EntraPass 8.40 SE Administration Guide
EntraPass 8.40 SE Administration Guide
Guide
D29011093R001
D29011093R001
2 EntraPass Special Edition Administration Guide
Contents
Privacy notice................................................................................................................................................ 17
Contents
Copyright............................................................................................................................................ 17
Release Notes 8.40....................................................................................................................................... 18
Product security advisory................................................................................................................. 18
Cybersecurity improvements........................................................................................................... 18
Video server connections use HTTPS protocol..................................................................................... 18
KT-2 Two-Door Controller................................................................................................................. 18
Technical support......................................................................................................................................... 19
How to........................................................................................................................................................... 21
How to create a backup.................................................................................................................... 21
How to create a badge...................................................................................................................... 21
How to create a card......................................................................................................................... 21
How to create a schedule................................................................................................................. 22
How to create a simple report......................................................................................................... 22
How to create an access level.......................................................................................................... 22
How to print a list of cards............................................................................................................... 22
How to print a list of access levels.................................................................................................. 23
How to print a list of doors.............................................................................................................. 23
How to set up desktops.................................................................................................................... 23
How to use shortcut keys................................................................................................................. 23
How to set up the ioSmart............................................................................................................... 24
How to configure an ioSmart reader on the operation tab................................................................ 24
FAQ................................................................................................................................................................. 26
Introduction.................................................................................................................................................. 27
What is EntraPass?............................................................................................................................ 27
Kantech Advantage Program (KAP)....................................................................................................... 27
Kantech IP Link......................................................................................................................................... 27
KT-100, KT-200, KT-300, KT-1, KT-2, and KT-400 controllers................................................................ 27
KT-400 controller...................................................................................................................................... 28
Expansion modules for the KT-400........................................................................................................ 28
Kantech ioSmart card reader................................................................................................................. 28
Kantech Telephone Entry System.......................................................................................................... 28
Express setup........................................................................................................................................... 28
Elevator control capability...................................................................................................................... 29
Integrated badging.................................................................................................................................. 29
Interactive floor plans............................................................................................................................. 29
Configurable desktops by operator....................................................................................................... 29
Interfacing with external alarm panels................................................................................................. 29
In/Out feature.......................................................................................................................................... 29
Visual diagnostics..................................................................................................................................... 29
Enhanced video integration.................................................................................................................... 29
Copyright
© 2021 Johnson Controls. All rights reserved. JOHNSON CONTROLS, TYCO, and KANTECH are
trademarks of Johnson Controls.
Cybersecurity improvements
To improve the security of EntraPass, the following updates are available with version 8.40.
• You can use the KT-2 to control the entry of two doors or to control the entry and exit of one
door. It replaces the KT-300 which is due to reach its end-of-sale date.
• When used with EntraPass, the KT-2 has Wi-Fi compatibility.
• The KT-2 is compatible with all of Kantech's existing controllers, including the KT-1 and the
KT-400, and the KT-MOD-IO16 expansion module.
• The KT-2 integrates with the following devices:
Result
For more information about configuring backups, see Backups.
Note: If you activated enhanced user management, see Issuing a new card in enhanced user
management environment.
Result
For more information about defining holiday, see Holiday Definition.
1. On the EntraPass workstation, click the Devices tab, and click Controller.
2. From the Controller list, select a controller, and click on the ioSmart tab.
3. Click +Add to add an ioSmart reader to the controller.
4. In the Serial number field, enter the ioSmart reader's serial number.
5. From the Door list, select the associated door.
6. If the ioSmart reader includes a keypad, select the Keypad check box.
7. Click Terminals to configure the ioSmart reader's inputs and outputs.
8. In the Setup terminals window, in the I1 and I20 panes, select the terminal functions.
- Disabled
- Single input
- Dual input
- Lock output
- Relay
Note: You can configure I1 and I2O for a maximum of four inputs, using both I1 and I2O
in dual inputs mode, or for two inputs and one output, a lock output or a relay.
9. Click the KT-1/KT-2 or the KT-400 tab, and, from the RS-485 baud rate list, select the
appropriate baud rate for your system.
10. In the Reader template field, click the Three dot icon, and select a reader template.
11. To configure the reader template, on the EntraPass workstation, click the Devices tab, and
click Reader template.
• Kantech IP Link
• Express setup
• Integrated badging
• In/Out feature
• Visual diagnostics
• Vocabulary editor
What is EntraPass?
EntraPass is a comprehensive menu-driven access control software package. The access control
system includes components such as door readers, exit detectors, and motion detectors that
are professionally installed and electronically controlled. Use system workstations to perform
operations such as acknowledging alarms, modifying the system database, and receiving event
messages. A supporting advantage of access control is that all system events are carefully archived
and can be retrieved easily for inspection purposes.
Kantech IP Link
EntraPass is compatible with the Kantech IP Link which provides an Ethernet connection that serves
as a polling device that controls the excess bandwidth by communicating to the system only when
necessary. The Kantech IP Link’s main function is to relay information between the controllers and
the gateway.
KT-400 controller
The KT-400 is a four-door Ethernet encrypted controller that you can use as a door controller and as
an IP communication device for a remote site loop.
• KT-MOD-REL8: This is an 8-relay expansion module used as general relays or elevator control
outputs. The module supports daisy chaining which can add up to 32 KT-MOD-REL8 modules
for a total of 256 external relays for each KT-400 controller.
• KT-MOD-INP16: This is an input module that adds up to 16 zones to the KT-400 controller.
The module supports daisy chaining; you can interconnect up to 15 KT-MOD-INP16 modules
for a total of 240 external inputs for each KT-400. Adding the 16 onboard inputs of the KT-400
gives a total of 256 inputs for each KT-400.
• KT-MOD-OUT16: This is an open drain to 12 VDC 16-output module. You can use it for
elevator access control (which may require additional hardware). The module supports daisy
chaining; you can interconnect up to 16 KT-MOD-OUT16 modules for a total of 256 external
outputs for each KT-400.
Express setup
Installers can use the express setup program to automatically define and configure standard
system components. This saves installation time and prevents setup errors. With express setup, the
system is fully functional and ready to test the hardware and wiring before the installer makes the
customized changes necessary for a particular site.
Integrated badging
The integrated badging feature in EntraPass allows users to design and print badges. Pictures and
signatures can be imported or, with the necessary devices, captured and incorporated into cards
for printing badges.
In/Out feature
Operators can use the In/Out feature to print or download time sheets in a CSV format to a payroll
system.
Visual diagnostics
In EntraPass, you can see a visual representation of the system devices, with conditions updated
in real-time, including high resolution floor plans that you can import and display. You can add
interactive system buttons to the graphic to display component statuses in real-time. You can
perform manual operations from the real-time system graphic.
Vocabulary editor
Use the vocabulary editor to translate the EntraPass software into up to 99 languages. By default,
EntraPass is available in English, French, Spanish, German, and Italian.
Note: Ensure that all operating systems have their latest service packs and updates.
Note: Perform software installations with administrator rights.
Ensure that you install the EntraPass software on a computer that meets the following minimum
requirements:
Additional requirements
For several applications, you can use the following devices:
System installation
1. Before you begin the installation, close all EntraPass applications.
2. Insert the software USB flash drive into a USB port, or the CD-ROM into the CD-ROM drive. If
your computer is configured to autorun, the installation program starts automatically. If the
installation program does not start automatically, click Start, click Run, and, in the field, enter
D:\Setup.exe (D: is the CD-ROM drive).
3. From the Choose setup language list, select a language. English is selected by default.
Note: You cannot change the setup (InstallShield) language if you need to perform an
EntraPass update or install system components with a different language. To change the
setup language, you must remove and re-install the software.
The system and database language depends on the language you select when installing
the software. For example, if you select English, it is the system default language at start
up. You can change the system and database language in the EntraPass Workstation.
4. Click OK. The Welcome window displays.
- See the software version you are about to install in the upper left of the window.
- To verify or modify parameters you have set up, navigate between the installation
windows by clicking Back or Next.
- You can cancel the installation at any time.
- Install Server, Database and Workstation : Select this option to install the EntraPass
Special Edition system. It is greyed out if the application is already installed on the
machine.
- Update Installed Applications: This option is greyed out if the system has not been
installed previously. To update your EntraPass system, see Updating EntraPass.
7. Click Next.
8. In the Serial Number window, enter the serial number for the EntraPass Special Server or
Software. The information is located in the CD-ROM pocket. Make sure to enter the correct
digits. The Next button activates only if the serial number is valid.
- To change the directory, click Change. In the Choose Folder window, select the new
installation directory.
- Type the destination directory or double-click the directory structure to find the
destination directory, and click OK. In the Choose Destination Location window, the
path to the directory updates.
Basic functions
Use this section to find information about the following basic system operations:
• Finding components
• Using the extended selection box
• Selecting components, a specific folder, a connection or a gateway
• Printing lists or reports
• Viewing links between components
• Calling the system tree view
Finding components
About this task:
To search for a component or a card in the system database, use the find a component search
function.
There are two types of find a component window: access one type on any EntraPass window
toolbar, and access the other type on the toolbars on any of the windows that relate to users,
including card, visitor card and daypass.
The following table lists the find a component search icons and their functions.
Click the Details icon to search for the picture that corresponds to the card you
search for.
Click the Index icon to select which criteria you want to search, for example, card
number, email or card information fields.
- Start with: the list of results includes all of the components that start with the
keyword you enter, in alphabetical order, and includes all other components in the
database.
- Begin with: the list of results includes only components that start with the keyword
you enter.
- Contains: the list of results includes all of the components that contain the keyword
you enter.
4. Optional: When you search for cards, the default search criteria is card user name. To change
the search criteria, on the left of the Search field, click the Index icon and select which criteria
you want to search, for example, card number or email.
5. Optional: When you search for cards, to search for the picture that corresponds to the card
you select, click the Details icon.
6. Click the Find icon.
7. From the list of search results, select the component that you want to display.
8. Click OK. The component that you select displays in the window where you initiate the search.
- Contains
- Starts with
- Ends with
- Exact words
- Selected
Selecting components
About this task: Operators can use the component selection function to select one or more
system components.
6. Click Print.
Note: If there is no printer configured for the computer, an error message appears.
1. In any EntraPass window, select a component and click the View links icon. All the
components that are associated with the selected component display. For example, on the
EntraPass workstation, click Definition and click Schedule. From the Schedule list, select
Always valid, and click the View links icon. The system displays a list of all the menus in
which this schedule is used.
Note: In the highlighted example, the always valid schedule is used as the REX schedule
in the door definition menu. You can right-click an item to select a category. For
example, if you right-click and select Access levels, only the access levels in which this
schedule is defined are displayed.
2. To view the links of the selected door with other components of the system, select the door
and click the View links icon again. All system components that are associated with the
selected door appear. In this example, the door is used in the administrator access level;
users that are granted this access level are allowed to access the selected door.
3. To print the list of links for the selected component, click Print.
Floating windows
Use the Floating window button to move a window outside of the workstation. The Floating
window button is located to the left of the Minimize button on windows that support the floating
window function. To return the window to the workstation, close it and reopen it. No information
about the window’s position is kept by the system.
Figure 2: Floating window button
Deleting an item
To delete the currently selected record, click the Delete icon. To protect against accidental deletion,
a warning displays and you must confirm that you want to delete the item.
• Deleted components
• Component links deleted
• Child component links deleted
When a component is deleted, all links with other items are deleted. However, the archived records
are kept in the database after an item is deleted.
EntraPass toolbar
EntraPass windows display a selection of the following toolbar icons to provide quick access to
system functions.
Table 4: EntraPass toolbar icons
Icon Description
Click the New icon to add new items, such as connections, schedules and
controllers, to the system database.
Click the Save icon to save all of the information you have entered since the last
save. Information saves directly in the system.
Click the Save As icon to save all of the information of an existing component
under a new name without affecting the original component. If you use this
option while issuing a card, you can create a new card or save under a new card
number without having to modify the information of the original card.
Click the Delete icon to delete the currently selected record. To protect against
accidental deletion, a warning displays and you must confirm that you want
to delete the item. When a component is deleted, all links with other items are
deleted. However, the archived records are kept in the database after an item is
deleted.
Click the Print icon to print information. Depending on which window you are
working in, you can print items such as reports or card lists.
Click the Parent icon to display your search in a hierarchy or, according to the
menu you are in, to divide searches by gateways, connection, and controller.
This icon is useful when the system database increases in size as you can find a
specific item by selecting its parent items.
Click the View links icon to view all instances of an item in other menus. For
more information, see Viewing component links.
Click the Find icon to search for a specific item or component in the system
database. For more information, see Finding components.
Installers and system administrators can click the Express Setup icon to
configure system devices by assigning default settings.
Click the System tree view icon to display the components list in a hierarchy.
You can select or deselect the components displayed in this window.
Right-click Right-click to access a shortcut menu and select specific commands depending
on which window is open.
Note: Toolbar icons for features that are not activated are automatically hidden from view.
Express setup
Use the express setup to configure system components, such as sites and controllers, and devices
associated with these components, such as doors and inputs. This utility reduces programming to a
minimum, allowing the installer to test the installation and system components.
Use the express setup to configure a connection or to define controllers associated with a
connection. When used to configure a connection, installers can associate the connection with
a gateway. Installers can configure the connection rapidly, giving minimum configuration
information about the controllers connected to it.
To start Express Setup, go to: Start > All Programs > EntraPass Special Edition > Express Setup or,
in any appropriate EntraPass window, click the Express Setup icon.
Note: You must log on to the workstation when you start Express Setup. As the program
allows you to modify the system devices configuration, you must authenticate yourself before
proceeding with any modification.
- Display menu : only the menu bar appears. No buttons are displayed. Right-click the
work area to modify the properties.
- Display toolbar : the menu bar and the toolbar are displayed.
Alarms Desktop
The Alarms desktop is used to view and to acknowledge alarm events. Alarm events are defined
in the Event Parameter menu (System > Event Parameters). Any event can be defined as an alarm
event. Alarm events require operator acknowledgement and are displayed in the Alarms desktop.
A schedule must be defined for all alarms (System > Event parameters, Alarm settings). When an
alarm is generated during a valid schedule, operators have to acknowledge the alarm. Alarms are
displayed with date and time, alarm description, details, instructions (if defined) and associated
graphic or video clip. New events are added at the bottom of the Alarm desktop unless you have
setup the list to display in descending order (in the Alarm Desktop Properties dialog).
- Display on new alarm: When you select this check box, the following actions can
occur:
- Message screen: This window allows operators to view and acknowledge alarms
that have an “acknowledgement schedule” selected in the Event Parameters
definition menu (System > Event Parameters > Alarm settings) or to display the
auto-acknowledge button configured in the Operator dialog (System > Operator >
Privileges).
- Instructions screen: This window displays the instruction that is linked to the event
to be acknowledged (i.e. call the police, send a message to a client application,
etc.). Instructions are defined in the System > Instructions. Then after, they may be
associated with events.
- Graphic screen: This window will display the location of the alarm being reported (if
graphics are defined in the system). For more information on assigning graphic, see
Graphics Definition.
- Trigger destination: Alarms are sorted by their order of arrival. This the default
sequence. The window scrolls to the end each time a new alarm is displayed.
- State: Alarms are sorted according to their status (acknowledged, to be
acknowledged or flagged). When you use this option, you interrupt the normal
scrolling of events. Select “sequence” to go back to the default display.
- Date and time: Alarms are sorted according to the date and time of their arrival.
- Event: The Event messages column is sorted in alphabetical order, grouping identical
events. For example, all Input in alarm events are grouped.
- Priority: Events are sorted by priority (as defined in Event parameter).
4. You may right-click anywhere in the window to enable the Properties window from which
you can enable alarm status buttons:
5. Select the Manual / Automatic buttons to toggle the acknowledgement method (automatic or
manual). Only operators who are assigned this feature in the Operator Definition menu can
use this option. For more information, see Operators Definition.
Note: The Manual / Automatic acknowledgement option is only available through the
Alarms Desktop. When the operator logs out, it will return to “manual” by default.
1. Define a desktop and customize it as an alarm desktop: For this, you have to check the
items of the Alarms desktop section.
2. Check the Display on new alarm option so that operators can automatically view new alarms
without having to open the alarm desktop and secondary windows associated with it.
Note: If this option is selected when defining a Filtered message desktop for instance
and if the desktop button is selected, the filtered message desktop will be displayed (the
background colour of its button turns blue), but the windows below the Display on new
alarm section will not be displayed; they are only displayed when a new alarm occurs.
If those windows are displayed (on new alarm), clicking the “X” in the top right hand
corner of one of them will close all the open windows. If Display on new alarm is not
checked, the alarm desktop and all its secondary windows will be displayed on call (that
is, when the alarm desktop is selected).
3. Click OK and Go for your configuration to take effect immediately.
Acknowledging Alarms/Events
Usually, operators have to acknowledge receipt of an alarm condition (event—such as intrusion,
input in alarm, etc.) by responding in ways such as clicking the acknowledgement button. In
EntraPass, operators acknowledge alarm messages from an alarm warning box or from the Alarms
desktop window.
Acknowledgement options are setup in the EntraPass application definition (Devices > EntraPass
application > Alarm tab, Acknowledgement parameters). Events that require operator
acknowledgement are defined in the System > Event Parameters.
Note: If the component that is in alarm is assigned to a video view, the video view or video
recording is automatically displayed when an alarm occurs.
Automatic Acknowledgement
Alarms can be automatically acknowledged without operator intervention. This option is enabled in
the Operator definition menu (System > Operators > Privileges, Auto acknowledge).
Note: In order for the Manual button to display on the Alarm Desktop window, it is important
to close the EntraPass session and reopen it after you have selected the Auto acknowledge
option.
Only operators granted the appropriate access privilege should be using this option. If the
Automatic acknowledge feature is used, the alarm message box is not displayed; therefore,
it will not be possible to suspend alarms. If this option is enabled in the Operator definition
menu, the Manual button is added to the Alarms desktop. This button toggles between
Manual and Automatic acknowledgement.
- Click the Acknowledge button to acknowledge the displayed alarm event. The red
status button turns green once an alarm is acknowledged.
- Click the Suspend button to suspend alarms while doing other operations in the
system. The alarm will be suspended for the delay time specified in the EntraPass
application definition menu. Once the suspended alarm delay time expires, the
system prompts the operator to acknowledge the alarm.
- Click the Re-visit button if you want to acknowledge an alarm message, and if you
want to identify it for future reference. A flagged alarm is identified by a yellow
button.
- Click theMutebutton (speaker button) if you want to stop the alarm sound.
Note: The Acknowledgement required message box will be presented in a
format without the Instructions window if there are no instructions associated
with the alarm message.
If the component that is in alarm is assigned to a video view, the video view or
video recording is automatically displayed when an alarm occurs.
Note: This process will occur each time a workstation have a communication failure with the
server.
1. Select the alarm event you want to acknowledge (one that has been flagged, for instance),
right-click to enable a shortcut menu.
2. Select Acknowledge from the sub-menu. The status indicator becomes green.
Note: To tag an alarm message for specific purposes, select the alarm event you want
to identify; right-click and select Flag from the sub-menu. You can also click an alarm
message until the colour of its status indicator changes to the desired colour.
• Select Use message desktop selection to display the same events defined for the selected
desktop.
• Select View Operator to view the desktop event selection for the logged on operator read-
only mode.
• Select Edit Operator to modify the desktop event selection for the logged on operator.
• Select Assign Operator to assign one or more desktop events to another operator.
Note: Changes made to desktop events only affect new events. Existing events on the
list will remain unchanged.
- Small buttons : If this option is selected, small components’ buttons are displayed
with no descriptive text. This option can be appropriate for operators who are familiar
with EntraPass buttons and do not need an additional description.
- Large buttons with images : Icons are displayed with their description.
4. You can enter a text string that will be used for searching specific archived messages (when
applicable).
5. In the combo-box, select the custom report you want to generate. The list of available
reports corresponds to your security level.
6. After selecting the report, a Date and Time window will pop up requesting a reporting date
and time period.
7. Enter Start and End date and time or click the calendar button to open the calendar and
select the start and end dates, and then type in the start and end times.
8. Check the Clear Screen Before Process Request box in order to clear the Custom Report
message list of the previous search results.
9. Click OK . The status indicator light located at the bottom left of the screen will change from
green to blue to indicate a custom report is being generated. It will turn green again when
the data transfer will be completed and the data will be displayed according to the criteria
you have selected.
1. Right-click an entry in the Custom Report Desktop window. A contextual menu will pop up.
2. Select Report State . The Report State dialog will open displaying report generation
information.
3. When the report is finally generated in the Desktop window, the information in the Report
State dialog will disappear. Click Close .
- Multi-line: Usually, events are displayed on a single line. You can increase the line
spacing between events by checking the appropriate option (1, 2, 3 or 4 lines).
- Show columns: You can choose to display different types of buttons beside each
event.
- Message type: When you select this option, the system inserts an button
next to events indicating the type of event. For example, if the event is a
“door forced open” an button representing a door is displayed (a hand
represents a manual operation, a diskette represents the operation that
modified the database, etc.). Access events are represented by the login /
logout buttons.
- Picture: When you select this option, the system inserts a card button next to
events containing cardholder pictures.
- Fail-soft messages: When you select this option, the system displays a plus
(+) sign next to the events that occurred when controllers were off-line.
- Video: Check this option if you want the selected desktop to display video
data from the video server connected to your system.
- Display account: On the bottom left, check Display account. The desktops
window now displays the Account column with the corresponding event for
each account.
- Keep card picture: When selected, the system keeps the latest card picture (if
the Picture window option is selected) until another event containing a card
occurs.
- Display toolbar: Displays / hides the toolbar on the top of the Message
desktop.
- Manual properties save only: When you select this option, you have to click
the Save button (once selected, the button is disabled). The system saves all
the settings defined in the Properties window as well as the position of the
window within the Messages Desktop.
- Display selected messages (full): When you select this option, a smaller
window is added at the bottom portion of the Message window. It displays
the selected event with its full description. This feature is very useful when
your Message window is too small to display the entire description of an
event.
- Display events in bold: Select this option to increase the legibility of text
event messages displayed in EntraPass desktops (Message list, Filtered
messages and Alarm desktops). Moreover, if the colour selected for an event
message is the same colour as the background colour, the event message will
be displayed in black bold so that it can always stand out (this option is not
available for Archived Messages list).
- Last Message on Top: By default, event messages are displayed in ascending
order of occurrence, with the area at the bottom of the screen reserved for
the highlighted event. You can select to display the events in descending
order, with the highlighted event showing above the list of event messages.
- Auto-scroll delay (mm:ss): Will automatically start scrolling the message list
after a pre-set delay when the operator selects an item in the list. By default,
this option is turned on with a preset delay. You can select to turn this option
off which means that the operator will have to click the Restart Scroll button
in the Messages list (this option is not available for Archived Messages list).
- Message background colour: Allows the operator to modify the background colour
of the message window.
- Display event colour in separate column: Event colours can now be displayed in a
separate column. Text and message background colours can also be selected.
Note: To change the font colour of system messages: System > Event
parameters.
Graphic desktop
Use the Graphic desktop to display the graphical location of an alarm occurrence. To enable this
function, you must define the graphic in the system. For more information, see Graphics Definition.
A graphic corresponds to a secured area on the system where the following components are
located on a connection: EntraPass application, controllers, inputs, and relays. With a graphic,
operators can view the exact location of a component installed on a connection, or the status of
components and devices. For example, area groups, areas, doors, contacts, motion detectors,
and controllers, assigned to the graphic. If you have defined muster reporting, and an emergency
occurs, graphic icons indicate when all employees have vacated the area. Operators can perform
manual operations directly from the displayed component, for example, to lock or unlock a door. To
define interactive floor plans, see Graphics Definition.
The following table describes the icons that display on the graphic.
- To adjust the display size of the selected graphic, click Fit to screen, Design size or
Picture size.
- For the system to display a message indicating the cause of the communication loss
in case of communication failure, select Auto result. If Auto result is not selected,
operators will have to manually request the results for the component by using Show
result .
Note: If you configure a desktop as a message screen and a picture screen, two windows are
displayed simultaneously when you select the desktop.
1. Select the first desktop. By default, all system events are displayed in ascending order with an
area at the bottom of the screen that displays the selected event in the list.
Note: You may change the message colour: System > Events parameters. You may
also change the events display order; see Customizing Event Display in the Message
Desktops.
2. From the Message list screen, you may change the sorting criterion by clicking on the
Sequence drop-down list. You may choose to sort by:
- Sequence : Events are sorted according to the normal sequence (default). New events
are added at the bottom of the window (This option is not available for Archived
Messages list).
- Date and time : This sort order interrupts the normal scrolling of events. This feature
is useful when you want to know when an event was generated. This time may be
different from the “normal sequence” for dial-up sites for instance or after a power
failure.
- Event : When selected, the system sorts the Event message column in alphabetical
order, grouping identical events. For example, all Input in alarm events are grouped
together in alphabetical order.
- Message type : When selected, the system sorts the Event message column in
alphabetical order, grouping similar events. For example, all Connections events are
grouped together in alphabetical order.
Note: To go back to the default display, select Sequence from the Sequence
drop-down list.
3. Clicking the Text filter button (top left of the window ) will open the Text filter dialog that
allows to enter a key word to display all the events that contain that keyword in the Message
list. In order to avoid delays, select the Suspend Refresh checkbox. This way, the Desktop
Message List will not use the Text Filter field while events are displayed live. To close the
Text filter dialog box, click Cancel or the Windows closing button (X).
4. To return to the normal display of events in the Messages list screen, click the Text filter
button.
- Multi-line: Usually, events are displayed on a single line. You can increase the line
spacing between events by checking the appropriate option (1, 2, 3 or 4 lines).
- Show buttons: You can choose to display different types of buttons beside each
event.
- Message type: When you select this option, the system inserts an button
next to events indicating the type of event. For example, if the event is a
“door forced open” an button representing a door is displayed (a hand
represents a manual operation, a diskette represents the operation that
modified the database, etc.). Access events are represented by the login /
logout buttons.
- Picture: When you select this option, the system inserts a card button next to
events containing cardholder pictures.
- Fail-soft messages: When you select this option, the system displays a plus
(+) sign next to the events that occurred when controllers were off-line.
- Video: Check this option if you want the selected desktop to display video
data from the video server connected to your system.
- Keep card picture: When selected, the system keeps the latest card picture (if
the Picture window option is selected) until another event containing a card
occurs.
- Display toolbar: Displays / hides the toolbar on the top of the Message
desktop.
- Manual properties save only: When you select this option, you have to click
the Save button (once selected, the button is disabled). The system saves all
the settings defined in the Properties window as well as the position of the
window within the Messages desktop.
- Display selected messages (full): When you select this option, a smaller
window is added at the bottom portion of the Message window. It displays
the selected event with its full description. This feature is very useful when
your Message window is too small to display the entire description of an
event.
- Display events in bold: Select this option to increase the legibility of text
event messages displayed in EntraPass desktops (Message list, Filtered
messages and Alarm desktops). Moreover, if the colour selected for an event
message is the same colour as the background colour, the event message will
be displayed in black bold so that it can always stand out (this option is not
available for Archived Messages list).
- Last Message on Top: By default, event messages are displayed in ascending
order of occurrence, with the area at the bottom of the screen reserved for
the highlighted event. You can select to display the events in descending
order, with the highlighted event showing above the list of event messages.
- Message background colour: Allows the operator to modify the background colour
of the message window.
Note: To change the font colour of system messages: System > Event
parameters.
• Deleting messages
• Viewing card information
• Validating card status and card transaction
• Modifying the desktop properties (such as display options), etc.
• Play, edit and export video recordings
- New message filter: This option displays the Message filter dialog to define new
message filters (see Message Filters Definition for more information).
- Edit message filter: This option displays the Message filter dialog to edit an existing
message filter (see Message Filters Definition for more information).
- Delete all: This option allows an operator to delete all the events displayed.
- Card : This menu items offers two choices: View card transactions and Search
card. Select View card transactions to display all access information related to the
cardholder who has triggered the access event. The Search card shortcut allows you
to browse the card database and to display information about all the card numbers
associated with this specific card user name from the View card information window.
From this window, operators can perform a variety of tasks including viewing and
validating information contained on a card, such as the card number, cardholder
name, card state (valid or invalid), card type, etc. They can also select a card and view
its transactions or view and validate a card access. For details about validating card
holders’ access and last transactions, see Validating Card Access.
Result
• Video recording: This menu items offers two options: Play and Play/Edit/Export. Selecting
Play allows users to play the video event in the Playback window, offering options to snap
(copy) it and save it for future use. Selecting Play/Edit/Export offers users features similar to
the ones in the Video Event list. Operators can then display details about the event (camera,
server, comment field) and camera information, etc. The video event can also be played and
exported.
Note: If camera buttons are not displayed, simply right-click a video event message,
select properties from the shortcut menu, and check Video in the Show buttons section
of the Properties.
• View parent: Displays the parent of each component related to the selected event.
