat Levels may be activated either by accessing the Set Threat Level page and selecting the desired threat level or by creating an event action that sets the threat level. Threat level ranges may be setup in Threat Level Groups and may be used to increase access requirements. This may be done by assigning a Threat Level to Portals and Access Levels.
Revision d1
End of eMerge Product Training & Certification