• Edit: This feature offers you the ability to edit each component associated with the selected
event. If Edit is selected, a shortcut menu displays components associated with the selected
event. In this example, the connection definition modified event involves the EntraPass
application, the operator who was on duty when the event was generated and the connection
related to the event. It is now possible to edit any of the three components by selecting it
from the shortcut menu. If the selected event is an access event and if the card that triggered
the event has already been registered in the system, it will be possible to edit the card.
However, if the card is associated with an Access denied - card unknown event, the card will
be created and registered in the system.
• Audit, select one of the following options:
- Application: select this to open the Audit window to view who make changes, and
when the changes occurred on the component.
- Operator: select this to open an audit window to view the operator component tht
generated the message event. For example, any change under the function system for
operator, name, security level, and workspace. In the absence of an modification to
the selected compoenent, the otpion is not available.
- Card: select this to open the Audit window to view who made changes, and when the
changes occurred on the card.
• Send to back: This option only works when the window type is set to floating. It sends the
active window behind the main application window. To bring back to front, right click the
desktop button, then select Bring to front.
• Help: Displays the EntraPass Online Help.
• Properties: This menu item enables users to modify the display properties for the selected
desktop.
• Select View Operator to view the desktop event selection for the logged on operator in read-
only mode.
• Select Edit Operator to modify the desktop event selection for the logged on operator.
• Select Assign Operator to assign one or more desktop events to another operator.
Note: Changes made to desktop events only affect new events. Existing events on the
list will remain unchanged.
Picture Desktop
If you selected Picture screen when defining the Message desktop, it will be displayed with the
Picture window. Access events are displayed with the card holder’s picture if you have set the
appropriate display option in the Message filter definition (System > Message filters). For details,
see Message Filters Definition.
- Design size : The card holder’s picture will be displayed with its original size.
- Stretch : This option stretches the picture to the window size without maintaining
proportions. The picture may appear distorted.
- Stretch ratio : This option stretches the picture to the window size while maintaining
proportions.
- Door : The door where the card was presented will be displayed above of the card
holder’s picture .
- Event : The event message will be displayed .
- User information : The User information field will be displayed above the picture.
- Comment : If this option is selected, a comment field appears below the card holder’s
picture. The comment entered when defining the card appears in this field.
Note: If a door is associated to a cell (photo) and the Door option is selected (
Display selected fields ), the name of that door will be displayed in blue instead
of the usual black colour.
1. Select the desktop you want to customize, right-click and select Properties in the menu to
open the Desktop properties dialog.
2. From the Desktop name field, assign a meaningful name to the desktop you are configuring.
3. Select the window type:
- Floating window : A floating window can be re-sized and positioned anywhere in the
work area screen. For example, you can choose to send it to the back or to bring it to
the front. If a floating window was sent to the back, you may bring it to the front by
right-clicking the desktop button, then selecting the Bring to front menu item.
- Desktop window : A desktop window is trapped within the work area. It is not
possible to send the window in the background. It always remains within the main
work area.
- Click OK : If selected, you just save your the changes, the window is not displayed.
1. Log in, using the user name and password of the operator with ‘full access’ security level.
2. Select the desktop you want to customize, right-click and select Properties in the menu to
open the Desktop properties dialog.
Note: A Permit button appears when the operator who is logged on has ‘read-only’
access permission. The permission acquired during this session will be valid until the
operator logs out. Click the Permit button. The operator login window appears. Enter
your user name and password, and click, OK. The temporary permission will be granted.
Desktops Colors
About this task:
Event colors can now be displayed in a separate column. Text and message background colors can
also be selected.
Database status
About this task:
This window displays the status of the components within the database while browsing the
database structure. The system displays items including all applications (connected or not), the
gateway, and controller sites.
You can perform manual operations directly from the window and edit components to modify their
configuration.
- Full expand: Click to expand the tree status and view all components. Only
applications that are connected to the server display a + sign.
- Full collapse: Click to collapse the tree status and hide all components of the root
component.
- Edit: When you select an assigned component (input) and click edit, the system edits
the definition window so that you can modify its definition and when finished, return
to the window you edited the component from.
Graphic Status
This feature is used to display a graphical status of a door controller, including the status of all its
components (outputs, inputs, power supply status, communication status, etc.) represented by
coloured shapes (circle, square, etc.).
1. From the Gateway drop-down list, select the gateway on which the controller to display is
located. You may select “All gateways” to display all the controllers in the list.
2. From the Controller drop-down list, select the controller for which you want to display the
status.
Example with a KT-200 Controller
Numerical Status
About this task:
This menu allows an operator to view the number of components in a “not normal” state for a
selected gateway.
1. In the Status tab, select the Numerical status button. The Numerical window appears.
2. The window displays the number of cards for that gateway, the number of inputs in alarm,
the number of relays manually activated, the number of doors forced open, etc. This can be
very useful if you need to find out how many cards are defined.
Text Status
The Text status allows an operator to display the status of a selected component (and sub-
components) as well as all the characteristics associated with this component in a text form. This
• The first seven buttons represent system devices (Workstation, Gateway, Connection,
Controller, Door, Input and Output).
• Summary/Detailed list —The magnifying glass button is used to display components that are
not in normal condition. It displays a summary list or a detailed list.
• Stop display —This button is used to stop the display when the information is taking too
much time. It cancels or interrupts the process.
• Refresh —Refreshes the status of the selected components.
• Print —Use this button to print the displayed status. You can preview your report before
printing it.
Clear buffered events: offline controllers buffer events until they reconnect to the
server. This operation discards saved events on the controller. This operation is
only available for KT-400, KT -1, and KT-2 controllers.
Unlock reader keypad: unlocks the reader keypad for KT-100, KT-400, KT-1, and
KT-2 controllers.
Reset reader power: resets the controller reader power. You can perform this
operation on KT-300, KT-400, KT-1, KT-2, and KTES controllers.
Note: A hint is displayed when you move your cursor over a button. It gives details about the
operation to be performed.
Selecting a Controller
1. From the Operations window, select the Controller button to open the Controller window
where you will be able to reset the controller.
2. From the Site pane, select a site. Controllers attached to this site appear in the right-hand
pane.
- From the Controller list, select the controller where the operations will take place.
It has to be highlighted. To perform the operation on a group of controllers, select
Controller Group (lower right-hand pane).
Note: If only one site is defined in the system, the Site Controller list pane will
not appear on the Controller window.The Controller Group bottom panel is
available only to the selected site or to a selected connection not linked to a site.
Note: Reset commands should be executed with caution. Before you carry out a controller
reset operation, we recommend you contact our Technical Support. For more information, see
Technical Support.
Result
This option is also available when you right-click the controller you want. This operation is only
available for KT-400, KT -1, and KT-2 controllers.
1. In the Controller dialog, in the Gateway/Site section, select KT-400-IP . Then in the
Controller section, the list of appropriate controllers relative to the selection display.
2. Select desired controller or controller group.
3. Click the Get Card List button in the toolbar. The system will display the number of cards in
for the selected controller or controller group.
Note: This operation is performed only on one controller at a time as it may be a lengthy
operation. The option is only available on a Multi-site Gateway.
Card Location
1. Right-click the appropriate local area number, and then click Find card position .
2. In the Get card position dialog, click Start with , Begin with or Contains to filter the search
criterion.
3. In the list, select the wanted card position, and then click Get position .
• In the Operations tab, select a controller, right-click and select Request unassigned
modules.
• In the Operations tab, right-click in the toolbar and click Request unassigned modules.
To edit a module, right-click an event, click Edit, and choose one of the following options:
• Controller: use to open the Controller window and edit the definition for the controller.
• Assign: performs the following actions:
- Populates the data into the controller's configuration page in the ioSmart tab, or the
ioModule tab. If necessary, rename the reader or change the configuration details,
and click Save.
Full status
Use Full status to review the controller's communication settings and configuration.
Module status
Use Module status to review the module's status.
Note: If you want to view the Full status and the Module status windows at the same time,
click Full status, and on the controller window, click Module Status.
Edit
Use Edit to open the Controller window and edit the definition for the controller.
Disable card reader: Will disable a door reader and user will not be able to access
that door, even if they have access rights.
Soft reset reader: will restart the reader by powering it off and then on again.
Hard reset reader:will restore the reader to its original factory state. It deletes all
programmed settings.
Note: A hint is displayed when you move your cursor over a button. It gives details about the
operation to be performed.
There are various reasons why you would want to perform one of these operations; for example
you may need to “disable a reader” for a short period in order to deny access to the door, etc.
This operation allows an operator to lock a door that was previously unlocked by an operator or a
schedule. When a door is manually locked through the Operation menu, it remains locked until:
• The presentation of a valid card (will re-lock after access), or
• The next valid change of the automatic unlocking schedule (for a door defined with an
unlocking schedule), or
• An operator manually unlocks the door.
- The left-hand pane displays the list of all Sites. You may select all or select one site.
- The individual doors associated with the site selected on the left are displayed in the
top right side of the pane. If you select All on the left, all doors in the system will be
listed on the right. You can select one, several or all doors.
Note: If only one site is defined in the system,the site list window will not appear
on the Controller window.
- Door groups associated to the site selected on the left are displayed at the bottom
right side of the pane. If you select All on the left, all door groups in the system will be
listed at the bottom right. You can select one or several or all groups.
1. Click the Temporarily unlock button. The Change delay on action dialog will popup.
2. Enter the New time delay (m:ss) and click OK . The selected door will be temporarily
unlocked by an operator.
Note: If a door contact is installed, the door will re-lock as soon the system sees a “door
open-door closed” transition. There is no “Animation” for this type of operation.
Result
For more information about access levels, click here.
Note: A hint is displayed when you move your cursor over a button. It gives details
about the operation to be performed.
- The left-hand pane displays the list of all Sites. You may select all or select one
connection.
- The individual elevator doors associated with the connection selected on the left are
displayed in the top right side of the pane. If you select All on the left, all elevator
doors in the system will be listed on the right. You can select one, several or all
elevator doors.
- Elevator door groups associated to the connection selected on the left are displayed
at the bottom right of the pane. If you select All on the left, all elevator door groups
will be listed at the bottom right. You can select one or several or all elevator door
groups.
Note: The Door Group bottom panel is available only to the selected site or to a
selected connection not linked to a site.
When a manual unlocking operation is completed, only floors that are defined with an
“X” in the “” field of the Floor Group Definition menu will be available for selection. Also,
when communication is lost and the controllers are working in stand-alone mode, only
the floors marked with an “X” will be available for selection and the access schedule will
be ignored.
1. Click the Temporarily unlock button. The Change delay on action dialog will pop up.
2. Enter the New time delay (m:ss) and click OK . The selected elevator floor will be temporarily
unlocked by an operator.
Note: This command will only temporarily enable the elevator floors that are defined
with an “X” in the “” column of the “Floor group Definition menu” (available for
selection).
There is no “Animation” for this type of operation. To temporarily unlock all floors, use
the “temporarily unlock door” option in the “manual operation on doors” menu.
1. In the Elevator door dialog, select desired elevator door (s) or door group.
2. Click the Return to Schedule button. This option will reset the schedule for the selected
components.
1. From the EntraPass workstation main window, select the Operation tab and click the
Gateway button to open the Gateway dialog where all the gateways connected to your
system are listed.
2. Select your multi-site gateway to see the status of all gateways.
3. Right-click on a gateway to view options.
4. Select as online gateway to reinstate primary gateway.
Result
A green square highlights the active gateway. A yellow square highlights non-active gateways.
Note: Gateways can be reloaded individually or together. To reload a gateway individually
right-click the gateway and select Reload. To reload the gateways together right-click the
multi-site gateway and select Reload. This reloads all associated gateways.
Input continuous supervision: will monitor the selected input at all times.
Input with no supervision will terminate the input monitoring, regardless of its
schedule, and will start monitoring with the next pre-defined schedule.
Input no supervision temporarily (Shunt): will stop input monitoring for a pre-
set period of time.
Note: A hint is displayed when you move your cursor over a button. It gives details about the
operation to be performed.
- The left-hand pane displays the list of all Sites. You may select All or select one
connection.
- The individual input associated with the connection selected on the left are displayed
in the top right side of the pane. If you select All on the left, all inputs in the system
will be listed on the right. You can select one, several or all inputs.
1. To temporarily shunt an input, select the input, then click the Temporarily shunt button. The
input will not be monitored temporarily.
2. Click Input no supervision temporarily. The Change delay on action dialog will popup.
3. Enter the New time delay (m:ss) and click OK . An button next to the input will indicate that
it is temporarily shunt. If an alarm occurs, or if the input is disconnected, no message will be
sent to the desktop Message list.
1. Click the Operation tab, and select Action scheduler from the menu.
2. From the calendar interface, double-click the date you want, or click the Add button on the
upper left panel.
1. Click the Operation tab, and click Door from the menu.
2. In the Door panel, select the appropriate door and right-click.
3. Click Action schedule to open the Action scheduler window.
4. Complete steps 3 to 9 in Programming the Action scheduler procedure.
- Name
- Action
- Which components
- Date
- Time, start time, and end time
- Recurring schedule with counter
- Time zone if applicable
Note: A hint is displayed when you move your cursor over a button. It gives details about the
operation to be performed.
Selecting Relays
1. From the Operation window, select the Relay button.
2. Click the Enable animation button to view a real-time display of the relay status.
- The left-hand pane displays the list of all Sites. You may select All or select one
connection/gateway.
- The individual relays associated with the connection selected on the left are displayed
in the top right side of the pane. If you select All on the left, all relays in the system
will be listed on the right. You can select one, several or all relays.
- Relay groups associated to the connection selected on the left are displayed at
the bottom right side of the pane. If you select All on the left, all relay groups in the
system will be listed at the bottom right. You can select one or several or all groups.
Note: A hint is displayed when you move your cursor over a button. It gives details about the
operation to be performed.
• Create schedules that correspond to the time the user has access to the desired doors.
• Assign the created schedule to the desired doors (in the Access level definition menu).
• Assign the access level to a card.
1. The default access level is Always valid, all doors : cardholders assigned this default access
level have access to all doors at any time. To restrict access to certain doors and at a certain
time, you have to create a specific access level.
2. From the Users toolbar, select the Access level button. The Access level window appears.
3. C lick New and assign a meaningful name to the access level you are creating.
Note: Components that are displayed in the Doors and Schedule columns have to
be pre-defined for selection. To define Doors: Devices > Door. To define Schedules:
Definition > Schedule.
4. From the Doors list, select the doors to which the cardholder has access.
5. From the Schedule column, select the schedule during which the cardholder will have access
to the corresponding door.
6. From the Floor group column, select the floor group, if applicable.
7. Click the Comment tab to add comments to the current access level. You can double-click in
the blank space to display the edition window.
Badge Designing
EntraPass contains a badge layout editor for users to create, save, edit or delete badge templates
that are later selected and associated with cards for badge printing. You can create and edit
badge templates, add coloured or graphic backgrounds, logos, text, bar codes, and place photo or
signature holders.
Note: The printer configuration description must be first entered from the System
Parameters/Credentials menu.
The Badge window contains all the tools available in other EntraPass windows: new, save,
copy, delete, print, links, search (the Hierarchy button is disabled). However, it contains an
additional 1-2 button which allows to modify the number of sides assigned to a badge layout.
2. To modify an object property before you drop it, go to Options in the Badge design window,
then choose Show properties on drop. If you do this, the Properties window will open every
time you drop an item in the template work area.
Note: To enable last and first name selection in the Card fields menu of the Badge
design window, go to the Options menu , then choose System parameters, select the
User name format tab, check Parse user name checkbox, then select the name (first or
last name) that will be used for sorting cardholders names. For more information see
User Name Format.
3. From the shortcut menu, select the card information field you want to add to the template
layout, then click in the template work area to incorporate that field you have selected.
Note: When you add a photo to a badge design template, the photo that appears is
only a placeholder. It indicates where the card holder’s photo will be displayed. When a
badge is assigned to a card, the appropriate card holder’s photo is displayed.
• Show grid lines: displays grid points to aid with object alignment.
• Align to grid: must be activated before you start building your template. As you “click and
drop” design objects in the template work area, they will be “snapped” to the nearest grid
mark.
• Grid settings: allows you to specify the horizontal (Height) and vertical (Width) grid spacing
(in pixels).
Note: To disable the grid deselect Show grid line in the Align menu.
1. From the Badge design template, right-click the object you have inserted (in this example,
Card information fields).
2. From the shortcut menu, select Card fields properties .
Note: The Properties menu item depends on the selected item. For example, it will
change to Image properties or Current date properties, depending on the selected
object.
3. From the Card fields properties window, you can modify all the text properties:
1. From the Badge design work area, right-click the image (picture, logo) or signature that you
want to modify.
2. From the shortcut menu, select Images properties.
3. You may select another image from file or modify the image properties:
- Stretch ratio: select this option if you want the image to be centered in the image
holder space, while keeping the proportion of the original image.
- Transparent mode: if you choose this option, there is no background colour,
4. You may check the Set as default option if you want these properties to apply to all image
objects you add in the badge template.
1. From the Badge design tool bar, click the text button. To re-size the text box, select it and use
the two-headed arrow to drag the sizing handles to the desired position. This also allows you
to change the height and width of the text box.
2. To align the text box, see To Align Objects in the Template Layout.
3. To add text to the text box, right-click the text box, then select Static text properties from
the shortcut menu.
4. Enter text in the Enter text field; then modify the text properties as desired. The Preview
section shows the result of the changes you apply to the text.
1. From the Badge design window, click the Bar code button, then click in the Badge design
work area.
2. To align the bar code, see To Align Objects in the Template Layout.
2. From the Properties window, you can define settings for the bar code that you want to
incorporate in the Badge design.
Note: If it is necessary to set Bar code encoding option to Code 39-Modulo 43, set Field
Checksum to true.
1. From the Badge Design template, select the Current date button, then click in the Badge
design work area.
2. Right-click the current date to display the shortcut menu.
3. To align the current date, see To Align Objects in the Template Layout.
4. Select Current date properties from the shortcut menu.
5. From the Current date properties window, you can:
Adding an image
About this task:
You can import background images from any directory. You can incorporate scanned images,
photos taken with a digital camera and artwork created in any illustration design program into the
badge design.
Note: When you import an image, you have to re-size it to its original size, as illustrated
in the figure.
5. Using the sizing handles, adjust the image to the desired size, then move it to the right-hand
position; you can use the grid to align it properly. For more information, see To Align Objects
in the Template Layout.
6. Right click the image to modify its properties. For more information, see To Modify Picture
Properties.
1. From the Badge design window, select the object you want to add (next to the Diskette
button), then click in the Badge design work area” The Border properties window opens.
2. To modify the border properties, select the border colour, the border style, and the border
width. You may check the Set as default option, then click OK to exit.
To Place a Rectangle
1. From the Badge design window, select the rectangle tool (next to the Border tool), then click
in the work area.
- Line colour,
- Line style,
- Line width,
- Background (brush style and brush colour).
Printing Badges
You may print badges from a Card or from all Badge preview windows. The software is set up to
let you print one single or double-sided badges.
Before you print, you have to select a badge printer. It may be any network printer, or a specific
badge printer.
- Print front side: only the front side (preview in the left-hand pane) is printed.
- Print back side: Only the back side (preview in the right-hand pane) is printed. This
button is enabled only when the badge is defined with two sides.
- Print both sides: The front and back side are printed. This button is enabled only
when the badge is defined with two sides.
Important: In order to print badges with bar codes, your printer has to be
properly set. You have to select the “black resin” option, otherwise, bar code
readers may not detect the bar code. If you have problems with bar code printing
or reading, refer to your printer manufacturer’s manual.
Note: When importing cards, the card access group may be used to assign an access level to
the cards.
1. From the Users toolbar, click the Card access group button.
2. To modify an existing card access group, select it from the Card access group list. To create
a new group, click the New button and enter the group name in the language section. The
connection column displays the connection associated with a card access group.
3. From the Access level list, select the access level that will determine the access to the doors
of the selected connection.
Card Printing
About this task:
Note: Whatever your selections, the card user name and card number will always be
displayed. By default, only fields containing information will be printed. If no fields are
selected, only cards containing information will be printed. If you want to print empty fields,
check the Print empty fields option. If you want to print component references, check the Print
component references option. If you want to simply preview card reports there must be at
least one printer installed on the computer.
- If you want to print a specific range, you have to specify a starting number in the
Lower boundary field. It has to be used with the Upper boundary field. You must
use the “card index field”.
- If you have decided to print a specific range and if you have entered a Lower
boundary value, enter the last number or letter in the Upper boundary field. This
field is used with the Lower boundary and the Card Index field.
Note: Only cards that match ALL the selected filters will be printed. For example,
if you specify six filters, all the six criteria must be met. Cards that do not match
all the six criteria will not be included in the range.
4. Select the Filter option if you do not want the system to search through all the cards of the
system. Filters will restrict the search and facilitate the production of the desired card list.
- Start date between: The system will include cards with a “Start date” field which is
within the specified range (Miscellaneous tab).
- End date between: The system will include cards with a “Use end date” field which is
within the specified range (Miscellaneous tab).
- Card: Check the option and then select the desired state. The system will include cards
that have this card state selected in the Card window (Miscellaneous tab).
- Select the Exist trace for the system to include cards that have the “Card Trace”
option in their definition (Card window, Miscellaneous tab).
- Select the Exist comment option for the system to include cards that have
information in the Comment field in their definition (Card window, Comment tab).
- Select Exist PIN: The system will include cards that have a PIN.
- Select Exist delete when expired: The system will include cards that have information
in the Delete when expired field (Card window, Miscellaneous tab).
- Select Exist wait for keypad for the system to include cards that have information in
the Wait for keypad field (Card window, Miscellaneous tab).
Cards definition
Cards are defined by the following properties: card number, card user name, access level and
status (valid, invalid, pending, lost/stolen or expired). Card records can be searched, sorted and
deleted.
An activity report icon on the toolbar becomes available when you select a card. Use this icon to
generate a quick report based on time parameters. The report contains the following information
on the user's card: date and time, event message, card number, and many description columns. For
more information on the report options, see Previewing Reports.
Table 14: Activity report icon
Icon Description
Activity report: this generates a last transactions report based on the time
parameters you enter. On completion of the report, EntraPass generates an event
with details of who requested the report, and for what user.
1. Click Users, click Card, and select a cardholder from the Card user name list.
2. To open the Audit window, in the toolbar, click the Audit trail icon.
The Audit window contains two tables, the first table contains the following card
information:
- Color coded column: indicates if the card was created, modified, or deleted.
- Green: Create
- Blue: Modify
- Red: Delete
- Date and time: the date and time an operator created, modified, or deleted the card.
- Operator: the name of the operator who made the change.
- Count: the number of fields that were changed.
- Reference type: the connection, site, or gateway connected to the card that changed.
- Reference: the item the change references.
- Field name: the name of the GUI field.
- Old value: the value before the change occurred.
- New value: the value when the system saved the change.
- Field description: description of the field name.
- Time
- Integer
- Object
- Components
- CSV export selected: export the selected entry of the card audit trail to a CSV
format file.
- CSV export all: export the entire content of the card audit trail to a CSV format
fiel.
- View old value: view a window with the value before the change.
- View old value parent: view a window of the parent of the selected component
with the value before the change.
- View old value link: view a window representing a link to the component with
the value before the change.
- View new value: view a window with the value after the change.
- View new value parent: view a window of the parent of the selected
component with the value after the change.
- View new value link: view a window representing a link to the component with
the value after the change.
1. From the Users/Card menu, click the Door access list button:
Result
• Gateway/connection button
• Gateway/connection description
• Door description
• Schedule description
1. Type required changes into specific fields in the Card window and click the Save as button.
This feature allows you to create a new card under a new card number.
2. Enter the new card number in the New card number field.
3. Select the Keep/Delete original card options to specify if the original card should be kept
or deleted (usually kept), then click OK to save the new information. The Card window is
displayed.
- Refresh an access granted: if this option is checked, each time an access is granted
the information displayed will be refreshed with data relative to the card.
- Save on new card: if this option is checked, new cards will be saved in the card
database on an “unknown card” event message. If this box is not checked, the
operator will have to save the card manually each time a card is read.
Note: When this option is selected, the first card presented to the door reader
will be saved only when presenting a second card or by pressing the save button.
- Find: allows operators to search for an existing card in order to create a new card
based on the existing card data.
Note: If an operator clicks the Close button without saving (when the Save
button is still enabled), a system prompt will ask to save the last information.
Card handling
Finding a card using the toolbar search
1. On the EntraPass workstation, click Users and click Card.
2. In the Card window, on the toolbar, click the Find icon.
3. In the Find a component (Card) window, in the Search field, enter a keyword.
4. To narrow the search results, click one of the following buttons:
- Start with: the list of results includes all of the components that start with the
keyword you enter, in alphabetical order, and includes all other components that are
in the database.
- Begin with: the list of results includes only components that start with the keyword
you enter.
- Contains: the list of results includes all of the components that contain the keyword
you enter.
5. Optional: The default search criteria is card user name. To change the search criteria, on the
left of the Search field, click the Index icon and select which criteria you want to search, for
example, card number or email.
6. Optional: To search for the picture that corresponds to the card that you select, click the
Details icon.
7. Click the Find icon.
8. From the list of search results, select the card that you want to display.
9. Click OK. The card that you select displays in the Card window.
Alternatively, in the Card window, in the Card user name field, enter a user name. Existing user
names display as you enter a value in this field. Select the card that you want to display.
For more information about searching in EntraPass, see Finding components.
- Start with: the list of results includes all of the components that start with the
keyword you enter, in alphabetical order, and includes all other components in the
database.
- Begin with: the list of results includes only components that start with the keyword
you enter.
5. Optional: The default search criteria is card user name. To change the search criteria, on the
left of the Search field, click the Index icon and select which criteria you want to search, for
example, card number or email.
6. Click the Find icon.
7. From the list of search results, select the card that you want to display.
8. Click OK. The card that you select displays in the Card window.
If card information is modified, the updates do not register in the open search window. To
see the latest updates in your search results, refresh by pressing F5, or by closing and re-
opening the Card window.
For more information about searching in EntraPass, see Finding components.
Editing a card
To edit a card in the Card window, complete one of the following steps:
• In the Card user name field, enter a user name. Existing user names display as you enter a
value in this field. Alternatively, use the up and down arrows to browse for a card. Select the
card that you want to modify.
• In the Card number field, enter the card number and press Enter.
The card displays in the Card window and you can modify it as required.
Deleting a card
About this task:
If you have the appropriate access rights, you can use the delete feature to remove a card from the
cardholder database. If you delete a card from the cardholder database, you must re-issue it to use
it.
1. Find the card that you want to delete. To search for cards, see Finding a card using the
toolbar search.
2. In the Card window, on the toolbar, click the Delete icon.
3. In the Warning window, click Yes.
Deleting cards removes them from the cardholder database but they remain in the card
history. All events involving a deleted card remain in the event messages database. You can
generate an event report that includes past events for deleted cards.
1. In the Card definition dialog, select any card, then double-click the Card information label
under the General tab. The system displays the Change labels window .
2. Select the field you want to modify on the left, and enter the name in the field on the right.
If your system operates in two languages, two fields will be available to enter the field name
in both languages. For example, if you want to rename Card Information 1 to Employee
number , double-click the Card Information 1 label and enter the new name in the field(s) on
the right.
• Create schedules that will correspond to the time the user has access to the desired doors,
• Assign the created schedule to the desired doors (in the Access level definition menu),
• Assign the access level to cards.
1. From the Card definition window, select the Access level tab. The Access level window
appears, it displays the connection column and Access level list.
A small box in the far right column indicates the connection has controllers which accept multiple
access levels. If the box is black, no additional access levels have been added. If the box is green, at
least one additional access level has been assigned. If the box is yellow, the access level has doors
from legacy controllers, which prevent additional levels to be assigned.
2. Select the desired Gateway or connection by clicking the small box in the far right column.
The Additional access levels window appears with the different Gateways and Connections.
3. From the Additional access levels window, you can assign additional access levels.
Note: If there is a warning exclamation sign in the right column beside the access level,
there are controllers associated with the access level which do not support additional
access levels, such as the KT-100, KT-200 and the KT-300.
2. On the right pane, from the list, select a schedule. Click the button to add or remove doors
from the list on the right.
3. In the Access column, choose between Allow or Deny.
Note: Only doors with an associated schedule are saved.
WARNING: The user list report does not take access exception into account.
To enable the Access level exception feature, see Credentials Parameters.
1. Select a card number using the Up/down arrows. The Start date field indicates the card
creation date. You can change this information by selecting another date in the displayed
calender. The start date must be the same day or earlier than the current date; else, the Card
state field ( Miscellaneous section) is set to Pending.
2. Select the Use end date box, if applicable. When this box is checked, the system displays a
calender allowing you to select the end date. When the end date is reached, the Card state
field is set to Expired.
3. Select the Delete when expired option, if applicable. This option can only be used with
the Use end date option. When selected, the card information is automatically deleted on
the expiry date (using the end date and hour specified), otherwise the Card state field is
modified to Expired.
Note: A deleted card is a card that is not active in the system database. Even if a card
was deleted, previous events generated by this card are still stored in the archive file.
4. Select the Wait for keypad option to force users to enter a PIN on keypad to access all doors,
then in the Editable PIN field enter the PIN that users will be required to enter.
5. Editable PIN number: The operator can enter the number of digits needed by the reader/
keypad to grant access. See Defining a Card Display Format for more information.
Note: Selecting the Wait for keypad delays access to a door for this card until the
correct PIN has been entered on a keypad. This only affects doors defined with both
reader and keypad in the Door Definition menu (Devices > Doors). The keypad schedule
must also be valid for this door. For more information on defining a door, see Doors
Configuration.
6. From the Card state list, assign a state to the selected card. By default, a card is valid. The
following are available:
7. Select the Disable passback option if you want the card to override the passback option
when defined.
Note: If you are issuing a card for a cardholder with disabilities, check the Extended door
access delay option. To enable this option in the system, you have to define appropriate
delays in the Door definition.
8. Allow multiple-swipe (KT-400, KT-1, and KT-2 only): Enable the multi-swipe action. For more
information, see .
- Get picture from file: This option allows you to select a previously saved picture:
3. From the Files of type drop-down list, select the file type you are looking for or leave this field
to All to display all image files. Make sure that the Auto displayer option is selected to enable
preview.
4. Select the directory where the image is stored. Select the image you are looking for, then click
Open to import it into the Card window.
Note: Files with the following extensions are supported: BMP, EMF, WMF, JPG, GIF, PNG,
PCD, and TIF.
- Paste picture: this option allows you to paste a picture from the clipboard. To use this
option, you have to copy the picture, then paste it into the picture window.
Note: To delete the imported picture, right-click the picture, then choose Clear
picture from the shortcut menu.
1. From the Card window, right-click the signature area. A shortcut menu appears.
2. From the shortcut menu, make the appropriate choice:
- Get signature from file: allows you to select a previously saved signature,
- Paste signature: allows you to paste a signature that was previously copied to the
clipboard. The option is enabled when there is content in the clipboard.
Note: The Signature pad option is enabled only when the appropriate device is
enabled in the Options menu ( Options > Multimedia devices > Signature ).
1. From the Card window, right-click the signature area. A shortcut menu appears.
2. From the shortcut menu, select Signature pad. The Signature window appears, allowing you
to preview the signature.
3. Click OK to paste the signature in the card window.
Editing a Picture/Signature
1. Right click the image you want to edit.
Note: The Bar code area allows you to assign a bar code to a badge for identification
purposes. Select any item from the drop-down list to be used as the value of the bar
code. Select Custom to enable the Value field and type a specific bar code value. If you
do not enter a custom bar code value, the Card number is used as the default value.
2. From the shortcut menu, select Edit (picture or signature ).
3. Adjust the features of the image using the displayed options. The Reset all option enables
you to go back to the original image:
- Auto contrast: this feature gives better contrast by intensifying lights and shadows:
it makes the darks darker and the lights lighter. In general, this auto contrast feature
gives a good result when a simple contrast adjustment is needed to improve an
image’s contrast.
- Sharpen: this feature provides more definition to blurry images by applying
sharpening only when an edge is found.
- Brightness: this feature allows you to add light to the image by sliding towards the
positive values.
- Reset all: this feature allows you to undo all the changes and to restore the original
image.
1. From the Users toolbar, select the Import/Export CSV file button.
2. From the Select operation drop-down list, select either Import or Export.
3. In the Available Patterns pane, select the pattern you wish to use. This depends on the
software you are upgrading from.
4. Use the Edit pattern button if you want to edit the pattern.
1. From the Users toolbar, select Import/Export CSV File button. The system displays the
Import / Export CSV file window.
2. From the Import/Export CSV file window, click on New Pattern. The New pattern window
displays a list of all the fields that are available in the EntraPass card databases. They contain
specific value formats that have to be respected. For example, the card state field will only
accept the following values (0=valid, 1=invalid, 2=stolen/lost).
3. Double-click the available fields or use the left and right hand button to move the field
back and forth. Once the fields are selected, you can use the red Up / down arrows to
organize information (this will indicate how information will be arranged in the CSV file).
Note: The card number must always be selected for every pattern including a specific
card. For example, if you select the field Card #1 - Stolen/Lost, you must also select the
field Card #1 - Card Number.
4. Specify the Add code and Modification code. These codes are used by the system to identify,
when importing a file, which card has to be modified or added to the card database. The
default add code is “+” and default modification code is “+”.
5. Select the Delete code. This code is used by the system to identify, when importing a file,
which card has to be removed from the card database. The default delete code is “-”. Field
separators can be: tab, space, comma, semicolon (;) and other.
6. Select the Field separator. This code will be used to separate the selected fields when
importing or exporting data. Usually a comma (,) is selected. Keep this in mind when adding
users’ last names and first names separated by a commas.
- MM/DD/YYYY
- DD/MM/YYYY
- YY/MM/DD
- MM/DD/YY
- DD/MM/YY
Note: The Use DLL feature allows you to enable a program that will convert
specific card numbers. You may use the Remove DLL when you do not wish to
enable the program that converts card numbers.
8. Click OK to exit the pattern window and to specify the new pattern name.
9. Enter the pattern name, then click OK. The system automatically returns to the Export/Import
CSV file window. The pattern you have just created is displayed in the Available patterns list.
10. If you want to add or remove fields from your pattern, double-click the new pattern to edit
and make the necessary modifications. Now you can import or export your information using
the new pattern you have just created.
Exporting Cards
About this task:
Your organization may need to export the card database data into another application. You may
use a predefined template or create a custom template.
1. From the Users toolbar, select the Import/Export CSV File button. The system displays the
Import / Export CSV file window.
2. From the Select operation drop-down list, select Export.
3. From the Available patterns list (left-hand pane), select the pattern you want to use
when exporting cards. If necessary, you may edit the pattern so that it matches the target
application pattern, else, you may create a new one. (For more information on how to create
a pattern, see Creating a New Import/Export Pattern).
4. For the Transaction file, click on the three-dot, then select the folder in which EntraPass will
save the card database content. You can open the CSV file in Excel, NotePad, etc.
5. Once you have selected/created an export folder, click OK to return to the Import / Export
CSV file window.
6. Click the Export button; it is enabled once the transaction file is selected. The system displays
a window allowing you to filter the cards you want to export.
Note: For cards to be included in your file, they must match all the selected filters, if one
or more filters are not matched, the card will not be included.
7. In the Export Card’s filter window, specify the cards you want to export. Once you have made
all your selections, click the Export button. The Import / Export CSV file window appears.
Note: The Transaction file field shows the target file name and location. By default, the
export file is saved in the specified folder (Exportdata, in this example). The status bar
(lower part of the window), shows the number of imported cards (1, in this example).
The default name is YYYYMMDD.csv. You can open the target file with NotePad for
instance.
1. Click the Import or Export button to start the transaction (the following example illustrates
a case of importing CSV data). The lower part of the window displays the number of cards in
the list.
Note: Although entries in the Transaction code column are identified with a green flag,
the Card number column is empty. This indicates problems in the pattern conversion.
2. Click the Import button.
Note: The Error button is enabled because the system encountered problems during the
import transaction.
3. You may click the Error button to display information about the error. The Process error
window shows that the pattern used is invalid.
4. Click the Close button to go back to the Import Export window.
5. In the Import/Export CSV window, double-click the pattern you have used for the Import
transaction (Custom, in the example above).
6. From the Field separator drop-down list, select Comma as the field separator, then click OK.
Data in the Card number field indicates that the import transaction will be successful.
- If EntraPass was previously configured for Multiple Card Format, you can modify
the card format by right-clicking the Card number field. See Defining a Card Display
Format to enable the multiple card formats . The default card format is HH:DDDDD
(Hexadecimal and decimal 24 bits).
Note:
- When the Multiple Card Format is selected, a list of all card formats is displayed
when you right-click the Card number field.
- When a card format is defined by the system administrator, the card format in use has
a check mark next to its description.
- Refresh an access granted: if this option is checked, each time an access is granted
the information displayed will be refreshed with data relative to the card.
- Save on new card: if this option is checked, new cards will be saved in the card
database on an “unknown card” event message. If this box is not checked, the
operator will have to save the card manually each time a card is read.
Note: When this option is selected, the first card presented to the door reader
will be saved only when presenting a second card or by pressing the save button.
- Find: allows operators to search for an existing card in order to create a new card
based on the existing card data.
Note: If an operator clicks the Close button without saving (when the Save
button is still enabled), a system prompt will ask to save the last information.
• Access denied events (bad location, bad access level, bad card status, etc.),
• Access granted events,
1. From the Users/Card menu, click the Door access list button:
Result
• Gateway/connection button
• Gateway/connection description
• Door description
• Schedule description
Note: This information can be exported to a CSV file for printing and report purposes.
The same information is also available from the View card information window by clicking the Door
access list button:
Tenants List
The tenant is a resident in an apartment building or an employee in a company. The tenant can
grant access to a visitor. Tenants list can be created in EntraPass to be used with the KTES.
- Hexadecimal 24 bits
- Hexadecimal and decimal 24 bits
- Hexadecimal 32 bits
- Hexadecimal and decimal 32 bits
- Decimal ABA 8 digits
- Decimal ABA 10 digits
Result
Default value is Hexadecimal 32 bits
- Tenant name: Enter the tenant’s name (20 characters maximum). The default value is
New tenant.
- Tenant ID: Enter the tenant’s ID. The tenant’s ID is an identification code of 1 to 5
numbers that a visitor can use to call a tenant. The number of digits available for an ID
is configured when the list is created. The default value is 0000.
- First phone number: Enter the first phone number. The first phone number is used
when a visitor select the tenant from the KTES directory. If no phone number is
entered, the tenant cannot be called by the KTES system and is not displayed in the
KTES directory either (15 digits maximum). The default value is empty.
- Second phone number: Enter a second phone number. The second phone number
is used by the KTES to contact the tenant when there is no answer to the first number
(15 digits maximum). The default value is empty.
- PIN: A Personal Identification Number (PIN) is 4 to 6 numbers configured for each
tenant. The number of digits available for a PIN is configured when the list is created.
The default value is 0000.
- Access schedule: Enter the access schedule. For security reasons, an access schedule
is configured to link a schedule with the tenant access rights. A tenant can access the
building according to specific times, days and holidays defined in the system. The
default value is always valid. For more information about defining schedules, see
Schedules Definition.
- Tenant admin level: Select the administration level for the tenant (installer, owner,
maintenance or tenant). The default value is Tenant.
- Tenant language: Select the default language used by the KTES for the tenant
(System, English, French, Spanish, Custom). The default value is Default. For more
information about the system language, see Kantech Telephone Entry System (KTES)
Configuration.
- Disabled Tenant: A disabled tenant status allows the activation of a relay and/or the
generation of an alarm. The default value is deselected (enabled).
- Trace: The trace option allows the activation of a relay and/or the generation of a
traceability event. The default value is deselected (not traced).
- Hide tenant: This option is used if you want the current tenant’s name to be
displayed or hidden. The default value is deselected (displayed).
- Extended door access delay: The extended delays correspond to the additional
time lapse a door should stay unlocked and can be kept opened. The default value is
deselected (no extended delay).
- Extended ring: The system can allow an extended number of rings to give more time
for the tenant to answer. The default value is deselected (no extended ring).
- Start date: The start date is the date from which the tenant can access the system.
Enter the date in the field (mm/dd/yyyy) or click the Calendar button to select a date.
The default value is empty.
6. Set the Do not disturb option. This functionality is used to place the tenant in a do not
disturb (DnD) status if the selected schedule is active. Select the Hide tenant check box if you
want the tenant to remain hidden from the list or for search option while in the DnD status.
7. The Call second phone number option enables the use of a second phone number
immediately (bypassing the first number) when the schedule is active. If you want to use
the second phone number only when the selected schedule is active, select the Call second
phone number only on schedule check box.
8. Set the Wiegand interface for access granted:
- Tenant card number: A 64-bit number associated to each tenant. This number is used
by the tenant to get access from the KTES.
- Card holder for access granted (not available in EntraPass KTES Edition): This
cardholder’s number is the first card number to be used by the tenant to get access
from the KTES.
- Red: Indicates that access to the selected door on the selected date and time is not
allowed (not authorized).
- Green: Indicates that access to the selected door on the selected date and time is
allowed (authorized).
Floors Definition
About this task:
Use the Floor window to create or edit elevator floors. After the floors are created, they are
grouped and associated with a schedule that defines when access is permitted.
Graphics Definition
A graphic corresponds to the secured area of the system where components (EntraPass
applications, controllers, inputs, relays, etc.) are located on a connection. With graphics, operators
can easily view the exact location of a component installed on a connection, or the status of
components and devices such as doors, contacts, motion detectors, controllers, assigned to the
graphic. Operators can perform manual operations directly from the displayed component (for
example, locking/unlocking a door). Each graphic can display up to 250 components including
using live video as a background. You may also import graphics or maps from other programs in
the following formats (BMP, EMF, WMF, JPEG, GIF, PCX, PNG, TIF or PCD).
Note: EntraPass offers users four sample floor plans. You can customize them to suit your
system needs. The sample floor plans are located at: C:\Program Files\Kantech\Server_ SE \
Generaldata\Demobmp folder .
Card location
• For information on enabling the card location feature, see .
- To import an existing graphic, click the diskette button, then drag and drop the
diskette in the work area. Once you have positioned the component, and released
the mouse button, the Image properties dialog will pop up on the screen. The system
displays the Open window. Locate the graphic you want to import and click Open. The
graphic will be placed in the graphic area of the dialog.
- To import a custom button into the background graphic, click the Custom images
button in the toolbar. The Select an image window pops up on the screen. Select an
button, then click OK to close the window and import the image in your design.
- Select the graphics to be printed using the checkboxes. You can also use the Select all
or the Clear all buttons.
- Select Print empty fields to include the titles of the fields even if they are empty.
- Select Print component references to print the component reference numbers.
- Use the Font button to display the standard Windows Font dialog and modify the font
attributes accordingly.
- Click on the Preview button to display a general view of the printing layout.
Holiday Definition
About this task:
1. On the Definition tab, select the Holiday button. The Holiday window appears.
2. To create a new holiday, select the New button.
3. To create a global holiday, proceed with the holiday definition. If you want to define a holiday
for a specific gateway/connection, select the gateway/connection from the list.
4. Assign a name to the holiday.
5. From the Date menu, select a the holiday date from the calendar.
6. Select the Recurring option if this is the case for the holiday you are defining.
Note: If the holiday is not a recurring holiday, you will have to reprogram it for the
following year. You can program holidays years in advance; but it is recommended to
review holidays on a yearly basis.
7. In the Holiday type section, select the type of the holiday you are defining. This gives you
flexibility when defining a holiday. For example, you may decide that a given day is a holiday
for a certain group of users, but it is a regular day for another group.
8. Click on the + Holiday list button to display a calendar for the next 12 months showing
holidays in one of the three colours identified in the legend.
9. If the holiday is to apply to specific sites only, the Selective Holiday checkbox must be
selected.
10. Drag & drop system, sites or global gateways to the appropriate holiday case. You can also
Schedules Definition
A schedule indicates when the system will execute certain operations such as automatically
unlocking doors, permitting access to employees, running automatic reports, monitoring inputs,
etc. It also determines when events are to be acknowledged or when to activate relays controlling
different functions (lighting, heat, etc.). You can use the same schedule in different menus, but it
is recommended to create a different schedule for each application, because it is much easier to
modify a particular schedule without affecting other applications.
Each schedule is composed of four intervals. Each interval has a starting and ending time. Each
of these intervals can be individually selected for the seven days of the week, and for 4 holidays.
EntraPass gives you the possibility of programming 99 schedules per connection .
Note: For more information, see System Parameters Configuration.
• System schedules : System schedules for global functions such as operators login schedules
and video triggers. These are not loaded in controllers.
• Multi-site schedules : These are defined per connection. You can define 99 schedules per
connection for such purposes as: power supervision (controllers), unlock schedule (doors),
Rex schedule (doors), activation mode (relay), monitoring schedule (input).
2. Define a second interval for Tuesday from 00:00 to 08:00. The system considers these two
intervals as one continuous interval.
Extended Schedule
Note: Schedules with 20 intervals in stand-alone mode can be used with KT-400 and KT-400 V1
controllers only.
1. On the Groups tab, click the Trigger group button to open the Trigger group dialog.
2. From the Trigger group list, select an existing group if you want to modify it, or click the New
button to create a new group. Then, enter the name of the group in the language section.
3. From the Component list, select a component. Select the boxes corresponding to the sub-
components you want as part of the trigger group.
4. Click the Save button.
5. From the Schedule column, select a schedule for each floor in the group.
- When assigning a floor group and an unlock schedule to an elevator door the system
scans the schedule column of that group and unlock each floor accordingly. For more
information, see Defining Elevator Doors.
- The schedule assigned to the floor group will be used to validate the access card and
its unlock schedule. This way, the floors will be unlocked only when the two schedules
(the floor and the access card) are valid.
Note: The unlock schedules are effective even when the controllers are in Fail
soft mode (communication failure).
Application Configuration
The minimum configuration of an EntraPass software package includes a workstation application
(EntraPass monitoring application). EntraPass Special Edition application is a single-workstation
software. The software package comprises a number of applications including:
• A workstation application
• A server application,
• One multi-site Gateway application,
• And a number of utilities such as the Vocabulary editor, the Express Database utility, etc.
Configuring an Application
1. From the EntraPass main window, select the Devices tab, then click the Application button.
The Application main window appears.
2. Select Workstation EntraPass Special Edition.
3. Assign a name to the selected application. If you are running the software in two languages,
for example in English and French, you may assign a name in English and in French.
- Specify the number of alarms that will be kept on server when the EntraPass
workstation is off-line, that is, when it is not connected to the EntraPass module. The
EntraPass module buffers a maximum of 100,000 alarms per EntraPass workstation
(default: 500).
- Specify the number of alarms that will be kept on workstation . There is a maximum
of 100,000 alarms per EntraPass workstation. By default, it keeps 5,000 alarms.
Note: The EntraPass workstation will always keep newer events. To view older
events, you have to request a historical report. For details on requesting reports,
see Requesting Reports.
3. Specify if the server should keep newest or oldest alarms when its buffer reaches the defined
maximum number:
- Keep older alarms: The EntraPass module will keep the oldest alarms and archive the
newest alarms when the EntraPass workstation is off-line and when the Server buffer
is full.
- Keep newer alarms: The EntraPass module will keep the newest alarms and archive
the oldest alarms when the EntraPass workstation is off-line and when its buffer is full.
Alarms are processed on a first in - first out basis.
4. In the Clear Alarms Desktops section, specify when alarms should be cleared:
1. From the Application main window, select the Email reports tab.
2. In the Email server (SMTP or Exchange server) field, enter the IP address of the email
server that will be used for sending emails.
3. In the Email Port field, enter the number of the port that will be used for sending emails
(usually 25).
4. Select the encryption method.
5. Enter a valid email address in the Email sender field. This email address will be used for
authenticating the email server.
6. Authentication: These options can be used to configure the authentication method.
Connection configuration
About this task:
A connection is composed of 32 controllers attached to the same serial port. EntraPass Special
Edition supports 2 connections composed of KT-100, KT-200, KT-300, KT-400, KT-1, and KT-2
controllers. Items displayed in the EntraPass Connection window vary depending on the selected
connection type. For example, if the selected connection type is an RS-232, an RS-232 tab will be
displayed to configure the corresponding serial port and baud rate. If the connection type is dial-
up, three extra tabs will be displayed for modem configuration.
Note: For a single gateway, limits are 2048 connections, 10,000 doors, 100,000 inputs and
100,000 outputs.
Note: The multi-site Gateway is available in all EntraPass Editions. Even though it is not
referred to as a multi-site Gateway, the EntraPass Special Edition includes an imbedded multi-
site Gateway.The KT-NCC and the Global Gateway are only available with EntraPass Global
Edition.
- In the Hardware definition section , specify the number of controllers for the
connection. There may be up to 32 controllers for each connection. If the number
specified is greater than the maximum allowed, the system will set the value to 32.
Note: When the connection type is IP address (KTES), the number of KTES is
automatically limited to a single KTES per connection.
- Select a Time zone: This setting allows events from the remote site to display at local
gateway time on EntraPass workstations located in different time zones.
Note: For more information about configuring the Kantech IP Link, refer to the Kantech IP Link
Installation Guide, DN1670. For more information about the KT-400, refer to the KT-400 Ethernet
Four-Door Controller Installation Guide, DN2003. For more information about the KT-1, refer to
the KT-1 One-Door Controller Installation Guide, DN2186.
If you choose Secure (IP KT-400) as a connection type, the primary controller must be a
KT-400.
For the KTES, the only controller in the loop must be a KTES. For more information about the
KTES, see the KTES Installation Manual, DN1769.
1. From the Connection list, select a connection type. If you select one of the following devices:
KT-400, KT-1, KT-2, IP Link, or KTES, the following three tabs become available:
- IP Device IP configuration
- IP Device Automated Connection
- IP Device Parameters
- MAC address: Enter the device MAC address. The first 6 characters in the MAC
address (00-50-F9) cannot be modified.
- The Online box is selected by default.
- Auto Discovered IP: This is a read only field that automatically displays the
gateway IP address. When the radio button is selected, the system overrides
the IP address and reloads the connections with that new information.
Note: The Auto Discovered IP field is always filled and updated with
an IP address even when not selected.For a new gateway, the Auto
Discovered IP radio button is not selected by default. The IP Address
field is still the default selected option.
- IP address: Enter the gateway computer IP address.
- Domain name: If you do not have the gateway IP address, you can enter the
domain name provided by the System Administrator (for Kantech IP Link,
KTES, KT-400, KT-1, and KT-2 only) .
Note: You must select to either enter the IP address or the domain
name. You cannot enter both at the same time (for Kantech IP Link,
KTES, KT-1, KT-2, and KT-400 only) .
- Test DNS: After you enter the domain name, click the Test DNS button to display the
corresponding IP address (for Kantech IP Link, KTES, KT-1, KT-2, and KT-400 only).
2. Move to the IP Device Automated Connection tab if you are in a WAN environment.
- Enable KT-Finder diagnostic for IP device: Check this box if you want to use the KT-
Finder as a configuration and troubleshooting tool.
- Heartbeat frequency (mm:ss): Enter the frequency to which you want the IP
device to send a signal to the gateway to indicate it is online (00:15 to 10:00).
- Fail to report after (mm:ss): Enter the delay before acknowledging
communication failure (01:30 to 59:59).
- Fail-soft delay on gateway communication failure (mm:ss): Enter the delay
before the IP device will consider communication with a controller has been
lost and the controller is in fail-soft mode.
- TCP if the communication is made with the gateway through a terminal server using
TCP protocol. In this case, you have to configure the terminal server. To do this, follow
the manufacturer’s instructions or refer to the Terminal server documentation.
- UDP (User Datagram Protocol), uses the IP protocol to send datagrams from one
Internet application to another. It is called “connectionless” because the sender and
the receiver are not required to connect before the transmission of data. Check this
option if the connection you are configuring uses this protocol.
1. Select the Modem options tab to set outgoing call behaviour to site modem.
Note: The Remote Baud rateshould not be changed. If you are uncertain about modem
setup parameters, consult your network administrator for the settings which apply to
your particular hardware configuration.
- Click on the Retrieve site events button to bring up the schedule selection window.
Select the schedule that best corresponds to the time requirements set out for this
task. For more information on defining schedules, see Schedules Definition.
- Repeat this step for If data is modified since last , Report events under prioritycall
type and Report events automatically .
- Define the delay before the system will Fail to report after (mm:ss) .
Note: To schedule the reporting of events under priority call types, first define
Priority call types for items such as doors, inputs and controllers.
3. Click the Miscellaneous tab to configure how modems handle site incoming and outgoing
calls.
- Check the Use a callback connection option to force the gateway modem to
hang up after initial connection to the remote site modem and to stand by for an
acknowledgement call from the remote modem. You may also want to customize the
Fail to callback delay. Default is set to 1:30 (1 min 30 secs.).
- This option only applies to the KTES. Check the Enable multiple KTES line sharing
option to change the Identification delay (ss) between each KTES. The time range
value is between 00 and 20 seconds.
- Select the Primary host modem in the drop down list. If available, select a backup
modem in the Secondary host modem. This setting is useful when the primary
modem is busy or fails to take the call.
- Check After reception stay online for if you wish to limit in-call time to a
predetermined amount of time which can be set to anywhere between 00.03.00 and
23.59.59.
- Check the Call immediately when secondary controller communication failure to
be alerted in the event that a secondary controller fails to send data to the primary
controller (the one carrying the modem).
- Check the Call immediately when buffer 70% full to force download of a site
controller’s event buffer as soon as it reaches 70% capacity.
Note: Do not click the Remote modem delays button. All values are factory-set
for optimum performances with the supported US Robotics modems. Settings
SHOULD NOT be edited unless recommended by Kantech.
• Controller definitions
• Door definitions
• Relay definitions
• Schedule definitions
• Holiday definitions
• Time zone
• Alarm panel integration
• Multi-swipe settings on exit door.
• Cards #2 to #5.
• Door access exceptions
• Interval #5 of schedules.
Before you migrate your data, you must configure EntraPass to use the same card format,
Global Card Format, and PIN length as the standalone settings:
Controllers configuration
Controllers provide audiovisual feedback on the access decision. Typically, a red/green light (LED)
indicator on the reader informs the cardholder that the door is unlocked or that access has been
denied. A local door alarm can be installed to provide an audible warning if the door is forced open
or remains open after an access.
The controller definition tells the system how a controller is being used and what devices are
associated with it: (doors, input zones, relays and output devices). Controllers may be defined
during a system or connection configuration; or in the controller definition menu, by selecting
either the controller button (Devices > Controller) or by using Express Setup program. EntraPass
supports the following controllers: KT-100, KT-200, KT-300, KT-400, KT-1, and KT-2. These provide
the ability to activate local functions associated with a controller. The number of devices associated
with a controller varies according to the controller type. The following table summarizes the basic
components associated with each type of Kantech controller.
Table 17: Kantech controller components
Type Doors Wireless Relays Input zones Auxiliary
doors outputs
(licensed)
KT-100 1 not supported 4 4 2
KT-200 2 not supported 2 16 4
KT-300 2 not supported 2 8 4
KT-400 4 8 4 16 16
KT-1 1 8 2 5 5
KT-2 2 8 2 8 5
Unassigned modules
To find a list of modules commuicating with a controller but unassigned, click the Request
Unasigned Modules icon. A window with the following information displays:
• Module Type: ioSmart or ioModule.
• Module Serial Number: of the module.
To define an unassigned module, right-click the module, and click Assign module, it automatically
populates the module’s data into the controller’s configuration page in the ioModule tab, or the
ioSmart tab. If required, rename the module, or change the configuration details, and click Save.
When you define the module, the system removes it from the list.
- Assign a meaningful name to the controller in the language section, and click the Save
icon. After you save, the Controller type list is disabled.
- The system prompts you to use the Express Setup program. Click Yes to continue. If
you click No, you must manually configure these devices in their respective definition
menus (doors, relays, inputs and auxiliary outputs).
Note: In EntraPass, you can install two types of readers on the same controller
(primary and secondary). This feature is only available with KT-100 and KT-300.
For KT-400, KT-1, or KT-2, 8 different reader types can be loaded (this feature is
supported with firmware 1.06 and later).On a given controller, all reader types
must be the same (Wiegand or ABA).
6. Select the reader installed on your controller from the Reader type lists. Check Table 18 for
the reader types and the controller types.
Note: The icon allows you to install a custom driver for a specific controller. Use this
icon to add the driver in the Reader+ Driver table, making it available the next time you
want to configure a new controller.
1. Click the Devices tab, click Controller, and, from the Controller list, select a controller.
2. Select a new controller type from the KT controller type list.
3. Click the Save icon. A warning message asks if you want to continue. Click Yes to continue.
This launches the Express Setup window.
4. Any undefined components can be configured using the Express Setup window. For
example, when changing from a KT-1 to a KT-400, the undefined doors can be configured.
5. Click OK to complete the process.
6. During the process, the option Disable controller polling is automatically selected. Ensure
that this option is cleared.
Result
This function only supports updating controllers to newer controllers. The rules for updating
controller types are summarized in the following table.
Note: When converting from a KT-100 or a KT-1 to a KT-400, exit readers are converted to a
second door.
It is not possible to change the controller type if a KT-IP has been used.
Combus and SPI modules associated with a controller cannot be transferred. To change the
controller type, definitions for combus and SPI modules must first be removed.
6. Enter the Wait for second access card delay. The maximum time allowed is 2 minutes and
7 seconds. This feature is useful for secured areas where two cards are required to access a
secured door. If the value entered is greater than the maximum allowed, the system will use
the existing value.
occurs. Click the button to select a relay or a group of relays (not available for KT-100).
1. Click Devices, click Controller, and select the controller you want to configure. If the
controller supports licensed wireless doors the Licensed door icon is available on the
Controller window toolbar.
2. Click the Licensed doors icon.
3. If no integrated panel has previously been linked to that controller, EntraPass automatically
creates a new integrated panel.
4. Click Configuration to open the Licensed Doors window. The number of Purchased licences
and Available (remaining) licenses is displayed.
5. To add a door, click +.
6. You must input a description of the door and the device address. The device address (EAC
address) has been configured during the configuration of the wireless lock. For more
information about configuring the Assa Abloy interface, refer to the Application Note, ASSA
ABLOY Wireless Locks integration (AH30 hub, serial).
7. Select the correct box to indicate whether the door has a contact (to indicate open or close)
or a REX (Request To Exit) functionality.
8. To delete a door, click Delete and click OK.
9. If an integration panel has previously been linked to the selected controller, the Licensed
Doors window displays, and you can edit existing wireless doors.
Note:
Licensed wireless doors can be identified by a blue icon. Wired doors have a green icon
in EntraPass.
There are less configurable parameters for wireless doors when compared to wired
doors. There are also some differences to the operation of wireless doors.
- Some manual features such as Arm Door, Disarm Door, Door contact back to
schedule and Disable Door Contact are not available for wireless locks.
- Wireless locks go into a sleep mode to conserve power. When you send a manual
operation to these locks you must wake up the lock (by interacting with the lock) for
the manual operation to be processed. This is also true of unlock schedules which
require the lock to be woken up to operate correctly. To wake a lock you may need to
swipe your card twice.
- On initial power up the Tamper State will be reported as Unknown until the lock
cover has been opened.
- If a wireless hub looses power it will not retain the last status of it wireless locks.
- The buzzer and LED cannot be controlled through EntraPass.
- When switching the length of the pin code, the wireless lock must be configured
through it's own interface.
- The current status of the lock is only updated on an event.
- The wireless lock cannot be operated when disconnected from the controller.
- The lock state refers to deadbolt of he lock. When the dead bolt is engaged the lock
state becomes unknown.
- Currently only 26-bit drivers are supported for wireless locks.
Note: If you go to Devices>Integrated Panel>Print, you can see the number of licensed
doors associated with that integrated panel.
Currently, wireless licensed doors are only supported for KT-1 and KT-400 controllers.
1. From the Controller window, click the Option tab to define anti-passback, duress and card
count options.
2. Determine the Duress options . When a duress option is selected, you have to assign a
duress key, that is a silent panic key.
- Duress on access granted : This option enables the duress key when access is
granted.
- Duress on access denied : This option enables the duress key, even when access is
denied.
3. Select a duress key from the Keypad duress key drop-down list.
Note: For added security, you may select both options.
4. From the Anti-passback options , select the anti-passback option from the Type drop-down
list: when an anti-passback option is enabled, a card cannot be used on an exit door unless it
has been used on a corresponding entry door.
5. In the Forgive schedule section, click the three-dot button to set a schedule for resetting the
anti-passback option on all other cards.
Note: The Forgive Schedule section is enabled only when Soft anti-passback or Hard
anti-passback item is selected.
6. In the Miscellaneous section, indicate options for Enable fail-soft delay(10-255 s) . During
a fail-soft mode, the controller operates in stand-alone mode, following a communication
failure.
7. Enter the 32-bit card family code (optional). You can locate this hexadecimal code on the
access card.
8. In theCard countoptions , use the up or down controls to set the maximum card number.
The maximum card number allowed is 2,147,483,647. The system keeps track of the number
of monitored cards that are in the monitored area and activates a relay when the count is
reached. When users exit the area, the counter decrements and the relay will eventually reset
when the count is smaller than the value defined.
maximum count is reached. Click the button to select the relay or relay group that will be
activated when the number is reached.
Note: The Activate relay section is enabled only when Soft anti-passback or Hard anti-
passback item is selected.
Supervision Schedule
1. Select a schedule for the Power supervision (not available for KT-1).
2. Select a schedule for the Tamper switch (not available for KT-100 and KT-300).
Note: Please refer to Schedules Definition for more details about schedule
configuration.
KT-200
Defining KT-200 Auxiliary Devices
1. From the Controller definition window, select the KT-200 tab.
2. In the Auxiliary devices section, select the type of devices used with KT-200 controller.
- Check the REB-8 relay option if REB-8 expansion boards are used as relays. Only 16
relays can be defined. If two REB-8 are added, the last two relays (the 17th and 18th
relays) can be used to perform different actions. You have to specify the additional
actions for the two relays in the Extra relay drop-down list.
- Check the KT-2252 elevator controller and REB-8 relay option if KT-2252 are used
as elevator controllers and REB-8 are used as relays on the same door controller. A
maximum of four KT-2252 can be connected to the controller.
- Check the REB-8 ElevatorController option if REB-8 are used for elevator control. Up
to four REB-8 can be used for elevator control.
Note: When an elevator controller option is checked, an Elevator tab appears
beside the KT-200 tab.
1. In the KT-200 definition window, select the REB-8 elevator controller option. When the
option is selected, an Elevator tab appears beside the KT-200 tab. The REB-8 definition
section is only active when REB-8 are used as relays.
2. Select the Elevator tab to configure the REB-8 elevator controllers. Up to four REB-8 elevator
controllers are supported.
3. Specify the number of REB-8 that are installed on the controller. The selection is cumulative.
For example, if four REB-8 are installed, the first three checkboxes have to be checked also.
The following table summarizes how REB-8 are assigned to floors and to elevator cabs.
Note: The Inputs column refers to the REB-8 terminals. When floors have been defined
(in the Floor menu), the Floors column contains the floors that are associated with the
inputs.
4. In the Floors column, select the floors associated with REB-8 controller terminals. For
information about floor definition and door group definition, see Doors Configuration.
Note: There is no floor confirmation when an REB-8 is used as an elevator controller.
1. Under the KT-200 tab, select the REB-8 relay option if REB-8 are used as relays.
2. If they are used with the KT-2252 elevator controller, select the KT-2252 elevator controller
and REB-8 relay option. In either case, the REB-8 definition section is enabled.
3. In the REB-8 Definition section, select the appropriate option: No REB-8, One REB-8 or Two
REB-8.
4. If two REB-8 are added (for a total of 18 relays), the last two relays can be used to perform
different actions: select the use for the extra relays from the Extra relay drop-down list.
5. Select the Status relay tab to program a relay or group of relays that will be activated when
an event occurs.
KT-300
Defining the KT-300 Elevator Floor Associations
Note: The Elevator tab displays only when Combus modules have been defined as elevators
under the KT-300 tab.
• KT-PC4108 (8-zone input expansion module). This module has a tamper contact input.
• KT-PC4116 (16-zone input expansion module). This module has a tamper contact input.
1. If a Combus module is installed to the KT-300 controller, click the Combus module
configuration button. Undefined Combus terminals are identified by red flags/bullets. Once
a module has been defined, it is identified by a green flag.
2. To define a module, select one, then click the Define button (lower part of the window). The
Enter Combus module serial number message box appears.
3. Enter the module’s serial number, then click OK.
Note: To obtain this number, you have to activate the Tamper switch or to press any
key on the keyboard. The Combus serial number is displayed in the Desktop Message.
4. Assign names to the modules in the language fields.
5. Check the options related to the module you want to configure (if these are displayed in the
window).
Note: Usage options of a module vary according to the selected Combus module. For
example, installing the KT3-LCD and checking the options Combus low power and Display
date and time will allow the KT-300 to report Combus low power conditions and to
display the date and time.
Note: The KT-400 SPI port maximum current draw is 500 mA, when the 12V AUX terminals are
not used. External power supply (12 VDC, 2 Amps) for the expansion module is required when
the total current draw exceeds 500mA on the SPI Port. For additional hardware details, refer to
the KT-400 Ethernet Four-Door Controller Installation Guide, DN2003.
Thare are three expansion module types available:
• KT-MOD-INP16: The KT-MOD-INP16 is an input module that adds 240 zones to the KT-400
controller. Up to 15 input modules (16 input modules if used for elevator configuration) can
be connected to a KT-400 for a total of 240 external inputs. Adding the 16 onboard inputs of
the KT-400 gives a total of 256 inputs per KT-400. For further details, check the KT-MOD-INP16
KT-400 Expansion Module 16-Zone Input with SPI Cable, Install Sheet, DN1776.
• KT-MOD-OUT16: The KT-MOD-OUT16 is a 16-output module. It can be used for elevator
access control with additional hardware. Up to 16 output modules can be connected to
a KT-400 for a total of 256 outputs. For further details, check the KT-MOD-OUT16 KT-400
Expansion Module 16-Output with SPI Cable, Install Sheet, DN1781.
• KT-MOD-REL8: The KT-MOD-REL8 is an 8-relay outputs expansion module used as general
relays or elevator control outputs. Up to 32 relay modules can be connected to a KT-400 for
a total of 256 relays. For further details, check the KT-MOD-REL8 KT-400 Expansion Module 8-
Relay Output with SPI Cable, Install Sheet, DN1786.
The following table summarizes the options associated with each module:
Table 24: Expansion module options
Expansion Module Options
KT-MOD-INP16 Controller inputs (up to 256) and/or elevator inputs (up to 64 per
elevator door)
KT-MOD-OUT16 Outputs relays (up to 256) and/or elevator outputs (up to 64 per
elevator door)
KT-MOD-REL8 (Note) Relays (up to 256) and/or elevator outputs (up to 64 per elevator
door)
Note: There are already 4 relays available on the KT-400. To prevent redundancy unless it is
planned, select the Relay number assignments check box. The 9-16 relay configuration is set
by default.
1. If an expansion module(s) is(are) connected to a KT-400, click the SPI module configuration
button. The Expansion modules setup appears.
ioModule
About this task:
To define a KT-MOD-IO16 for a KT-400, a KT-1, or a KT-2 controller, click the ioModule tab, and
complete the following steps:
- Terminals 1 - 4
- Terminals 5 - 8
- Terminals 9 - 12
- Terminals 13 -16
- Not in use: this is the default setting. Select to indicate the terminals are not in
use.
- Use as input: select to use terminals of inputs/outputs as inputs. EntraPass
uses the same setting for EOL as the controller settings. If you want to change
EOL settings, use the Input menu. For more information, see Configuring
Specific Controller Parameters in the Inputs field, select an input bank from the
list.
Note: You cannot use an input bank on multiple devices. When you use it
on one device, it is no longer available until you delete the configuration.
- Use as outputs
- Use as floor confirmation (inputs)
Use as outputs
Note: You can define an elevator output bank on multipe elevators, they mirror each
other.
Use as floor confirmation (inputs)
a. Click the SPI tab, and click the Output module on ioModule tab.
b. If you have defined more than one ioModule, select the one you want from the
ioModule list.
c. In the Relay 1 -8 tab, select one of the following options:
- Not used
- Used as relays
- Use as elevator equipment
Note: You can define relays on the SPI expansion module, and on
the ioModule. For example, for the KT-1 controller, if you define
relays 1 - 4 on an ioModule, and an SPI expansion module, it lights
up on the controller, the ioModule, and the SPI expansion module.
The second door will automatically be labelled with the first door name plus the word EXIT at the
end.
1. From the KT-400 tab, under Enable exit reader, select the doors for which the reader has to
be enabled.
2. Click Save.
Note:
- The feature is available only when IoProx XSF or IoProx UK 31-Bit readers are
used under General/Reader and keypad. If another type of reader is selected,
the option is not available.
1. In the Controller window, click the elevator tab to define the floor associations.
2. In the Elevator tab, click Pattern #2 , and then select the appropriate Door number check
box(es).
3. From the Floors drop-down menu, select the appropriate item or floor number to associate
with the door number and the pattern number.
4. Repeat Steps 2 and 3 for each pattern.
5. Click Save .
Note: To define floors, see Floor Definition.
KT-1/KT-2
Enrollment Button
About this task:
The enrolment button is used to send an “enroll me” request to EntraPass with the controller
status which includes:
• IP address
• How it is powered (PoE or 12 VDC)
• Full Status
• Gateway description
• MAC Address
• Device type
The unassigned controllers list displays:
• Date and time (when it was added to the list) of the gateway
• Controller model
• MAC Address
• Serial Number
• Broadcast received IP address
• Name
• Serial number
• IP address
The incoming information remains in wait mode, ready for assignment to a hattrix account or a
defined Corporate Edition, or Global Edition system. In the workstation, the enrollment pending
count displays on the lower right section of the status bar. Double click the Enrollment pending
label to open the following report:
When you select an enrollment, double-click the enrollment to bring up the shortcut menu. The
following options are available:
Table 26: Enrollment shortcut menu
Column Description
Opens the video server window that EntraPass pre-populates with
Define information received from the outbound connection, which is the active
account. Rename the DVR and save it.
Delete Prompts to confirm and remove the unit from the list.
When you define a DVR using enrollment, the Video Server window opens, with fields pre-filled
with information received from the outbound connection. When you define a DVR unit, EntraPass
removes it from the list.
If you input the incorrect log in credentials, an error message is displayed. If the import is
successful, a confirmation window is displayed. When you click the Save button, the camera details
are automatically called. You can then rename the DVR in the Server Parameters tab. To maintain
the name of the imported cameras, select the Override Camera name from DVR check box, if you
clear the check box, operators can change the name of imported camera.
• The controller will delete messages in FIFO order (First In, First Out). The oldest message will
therefore be deleted first.
• When the controller is reconnected to the server, the controller events will be sent to the
Message list all at once, in the following order: events in the controller’s secondary event
buffer; a single Event Buffer Overflow will display, followed by the list of events generated
while the controller was disconnected from the server.
Note: For more details about the Comment entry box, see Comment Field.
Doors configuration
Use this menu to define the door parameters on which readers and/or keypads are installed. A
door can be an elevator door, a In/Out door, an entry door for anti-passback, an exit door for
anti-passback or an access door. It depends on how the settings are programmed. The controlled
door may be secured at all times or only during defined schedules. The common locking devices
used are electric door strikes and electromagnetic locks. A door may be equipped with one or two
readers; one reader on each side. For doors equipped with two readers, the outer reader has to be
defined as an entry reader and the inner reader as an exit reader.
Note: For a single gateway, limits are 2048 connections, 10,000 doors, 100,000 inputs and
100,000 outputs.
- Fail-secure: The strike is locked when power is removed (door locks, door strikes).
- Fail-safe: The lock output is energized to lock the door (electromagnetic locks).
- None: The reader is considered as an access reader. An access reader generates only
Access granted/Access denied events. This option is selected by default.
- Entry: An entry door is an entry point. In order for the system to record an entry, the
door must be opened after a valid access (if a door contact is installed).
15. Specify the Local area before and Local area after . These items are enabled and can be
specified only for Controller Local Area .
16. Specify the Door access delay:
- Unlock time (hh:mm:ss): The time during which the door is unlocked on a valid card
read or a valid request to exit event (when the REX is defined to unlock the door).
The time range value can be from 00:00:01 to 04:15 (255 sec.) for a KT-100, KT-200,
and KT-300; or to 18:12:15 (65535 seconds) for a KT-400, KT-1, and KT-2. If this is an
elevator door and a push button (input) is used to enable floor selection, this is the
time during which a floor selection will be allowed. Usually, a longer period should be
defined to allow the user to select floors. Default value is 10s. For more information,
see Input Configuration.
17. The Extended door access delay(hh:mm:ss) feature allows to keep the door open for an
extended period in order to allow people with disabilities to pass through without triggering
an alarm. If you want to use this option, specify the delays in the Unlock time (default is 40s)
and Open time (default is 2 min) fields. The time range value, for both delays, can be from
00:00:01 to 04:15 (255 sec.) for a KT-100, KT-200 and KT-300; or to 18:12:15 (65535 seconds) for
a KT-400, KT-1, and KT-2.
18. Unlock Schedule will allow the system to unlock the door for a predetermine period of time
that you will select.
19. First Person In option (Not for KT-200): keeps door locked until the first granted card access
while an unlock schedule is valid. Default is unselected.
- For the KT-400, KT-1, and KT-2 only, it’s now possible to specify an Unlock Grace
Period (mm). This feature allows the door to be unlocked under its unlock schedule
if the first card access is granted inside the selected time period before the unlock
schedule starts. Time range value can be from 0 (disabled) to 59 minutes. Default
value is 0 minute. For example, if the door has an unlock schedule that goes from
8:00am to 5:00pm and the First Person In is enabled with an Unlock Grace Period of
15 minutes, a valid access between 7:45am and 7:59am will allow the door to unlock
automatically at 8:00am.
20. Select Enable Multi-Swipe to turn the visibility of the Multi-Swipe tab ON or OFF.
21. Select a Graphic and Video view to which the gateway is assigned, if applicable. The video
view will only be activated if the video feature is enabled in EntraPass.
Note: The Keypad tab is enabled only if you have selected a Keypad type while defining the
controller associated with the door being defined. There are 4 keys. The first 2 keys: # and *
are fixed keys and they are similar and play the same role as in the KT-300 system. The 2 other
keys: Key 3 and key 4 are variable according to the client’s needs.
- Reader only: select this option if you want to grant access using a reader or a keypad
only. A keypad access is less secure than a reader access as the user may share their
PIN and cannot permit further use, compared to lending a card and getting it back.
- Reader or keypad: select this option if access is granted using a reader or a keypad
only. A keypad only installation is generally considered less secure than a reader only
installation, because a user may “lend” its PIN to another person but cannot prevent
further use (in comparison to getting a card back).
Note: This option can be enabled on a reader with an integrated keypad if you
want, for instance, to use the keypad only.
- Reader and keypad: select this option if both a reader and a keypad are used to
permit access to this door. The keypad will only be used when the “keypad schedule”
is valid. Adding a keypad to a reader significantly increases the level of security. PIN
code requirement can be limited by a schedule for use only outside business hours,
for example, rather than during high traffic hours.
3. From the Card and PIN schedule menu, select a schedule during which cardholders will have
to enter their PIN after a valid card read. The time allowed between a valid card read and
entering the PIN at the keypad is set in the Gateway definition menu ( Time-out on keypad
option).
4. Check the Enable duress function on keypad option, if desired. Default value is deselected.
5. Select the Keypad relay activation key(s):
- For KT-100 and KT-300 Controllers: for doors defined with keypad or reader and
keypad, you can program the star key (*) or pound key (#) to activate a relay. When
this feature is enabled, users can activate a relay simply by pressing the appropriate
key.
- For KT-400 Controllers: for doors defined with keypad or reader and keypad, you
can program *, # or any key to activate a relay or a relay group. When this feature is
enabled, users can activate a relay or a relay group simply by pressing the appropriate
key.
4. Check Enable door open too long notification to continue to receive the Door open too
long event and the Pre-Alarm door open too long in the desktop. If there is no schedule
selected, this checkbox is not available for selection (greyed out).
Note: For KT-200 Controllers, Input 1 (door contact) and 2 (request to exit device) are
ideally reserved for Door 1 of the controller whereas Input 9 (door contact) and 10
(request to exit device) are ideally reserved for Door 2 of the same controller. The input
that is used for the door contact or REX contact SHOULD NOT have a “monitoring”
schedule defined in the “Input Definition” menu.
5. Check the door reading options:
- Door open reading : If selected, this option allows the system to read cards while the
door is open. However the system will not unlock the door if it was locked. If selected,
the event “Access granted” is generated. Otherwise, the event “Access granted - Door
open” is generated. Default is checked.
- Door unlocked reading : If selected, this option allows the system to read cards
while the door is unlocked manually by the operator or by a valid unlock schedule.
If selected, the event “Access granted - Door unlocked” will be generated on access.
To ignore all access events while the door is unlocked, leave this option deselected.
Default is checked.
- Unlock on access door opened: If selected, this option allows the system to unlock
access on door opened at any time. Default is unchecked.
- Pre-alarm door opened too long : If selected, this option allows the system to
generate the event “pre-alarm door open too long” and sound the door piezo when
half of the delay defined in the Open time field is expired. It will continue to sound
until the door is closed. Default is unchecked.
Note: If the door is a KT-400 and if the value entered is higher or equal than the
open time and if the checkbox is selected, a pop up will appear explaining that
the delay value is incorrect. Value range can be between 00:00:01 and 18:12:15
and must be lower than the door open time.
6. Select the appropriate Relock on access option. You may choose to relock an access On door
opening or On door closing. Default value is On door opening.
- On door opening: if you want the door device to re-lock following a valid access.
- On door closing: if you want the door device to re-lock when it closes.
2. For thePrimary and Secondary REX options (the Secondary REX options does not apply to
KTES or KT-200) , make the appropriate choices:
- Assign the REX contact: The input to which a “request to exit” detector can be
connected. This input must be local; it has to be one of the inputs on the controller
operating the door.
- Select a Rex schedule: When this schedule becomes valid, the controller will detect
request to exit signals originating for the exit contact. This option applies only to a
door defined with a REX contact.
- Select a Rex Bypass Message schedule: When this schedule becomes valid, the event
will NOT be stored in archives . When invalid, event is sent to the gateway for archives.
On EntraPass updates, all existing REX will have the ‘Bypass REX message schedule’
set to NONE or to no schedule. On a new door definition, Bypass REX message
schedule is set to always valid by default.
Note: The primary and secondary Rex Bypass message schedule options will
be available upon activation in System parameters. See System Parameters/
Schedule for additional information.
- Unlock on REX: The door will be unlocked if a valid request to exit is permitted by the
controller. This option may be useful on exit doors such as interior doors, shipping
doors or other push doors through which people carrying packages may pass. The
system will permit the exit and generates the “request to exit granted” event rather
than “door forced open” event.
- Resettable REX function: The unlock time is restarted on a valid request to exit. Open
and unlock times are defined in the door definition ( Devices > Door > General ).
Select this option for high traffic area doors such as manufacturing doors where many
users may need to exit at short intervals (for example after a work shift) to prevent
unwanted door open too long or door forced open events.
Note: It is recommended to choose either Unlock on REX or Resettable Rex
function , not the two options at the same time. If you choose these two options,
the door may remain unlocked for long periods of time. Moreover, these features
should not be used if a door contact has not been defined.
- The Unlock schedule defined during a door definition (Door menu, General tab)
will OVERRIDE these schedules even if they are valid.
- Only one Unlock schedule can be valid at a time. For example if the first
schedule (Unlock schedule #1) is valid from 6h00 to 9h00 and the second
schedule (Unlock Schedule #2) is valid from 7h00 to 9h00, then Unlock schedule
#2 will NEVER be valid since Unlock schedule #1 is already valid.
For more information about how to program elevator control using REB-8 relays, see
Controllers Configuration.
- go Pass + Disable card: present go Pass to the door only, disables an ioSmart reader
in RS-485.
The option you select saves as a global setting and is the default setting when you
create a new account and enable go Pass. You can change the setting as required.
Note: The first type of authentication is an activation e-mail. The second type of
authentication depends on the smarphone, use a PIN or biometric identification.
• Enable duress function on keypad (KTES only): Set this parameter to enable the duress
function on the door controller keypad. Employees or tenants use the duress function
to signal for help. The operator must enable the duress function. The duress function is
unchecked by default. For more information, see KTES Configuration. For more information
on the duress function for doors only, see Defining Door Keypad Options.
There may be a combination of the options. For example, an alarm system will be disarmed with a
correct access code during a valid predefined schedule and after a valid card read.
1. Click the External alarm system options button located under the Options and Alarm
System tab in the Door dialog. The Alarm system options dialog will display on screen.
2. Under the Arming request tab, select the Arming request input . This is the input that is
activated on an external alarm arming request.
3. Once you have selected an arming request input, you have to Enable arming request
schedule during which the request will be valid.
- Wait for access granted to armwill force the user to present a valid card before
pressing the selected Keypad button option.
- Relock door on request to arm will be used in conjunction with the Wait for access
granted to arm to override the schedule.
- Relock door on arming after exit delay will relock the door and arm the system after
the pre-configure exit delay is over.
- Prevent arming request on input status will prevent arming the system if an input is
in alarm.
6. Specify the Exit delay and Entry delay (hh:mm:ss) . The Entry delay is the time during
which the alarm system is bypassed after an access granted event. The Exit delay is the
period before which the system is armed. The maximum values are 18:12:15 for both the exit
and entry delays. When the KT-300 system is used, the maximum values are 9:06:07. Usually
the entry delay is shorter than the exit delay.
7. Select the input that will indicate the External alarm system panel status . When the
selected input status is “normal”, this indicates that the external alarm panel is armed.
8. Select the Input tab to define input devices that will be supervised or shunted (no
supervision) when the alarm system is armed. The input description column contains all the
inputs that are defined in the system.
- Using the checkboxes, select the appropriate input where you want an external alarm
system to supervise them. Also select the appropriate item for which you want to
suspend supervision (on entry, on exit, or when the alarm system is disarmed).
9. Select the Disarming request tab to select the Input to postpone arming .
10. Select the applicable schedule from the Enable postpone arming schedule .
11. You may check the Wait for access granted to postpone box. If this option is checked, the
alarm system will be postponed only after a valid card read and the cardholder will then press
the selected Keypad button to postpone the external alarm system.
12. Select the Postpone or disarm access level from the list.
13. Select the Relay tab to define a relay ( Partition and Relays for the KT-400 to define a group
of relays) and input status for the external alarm relays.
Note: When you select an Alarm relay, you may specify its Activation type. It may be
activated permanently or temporarily.
For more information about access levels, see Access Levels Definition.
Reader Templates
About this task:
Use a reader template to define how a reader is configured. Reader templates can only be used
for ioSmart card readers in RS-485 mode. Creating a template allows the same configuration to be
shared across a number of card readers. To create a reader template complete the following steps:
5. Select the HID 125 kHz and ISO 14438B options to define the card technology.
6. If the controller connects to ioSmart readers and you want to enable the BLE technology,
select the BLE check box. EntraPass selects the BLE check box by defulat as all ioSmart
readers are BLE enabled.
7. Select the Keypad backlight intensity when in idle mode.
8. Set the delays for the LED flash duration (ms), Buzzer signal duration(ms), and Keypad
backlight duration(s).
9. Select Visible in all accounts to make the template accessible for all accounts.
Result
The Visible in all accounts checkbox is available in system account. When it is selected, the
template is viewable across all accounts, however operators cannot edit or delete the template.
When you clear the checkbox, the default reader template is reassigned to the controllers that
previously used the assigned template. A confirmation message appears and the option to delete
becomes available.
Input configuration
Door controllers can monitor the state of input points such as: door contacts, interlocks, alarm
points, motion detectors, temperature sensors, any REX and other devices with dry contacts. KT-100
monitors the state of 4 input points, KT-200 monitors the state of 16 input points, and KT-300
monitors the state of 8 on-board input points, with a maximum capacity of 16.
• KT-200 controllers: Inputs are normally closed or normally open dry contacts connected in
series with one resistor. If the dry contact is connected in series with the green resistor, the
input number will be odd. If the dry contact is connected in series with the red resistor, the
input number will be even.
Defining Input
About this task:
You may define inputs from the Input button of the Devices toolbar. You can also define inputs
using the Express Setup when defining a controller (see Express Setup Program ).
- Alarm response time (mm:ss:cc): The delay before the system generates the input
and alarm event. Default is 50 cc.
- Restore response time (mm:ss:cc) : The delay before the system generates the input
restore events Default is 50 cc.
Note: Specifying the input response time allows bouncing time when the contact
changes state, and helps to generate only one event for each transition if this
time is longer than the bouncing time. For example, a 01:00:00 delay requires
that a condition remains stable for at least one minute before it is reported.
11. Specify the Telephone Entry System options (applies to KTES only).
Note: To access the modem call type feature, the site connection type must be set to
Modem. For more information, see Connection Configuration. The modem call type
feature is supported by multi-site Gateways only.
- Pager call type : You can select Do not call (the relay activation for that event will not
be sent to the pager), Call immediately (the relay activation for that event will be sent
immediately to the pager) or Call when scheduled (the relay activation for that event
will be sent to the pager according to the pager call schedule). Default value is Do not
call .
- Under modem call type , assign the call type option that best suits event reporting.
Default value is Do not call.
- Input pager ID : Enter the pager code corresponding to the selected input. Possible
values are 201, 202, 203 and 204.
Note: To specify pager call types for each events, the Pager reporting function
must be enabled. See KTES Configuration.
12. For KT-400 and KTES only, check Override default EOL (56K), and then, in the drop-down
menu, select the appropriate item. Default is unchecked.
13. Select a Graphic and Video view associated with the input, if applicable.
For an Event component type, select an event. For a list of events based on the selected
a.
component type, see Table 27.
b. For a Door or Input component type, indicate the component source (controller).
c. Select the appropriate Component action to be reported for the virtual zone and click OK.
The purpose of this feature is to create virtual zones in an alarm panel that receive commands
from groups of selected inputs, doors, and other events of a gateway. These commands are then
transmitted from the panel to a central station.
Note: The DSC PowerSeries Neo 1.1 integrated panel can support 16 or 32 virtual zones: 16
virtual zones for HS2016 and 32 virtual zones for HS2032/3032, HS2064, HS2128/3128, and
HS3248.
Note: This feature is available only when using KT-400, KT-1, and KT-2 controllers. You require
the following firmware: KT-400 v1.16.xx, KT-401 v1.22.xx, KT-1 v1.02.xx, or KT-2 all firmware
versions.
8. If the Video feature is enabled, the Video view field appears (for zones and partitions only).
If this is the case, select the video view in which you want the defined component to appear.
For information about defining video views, see Video Views Definition.
9. From the Graphic list, select the graphic to which the application is assigned, if applicable (for
zones and partitions only). For information about defining graphics, see Graphics Definition.
Note: The Details button is available only for a User or a Virtual Zone component type.
10. Click Save.
• Load the Integration DLL on the EntraPass Server. If the toolbar does not display the two
buttons, see System Parameters Configuration.
• Connect the third party hardware on the serial port of the multi-site gateway or on the serial
port of a pass-through KT-400 controller.
• Turn on the third party hardware.
General tab
1. From the Connection type list, select a connection type.
2. From the Panel model list, select a panel model.
3. If the Video feature is enabled, the Video view list appears. If so, select the video view in
which you want the defined component to appear. For more information about defining
video views, see Video Views Definition.
4. From the Graphic list, select the graphic to which the application is assigned, if applicable.
For more information about defining graphics, see Graphics Definition.
5. Click Configuration to display the Panel Configuration window. A different window displays
according to the selected connection type.
Table 28: List of panel models and connection types
Callout Panel model connection type
A DSC PowerSeries Neo connected to serial or IP controller
B DSC PowerSeries Neo connected to serial or IP gateway
C DSC PowerSeries Pro connected to IP controller
D DSC PowerSeries Pro connected to IP gateway
E DSC PowersSeries or MaxSys connected to serial controller
F DSC PowersSeries or MaxSys connected to serial gateway
G Bentel Kyo320 connected to IP gateway
H Honeywell Galaxy connected to IP gateway
I Simplex 4100 & 4007ES connected to serial controller
J Simplex 4100 & 4007ES connected to serial gateway
Note: You cannot use the default integration access code when you program a DSC
PowerSeries Pro or Neo panel. For information about retrieving an integration access
code from a DSC PowerSeries Pro or Neo panel, refer to the following application notes:
Integrating the DSC PowerSeries Pro panel with KT controllers using type 2 encryption and
Integrating the DSC PowerSeries Neo panel with KT controllers using a DSC communicator
5.3x with type 2 encryption.
Note: If you select Access managed by user, on the Users tab, in the Card window, an
Intrusion tab becomes available.
For the KT-400 version, an additional list is available to select a controller for pass-
through.
1. Define the Zone, Partition, User, and Virtual Zone parameters. The following table lists the
parameters' maximum values.
Table 30: Parameter maximum values
Parameter PC1616 PC1832 PC1864 HS2016 HS2032/ HS2064 HS2128/ HS3248
3032 3128
Zones 32 32 64 16 32 64 128 248
Partitions 2 4 8 2 4 8 8 32
Users 48 72 95 48 72 500 1000 1000
Virtual Zones 16 32 32 32 32
2. Select the number of Zones. Click the button in the upper left to display a table that shows all
the defined zones. Click View or Edit to view or edit the selected zone.
3. Select the number of Partitions. Click the button in the upper left to display a table that
shows all the defined partitions. Click View or Edit to view or edit the selected partition.
4. Select the number of Users. Click the button in the upper left to display a table that shows all
the defined users. Click View or Edit to view or edit the selected user.
5. Select the number of Virtual Zones. This is available only for Neo panels connected to a KT-1
or a KT-400. A corresponding number of virtual inputs are added in Integrated Component
window. Configure virtual zones in the Integrated Panel window to view all zones. Configure
virtul zones in the Integrated Component window to view one zone at a time.
Note: The default number of Virtual Zones is the maximum value shown in Table 30.
The purpose of this feature is to create virtual zones in an alarm panel that receives
commands from groups of selected inputs, doors, and other events of a gateway. These
commands are then transmitted from the panel to a central station.
The DSC PowerSeries Neo 1.1 integrated panel can support 16 or 32 virtual zones: 16
virtual zones for HS2016 and 32 virtual zones for HS2032/3032, HS2064, HS2128/3128,
and HS3248.
This feature is available only when using KT-400, KT-1, and KT-2 controllers. You require
the following firmware: KT-400 v1.16.xx, KT-401 v1.22.xx, KT-1 v1.02.xx, or KT-2 any
firmware versions.
6. Click Virtual Zone List. The displayed table allows you to map Kantech components to DSC
virtual zones.
a. Click the Door, Input and Event tabs, and select a physical zone number and the type
of event (Alarm, Trouble or Tamper) to be sent to the central. View the remaining
available zones on the counter in the upper right.
Table 31: Events sent to the virtual zone
Component EntraPass Event Report Report Report
Alarm Trouble Tamper
Input Input in alarm / Input restored or in normal X
condition
Input in trouble / Input in trouble restored X
Input tamper in alarm / Input tamper restored X
Door Door forced open / Door forced open X
Restored
Door open too long / Door open too long X
restore
Door lock device failure / door lock device X
failure restored
Duress Duress feature X
Controllers Controller AC power failed / Controller AC X
power restored
Tamper switch in alarm / Tamper switch X
restored
Controller Auxiliary power failure / Controller X
Auxiliary power restored
Controller reader power failure / Controller X
reader power restored
Controller battery power failure / Controller X
battery power restored
Controller module communication failure / X
Controller module communication restore
Controller DC power failed / Controller DC X
power restored
Controller lock power failed / Controller lock X
power restored
Controller power trouble (KT-1) X
Access Access denied - Bad card status X
Denied
Access denied - Card lost or stolen X
Access denied - Card expired X
b. Click Add to add a new event in the list or click Remove to remove the selected event.
c. Click Save or Cancel to return to the Integrated Panel window.
d. Printing: Use the Print button from the Virtual Zone Summary section to send the
virtual zone configuration parameters to the central.
RS-232 tab
1. From the lists, select the Communication port COM and the Baud rate.
2. Click Save.
- Talk time: This is the maximum talk duration in seconds for a normal call between a
visitor and a tenant (10 secs to 59 min:59 secs). Default value is 40 secs.
- Extended talk time: This is the maximum talk duration in seconds for a extended call
between a visitor and a tenant (10 secs to 59 min:59 secs). Default value is 60 secs.
- Talk time remaining warning : The system sends a warning ring (a beep sound), a
certain number of seconds (depending on the value entered) to indicate the end of
the allowed talking period (1 sec to 59 min:59 secs). Default value is 10 secs.
- Number of rings before answer : This is the maximum number of rings allowed for a
tenant to answer (4 to 16). Default value is 5.
- Extended number of rings before answer : This is the maximum number of rings
allowed, for a tenant with the extended option, to answer (4 to 16). Default value is 10.
- Postal lock contact: This is the input corresponding to the door postal lock (0 to 4).
Select an input and click OK:
Note: See Input Configuration for more information.
- Postal lock Schedule : This is the schedule inside which the input, corresponding to
the postal lock, generates a valid postal lock request when that input is in alarm.
Note: See Schedules Definition for more information about schedule definition.
8. Disable KTES polling option: Select this checkbox when you need to put the KTES in disable
mode. In disable mode, the KTES will never be polled and all status requests from this
specific. Default value is selected.
9. Specify the Tenants list options:
- Tenants list capacity : By default, the capacity is 250 tenants unless you have
registered for 500, 1000 or 3000 tenants total.
Note: Remember that you are limited by the options purchased with the
software. If you have registered many KTES options for additional capacity, make
sure to assign it to the correct KTES site.
- Tenants list : Select a tenants list. Default value is empty.
Note: See Tenants List for more information about Tenants list definition.
- Use all tenants from list : Check this box to include all the tenants from the list.
Otherwise, leave the check box empty and click the Customize button. Select the
check boxes for tenants to be included and/or displayed on the LCD. Default value is
selected.
- Use the Print button to send a printout of the tenants list to a printer of your choice.
Sort by name or by code and preview before printing.
- Select a Graphic and Video view to which the gateway is assigned, if applicable.
- Line Type : Set this parameter to select the telephone line type used by the system.
Possible values are Tone or Pulse . Default value is Tone.
Note: For New Zealand, pulse dialling cannot be used.
- Telephone line regional setting : The Telephone line regional setting must be set to
specify which telephone line country code should be used by the KTES. Default value is
USA/Canada (0). Click the drop down list to display the available countries:
- Time base : Main time base comes from the AC power input (50 Hz or 60 Hz) for
best accuracies over large operating temperatures. Time base will be automatically
switched to internal Xtal in case of AC power failure. Time base can be forced to
internal Xtal when DC power only or unstable AC source is used. Default value is 60Hz.
- Line monitoring : The telephone line is monitored when busy or disconnected, when
this option is selected. Default value is selected.
Note: In order to comply with New Zealand Telepermit requirements, line
sensing must be turned on.
- Keypad key for access granted by tenant : This telephone key can be used by a
tenant to grant access to a visitor. Default value is 9.
- Keypad key for access denied by tenant : This telephone key can be used by a
tenant to deny access to a visitor. Default value is *.
- Reader type : This is the Wiegand Interface output format to be sent to the KTES.
Default value is KantechXSF .
- Reader’s Driver download: Click on the button to open the selection window and
select a driver to download:
- Wiegand integration with an access controller : Selecting this option indicates that
the KTES is connected to an access controller. Otherwise it is operating in Standalone
mode (not available in EntraPass KTES Edition ) .
- Card holder used for postal activated : This is the card number used by the KTES to
generate a Wiegand code when the postal lock is activated. Default value is empty.
- Enter the message to be displayed on the KTES LCD for each enabled language.
Default value is empty. Use the button next to the Display delay text box to centre the
message text.
- Enter the displaying delay in seconds (0 sec to 4 min:15 secs). Default value is 2 secs.
- Repeat both steps for the second message.
Special characters
By combining the commands listed in the following table, you can display the KTES current hour
and date according to different formats. For example:
- Hide PIN number : Select this check box to hide the tenant’s PIN numbers on the
LCD. Default value is deselected.
- Backlight delay : TheBacklight Delay is the maximum delay of inactivity before the
LCD backlight turns low (0 sec to 4 min:15 secs) . Default value is 20 secs.
- Next character delay : TheNext Character Delayis the maximum delay allowed
between each key press before considering a next character entrance when entering
a text string at the keypad (0 sec to 4 min:15 secs) . Default value is 2 secs.
- Find user timeout delay : After pressing theFindoption key, the Find user timeout
delayis the maximum delay allowed between each key press before cancelling a find
sequence (5 sec to 4 min:15 secs). Default value is 15 secs.
- Programming PIN timeout delay : The Programming PIN timeout delay is the
maximum delay allowed to enter a complete valid PIN number before entering in
system programming mode (5 sec to 4 min:15 secs) . Default value is 20 secs.
- Programming mode timeout delay : The Programming mode timeout delayis
the maximum delay allowed between each key press before exiting from the
programming mode and returning to the welcome messages (5 secs to 9h:59 min).
Default value is 60 secs.
3. Specify the Duress options. A Duress alarm is used by employees or tenants to signal for
help:
- Duress on access granted : Allows a tenant to trigger a duress alarm after a valid PIN
entry. Default value is deselected.
- Duress on access denied : Allows a tenant to trigger a duress alarm after an invalid
PIN entry. Default value is deselected.
- Keypad duress key : Set this parameter to configure the symbol that will activate the
duress functions. A Duress alarm is used by employees or tenants to signal for help(0
to 9, # and *). Default value is 9.
- Power failure: This is the relay that can be activated when a KTES AC power failure
occurs. The default value is none.
- Battery trouble: Relay that will be activated if the 12 volts standby battery is
disconnected or comes low (under 11.5 volts DC). The default value is none.
- Tamper in alarm: This is the relay that can be activated when a KTES tamper switch
event occurs. The default value is none.
- Buffer 70% full: Relay that will be activated if the event buffer for the EntraPass
software has reach a 70% capacity. The default value is none.
- Lock power trouble: This parameter defines the relay to be activated in the event of
a door lock problem, locking device disconnected or shorted to ground. The default
value is none.
- Other troubles: Relay that will be activated when any other trouble on the KTES
occurs. The default value is none.
- Heater kit activated: Relay that will be activated when cabinet inside temperature
falls below +5oC. The default value is none.
- Postal lock: Relay that will be activated with an entry request from the front door
postal lock. The default value is none.
- For each event you can configure a pager call type. You can select No call (the relay
activation for that event will not be sent to the pager), Immediate call (the relay
activation for that event will be sent immediately to the pager) or Schedule call (the
relay activation for that event will be sent to the pager according to the pager call
schedule). The default value is No call.
Note: To specify pager call types for each events, the Pager reporting function
must be enabled.
- Pager phone number : The pager phone number to which events will be reported (24
characters maximum). Default value is empty.
- Pager call schedule : The schedule number from which the KTES can communicate
programmed events, alarms and troubles to the pager. Select a schedule from the list
and click OK.
Note: See Schedules Definition for more information about schedule definition.
- Unit ID : The Unit ID identifies theKTES that sent the pager code(0001 to 9999).
Default value is 0001.
- Restore code : The Restore codeis the pager code corresponding to the general event
that triggered a zone restore condition (0 to 999). Default value is 0.
- Alarm code : The Alarm code is the pager code corresponding to the general event
that triggered a zone alarm condition (0 to 999). Default value is 1.
- Tamper code : The pager code corresponding to the general event that triggered a
zone tamper condition (0 to 999). Default value is 2.
- Trouble code : The pager code corresponding to the general event that triggered a
zone trouble condition (0 to 999). Default value is 3.
- Field separator : The Field separator is the character to be used as a field separator
or delimiter (*, # or ,). Default value is *.
- Field ending : TheField ending is used to indicate that the call is completed.
Remember that you can enter any signs for the ending parameter (*, # or ,). Default
value is #.
- Tamper in alarm : The pager code that corresponds to a tamper switch problem (0 to
999). Default value is 100.
- Power failure : The pager code that indicates an AC power failure on the KTES (0 to
999). Default value is 101.
- Battery trouble : The pager code that indicates a low battery problem on theKTES(0
to 999). Default value is 102.
- Buffer 70% full : The pager code sent to indicate that the event buffer for the
EntraPass software has reach a 70% capacity (0 to 999). Default value is 103.
- Other troubles : The pager code that corresponds to any other system event that can
occur (0 to 999). Default value is 104.
- Door forced open : The pager code thatcorresponds to a forced open door (0 to 999).
Default value is 120.
- Door open too long : The pager code that corresponds to a door opened for too long
(0 to 999). Default value is 121.
- Door alarm on relock : The pager code that corresponds to a door left opened (0 to
999). Default value is 122.
- Lock trouble : The pager code that corresponds to a problem with the door locking
device supervision (0 to 999). Default value is 123.
- Keypad disabled : The pager code that corresponds to a keypad disabled condition
(when the option is enabled (0 to 999). Default value is 124.
7. In the Selected doors section, select which door will affect the output you are configuring:
- First door: Only the first door port will follow the state programmed for these events.
- Second door : Only the second door port will follow the state programmed for these
events.
Note: This option is not available with KT-100 and KTES.
8. Set the Activation period (m:ss) delay . It defines the activation time in seconds during
which the output remains active when it is programmed for a temporary activation. It will
leave the output activated indefinitely, regardless of the activation type. Values range from 1
sec to 4 min:15 secs. Default is 5 secs.
Note: This option is not available when you are using the KT-400 or the KTES.
If you are using the Video Integration feature, EntraPass enables you to assign all
system components into a video view, the same way you assign them to a system
interactive floor plan (graphic). To do this, you simply select the video view where you
want the system component (Workstation, site, gateway, controller, etc.) to appear.
1. Select the Definition tab to associate a door event with an auxiliary output.
2. In the Options column, associate an event with an output state. Default is None .
- Steady timed : The output given this option will not flash, it will remain activated for
the specified activation period and will return to normal state when the activation
period is over.
- Flash timed : The output will flash and remain activated for the specified activation
period and will return to its normal state when the activation period is over.
- Steady : The output given this option will not flash, it will remain activated until it
returns to normal condition.
- Flash : The output will flash and remain activated until its condition returns to normal.
Relay configuration
Use the output control relays provided on each KT-100, KT-200, KT-300, KT-400 and KTES to activate
alarms or other devices such as lighting control, ventilation, and air conditioning. You can activate
these relays according to schedules, events reported by the system. You can also activate them to
indicate the status of an alarm system or a combination of different logic conditions.
Defining relays
1. Click the Devices tab, and click Relay.
2. Select a Site filter from the list.
3. Select the Gateway.
7. Specify the Automatic activation schedule: When this schedule is valid, the relay will be
triggered (activated or deactivated) according to the specified activation mode.
8. Specify the Disable relay action: When this schedule is valid, the relay will be deactivated (or
activated) according to the predefined operating mode .
9. Set the Temporary activation timer to indicate the delay during which the relay will be
temporarily triggered following a temporary activation.
Note: When the timer is set to zero, the default activation delay is set to five seconds.
Maximum time allowed: 9:06:07 (9 hours, 6 minutes and 7 seconds). When you are
using the KT-400, the maximum time allowed is 18:12:15 (18 hours, 12 minutes and 15
seconds).
10. Select a Graphic and Video view associated with the relay, if applicable.
Site configuration
About this task:
A site is composed of one or many physical connections. For more information about connections,
see Connection Configuration.
You can link together a large number of controllers, communicating over IP within an EntraPass
system, into a common virtual site, regardless of their physical connections.
Camera definition
You can assign names to cameras, presets, and patterns for easy identification in the Video desktop
and in all system video events.
The definition of a camera includes identifying its:
The camera name is displayed when viewing live or recorded video events (Intellex only). The
default names are Camera1 through Camera n (where n is the last camera number).
Defining a Camera
1. From the Video window toolbar, click the Camera button. The Camera window appears.
2. Select the camera you want to define, then assign it a descriptive name in the enabled
language fields. It is recommended to assign a name both in the primary and secondary
languages if the system is running in two languages.
3. Select the Camera type from the drop-down list.
4. Check the Show camera option for the camera to be accessible for selection and display
in the Video view desktop. It is important to check this option if you want the camera to
be enabled in EntraPass. Only operators with appropriate permission will be able to view
a camera with the Show camera option not checked (Hidden/covert cameras). To assign
permission to an operator: System > Operator definition > Privileges .
Note: If you leave the Show camera box unchecked, the camera will not appear in the
Video view component window ( Video view > Modify video view components ) and will
not therefore be assigned in the Video desktop for view. This feature allows to hide a
camera from all view. Operators who do not have appropriate permission will not be
able to view, search, export or carry any other operation on a camera for which they
do not have access permission. However, all links and references to this camera will be
kept. This feature is different from deleting a camera since links to a deleted camera are
deleted as well.
- Video View: The video view selected will be displayed when an alarm occurs on this
camera.
- Graphic View: The graphic view selected will be displayed when an alarm occurs on
this camera.
1. From the Camera window, select the camera you want to associate with an button, then click
or double-click the button next to the camera type drop-down list. The Select an button
window opens.
2. Choose an appropriate button to associate with the selected camera, then double-click it to
close the window. When you do this, a camera is associated with an button using the button
index.
- The Camera button in the Camera window toolbar allows you to add custom buttons
to the list of available buttons. The list of buttons is displayed when you click the
Camera button in the toolbar.
- Camera advanced motion alarm (Intellex only) : the camera will send any event
related to a motion alarm.
- Camera alarm (Intellex only) : the camera will send any event related to a change
that occurred in the target area.
- Camera light alarm (Intellex only) :
- Camera motion alarm : the camera will send to the EntraPass server all video
segment events related to any movement that occurred in the target area.
- Camera override (Intellex only) :
- Camera perimeter (Intellex only) : the camera will send all video segment events
related to an object, that has crossed into or out of the target area, to the EntraPass
server.
- Camera text alarm (Intellex only) :
4. Enter the comment you want to associate with the camera being defined, then save and close
the window.
Result
Current recording
Use the current recording feature to view the list of all on-going recordings. The information
displayed depends on the source of the recording request:
• Started by a video trigger
• Started by an operator
• Started by an alarm on the video server
Result
The following table shows the information displayed in the Current recording window depending
on the source of the recording.
1. In the Video window, click the View exported video button. The Video folder opens
automatically and includes the list of all exported video sequences that have been exported.
2. Select a video sequence. The video thumbnail appears in the lower left part of the window.
The directory contains the Date and Time the video was taken, the video file format ( Type
) and the File Name . You can then click the Preview button for details about the exported
video.
• KVI (Kantech Video Intellex format). Video data are stored in Intellex format (.img). A simple
double-click allows you to view the file using VideoPlayerIntellex.exe.
1. From the video event list, select the video event you want to export.
2. Click the Export button. The Enter a video filename window opens.
3. Enter a file name in the File name field. By default, the file is assigned the Kantech KVI
format. The file will be saved among EntraPass program files:\Kantech\Server SE\Video. Later
you can call this file simply by double-clicking it.
Note: Video files can be viewed in the Exported video window ( Video tab > Exported
video ). The video file is displayed with its name, date and time. Key frames (if any)
associated with a video clip can also be previewed in this window.
4. Click Save to close the Enter filename window. When you do this, the Description and
password window appear.
• Click the Video server tab to search for a video segment on a specific video server.
• Click the Events tab to filter events.
• Click the Options tab to determine the size of the video you are looking for. Appropriate user
access rights are necessary for performing this task.
3. Select the video server that you want to include in the search. You can select All video
servers if you want to search through all video servers defined in the system.
Note: If an event was registered by more than one video server, at least one of the
servers must be selected for the event to be included in the list.
4. Click the Events tab to filter events to be included in the report. If you select All events, all
the specific events are selected.
5. Click the Options tab to filter video segments according to their duration.
6. Check the Video segment duration limit option, and enter the duration in the Greater than
(mm:ss) and Smaller than (mm:ss) fields. The value entered is in minutes and seconds. This
feature allows you to target video segments meeting specific duration criteria.
Use the Play button to view a video event. When you click this button, the Video
desktop displays the video event. If only one camera was used, which is most often
the case, the system displays the duration of the video event. If the video event
was recorded by more than one camera on a single server, the video server will use
the most optimal display layout. If the video event was registered by more than
one server, it is possible to select a specific video server. For example, 2x2 for a
maximum of 4 camera, 3x3 for a maximum of 9 camera and 4x4 for a maximum
of 16 cameras. For events with various length, events will be played based on the
longer event. Note that this feature shows limitations when used in systems not
configured for continuous recording as it will not display cameras involved outside
the selected time frame.
The Retry aborted button enables operators to trigger any archiving process that
was suspended.
Use the Menu button to display the buttons in the lower part of the window and the
Legend button to display a legend about the status of the displayed video recording
events.
The KVI (Kantech Video Intellex), KVA (Kantech Video AVI), IMG, AVI and PS formats
are available for your Export needs. These formats allow users to store all the data
relative to a video event such as the event button or key frame, description, etc.
The Save button is enabled when an operator enters data in the Comment field. It
enables operators to save comments associated with a video event.
The Cancel button is enabled when the Comment field is modified. It enables
operators to discard the comment and to go back to the previous value.
Recording parameters
Use the Recording Parameters menu to define parameters that control video recording and to
associate recording parameters, such as video source and cameras, with a video trigger. For each
recording event, you must specify parameters such as the video server source, the camera, etc.
A recording can be stopped by a timer (maximum recording time) or by a trigger when a stop
recording trigger is used. A source component must be specified for each type of triggering event.
For example, the “door” component must be specified for the “Door forced” event message. The
resulting action (whether to start or stop recording) must also be specified.
You can associate multiple recording parameters with one trigger. In this case, all recordings are
associated with the single event and it is possible to save all record segments as a single event
recording.
1. From the Video toolbar, click the Recording parameters button. The Recording parameters
window appears with the General tab enabled.
2. Click the New button to create new Recording parameters (or select one from the
Recording parameters drop-down list) and assign a descriptive name to the Recording
parameters.
3. From the Video server pop-up window, select the video server that will be used for the
Recording parameters.
4. From the Camera drop-down list, select the camera for this Recording parameters.
Note: If the selected camera is a dome, you can specify the Preset or Pattern name and
number. Defining these options allows you to direct the camera to a specific position
for recording. However, the pre-alarm time feature may not work well with the preset/
pattern option. In fact, the pre-alarm may be triggered when the camera is directed to a
location different from the one where the video recording event occurred.
5. From the Start recording trigger pop-up window, select the Video trigger you want to
associate with the Recording parameters being defined. The Video trigger pop-up window
displays all video triggers defined in the system.
6. In the Timings section, specify:
- Pre-alarm time (m:ss) : This option enables users to retrieve from the video server,
segment that was recorded before recording was triggered. For example, if a
recording was triggered at 2:00 PM and if the Pre-alarm time is 1min. 0 seconds, the
record segment will start at 1h 59.
- Maximum total recording time (m:ss) : This options allows you to specify a
maximum length for the recording. This includes the pre-alarm time but not the post-
alarm recording delay. The maximum allowed is 5 minutes.
1. From the Recording parameters window, select the Stop recording trigger tab.
- Post-alarm recording delay (m:ss) : this delay enables the system to end recording
when an “end recording delay” condition has been used. Moving the mouse pointer
over the field shows the value range allowed in the field.
- Trigger : select one (or more) trigger(s) that will stop recording.
Video desktop
The video desktop allows operators to display and monitor, in real-time, video cameras that are
configured and connected to the network.
• Video triggers
• Search for a specific event associated with a video segment based on the date and time when
the video was recorded
• Play a video segment
• Export the video segment for future consultation
• The Details tab displays the text description of the video event such as the video server that
recorded the event, the operator who was logged on, etc.
• The Cameras tab shows cameras that are associated with a selected event.
• The Image tab contains the key frame for the video sequence. The key frame serves as
preview of the video sequence. It is from this pane that you can associate a video key frame
and link it to the video segment.
Note: Video recordings can be streamed from the left-hand pane ( Play button) or from
the Camera tab. You can also view camera recordings from the Message desktop. To
do so, you have to select a video recording event (identified by a camera button in the
Message desktop), right-click it and select Video recording > Play from the shortcut
menu.
1. From the Video event list, select an event, then click the Play button. The video clip appears in
the Video Playback window.
2. You may select the Cameras tab to view information about the camera that captured the
selected event.
3. You can:
- Click the Play button to view this video segment of the selected camera for the
duration of the recording. The video appears also in the Video desktop ( Desktop
menu)
- Click the Export button to export it for future use. For details, see Exporting Video
Files.
1. From the Video event list , select an event, then click the Image tab (right pane).
2. From the image window, you can:
- Import image : click the Import button to retrieve a previously saved or exported
image from a file.
- Paste image : click this button to paste a previously snapped image. The Paste image
button is enabled only when you have snapped (copied) an image while viewing it.
You can first play a video clip, snap it and then paste it.
- Clear : click the clear button to delete the displayed image from view.
• KVI (Kantech Video Intellex format). Video data are stored in Intellex format (.img). A simple
double-click allows you to view the file using VideoPlayerIntellex.exe.
• KVA (Kantech Video AVI format). Video data are stored in AVI format (.avi). A double click
opens the video file using VideoPlayerWindow.exe.
• AVI format
• IMG format
• PS format
1. From the video event list, select the video event you want to export.
2. Click the Export button. The Enter a video file name window opens.
Note: The password protection is applicable to KVI and KVA video formats only.
1. Select the video you want to export, then click the Export button.
2. Enter a description for the video segment, in the Enter Video file name window, then click
Save . The Description and password window appears.
3. Check the Use password box if you want to add more security to this video segment. Users
will have to enter this password in order to view the saved video segment.
4. Enter a password and confirm the password in the displayed field.
5. Click OK to close the Description and password window. Click OK to close the system
message confirming the export.
Video playback
Use the video playback feature to view recorded video of up to 16 cameras simultaneously. To do
so, you have to specify the period of time for the playback. A maximum of one hour is allowed.
- Snap : copy the displayed image and save it in the \tmp\image folder and use it
as a still image representing the video sequence. Later, the snapped image will
automatically appear in the View exported video when browsing the exported videos.
It is recommended to add a comment to the snapped image; the comment will
appears next to the image.
- Export : export the video clip for future usage
- If the server is offline for long periods, for example for maintenance, clear the Online
check box. If you do not clear the check box, EntraPass continues to poll the video
server and this may cause the system to hang.
6. In the IP address field, enter the static IP address of the video server. Ensure that the video
server is set to a static IP address. For more information about the video server IP address,
contact your network administrator.
7. In the Domain name field, enter the video server domain address.
8. In the Web service port field, enter a port number for Video (Intellex only),
Communication (Intellex, HDVR and TVR II) , and Event (Intellex only). Ensure that the
port number matches the port used by the DVR.
Note: The video application uses transmission control protocol (TCP) port to
communicate with EntraPass. Options displayed in the TCP port section depend on
the device you are configuring. For details about ports and their settings, contact your
network administrator or refer to the documentation provided with your DVR.
9. The Secure Connection (HTTPS) check box is selected by default for the primary and
alternative IP addresses.
- If the server cannot support HTTPS protocol, clear the Secure Connection (HTTPS)
check box. A warning message appears: Using a non-HTTPS protocol will make your
system less secure. Are you sure?. Click Yes to change the protocol to HTTP.
Note: To use HTTPS protocol, you require an SSL certificate. For more information, see
Step 2 in the Security hardening guide.
10. On the Server Parameters tab, select the Bypass Ping for identification (Intellex only)
check box if you want to conserve bandwidth usage. If you do not select this option, the
workstation continually polls for server identification.
- In the Number of cameras field, enter the number of cameras that are connected
to the video server or click Import camera details. If you click the button, EntraPass
connects to the video server to retrieve the number of cameras and the default names
for the cameras.
- Specify the Polling frequency (mm:ss). The polling frequency refers to the delay
between two polls from the Kantech server to the video server. This operation is
processed by the Kantech video server interface.
- Specify the Polls before Communication failure. This refers to the number of
unsuccessful polls before the video server is declared as offline. For example, if you
enter 4 in this field, EntraPass attempts to connect to the video server four times
before the video server is declared as offline.
- Click the up and down arrows to specify the Time zone adjustment if the EntraPass
server and the DVR server are not in the same time zone. The time zone adjustment
refers to the time zone difference between the DVR server and the EntraPass server.
Adjusting the time zone enables workstations to retrieve events generated by the DVR
server at the EntraPass server’s time.
- Select the Time for clock synchronization (Intellex only) check box. The time
synchronization refers to the time of the day when the video server synchronizes
with the Kantech server for date and time. This operation is processed by the Kantech
video server interface.
Note: The EntraPass server is the reference time source. The video server
processes the time according to the EntraPass server’s time. For example, if the
EntraPass server’s time is 3:00 and the video server's time is 2:00, the timezone
adjustment data is -1 so that the video server can display the correct information
about an event that occurred at a specific time.
- Domain name : enter the domain name used by the Intellex Video server (not used
for HDVR and TVR II) .
- Login name : enter the login name used for accessing the video server.
- Password : enter the password specific to the domain controller.
Installation of the Remote Video Connection will add 128 new video servers.
• For details about installing EntraPass Video Vault, see Adding System Components.
• For details about configuring the EntraPass Video Vault application, see .
• For details about using EntraPass Video Vault, see .
Result
Video triggers
Video triggers are system events that start or stop recording. Any event related to the selected
component type can trigger recording including exception events originating from a video server.
A source component must be specified for each type of triggering event. For example, the “door”
component must be specified for the “Door forced” event message. There is no limit to the number
of definable video triggers.
Based on an event that occurred on the selected system component, the trigger will start or stop
recording.
Note: The list of parameters depends on the video server type connected to EntraPass. It can
vary depending on server feature availability and decisions on subsequent implementation. All
EntraPass events can be associated with the video trigger function.
1. From the Video toolbar, select the Video trigger button. The Video trigger window appears.
2. Click the new button (or select an existing trigger if you want to modify one). Assign a
descriptive name to the trigger.
• Single camera
• Multiple cameras
• Multiple graphics and cameras
• Server-specific view: these are created by dragging a server into the display
• Multiple video servers: depending on their needs, EntraPass users can create views from
multiple video servers.
4. Click the Test button to view the result of the selection. The displayed Video view appears in
the Video desktop for video monitoring and surveillance ( Desktops > Desktop dedicated to
video monitoring).
Note: To delete a camera from a cell, right-click it, then select Delete from the shortcut
menu.
5. Click the Close button (bottom left or the “X” top right) to close the Video test window.
- Large: 1024x768
- Medium: 800x600
- Small: 640x480
- Tiny: 400x300
- Last used: displays the size that was previously displayed in the video desktop.
5. From the Default size on graphic list, select a size for the image to display on the system
graphics (Large, Medium, Small, Tiny, Last used).
6. Specify the Refresh rate percentage using the Up/down arrows.
Note: The Refresh Rate Percentage is related to the image compression/quality.
The image quality impacts the system performance: the higher the quality, the lower
the compression and the lower the system performance. If you set the Refresh
Rate to high (> 80), the compression is low. As result, the application uses a larger
network bandwidth. This may result in a slower process. The following table shows the
recommended options.
- Show overlay Intellex and HDVR only): select this option if you want the camera
identification (camera name and server) to appear in the video desktop.
- Show camera control: select this option for use with dome cameras. Selecting
this option allows operators to control a dome camera. It is not available with fixed
cameras.
- Show metrics (Intellex only): select this option to enable the system to display the
number of frames per second (Fps) and the number of bits per seconds (Bps) for the
selected camera. The information appears in the upper section of the video window
(and in the video desktop).
- Auto-hide text (Intellex only): if you select this option, the system does not display
the information related to a camera.
9. Select the Enable video pattern check box to alternate video images in the video window. If
you have defined a 2X2 view, the video pattern is composed of four images alternating in the
video display according to the delay specified in the Camera display delay field. If you do not
select this option, the video view displays all the cameras simultaneously.
Note: The enable video pattern section is enabled once components are assigned to the
video view.
10. Select the Delay before launching sequence (m:ss) check box to specify the transition delay
before the images start alternating in the Video window.
11. Specify the Display delays for Cameras, Presets, Patterns and Graphics.
Note: These delays indicate the time interval during which a video or graphic appears
in the video display before it is replaced by another. See the following table for the
minimum or default delays. The maximum delay is 9:59 seconds.
• The physical components (EntraPass applications, sites, controllers, doors, relays, inputs and
auxiliary outputs), and
• The logical components (cards, schedules, reports, instructions, groups, etc.).
Operators can edit or sort the system components from the Database structure window.
• Direct events to output devices (such as Messages desktop and log printer),
• Define schedules that will allow, for example, to send alarms only at night,
There are more than 400 system events. The most common among them are:
• Access granted
• Input in alarm
• Card modified by operator, etc.
Events are associated with system components, such as doors, controllers, etc. Every event
message is associated with a system component and output devices or group of devices. For
example, an Access granted event can be defined for each individual door or by default it can be
defined for all doors. This flexibility allows for different actions or responses on a door-by-door
basis.
• Default associations: Default associations are preset in the system. By default all events
messages occur on all components associated with them and are displayed in messages
desktops. You can keep the default settings.
Table 40: Default associations
Default associations
Component Workstation Comments
Default Default All events originating from all components are sent to all
workstations
Default (Specific) All events originating from all components are sent to
Workstation 2 only Workstation 2
Specific (Door 1) Default Only events originating from Door 1 are sent to all
workstations
• Manual associations: Manual associations are set up by the administrator and allow you to
send messages to message desktops for specific events. The following table shows the three
types of manual associations.
Note: Manual associations take priority over default associations. When you define
a manual association between an event message and a component, the default
association is ignored. It can be restored by deleting the manual association. Manual
associations should be used with caution.
4. From the Print pop-up menu, select a schedule to determine when the event will be printed.
When this schedule is valid, the selected event will be printed
5. From the colour drop-down list, select the colour that will be used to display the event in the
Message desktop. The default colours are set according to the following convention:
- Alarm (schedule )—When this schedule is valid, the event will be sent to the Alarms
Desktop and will require an acknowledgement from the operator.
- Instructions —Select the instruction that will be sent to the Instruction desktop with
the event to be acknowledged. Instructions will only be sent when the alarm schedule
is valid.
7. Assign the Priority level to the event using the slider. This determines the sequence in which
alarm messages will be displayed to the operator in the alarm queue. The priorities are
preset to the most common values (0 = higher, 9 = lower).
- Print empty fields : If selected, the system will print the fields that do not contain any
information. Only the field title will be printed.
- Print with default values : If selected, the system will print the default associations
as well as manual associations.
Note: If you do not select this field, only manual associations (not involving
defaults) will be displayed in the report. If you do not have manual associations
(component x with event y), the report will be empty.
- Print components reference : If selected, the system will print the component
physical address next to the component identification.
- Use the Font button to choose a different font (and font size) for your report.
- Select the Preview button before printing, if desired.
Instructions definition
This menu is used to define instructions that must be assigned to events. When an alarm
is generated, the instruction will display in the Instruction window (Desktop menu) for
acknowledgement. Usually, each line will contain a single directive; the response instructions will
be composed of several directives (lines). This allows for greater flexibility when modifications are
required.
Defining an Instruction
1. From the Definition main window, select the Instruction button.
2. To create a new instruction, click the New button. To modify an existing instruction, select
one from the Instruction drop-down list.
3. Enter the instruction name/identification in the language section.
4. If the Mandatory alarm comment checkbox selected, the operator will have to add a
comment in order to mark the alarm as “acknowledged”.
5. Select an appropriate language tab to enter the instruction. Instructions are entered in one
selected language.
Note: You may enter up to 511 characters (including spaces) per instruction.
6. To assign instructions to events, see Trigger and Alarm.
- Door filter : Only events related to the selected doors will be sent to the Filtered
Message desktop
- Pictures filter : Cardholders pictures related to cards presented to the selected doors
will be sent to the Filtered Message desktop
- Filters for doors and pictures : Door events related to the selected doors as well as
cardholders pictures that triggered door events on the selected doors will be sent to
the Filtered Message desktop.
7. Select the Gateway and connection tab to filter gateways and sites events sent to the
Filtered Messages desktop.
8. Check the All events option to receive events originating from the components of the sites.
You may select the connection that will send events to be displayed.
Note: When you use filters, the system retrieves events that are already displayed in
your Message desktop and sorts these events according to the settings of the selected
filter.
9. Select the Special filter tab to filter events according to their type.
- Picture : all events associated with a card holder’s picture will be displayed in the
Filtered Message desktop.
- Fail-soft : all events generated by a controller in stand-alone mode following
a communication failure will be sent to the Filtered Message desktop. Fail-soft
messages are identified with a + sign in the Filtered Message desktop (and Message
Desktop) when this option is select when defining the Messages list properties (
Desktop > Message Desktop > right-click an event > Properties ).
- Video : all video record events will be sent to the Filtered Messages desktop.
Operators definition
Use the Operator menu to define system operators and to determine their security level and
privileges. An operator is responsible for issuing cards, carrying out manual operations on system
components, requesting reports, and arming the system. For security reasons, each operator
accessing the system database should have his/her profile defined to ensure that all the actions
performed in the system will be traceable. You need to create at least one operator account or
modify the pre-created accounts for the operator to use and operate EntraPass and to receive
event messages.
There is one default operator created in the system:
Installer: full access to view, modify, delete, and print components. The default username is
kantech. You must create a new password. For information about creating passwords, see
Password rules.
Note: You can define operators using the default operator or you can create new operators.
For information about operators’ security levels, see Security Level Definition.
- Select the Auto acknowledge option. If this option is selected, the Manual button
is added to the Alarms desktop (see Alarms Desktop). The operator can decide to
manually or automatically acknowledge events. This is an operator privilege.
Note: Operators cannot see items that they have not been given access to.
- To create a new security level, click the New icon and enter the necessary information
in the language section.
• Operator login options: you can allow or restrict an operator to log in an EntraPass
workstation.
• Active windows that can be kept on the desktop: EntraPass allows operators to keep two
active windows on the desktop.
• Component display options: components can be displayed with our without their physical
address. The physical address can appear on the left or right of the component name.
- Select Allow login on server to allow the operator to log in to the EntraPass server
(Primary or Redundant).
- Select Allow login on workstation to allow the operator to log in to any application in
the system. the system.
3. The Keep on application desktop section allows users to increase the number of active
windows on the desktop. In fact, operators can open two windows at the same time.
EntraPass windows are classified in two categories:
- Configuration screen : this group includes all the menus that allow an operator to
program the system. This group includes such menu items as: User menu (card,
Badging, card access group, access level, Definition menu; Group menu; Devices
menu; System menu; Custom and In/Out reports .
- Operation screen : this group includes all the Operation menu items and the Video
playback option.
4. In the Components physical address section, specify how the component's physical address
will be displayed. This will also affect how components will be sorted.
- Display on left —If selected, components will be sorted by their address (i.e. 01.01.01
Controller xyz).
- Display on right —If selected, components will be sorted by their component name
(i.e. Controller xyz 01.01.01).
- No display —If selected, the address will not be displayed (i.e. Controller xyz) and
components will be sorted by name.
- Hide card holder pin content: If selected, it offers you the ability to hide the card
holder pin content from the view.
- Hide Camera from video view: If you are using the Video feature, EntraPass enables
you to deny viewing permission to a specified security level.
Note: Checking the Hide camera from video view option tells the system to
verify access permission to cameras before loading a video view. For example,
if the selected operator’s security level has access to a video server but not to
all cameras defined in the video server and has access to the selected video
view, the system will hide the camera that has been un-selected when assigning
permission to the video server. For details, see Video Server Configuration.
2. Select the fields (either individually or in groups) that will be hidden to the selected security
level. Click on a field box repeatedly to scroll through the different status (Normal, Hide, or
Read only).
1. From the Security level drop-down list, select the security level you want to define/edit.
2. Select the Video custom button tab to assign permission to this operator. The following
permission can be granted:
3. Select the option you want to assign to the operator being modified.
Note: Pressing the button associated with Playback with fixed delay will start a play
back with the specified duration. This includes the pre-alarm recording time and the
maximum recording time.
Workspace Definition
Workspaces allow System Administrators to grant or deny operators access to system physical
components such as gateways, sites, relays, etc. Workspaces are defined according to the type of
tasks the operators will be allowed to perform in EntraPass; creating and editing items, viewing
components, printing lists or reports, etc. Operators who are assigned a given workspace will not
be able to see nor modify EntraPass components that are not selected in that workspace definition.
Workspaces can also be used by operators to discriminate the information they want to view on
screen. For example, a System Administrator who has access to all components of the EntraPass
system may want to view only specific components. In that case, the System Administrator can
define a specific workspace for that environment and work within those parameters.
Note: There is only one default Installer workspace created when you install EntraPass for the
first time.
- Select All gateways and sites if you want all the displayed gateways and sites to be
available to the operator assigned to this workspace.
- You can also select individual gateways and sites from the displayed list.
Defining Schedules
1. Move to the Schedule tab to select the list of schedules that will be available to an operator.
- Select All schedules if you want all the displayed schedules to be available to the
operator who is assigned this workspace.
- You can also select individual schedules from the displayed list.
Defining Controllers
1. Move to the Controller tab to select the list of controllers that will be available to an operator
who is assigned the workspace.
- Select All controllers if you want all the displayed controllers to be available to the
operator who is assigned this workspace.
- You can also select individual controllers from the displayed list.
- Select All doors if you want all the displayed doors to be available to the operator who
is assigned this workspace.
- You can also select individual doors from the displayed list.
Defining Relays
1. Move to the Relay tab to select the list of relays that will be available to an operator who is
assigned the workspace.
- Select All relays if you want all the displayed doors to be available to the operator
assigned this workspace.
- You can also select individual relays from the displayed list.
Defining Inputs
1. Move to the Input tab to select the list of inputs that will be available to an operator who is
assigned the selected workspace.
- Select All inputs if you want all the displayed inputs to be available to the operator
assigned this workspace.
- You can also select individual inputs from the displayed list.
1. Move to the Access level tab to select the list of access levels that will be available to an
operator who is assigned this workspace.
- Select All access levels if you want all the displayed access levels to be available to an
operator who is assigned this workspace.
- You can also select individual access levels from the displayed list.
1. Move to the Alarm system tab to select the list of alarm systems that will be available to an
operator who is assigned this workspace.
- Select All alarm systems if you want all the alarm systems to be available to the
operator assigned this workspace.
- You can also select individual alarm systems from the displayed list.
1. Move to the Card Filter tab to select the list of card filters that will be available to an operator
who is assigned this workspace.
- Select All cards filter if you want all the card filters to be available to the operator
assigned this workspace.
- You can also select individual card filters from the displayed list.
Defining Reports
About this task:
This feature gives operators access to specific reports according to their workspace. For example,
a System Administrator may have access to all the reports that can be generated whereas the
Guards’ Supervisor may only have access to all Guard Tour related reports. The reports will be
generated from the Archived Message list on the workstation desktop. Once the reports have
been assigned to workspaces, operators will only have access to reports that correspond to their
workspace.
1. Move to the Report tab to select the list of reports that will be available to an operator who is
assigned this workspace.
- Select All reports if you want all the displayed reports to be available to the operator
who is assigned this workspace.
- You can also select individual reports from the displayed list.
Defining Graphics
1. Move to the Graphic tab to select the list of graphics that will be available to an operator who
is assigned the workspace.
- Select All graphics if you want all the displayed graphics to be available to the
operator assigned this workspace.
- You can also select individual graphics from the displayed list.
Defining Operators
About this task:
For security reasons, an operator can see and change another operator’s rights. Use the Operator
tab to limit the possibility for an operator to see, edit or delete another operator.
1. Move to the Operator tab to select the list of operators that will be available to an operator
who is assigned the workspace.
- Select All badge layout or individual badge layouts from the displayed list.
Defining Workspaces
About this task:
This feature gives operators access to information that pertains to specific workspaces according to
other operators workspaces. For example, Guards in the system may have a workspace assigned to
them according to the area they are patrolling and the type of information they can view and edit in
EntraPass. The Guard’s Supervisor, however, must have access the information available to all the
Guards working in his department. In that case the list of workspaces for the Supervisor will contain
all the Guards’ workspaces defined in EntraPass.
1. Move to the Workspace tab to select the list of workspaces that will be available to an
operator who is assigned the selected workspace.
- Select All workspaces if you want all of them to be available to the operator who is
assigned this workspace.
- You can also select individual workspaces from the displayed list.
1. Move to the Security level tab to select the security level (s) that you want to assign that
workspace. If you must create a new security level, see Security Level Definition.
- Select All security levels if you want to assign them all to that workspace.
- You can also select individual security level from the displayed list.
1. Move to the Video server tab to select the list of video servers that will be available to an
operator who is assigned the selected workspace.
- Select All video servers if you want all of them to be available to the operator who is
assigned this workspace.
- You can also select individual video servers from the displayed list.
Defining Cameras
1. Go to the Camera tab to select the list of cameras available to an operator who is assigned
the selected workspace.
- Select All cameras if you want all the cameras to be available to the operator who is
assigned this workspace.
- You can also select specific cameras from the displayed list.
- Select All video views if you want all of them to be available to the operator who is
assigned this workspace.
- You can also select individual video views from the displayed list.
Defining Panels
About this task:
Associating panels to a workspace allows you to control the panels that an operator can define or
modify.
- Select All panels if you want all the panels to be available to the operator assigned
this workspace.
- You can also select individual panels from the displayed list.
1. Move to the Panel Component tab to select the list of panel components that will be
available to an operator who is assigned this workspace.
- Select All panel components if you want all the panel components to be available to
the operator assigned this workspace.
- You can also select individual panel components from the displayed list.
Defining events
About this task:
Use this feature to define the event messages that display to operators who are assigned the
selected workspace.
1. Click the Events tab to select the list of events that you want to display on an operator
workstation. These events display for operators who are assigend to the workspace.
2. Save your modifications.
Operators in Workspace
1. For security reasons, an operator can see and change another operator’s rights. An
additional tabulation was integrated under Workspace to limit the possibility for an operator
to see, edit or delete another operator.
2. From the System menu, select Workspace.
3. Select an operator from the drop down list.
4. Select the Operator tab. You will see a list of operators who can be seen by the selected
operator in the Workspace drop down.
Audit
About this task:
Use the Audit icon to view which operator made changes or deleted a component.
1. To open the Audit window, click the System function, and click Audit.
2. To select an operator, choose from the Operator list.
- All
- Create
- Modify
- Delete
4. In the Start date and time field, select a date and time to start the search.
5. In the End date and time field, select a date and time to end the search. Click Search.
The search results populate two tables, the first table contains the folowing component
information:
- Green: Create
- Blue: Modify
- Red:Delete
- Date and time: the date and time the card was created, modified, or deleted.
- Type: the menu that was changed.
- Component Type: the component that was changed.
- Count: the number of fields that were changed.
- Account column: indicates, which system account the change occurred.
To access the following column options, click the Hamburger icon in the
upper left table.
- Data type: the database data type:
- TimeStamp
- Integer
- Object
- Components
Note: Define the results based on the amount of records, or by date. For more
information, see .
- CSV export selected: export the selected entry of the card audit trail to a CSV
format file.
- CSV export all: export the entire content of the card audit trail to a CSV format
file.
- View old value: view a window with the value before the change.
- View old value parent: view a window of the parent of the selected component
with the value before the change.
- View old value link: view a window representing a link to the component with
the value before the change.
- View new value: view a window with the value after the change.
- View new value parent: view a window of the parent of the selected component
with the value after change.
- View new value link: view a window representing a link to the component with
the value after the change.
Archive viewing
The Archive feature enables users to view the reports that were defined and saved in the system.
Operators can use it to view reports in any format, or to customize a report before printing it.
Note: When you create a report (csv, db or dbf), the system automatically creates an
associated rdf file. This rdf file is the one that is listed in the Archive window. When you click
“Preview”, the system automatically launches the appropriate program to view the report.
Displaying a Report
1. Under the Report toolbar, click the Archive button. The system displays the default
destination folder. If the report was saved in a different folder, browse the disk, using the
scroll-down arrow (bottom of the window) to the report you want to display.
2. Select the report you want to view. If there is a printer installed, the Preview button is
enabled. It is used to preview the report before printing it.
Note: You must have a printer installed on your computer in order to preview or print
reports. To setup a printer, click on Start > Settings > Printers > Add Printer . For more
information, consult your system administrator.
3. Click the Details button to display information about the report. If you click the Details
button, the Report details window appears, displaying information related to the selected
report file such as the report file name, title, type, date, etc. The Workspace as report filter
field indicates whether the report has been filtered according to the requester’s workspace
restrictions.
4. Click the Details button again to close the Report details window.
5. Click the Preview button to view the report in the system displays the Report preview
window.
Previewing Reports
1. From the Archive window, select the report you want to view in the right-hand pane. If you
select a report generated by Sybase, the Report Options window will display allowing you to
customize your report before printing it.
Note: If you select a CSV type of report, the report will be generated in a WordPad
window, in text format.
- Contains: All events which contain the specified text will be included in the report.
- Starts with: All events which start with the specified text will be included in the
report.
- Ends with: All events which end with the specified text will be included in the report.
- Exact words: All events containing the exact specified text will be included in the
report.
3. Click on the Preview button , select a printer from the drop-down list and click OK . The
system displays the result of the report. From that window, you can:
4. Click Properties to access the Reports details window where detailed information is
displayed:
- Report file name : Displays the whole path where the report was saved as well as its
name.
- Report title : Displays the title of the report.
- Start date : Reports are created for a selected time frame. This option specifies the
starting date of this time frame.
- End date : Reports are created for a selected time frame. This option specifies the
ending date of this time frame as well as the time.
- Requested : Displays the date and time at which the report was requested.
- Delivered : Displays the date and time at which the report was produced and
printed.
- Requested by : Displays the name of the operator that requested the report.
- Count : Displays the number of transactions (lines) in the report.
- Output process : Displays a list of the possible templates used for this report.
- Group by— Select this option for easier management. The report data may be
grouped by card user names or by card numbers.
- Sort by—You may choose a sort order, by user names, or by card numbers.
- Report type—Select this option for easier management. You may choose to include
details with or without total.
3. Click Preview to display the result of the report. From that window, you can save the report
(in.QRP format) or print the report.
• Access denied (bad location, bad access level, bad card status, etc.)
• Access granted
• Database (events that have affected the database, such as card definition modified)
• In/Out events (entry, exit)
• Other events
1. In the Card use report window, select a report from the Report drop-down list. If you
are creating a new report, click the New button in the toolbar, then enter the necessary
information in the language section.
2. You may also check the Process separately option if you want the events to be processed
individually for each card. For example, if you want a report for “Access denied events” and
“Access granted events”, if you do not check the Process separately option, the report will
contain all these events. When the Process separately option is checked the report will
display Access granted events and Access denied events separately.
3. Specify the card use options (Not used since or Used since) and defined periods.
4. To define the target period, click the From radio button and select a date. You may select a
date in the calendar when you click the drop-down arrow. Alternatively, you may use the up/
down controls or enter the number of days back, starting from today’s date.
5. When you have finished defining the report, save it. You may request it using the Report
request button in the Report toolbar.
1. Under the Report toolbar, click the Custom report button. The Custom report window
appears.
2. You can only edit the language section for the All events report.
- Normal and abnormal events: select this option to include normal and abnormal
events in the report.
- Normal events: quick report can create reports based on normal events. In an access
report, normal events would be events such as access granted.
- Abnormal events: events such as access denied (bad access level, supervisor level
required), workstation server abnormal disconnection, gateway communication
failure, or all events related to a process that is not complete (a controller reload
failure, for example), are considered abnormal.
- Watchable events: These are preselected events that can be displayed on EntraPass
Web Watchlist. It can be used to issue a report of events related to EntraPass Web.
5. Check Bypass operator workspace to issue a report with no regards to the operator’s
workspace permissions. For more information, see Creating or editing an operator.
6. Origin Filter: This filter is used to define a report of events coming from one or more of the
selected sources only. If one or more sources (connection, gateway, site and application)
are seelcted in the Origin Filter, an Origin tab is added and this allows user to select one or
more components related to selected source
7. Component filter: Select a Filter mode for the components to be included. Use the
checkbox to display deleted components.
8. Specific time frame: Only events (event time) that are within this specific time frame are
included in your report.
- + (New)
- = (Modify)
- - (Delete)
Note: The checkboxes under Specific Database Event are displayed only when a
database event is selected.
The Events selection tab contains events based on the selected filters only.
Origin
From this tab, you can select components from the origin(s) selected in the General tab with the
Origin filter.
Components
About this task:
If you have selected a Step 7, the Components tab will appear only when the corresponding
events are checked. You must specify the components that may affect the report.
Cards
1. In the Custom report window, move to the Cards tab. It is displayed only when access events
are selected. It is used to add more filters to your report in order to target specific events.
2. Select the All Cards option to include all cards.
3. From the Filter mode drop-down list (None, Include, Exclude), specify if the system should
exclude or include the value range that you specify in the Upper/Lower boundary fields.
When a filter mode is selected (Exclude or Include), the “Boundary” fields are enabled.
4. Enter the value range in the Lower/Upper boundary fields according to the selection in the
Filter mode field. These may be, for example, alphabet letters (if the filter index is by names;
or numeric, if the filter index is by card number). You could, for instance, use the card user
name and specify A to F in the Lower/Upper boundary as the lower and upper boundaries.
As a result the system will include events in which the selected door is defined and events in
which the defined card numbers appear but only for card holders whose names begin with A
to F.
Note: Users can select more than one filter for the same report using the filter index.
Events are filtered in times depending on how many filter indexes are defined for the
report.
• The frequency: when the report should be generated: none, weekly, monthly, and once.
1. In the Custom report window, move to the Automatic report schedule tab.
2. From the Schedule mode drop-down list, select the frequency at which the report should be
executed:
- Select None if you want the report to be manually requested (see Report Request).
- Select Weekly if you want a report every week. You have to check the day on which the
report should be executed automatically.
- Select Monthly if the report is needed once a month. You have to specify the day (ex.
the second Friday of the month or the 15th day of the month) when the report will be
executed automatically.
- Select Once if you want the report to be executed automatically on a specified date.
3. In the Start at this time field, enter the time the system will start executing the report.
4. Specify the Scheduling parameters:
Note: These settings are ignored when the report is requested manually by an operator.
- Start this many days back: The report starts collecting events according to the
number of days specified in this field. It is based on the present date.
- Start at this time: When you specify the amount of days, specify the starting time
(i.e.: 7:00am). For example, if you enter 7:00, events that occurred at 6:00 will not be
included in the report.
- Stop this many days back: The report includes the specified number of days entered
in this field. It is based on the present date.
- Stop at this time: Once you specify the number of days, specify the ending time
(i.e.:5:00 pm), that is, the day on which the system will stop collecting data; you may
also specify the time at which it will stop. For example, if you enter 7:00 and an event
occurred at 8:00, then this event will not be included. To target events that occurred
during a specific time frame, you must use the Specific time frame option.
Note: The start and end time are only used for the first day and last day, for
example if you start collecting events on Monday at 8:00 and end on Friday at
17:00 all events between 8:00 Monday and 17:00 Friday will be included. The
system does not use the start and end time for each day but for the whole
period.
In/Out Reports
About this task:
In/Out reports will be saved in the reports folder, they are not printed nor displayed. User have to
manually retrieve the report to view it, they can also use the “Archive” menu.
1. Single file with all data (CSV only): The report is generated in one file containing the data
and the descriptions (date & time, transaction ID, card number, card user name and door
description).
2. Database with transactions (CSV): The report is generated with all the data and transactions
in one single file. It includes the date & time, the transaction ID, the card number and the
card user name.
3. Display In/Out report (Sybase only): The report will automatically be displayed on the desktop
when completed. You can customize the report before you print it manually. It contains: the
card number, card user name, entry time, exit time, contents of the card information field as
selected in report definition and total hours per cardholder. For more information on how to
customize the report, see Previewing In/Out Reports.
4. Two (2) databases with all data (Sybase): the report will be generated in two separate files:
- One file containing: date, time, event message (transaction type), pkcard, pkdoor,
pkdoorgroup.
- One file containing: pk description (explaining pkcard, pkdoor and pkdoorgroup), card
number, object and contents of card information field selected in the report definition
menu.
Note: PK refers to a component unique number within the system.
5. Single database with all data (Sybase): The report will be generated in one file containing the
data and the descriptions (date and time, transaction ID, card number, card user name, door
description and sequence).
6. CSV compilation In/Out (CSV Only): The report will be generated in two files. One file
containing a total, of hours for instance, by department, and the other file containing detailed
information. Depending on the number of days covered by the report, a “day” column will be
reserved for each day.
- File name—If you wish to overwrite the same report (for example—every week),
you can enter a file name here and when the report will be executed according to
specifications, the new report will replace the oldest report.
- Destination: this is where the report should be sent/printed automatically. You can
also use the Overwrite existing output option to specify a different destination file.
- Report language—This field is used to include additional information in your report.
Select from the displayed list.
• The frequency: when the report should be generated (none, weekly, monthly, once)
• The time period covered
• The output process (display, print, etc.)
• The output type (Sybase, CSV, PDF)
• The language and the file name
Note: Make sure that EntraPass is running at the time you have defined for the
automatic report generation. For example, if you have set the report schedule to daily, at
00:30, EntraPass must be running at that time to generate the report.
1. From the Schedule mode drop-down list, select the frequency at which the report should be
executed:
- Select None if you want the report to be manually requested (see Report Request).
- Select Weekly if you want a report every week. You have to check the day on which
the report should be executed automatically.
- Select Monthly if the report is needed once a month. You have to specify the day (ex.
the second Friday of the month or the 15th day of the month) when the report will be
executed automatically.
- Select Once if you want the report to be executed automatically on a specified date.
2. Select the Queue priority level. A report with a priority of 1 will be processed before a report
with a priority of 99.
3. In the Start report field, enter the time at which the system will start executing the report.
4. Specify the Scheduling parameters.
Note: These settings are ignored when the report is requested manually by an operator.
- Start this many days back: The report will start collecting events according to the
number of days specified in this field. It is based on the present date.
- Start at this time: Once you specify the amount of days, specify the starting time
(i.e.: 7:00am). For example, if you enter 7:00, events that occurred at 6:00 will not be
included in the report.
- Stop this many days back: The report will include the specified number of days
entered in this field. It is based on the present date.
- Stop at this time: Once you specify the number of days, specify the ending time
(i.e.:5:00 pm), that is, the day on which the system will stop collecting data; you may
also specify the time at which it will stop. For example, if you enter 7:00 and an event
occurred at 8:00, then this event will not be included. To target events that occurred
during a specific time frame, you have to use the Specific time frame option.
Note: The start and end time are only used for the first day and last day, for
example if you start collecting events on Monday at 8:00 and end on Friday at
17:00 all events between 8:00 Monday and 17:00 Friday will be included. The
system does not use the start and end time for each day but for the whole
period.
- Select the Keep only the first entry (first IN) and the last exit (last OUT) option to
get the time lapsed between the first reading of the card on an entry reader and the
last reading of the card on an exit reader.
Operations on In/Out
Use the Operation on In/Out feature to manually insert, add or delete In/Out transactions in the
database. This feature is useful for an organization using the In/Out feature for the payroll system,
for instance.
- The Delete column indicates transactions that have been deleted (if the View deleted
transactions option is checked). These are identified by an X.
- The Date column indicates the date on which the transaction occurred. Use this field
to specify the date when you manually insert a new transaction.
- The Time column indicates the time at which the cardholder entered or exited an
area. Use this field to specify the time (entry or exit) when manually inserting a new
transaction.
- The Door column indicates which door was accessed by this user. When you manually
insert a transaction, you have to specify the door according to the transaction type
(Entry or Exit).
Note: If you are inserting an entry transaction, only doors defined as “Entry
doors” will be displayed in the list. If your are inserting an exit transaction, only
doors defined as “Exit doors” will be displayed in the list.
11. Click the Load button to load the transactions from the server for this cardholder. You have
to enter the card number, select the connection and door(s), then click the Load button. The
button is disabled once you have loaded the transactions.
12. Click the Add button to add a transaction to the existing transaction list. The new transaction
will be added at the end of the list.
13. Use the Insert button to insert a transaction between existing transactions or above any
transaction.
14. Click Cancel to cancel any insertion or modification that was made BEFORE saving.
Note: When you delete a transaction that was added manually, it is permanently deleted
from the list; as opposed to transactions that were generated by controllers. When they
are deleted, they are identified by an X in the Deleted column.
- Group by— Select this option for easier management. The report data may be
grouped by card user names or by card numbers.
3. Click Preview to display the result of the report. From that window, you can save the report
(in.QRP format) or print the report.
Previewing Reports
1. In the Archive window, select the report you want to view in the right-hand pane. If you
select a report generated by Sybase, the Report Options window will display allowing you to
customize your report before printing it.
Note: If you select a CSV type of report, the report will be generated in a WordPad
window, in text format.
2. Define the filter options: enter a text string in the Search description field. The report will be
sorted leaving only events containing the specified text string. You may refine your filter:
- Contains: All events which contain the specified text will be included in the report.
- Starts with: All events which start with the specified text will be included in the
report.
- Ends with: All events which end with the specified text will be included in the report.
- Exact words: All events containing the exact specified text will be included in the
report.
3. Click on the Preview button, select a Printer from the list and click OK. The system displays
the result of the report. From that window, you can:
4. Click Properties to access the Reports details window where detailed information is
displayed:
- Report file name : Displays the whole path where the report was saved as well as its
name.
- Report title : Displays the title of the report.
- Start date : Reports are created for a selected time frame. This option specifies the
starting date of this time frame.
- End date : Reports are created for a selected time frame. This option specifies the
ending date of this time frame as well as the time.
- Requested : Displays the date and time at which the report was requested.
- Delivered : Displays the date and time at which the report was produced and printed.
- Requested by : Displays the name of the operator that requested the report.
- Count : Displays the number of transactions (lines) in the report.
- Output process : Displays a list of the possible templates used for this report.
- Normal and abnormal—Select this option to include normal and abnormal events in
the report.
- Normal —Use Quick report to create reports based on normal events. In an access
report, normal events would be such events as “access granted” for instance.
- Abnormal—Such events as access denied (bad access level, supervisor level required),
workstation server abnormal disconnection, gateway communication failure, or
all events related to a process that is not complete (a controller reload failure, for
example), are considered abnormal.
- Watchable events—These are preselected events that can be displayed on EntraPass
Web Watchlist. Use to issue a report of events related to EntraPass Web.
- Custom events—Select this option to include your own events. The Custom events
become visible when the Custom events option is selected. This option allows the
operator to select the components that have generated the selected events according
to the setting in the “event” field.
Note: When you use the Event field, you have to specify which component(s)
should be used or not used. When you select an event (i.e. access), the system
displays all the doors. If you select Controllers, the system displays all the
controllers. Once you have selected an event (i.e. controller events), select the
controllers, that is the list of controllers to be included in the report.
4. If All Events has been selected, Specific Database Event is displayed. You can choose to
include New(+), Modify(=), and Delete(-) database events in the quick report.
5. Select the Card tab to specify filter details about the report. The Card tab appears only if a
card-related event is selected.
6. In the Card index drop-down list, specify the information that will be used as the filter. For
example, if you select “card number”, only access events in which the defined card numbers
appear will be selected.
Note: If you select Card number, the Lower and Upper boundary editable fields display
the default numerical values to be replaced by card numbers. If you select Card user
name , these fields are enabled to receive text data. For example, you can enter A in
the Lower boundary field and F in the Upper boundary fields for the system to include
events in which the selected door is defined and events in which the defined card
numbers appear but only for card users whose names begin with A to F. If you select All ,
the editable fields are disabled.
- Database output type : Select the database output format by selecting the icon for
Sybase, CSV, PDF, Excel, RTF, or text.
- Report name : The default is the current date and time. This can be edited.
The report name is used to name to output file.
- Database output process —Select the appropriate output processes. A report
template is associated with each output.
Report Log
About this task:
The Report Log window allows you to view a detailed list of all history reports processed by the
system.
1. To view the Report log, select the Report Log button from the Report menu.
2. Click the Text filter button to display the Text filter window. From that window, enter the
text string (i.e. Kantech), and the system will only display logs containing the specified string
text. To return to normal display, click text filter.
3. Click the Refresh button to update the displayed data.
4. Columns:
- Date requested: This is the normal incoming sequence, if you select another sorting
mode, you interrupt the normal sequence.
- Requested by : When selected, all columns will be sorted according to the Requested
by column in alphabetical order.
- Reportname : When selected, all columns will be sorted according to the Report
name column in alphabetical order.
- Date from : When selected, all columns will be sorted according to the Date from
column in alphabetical order.
- To (Date) : When selected, all columns will be sorted according to the To (Date)
column in alphabetical order.
Report state
Use the Report state feature to view the statuses of all requested reports that are still pending. On
the Report tab, click Report state.
Requesting Reports
About this task:
With this feature operators can request pre-defined historical reports or Card use reports that were
created using the Custom Report menu. Operators can also email the report to one or multiple
recipients.
Note: If your report contains automatic settings, these are ignored. You must indicate new
settings.
6. Select the Preview button to define the report and filter options. This will increase
the readability of the report by adding, for instance, alternating band colours, framing
events, buttons in the reports, etc., or by sorting events in the report (by event ID number,
alphabetical order or date and time).
7. Enter the description in the Search description field. The report is updated in real-time
when you enter a filter option.
8. Use Preview to preview the report or the Properties button to view details about the report.
When you click the Preview button, the system displays the result of the report. From that
window, you can save the report in various formats or print the report.
Functionalities
• A maximum of 8 roll call reports can be configured through EntraPass.
• Doors must be assigned to a report number (1-8) in order to be considered for the roll call
report (see Doors Configuration for more information).
• At runtime, the Roll call report will list all individuals that have swiped a card at a pre-defined
reader. No other card holder will be shown in the report than the ones who have entered a
perimeter after the last perimeter reset.
• To create an “in-out” functionality, the operator must make sure that doors considered “out”
of a building or connection have a different roll call number. Any door that doesn’t have a
number assigned to it will have no effect on the location of the card holder for the roll call
report.
• A configurable reset of the report is available and the default value is 12:00PM (midnight)
every day. This function cleans the report. Reset can be performed for all reports in the roll
call report window.
• Upon manual request in Report –> Roll Call Report or on trigger of a pre-configured input, a
report can be generated up to 3 times to a pre-defined printer, workstation or email address.
1. Click the button to add more settings to the automatic scheduled report.
When you click this button, the Automatic report output definition window appears.
2. From the Database output type list, select the output format of the report. You can choose
Sybase, CSV, PDF, Excel, RTF or text formats.
3. From the Database output process list, select the report template. It will be used with the
requested report. For information about the output format, see Defining a Report Output
Format.
Note: From the Database output process list, you can select Email custom report if
you want this report to be automatically sent to specified recipients. If you choose this
option, select the Email tab to enter the recipients’ email addresses in the Send Email to
field. You can protect the report using a password before emailing it.
The following table describes the different database formats and their output file formats.
See Multimedia devices configuration to define alarm sounds, videos features, and video and
signature capture devices. For printing instructions for event logs, reports and badge printing use
Printers selection and configuration. For new system components, you must register them in the
system Registration section. Read the System date and time modification section to find out why
you should approach changing the system time with caution and the options available. If you want
to change the system language see System language selection, and choose from English, French,
Spanish, German, and Italian.
Use System parameters configuration to define the following components and features:
• Disk Space
• Schedule
• Icon Status
• Password rules
• Firmware Parameters
• Image Parameters
• Report Parameters
• Disk Space
• Video Parameters
• Time Parameters
• Toolbar Buttons
• Integration
• Back up your files regularly, at least once a week or more if many modifications were made to
the database.
• We recommend that you make two backups of all your database files. To be especially safe,
keep them in separate locations.
• To backup your files, you can use any of the following options:
- Default folder : Will backup your files in a system default backup folder. By default,
the name of the backup sub-directory is generated automatically according to the
following convention: X_YYYY_MM_DD_HH_MM_SS (Where 'X' = Data or Archives or In/
Out (D, A or T), year, month, day, hour, minutes, and seconds.
Note: By default, the system backs up all the information originating from the
following directories: C:\Program files\Kantech\Server\Data or Archive or Time
on video or V . The information is sent to: C:\Program files\Kantech\Server
\Backup\X_YYYY_MM_DD_HH_MM_SS.
- Specific folder : Will backup your files in a sub-folder labeled according to the default
convention in the XXX folder.
- Weekly : the backup will be carried out once a week. Specify which day (example, the
backup will be executed every Thursday).
- Monthly: the backup will be carried out monthly, specify the day of the month
(example, the backup will be carried out every first day of the month).
- Daily : the backup will be carried out every day.
7. Enter the time at which the backup will start (24:00 format).
8. Select Now if you want to perform a backup immediately after saving the backup
parameters.
Note: This is not applicable to the Configure Automatic backup feature in the Mirror
Database and Redundant Server application.
9. Repeat steps 1 to 8 for all the remaining tabs.
10. Click OK to save.
2. Fill in the dealer information and add a picture logo if needed using the
button.
3. Fill the Site information data.
4. Click OK.
KAP reminder
A message displays reminding the user that the KAP period is ending. There are two different
notifications: a pop-up on the screen or an email containing the following information:
Figure 6: KAP expiry reminder
Pop-up message
A pop-up message is automatically generated by EntraPass to advise the user that their KAP is
expiring. Messages display at the following times:
Email
In the Dealer Information window, you can configure the email reminder. You can add up to
4 recipients. Click theSend reminder now button to save the information and send a reminder
immediately.
A new event is logged in the desktop events list.
Each workstation also receives a 60-second notification pop-up message. See the following figure.
Note: You can also access the KAP reminder feature in the About window.
3. Check the Use multiple card format box if your environment contains multiple reader types
and you would like to have the capability to select a different reader, that is not the default
reader, when creating a new card.
- No duplication : An error appears on the workstation; the PIN field will be reset to
the default value (00000) and will be highlighted, inviting you to enter a new and valid
PIN. Only PIN 00000 will be duplicated regardless of the PIN setting option.
- Notify when duplication: the server verifies if this PIN already exists. If the PIN
exists, a message box appears, indicating that the PIN exists. A Details button will
allow operators to view a list of cardholders who were issued this PIN.
- Duplication: no test will be processed, the PIN will be accepted even if it is a duplicate.
5. Number of PIN digits (KT-400 only): This function allows using the Keypad Pin Digit option
with the new KT400 firmware. You can choose to have 4, 5 or 6 digits. For more information,
see Card options definition.
Note: The PIN number must be set up once and kept that way in order to avoid any in
duplication if truncated or filled by the system.
6. Under the Global display format for KT-100 , KT-300 and KT-400 , select the appropriate
option to coordinate with the selection in the upper section of the dialog.
- 24-bit Wiegand card, 5-digit PIN (KT-200 default) : for up to 24-bit for KT-100,
KT-200, KT-300 and KT-400.
- 32-bit card, 5-digit PIN : for up to 32-bit for KT-100, KT-300 and KT-400.
- 24-bit Wiegand card, 6-digit PIN : for up to 24-bit for KT-100, KT-300 and KT-400.
- Up to 16 characters ABA card , 6-digit PIN : for up to 16 for KT-100, KT-300 and
KT-400.
Note: KT-100, KT-300 and KT-400 controllers will do a hard reset on card format
change. Avoid alternating between different card formats because this may
result in lost card information.
1. Click the Options tab, and select Display format from the menu.
2. In the Global card format area, choose the 32-bit card, 5-digit PIN option.
3. Click OK. If you made a change from a 24-bit Wiegand card, five or six digits, to a 32-bit card,
five digit PIN, a prompt displays to ask if you require the cards converted to 32-bit family
code.
The ability to change the global card format from 24-bit to 32-bit format is not available when
running from a redundant server.
EntraPass does not automatically backup data when you switch from 24-bit to 32-bit
card format.
Auto conversion
When you select the Use Auto Conversion for legacy 24 bit cards check box in the Display
Format window, EntraPass automatically converts all card accounts to a 32-bit card format. The
default value is cleared. To enable the check box, you must set the Global Card Format to the 32-
bit card, 5 digit PIN option.
When you select the auto conversion feature, and have not converted the cards to a 32-bit format,
the system automatically modifies the card number and triggers a Card definition modified event.
The events have to be non-fail soft events. The feature is available in the multi-site gateway, the
global gateway, and the KT-NCC gateway.
Note: The Auto conversion feature is available when running the redundant server.
Integration
The Integration tab allows the user to select third party hardware that has been integrated to
EntraPass by Kantech.
• DLL registration: The available DLL in this menu will be used to specify which type of
hardware the customer will connect to EntraPass.
- Click on Add to integrate another DLL. For additional details, see Integrated Panel
Configuration.
• Virtual keypad: The Virtual keypad tab allows the user to customize the virtual keypad
screen display. Three different display modes can be selected: Floating, Modal or Stay on
top.
• Alarm sound
• Video capture devices
• Signature capture devices
• Video feature devices
Note: You need to assign a “print” schedule to certain events to print them at a specified time.
- No log printer— If you select this option, no event will be printed, even if a print
schedule is defined for the events.
- Use Network/Local Windows ® printer (page printer) —If you select this option,
all events sent to the printer will be buffered and printed when a full page is ready to
be printed. Events will be printed on the network/local printer - not on a specific log
printer.
- Use local dot matrix printer —If you select this option, all events sent to the printer
will be printed one-by-one and one under the other, or it will print one event per
page, depending on your printer type. Select the printer port that will be used in the
“printer” field. Specify if messages and alarms will be printed on this printer.
3. In the Printer selection section, specify whether you want to print message or alarms.
- Print messages log —If you select this option, all events that are assigned a “display”
schedule in the events parameters menu will be printed.
- Print alarms logs —If you select this option, all events that are assigned an “alarm”
schedule (and need to be acknowledged) in the events parameters menu will be
printed.
4. From the Printer drop-down list, select the specific printer that will be used as a log printer.
- If you have selected a dot matrix printer , select the Port on which the printer is
connected to communicate with the computer. The Port field appears when a dot
matrix printer is selected.
- If you are using a network/local printer , select the Font and the Font size . The font
and font size influence the number of events that will be printed on one page. Using a
smaller font increases the number of events printed on a page.
1. From the Printer options window, select the Report printer tab.
1. From the Printer option window, select the Badge printer tab.
2. Check the Badge printer option if a badge printer will be used; as a result, the Print badge
and Preview badge button will be displayed in the Card window.
3. From the Select badge printer drop-down list, select the appropriate badge printer.
4. If you want the picture on the reverse side of the badge to be inverted, click the Invert
Reverse Side box.
5. Check the Use bar code 39 as font when appropriate, and select the corresponding Font .
Registration
Use this menu to register new system components, including the KTES, For more information, see
System Registration .
1. From the Printer option window, select the Badge printer tab.
2. Check the Badge printer option if a badge printer will be used; as a result, the Print badge
and Preview badge button will be displayed in the Card window.
3. From the Select badge printer drop-down list, select the appropriate badge printer.
4. If you want the picture on the reverse side of the badge to be inverted, click the Invert
Reverse Side box.
5. Check the Use bar code 39 as font when appropriate, and select the corresponding Font .
1. From the Option main window, select the Date and Time button.
2. Enter the date in the Date field, or select a date from the calender. Connected components of
this application will also receive the date change notification.
3. Enter the time in the Time field. Connected components of this application will also receive
the time change notification.
4. Click OK to exit.
Note: If you want the system to automatically change the time when necessary, use the
Time adjustment tab of the Server Parameters definition menu. For more information,
see Time Parameters.
Important: Do not change the time using Windows settings. It is strongly recommended
to change the system time through the server parameter settings.
Server Parameters
On the Server tab, you can define disk free space threshold and button status.
E-mail Server
About this task:
EntraPass offers users the ability to send reports using email capabilities. This function can also be
used with SMTP servers asking for a user authentication.
1. In the Email server (SMTP or Exchange server) field, enter the IP address of the Email server
that will be used for sending emails.
2. In the Email Port field, enter the number of the port that will be used for sending emails
(usually 25).
3. Select the encryption method:
4. Enter a valid Email address in the Email sender field. This email address will be used for
authenticating the email server.
• Disk free space threshold (MB) : scroll-down list: specify a disk free space threshold that
indicates when you want the system to send a message when the amount of free space falls
below the value indicated. This value is in mega bytes. The range value is 2000 up to 99999
MB.
• Time between notifications (hh:mm) : enter the amount of time between notifications
when the disk free space has reached the quota specified in the Disk free space threshold
field. For example, if you enter 00:30 in the field, a system warning will be displayed every half
hour. The time range value is 00:10 to 24:00.
Schedule
• System schedules: System schedules are applicable to system logical components such as:
operators login schedules, video triggers, etc. System schedules are not loaded in a particular
controller; they are applicable to all the system. You can program an unlimited number of
system schedules.
• Multi- site schedules: These are defined per connection. You can define 100 schedules per
Multi-site for such purposes as power supervision (controllers), door unlocking, REX trigger
(doors), activation mode (relay), input monitoring, etc.
• After checking the box and clicking OK, a warning will popup on screen indicating that the
action is reversible but with consequences.
• We strongly suggest that you perform a backup of your data before activating this option.
• Once the process has been completed, you will notice that the Schedule tab will have
disappeared from the System Parameter dialog.
Icon Status
The Status time out delay (m:ss) parameter allows you to define a period of time before the
workstation queries the server for the latest button statuses. The higher the delay, the lower the
button refresh rate will be, therefore creating less traffic on the network. The maximum time out
delay is 1 min. 30 seconds.
Password rules
The purpose of this feature is to add more parameters to the operator’s password.
Note: Also, when you create passwords, remember the following rules:
Result After you select this option, all newly created or modified operators must comply with the
password rules.
Firmware Parameters
This section contains all the information pertaining to controllers, gateways and IP communication
module, as well as the section to update you firmware.
Note: The KTES tab will be available only if a KTES controller have been previously defined in
the system. See Kantech Telephone Entry System (KTES) Configuration for more information.
KT-100
The KT-100 tab specifies the location of the folder containing the firmware for KT-100 controllers.
The system will use this data to update the installed controllers (not available in EntraPass KTES
Edition).
KT-300
The KT-300 tab specifies the location of the folder containing the firmware for KT-300 controllers.
The system will use this data to update the installed controllers (not available in EntraPass KTES
Edition).
• When checked, the Enable TFTP KT-400 updater option will allow operators to upgrade the
KT-400 firmware from the Update firmware button from the Operation > Site dialog in
EntraPass.
• Enable automatic firmware update: Select to make an update of each KT-400 with a different
firmware version.
Note: The automatic firmware update function applies only to KT-400s that support it.
The multi-site Gateway must be restarted in order to enable the TFTP KT-400 updater.
• For security reasons, you may decide, as a System Administrator to disable this option and
not allow operators to update the firmware.
KT-1/KT-2
The KT-1/KT-2 tab specifies the location of the folder containing the firmware for KT-1 and KT-2
controllers. The system will use this data to update the installed controllers (not available in
EntraPass KTES Edition).
• Select the Enable TFTP KT-1/KT-2 updater option to allow operators to upgrade the
controller firmware using the Update firmware button from the Operation > Site dialog in
EntraPass.
• Enable automatic firmware update: Select to make an update of each controller with a
different firmware version.
Note: The automatic firmware update function applies only to controllers that support it.
Restart the multi-site Gateway to enable the TFTP KT-1 updater.
• For security reasons, you may decide, as a System Administrator, to disable this option and
not allow operators to update the firmware.
• Select the Firmware flashing mode to apply.
KTES
The KTES tab specifies the location of the folder containing the firmware for the KTES. The system
will use this data to update the installed KTES.
Kantech IP Link
The IP Link tab specifies the location of the folder containing the firmware for the Kantech IP Link
module . The system will use this data to update the installed firmware (not available in EntraPass
KTES Edition) .
• When checked, the Enable TFTP IP Link updater option will allow operators to upgrade
the IP Link firmware from the Update firmware button from the Operation > Site dialog in
EntraPass.
Note: The Multi-site Gateway must be restarted in order to enable the TFTP IP Link
updater.
• For security reasons, you may decide, as a System Administrator to disable this option and
not allow operators to update the firmware.
ioModules
The ioModule tab specifies the location of the folder containing the firmware for the ioModules.
The system uses this data to update the installed ioModules.
KT-401
The KT-401 tab specifies the location of the folder containing the firmware for KT-401 controllers.
The system will use this data to update the installed controllers (not available in EntraPass KTES
Edition) .
• When checked, the Enable TFTP KT-401 updater option will allow operators to upgrade the
KT-401 firmware from the Update firmware button from the Operation > Site dialog in
EntraPass.
• Enable automatic firmware update: Select to make an update of each KT-401 with a different
firmware version.
Note: The automatic firmware update function applies only to KT-401s that support it.
The multi-site Gateway must be restarted in order to enable the TFTP KT-401 updater.
• For security reasons, you may decide, as a System Administrator to disable this option and
not allow operators to update the firmware.
Image Parameters
The Image section is where you will define parameters for the badging features. You will define
image quality for picture, signature and background images.
• If you are using the badging feature, it is recommended to leave the jpeg quality to default.
Reducing the image quality may affect the quality of the pictures imported from badges.
• If you are not using the badging feature, you may reduce the jpeg quality of your images
so that they will not occupy a large space in the database. You must take in consideration,
however, that reducing the quality of the saved images may affect the quality of the photos
imported into badges.
A parameter allows you to save cards and visitor card pictures, signatures and background graphics
to a file instead of directly to the database. We are offering this option for sites that have large
banks of pictures and graphics. The picture, signature and graphic database can currently contain
up to 2 Gb of data each. The parameter will be used in instances where a site may need more space
to save pictures, signatures and graphics.
Graphic
The graphic feature allows you to adjust the graphic quality for use with the EntraPass software.
• Unchecking Use JPEG format for graphics tells the system to save graphics in a tiff format.
Note: Remember that this may affect the image quality. If you are not an advanced user,
leave these values to default.
• The JPEG quality value for Graphic background ( picture ) indicates the quality of the image
that will be saved. If you choose 10, the saved image quality will be poor; 100 indicates an
excellent quality.
• When checking the Save graphics in a file box, the system will create a Graphic directory
under C:\Program Files\Kantech\Server_SE\Data where all graphics will be saved instead of
directly in the database.
Note: When modifying an existing graphics, EntraPass will save it to the appropriate file
and delete the corresponding entry in the database.
Report Parameters
The Report tab enables users to define the field separator for reports, disk free space threshold
and user name format.
CSV
Under the CSV tab, you can define the field separator for your reports.
• By default, the system uses a comma (,) as the Field separator . You can modify the comma
for another character. Other options are: Period, Equal, Semicolon, Colon, Space and tab.
• It is recommended to check the Date and time on separate fields option . When selected,
CSV (comma separated values) as the output process for your reports, by default, the system
includes the date and the time in a single field. When you select this option, the system will
separate the date and the time fields.
Disk Space
This feature is a protection when for instance a huge report has been requested. In this case, the
system will abort the execution of the report and displays an alert message indicating the reason of
the cancellation.
• Abort report if free space lower than (MB): scroll-down list allows you to specify the
minimum amount of free disk space required for the execution of reports. The range value is
2000 to 999,999 MB.
• Parse user name should be checked if you want to select a method of parsing the user’s
name in the system.
• User name format lets you select the parsing method. Options are: Begin with last name,
Begin with first name.
• Parse user name with lets you select the character that will be used to parse the user name
fields. Options are: Comma, Period, Equal, Semicolon, Colon, Space.
• Strict search on card field should be left empty unless you wish to keep the previous
method (EntraPass Version 3.17 and lower) of strict searching a card field for reports.
Note: Prior to version 3.18 of EntraPass, the system used a strict search method that
required Administrators to enter specific upper and lower boundaries to attain specific
results. For example, for generating a report that included all users whose last name
started with A, the lower boundary had to be A and the upper boundary had to be
AZZZZZ. Now, the system will display all user names that start with an A just by entering
A as a lower and upper boundary.
Video Parameters
The Video section will display only if the Video integration option is enabled in the EntraPass
system. You will define the time synchronization, remote video process and JPEG format for video
images.
Parameters
The Parameters tab allows you to define parameters for the video process.
• Disable manual time synchronization will keep the EntraPass server from updating the
video server date and time following a manual modification of time. This feature is useful
when, for example, you want to keep all recording events that occurred at the video server
regardless of the actual time at the EntraPass server.
- Preset and pattern control application field allows you to enter the number of
applications that will be simultaneously launched for processing presets and patterns.
The system is preset with a range value of 1 to 8 concurrent applications.
Note: A Preset and Pattern Control application is launched each time a video
recording is started following a trigger on a preset. If you set this number to 1
and if there are for instance more than 1 video servers with presets and patterns
defined, the control application will process presets on all video servers. If you
decide to increase the number of Preset and Pattern Control Applications, keep in
mind that running many concurrent applications takes a great amount of system
resources.
• Reset remote video process application will allow the system to terminate and
automatically restart the Remote Video Process application a few seconds later. This option
may be used in instances when the video events are not being displayed.
• Reset remote video process applications control will allow the system to terminate the
Control applications (recordings, polls, events and preset and patterns) and automatically
restart the Remote Video Process application.
• Log Video process error will allow the system to keep a log of all video process errors in the
EntraPass server files. Video process errors are logged in C:\Program files\Kantech\Server_SE
\Bin\Log. Each Remote Video Process Control application generates a log file:
• The Video image snap indicates the quality of the image that will be saved as a thumbnail
for each video. If you choose 10, the saved image quality will be poor; 100 indicates an
excellent quality.
Intellex:
• Disable DirectX will disable DirectX, a Windows® technology that enables higher
performance when working or viewing graphics and other multimedia contents, including
video and sound. By default, DirectX is enabled with the Video feature. You may sometimes
need to disable it if, for example, video images are not correctly displayed or are not
displayed at all.
Note: The system will use more system resources when DirectX is disabled
• Limit video bandwidth allows you to reduce or increase the bandwidth required to stream
live video without compromising video storage quality and computer performance. The
range value is between 64 KB/s to 8192 KB/s. The value will apply to all workstations .
However, for any specific workstation, this value can be reduced locally from the Options
toolbar > Multimedia Devices > Video .
• Video vault save delay is used to indicate the time delay before the video vault recording
can be played back.
• Video vault save delay is used to indicate the time delay before the video vault recording
can be played back.
• Video vault save delay is used to indicate the time delay before the video vault recording
can be played back.
Time Parameters
• No time adjustment will disable the option.
• By Gateway will automatically synchronize the time of all computers with the Gateway
selected in the scrolling list.
• By Server will automatically synchronize the time of all computers at regular intervals. You
must also select the rate of Hours between refreshes in the adjacent selection box. The
range value is 1 to 9999 hours.
• Click on Add to integrate another DLL. For additional details, see Integrated Panel
Configuration.
Virtual keypad: The Virtual keypad tab allows the user to customize the virtual keypad screen
display. Three different display modes can be selected: Floating, Modal or Stay on top.
Web Interface
Web tab
Use the Web interface button to configure EntraPass Web parameters.
• Allow messages to EntraPass Web: Select to allow the operator to see messages in
EntraPass Web.
• Maximum web messages: Select a maximum from the counter.
• Signature pad pen width: Select a width value for the pen used with the signature pad.
• Maximum request simultaneously by session:Select the maximum number of report
requests that can be done simultaneously.
• Message filter for web messages: From the drop-down list, select a filter for the messages
to be displayed.
• Badge image ratio for web: Use the selector to increase the image printing quality (default
value is 2). Note that increasing the ratio value will also increase the file size.
go Pass Tab
About this task:
If you register the go Pass mobile application, the go Pass tab appears. Use go Pass with a
smartphone or an Apple watch to lock or unlock a door. For convenience, you can control a door
from a remote location. For a higher level of security use an ioSmart reader with the door, ioSmart
readers use BLE technology. To cater for a range of security levels, select an option from the
Proximity Restriction list.
- To set how many invalid requests occur before SmartLink responds, enter a number in
the Notification debounce on wrong request field.
- None there is no restriction, the go Pass cardholder can lock, and unlock doors
remotely, and at the door. EntraPass ignores BLE technology.
- Strict (ioSmart BLE only) - if the go Pass cardholder presents go Pass at an ioSmart
reader, the go Pass cardholder has to be within range of the door.
- Hybrid (BLE when available) - use for go Pass cardholders who have access to
ioSmart readers and non-ioSmart readers. If the go Pass cardholder is at an ioSmart
door, the cardholder has to be within range, if it is a non-ioSmart door the cardholder
can control the door remotely
Note: If you fail to select the BLE checkbox in the reader template that the controller
uses, the Proximity Restriction selection is redundant.
• Back up your files regularly, at least once a week or more if many modifications were made to
the database.
• We recommend that you make two backups of all your database files and keep them in
different locations.
• To backup your files, use any of the following options:
- Backup Data
- Backup Archive
- Backup In/Out
- Backup Video Events
Note: By default, EntraPass backs up all the information originating from the following
directory: C:\Program Files\Kantech\Server_SE\Data or Archive or In/Out to C:
\ProgramFiles\Kantech\Server_SE\Backup\ X_YYYY_MM_DD-h_mm_ss, where X is the
data type. The data type is followed by the year, month and day information as well as
the time of the backup.
- Separate file: The system will back up the databases one by one (standard). This
backup type includes the Regdata.ini file containing the following identification data:
software used to create the backup, backup type (data, archive, In/Out), operator who
requested the backup, date and time of the backup as well as the software version.
3. From the Drives drop-down list, select the drive on which the backup will be performed. A list
of choices is available according to your computer settings. To save as default, leave as is.
4. You may click the New folder button if you want to specify a new destination folder.
5. Click OK to launch the backup procedure. The backup process can be viewed on the bottom
part of the window.
Note: You can use the “Backup Scheduler” to schedule or plan automatic backups. To
schedule automatic backups see Backup Scheduler. When you backup or restore files,
the Server databases are temporarily disabled. You cannot modify the databases when a
backup is in process.
Restores
About this task:
If you are restoring data, it is strongly recommended to perform a backup before you do so. If you
are using a third party program to restore the data, it is recommend to restore the whole Kantech
directory and sub-directories.
1. From the Backup tab, select the appropriate restore button: Data, Archive, In/Out, Video.
The system displays the Restore data window. It displays the path of the backup folder.
2. To change the destination folder, browse the Drives list. Click OK to launch the restore
process.
3. If you click the Complete button, the system restores all the information from the selected
directory.
Note: By default, the system restores all the information originating from the following
directory: C:\ProgramFiles\Kantech\Server_SE\Backup\ X_YYYY_MM_DD-h_mm_ss to C:
\Program Files\Kantech\Server_SE\Data or Archive or In/Out.
We recommend to reload the Gateway after restoring the data (Operation > Reload
data).
Log
About this task:
The log window contains all the login and logout events for all workstations defined in the system.
The logs are displayed with date and time, the workstation name, the operator name using the
workstation as well as the log type. The log window contains all the login and logout events for all
workstations defined in the system.
1. To view system logs, select the Log button from the Server menu.
2. Click the Text filter button. In the Text filter window, enter the text string, for example
Kantech, and the system will only display logs containing the specified string text. To return
to normal display, click Text filter.
- Date and time: This is the normal incoming sequence, if you select another sorting
mode, you interrupt the normal sequence. Select date and time to restore the normal
sequence. To do this, you have also to use the Restart scroll button.
- Workstation: When selected, all columns are sorted according to the Workstation
column in alphabetical order.
- Operator name: When selected, all columns are sorted according to the Operator
name column in alphabetical order.
- Transaction: When selected, all columns are sorted according to the Transaction
column in alphabetical order.
4. To change the background color, right-click in the window and select Background color
from the displayed shortcut list. Pick a color from the standard Windows dialog.
5. To clear the window, right-click in the window and select Delete All from the shortcut menu.
6. Optional: To export the logs to a CSV file, right-click in the window and, from the shortcut
menu, select CSV Export.
Error Log
About this task:
The system errors are displayed with the date and time, the code number, the workstation name
where the error originated from, the error code and its description.
1. Select the Error Log button from the Server menu to view all the errors that occurred in the
system.
2. Click the Text filter button to display the Text filter window. From that window, enter the text
string (i.e.: Kantech), and the system will only display logs containing the specified string text.
To return to normal display, click on text filter.
3. Columns:
- Date and time: This is the normal incoming sequence, if you select another sorting
mode, you interrupt the normal sequence. Select date and time to restore the normal
sequence. To do this, you have also to use the Restart scroll button.
- Code : When selected, all columns will be sorted according to the Code column in
alphabetical order.
- Workstation : When selected, all columns will be sorted according to the
Workstation column in alphabetical order.
- Error Code : When selected, all columns will be sorted according to the Error Code
column in alphabetical order.
- Description : When selected, all columns will be sorted according to the Description
column in alphabetical order.
4. You may also use the right-click menu to change the window background or to clear all the
data displayed.
Note: You can export the logs to a CSV file. To do this, right-click in the window, then
select CSV Export from the shortcut menu.
Database utility
The database utility program verifies the integrity of the database tables that are used to store
events, alarms, network alarms, and graphics. The system scans all the system database tables
and corrects errors (when they are found). Usually, the system verifies the database integrity
automatically at start-up (a system message is displayed). If an operator decides not to perform a
database check at startup, they can trigger the operation later, using the database utility program.
It may also be necessary to launch the database utility program when for instance the system
experiences problems frequently. This operation should be executed when the system is not used
since the system database is not available during operations on the databases. Some verifications
such as re-indexing the archive files, updating database fields, verifying archive files, or swapping
database languages require that the EntraPass applications be shutdown. Once all the EntraPass
applications that are running on the EntraPass Server computer are closed, you can start the
database utility. When an operation that requires the application to be shutdown is launched, the
operator is warned that the database access will be suspended during the operation.
Note: You must shut down the EntraPass workstation before you run the database utility.
- Quick check : The system scans through the database tables, but does not display a
detailed report afterwards.
- Complete check : The system scans through the database tables and a detailed
report is displayed.
1. From the EntraPass Database utility window, select the Update database field button.
Note: Use this function when, for instance, you experience problems when starting the
workstation. When the system does not start, this may imply that there are problems in
the database; that the source and the structure do not match.
• Viewing the structure of a component's links to all other components of the system,
• Removing all the traces of a component within the database when this component has been
deleted. For example, if a schedule is deleted, the system will use the link list to initialize all
the database fields that contains this schedule.
Note: It may be necessary to use this function when it is obvious that the database links
are incorrect. This features is useful when for example the system experiences abnormal
terminations.
Swapping Descriptions
This function is used to interchange or to swap the database descriptions.
2. From Windows® Start menu: Start > All Programs > EntraPass Special Edition > Express
Setup. You may also launch the Express Setup by clicking the Express Setup button (rabbit)
from the various dialogs in the Devices toolbar.
3. Click the New connection button to create a new connection.
4. Enter the connection name in the connection description field, then select the reader type.
5. Select the Controller type for this connection.
Note: The KTES option is available for a Multi-site Gateway only.
There is no reader type or number of controllers to select when the controller type is a
KTES.
6. Select the Reader type .
7. Set the Number of controllers .
8. Specify the Connection type . This indicates how the connection communicates with the
computer. The connection types available will follow the controller type selection.
9. Click OK .
10. Specify the minimum configuration for the controllers or KTES defined in the site. This
includes assigning a name to the controller/KTES, specifying the passback option, and
entering the serial number.
Note: The serial number column appears only for the KT-100, KT-300, KT-400
controllers and the KTES. The passback type column only appears for the KT-300 and
the KT-400. The passback feature will not allow any card to re-enter unless it has been
used to exit. This requires that readers be used for both entry and exit.
11. For a new site with a KTES, go to Step 14.
12. Check the Same door 1 and 2 and Same door 3 and 4 option if a reader is installed on each
side of the door. The Same door 3 and 4 boxes are available only when you are using KT-400.
13. Select the appropriate Passback type (none, soft or hard). If a door is defined as an access
door, there is no anti-passback defined for this door. An entry or an exit door can be assigned
a passback option.
14. Go to Step 16.
15. Check the Door contact option.
16. Check the Postal lock option, if applicable, for a KTES only.
17. Enter the Serial number , if this column is displayed. The serial number (S/N) is on a sticker
and generally starts with Axxxxxxx .
18. Click OK . The components associated with the controller and to the site are created in the
server database. By default, the KT-200 and KT-300 are assigned two doors except for the
KT-400 which is assigned four doors, if the Same door option is not checked. The following
table summarizes default values that are assigned to controllers.
Note: When the system is updating the database, the second status flag turns red,
indicating that the system database is locked. When you try to access another system
menu while the database is locked, an error message appears. Simply wait until the
system database becomes available.
Result
The following are default values assigned to controllers by the Express Setup program.
Table 44: Express Setup controller default values
Controller or
KTES Door Relay Input zone Auxiliary output
KT-100 1 4 4 2
KT-200 2 2 16 4
KT-300 2 2 8 4
KT-400 4 4 16 16
The following table summarizes how input zones are used by the system for controllers.
Table 45: How the system uses input zones for controllers
Input zone System use Controllers
1 Door 1 contact KT-100, KT-200, KT-300, KT-400, KT-1, and KT-2
2 Door 1 Rex
3 Door 2 contact KT-300
4 Door 2 Rex
5 Door 2 contact KT-400 and KT-2
6 Door 2 Rex
9 Door 2 contact KT-200
10 Door 2 Rex
9 Door 3 contact KT-400
10 Door 3 Rex
13 Door 4 contact
14 Door 4 Rex
The following table summarizes how input zones are used by the system for the KTES.
Table 46: How the system uses input zones for the KTES
Input zone System use Kantech Telephone Entry System
1 Door Contact KTES
2 Postal Lock
3 Door Rex
4 Future
The following table summarizes how output zones are used by the system.
Table 47: How the system uses output zones
Auxiliary output Use Controllers
1 LED (Door 1) KT-100, KT-200, KT-300 and KTES
2 Buzzer (Door 1)
3 LED (Door 2) KT-200 and KT-300
4 Buzzer (Door 2)
Note: The remaining components (relays and input zones) are undefined, that is, they have
been created but not yet defined. Components that are defined are grayed out. You cannot
select them or change their description. You can change their description in their respective
definition menu (Devices > Relays/Input zones).
By default, the system assumes that:
- If you click on No , you can always return to the Express Setup by clicking on the
button.
Note: Please note that the KT-300 is a 2-door system while a KT-400 is a four-door
system.
4. Specify if Both readers are installed on the same door, if applicable (not for a KTES). When
two readers are installed on the same door, the REX contact option is disabled.
5. Click the Advanced button to define the other devices, such as doors, inputs, relays and
outputs.
Note: Components are listed in the left-hand pane. The related tabs are displayed in
the middle of the window. When you select a component, its default name, number
and default settings are displayed in the language section. Select a component to
enable its tab. Components that are assigned are gray and cannot be modified at this
stage. However, you may later modify any component description in its definition menu
( Devices > Controller/Door/Relay / Input / Output ).
1. From the Site window, click on New to define a new site. Assign it a name for both
languages.
2. Under the General tab, select the Controller type : Secure IP (KTES) .
3. Click on Save , a message box should display: Do you want to use the Express Setup
program to configure the associated devices. Click Yes to continue with the Express Setup .
- If you click on No , you can always return to the Express Setup by clicking on the
button.
1. Select the first relay if you want to modify its description. The relay tab is enabled. You have
to check the box beside the relay name in order to enable the language section.
2. Check the appropriate options for the Operating mode .
3. In the Automatic activation schedule drop-down list, choose the appropriate activation
schedule.
4. In the Disable relay action drop-down list, choose the appropriate action.
Defining Inputs
About this task:
By default, the response time for a REX is 250 ms; it is 500 ms for other input zones. The alarm
restore time is 500 ms by default. The Express Setup program allows you to define the Input
Normal State and Monitoring Schedule.
1. Select the first undefined input (its checkbox is not gray). Check its box to enable the
language fields, then assign names to it.
2. Choose the Input normal state option.
3. Select the Monitoring schedule from the drop-down list. If you want to assign a custom
schedule to the selected input, you have to define it in the Definition > Schedule .
1. Select the first undefined output; its check box is not gray. Select it to enable the language
fields, and then assign names to it.
2. Choose the Operating mode option.
3. Assign a door to the output from the Selected doors list.
Result
The following table summarizes how output zones are used by the system.
1. From the Windows® task bar, click Start > All Programs > EntraPass > Quick Report Viewer.
2. Click the Open button to open a report. The system displays the Open window.
3. By default, when a report is saved in a QRP format, the system automatically saves it in My
Documents folder. If you have saved the report in another folder, browse to the folder to
select the report.
4. Click Open to preview the report.
5. Use the toolbar buttons to preview the report.
Table 49: Report toolbar icons
Icon Description
Use the Zoom out icon to zoom out the report view.
Use the Open icon to open a report located in any folder on your computer.
Use the Print icon to print the report. There is no printer setup dialog box, the
report prints automatically. To cancel the printing, click Cancel.
Use the Quit icon to quit the application.
Vocabulary editor
Use the vocabulary editor to translate the display text of the software into the language of your
choice. EntraPass offers you the possibility of adding up to 99 languages for the purpose of
changing the text language in the graphic user interface. However, you can only run the software
1. Start the Vocabulary editor from the Windows® Start menu: click Start > All Programs >
EntraPass Special Edition > Vocabulary Editor > Vocabulary Editor.
2. Select one of the available languages and click on New . The system displays the Select
language window.
3. Select the source language for the translation, then click OK . The newly selected language is
transferred to the right in the Custom Languages display list.
4. Click on the new Custom Language and then on the Edit custom language button to start
translating the software vocabulary. The system displays the dictionary database.
Note: You must make sure that the Customdictionnary directories are regularly backed
up (C:\ProgramFiles\Kantech\Vocabulary Editor\CustomDictionary\files.xxx.ath) or C:
\ProgramFiles\Kantech\”Application type”\CustomDictionary\files.xxx.0
Result
The following table shows the value of the Vocabulary Editor color codes.
• The “Source language” column contains text based on the basic language that was selected
during the creation of the vocabulary. This column will serve as a “source” for the translation.
Software language columns cannot be modified by the user.
• Use the right-click to enable a contextual sub-menu or use the Language editor toolbar. A
hint appears when you position the mouse over a button.
1. Start the Vocabulary Editor. The Vocabulary Editor window toolbar displays five buttons.
Note: The Graphic User Interface appears only in one of five languages: English, French,
German, Italian or Spanish.
2. Select a newly translated vocabulary.
- You can choose to Apply changes to the Operational dictionary: this option is
useful when you want to test your changes before you update the whole system.
- Restore the operational vocabulary: this option allows the user to easily restore
the default languages. It creates a self-extracting file which restores the original
dictionary.
- Scan dictionary for new entries: this option is useful when the software was
updated for example.
3. If you decide to implement the new vocabulary, click the Actions menu and select Create
self-extracting file for update. The system creates the Updatedictionary.exe file, and
prompts you to select a destination folder for the file.
4. Select the destination folder for Updatedictionary.exe. By default, the self-extracting file
is stored in C:\Program Files\Kantech (application).
Alarm Systems
Alarm system icons indicate the status of an alarm system within the Graphic desktop (Desktop >
Graphic desktop) or in the “Operation” window.
This animated icon appears when the alarm system is in alarm. It is displayed in:
This animated icon appears when the alarm system is armed. It is displayed in:
This animated icon appears when arming the alarm system while a surveillance area is in alarm.
The system will allow you to arm the system (forced armed) and the icons will display the input in
alarm in:
• the Operation window
• the Desktop > Graphic desktop.
This animated icon appears when the alarm system in the “arming request” delay (waiting for
confirmation with the arming request input button). It is displayed in:
• the “Operation” window
This animated icon appears when the alarm system is disarmed. It is displayed in:
This animated icon appears when the alarm system is in “entry” delay. It is displayed in:
This animated icon appears when the alarm system is in “exit” delay. It is displayed in:
This animated icon appears when the status of the alarm system is unknown. It is displayed in:
• the “Graphic” window (the Desktop > Graphic desktop) when the status of the alarm system
is unknown.
Controllers
Controller animated icons indicate the status of a door controller in the graphic window (Desktop >
Graphic desktop) or in the “Operation” window.
Status unknown
Appears when the EntraPass application has not received the component status after four (4)
attempts. It is displayed in:
• the Operation window (alarms, areas, guard tours, door, elevator door, relay, input, reload
data)
• or the Desktop > Graphic desktop.
Controller AC failure
• the “Operation” — “Area”, “Guard Tour” and “Controller Reset” windows. “Controller Reset”
windows. “Controller Reset” windows.
• the Desktop > Graphic desktop.
Appears when the controller is communicating and the communication is regular. It is displayed in:
Appears when the controller is in “reset mode” and in “AC failure”. It is displayed in:
Appears when the controller is in “reset mode”, in “AC failure” and the tamper is in alarm. It is
displayed in:
• the Graphic desktop (Desktop > Graphic desktop window)
• the Operation > Controller Reset
Appears when the controller is in “reset mode” and the tamper is in alarm. It is displayed in:
Doors
Icons representing a door state indicate the status of door within the graphic window (from the
desktop) or within the “Operation” window.
This animated icon appears when the door is opened and that no access granted nor request to
exit was permitted and the reader is disabled. it is displayed in:
This animated icon appears when the door is closed and locked. It is displayed in:
This animated icon appears when the door closed and locked and that the reader is disabled. It is
displayed in:
This animated icon appears when the door is opened more than the permitted delay set in “open
time”. It is displayed in:
• the Graphic desktop (Desktop > Graphic desktop window)
• the Operation > Door, Elevator door.
This animated icon appears when the door is opened more than the permitted delay set in “open
time” and that the reader is disabled. It is displayed in:
This animated icon appears when the door is opened and it was unlocked by an operator. it is
displayed in:
This animated icon appears when the door is opened and it was unlocked by an operator and the
reader is disabled. It is displayed in:
This animated icon appears when the door is opened and it was unlocked by a schedule. It is
displayed in:
• the Graphic desktop (Desktop > Graphic desktop window)
• the Operation > Door > Elevator door.
This animated icon appears when the door is opened more than half the time permitted delay set
in “open time”. It is displayed in:
This animated icon appears when the door is opened more than half the time permitted delay set
in “open time” and the reader is disabled. It is displayed in:
This animated icon appears when the door is opened and the unlock schedule is invalid. It is
displayed in:
This animated icon appears when the door is opened and the unlock schedule is invalid and the
reader is disabled. It is displayed in:
• the Graphic desktop (Desktop > Graphic desktop window)
• the Operation > Door/ Elevator door.
This animated icon appears when the door is unlocked by an operator (manually). It is displayed in:
This animated icon appears when the door is unlocked by an operator (manually) and the reader is
disabled. It is displayed in:
This animated icon appears when the door is unlocked by a schedule. It is displayed in:
This animated icon appears when the door is unlocked by a schedule and the reader is disabled.
It is displayed in:
This icon appears when the wireless lock is connected. It is displayed in:
This icon appears when the wireless lock has an error associated with it. It is displayed in:
• the Graphic desktop (Desktop > Graphic desktop window)
• the Operation > Integrated Panel/Wireless Lock.
Relays
Relays icons indicate the status of a relay within the graphic window (from the desktop) or within
the “Operation” window.
• the “Graphic” window (desktop—graphic) for a relay triggered by an alarm system in alarm.
• the Operation > Relay when the relay is triggered by an alarm system in alarm.
• the “Graphic” window (desktop—graphic) for a relay triggered by the delay of an alarm
system.
• the Operation > Relay when the relay is triggered by the delay of an alarm system.
• the “Graphic” window (desktop—graphic) when the relay is temporarily activated by an input.
• the Operation > Relay when the relay is temporarily activated by an input.
Relay deactivated
Inputs
This section is used to indicate the status of an input within the graphic window (from the desktop)
or within the “Operation” window.
• the “Graphic” window (desktop—graphic) when the input is activated and the monitoring
schedule is invalid.
• the Operation > Input when the input is activated and the monitoring schedule is invalid.
Input activated—Supervised
• the “Graphic” window (desktop—graphic) when the input is activated and the monitoring
schedule is valid.
• the Operation > Input when the input is activated and the monitoring schedule is valid.
• the “Graphic” window (desktop—graphic) when the input is activated, manually operated
and the monitoring schedule is temporarily valid.
• the “Graphic” window (desktop—graphic) when the input is in alarm and the monitoring
schedule is invalid.
• the Operation > Input when the input is in alarm and the monitoring schedule is invalid.
• the “Graphic” window (desktop—graphic) when the input is in alarm and it is shunted by an
operator.
• the Operation > Input when the input is in alarm and it is shunted by an operator.
Input in alarm—Supervised
• the “Graphic” window (desktop—graphic) when the input is in alarm and the monitoring
schedule is valid.
• the Operation > Input when the input is in alarm and the monitoring schedule is valid.
• the “Graphic” window (desktop—graphic) when the input is in alarm and it is supervised by
an operator (continuous supervision).
• the Operation > Input when the input is in alarm and it is supervised by an operator
(continuous supervision).
• the “Graphic” window (desktop—graphic) when the input is in normal condition and it is
shunted by an operator.
• the Operation > Input when the input is in normal condition and it is shunted by an operator.
Input OK—Supervised
Controller connection
These icons indicate the status of a connection, or gateway within the graphic window (from the
desktop) or within the “Operation” window.
• the “Graphic” window (desktop—graphic) when the status of the controller connection is not
yet known.
• the “Graphic” window (desktop—graphic) when the connection is connected and is in “reload
data” state.
• the Operation > Reload data when the connection is connected and is in “reload data” state.
• the “Graphic” window (Desktop—graphic) when the connection is disconnected and there is
a communication failure.
• the Operation > Reload data when the connection is disconnected and there is a
communication failure.
Gateways
Gateway—Communication Failure
• the “Operation” (door, elevator door, relay, input, reload gateway) window when the gateway
is in communication failure.
• the “Graphic” window (desktop—graphic) when the gateway is in communication failure.
Gateway Trouble
Gateway OK—communicating
Gateway—Communication Failure
EntraPass Application
Application status is not yet known
• the “Graphic” window (desktop—graphic) when the status of the application is not yet
known.
• the start-up window when the workstation attempts to communicate with the server.
Application—Communication Failure
Others
Database Initialization
No status available
This animated icon is used to indicate a transient stage. This could indicate that the requested
component status is not currently available.
• the “Graphic” window (desktop—graphic) when the status of the output is not yet known.
Status unknown
Error in process
Undefined Component
1. SCOPE OF LICENSE. The Software may include computer code, program files and any
associated media, hardware or software keys, printed material and electronic documentation.
The Software may be provided to you pre-installed on a storage device (the media) as part
of a computer system or other hardware or device ("System"). The Software is protected
by copyright laws and international copyright treaties, as well as other intellectual property
laws and treaties. All title and intellectual property rights in and to the Software (including
but not limited to any images, photographs, and text incorporated into the Software), the
accompanying printed materials, and any copies of the Software, are owned by Tyco and/or
its suppliers. The Software is licensed, not sold. All rights not expressly granted under this
EULA are reserved by Tyco and its suppliers.
2. GRANT OF LICENSE. This EULA grants you the following rights on a non-exclusive basis:
a. General. This EULA permits you to use the Software for which you have purchased
this EULA. Once you have purchased licenses for the number of copies of the Software
that you require, you may use the Software and accompanying material provided
that you install and use no more than the licensed number of copies at one time.
The Software is only licensed for use with specified Licensor-supplied Systems. If the
Software is protected by a software or hardware key or other device, the Software
may be used on any computer on which the key is installed. If the key locks the
Software to a particular System, the Software may only be used on that System.
b. Locally Stored Components. The Software may include a software code component
that may be stored and operated locally on one or more devices. Once you have
paid the required license fees for these devices (as determined by Tyco in its sole
discretion), you may install and/or use one copy of such component of the Software
on each of the devices as licensed by Tyco. You may then use, access, display, run
or otherwise interact with ("use") such component of the Software in connection
with operating the device on which it is installed solely in the manner set forth in
any accompanying documentation or, in the absence of such, solely in the manner
contemplated by the nature of the Software.
3. OTHER RIGHTS AND LIMITATIONS. Your use of the Software is subject to the following
additional limitations. Failure to comply with any of these restrictions will result in automatic
termination of this EULA and will make available to Tyco other legal remedies.
a. Limitations on Reverse Engineering and Derivative Works. You may not reverse
engineer, decompile, or disassemble the Software, and any attempt to do so shall
immediately terminate this EULA - except and only to the extent that such activity
may be expressly permitted by applicable law notwithstanding this limitation. You
may not make any changes or modifications to any portion of the Software, or create
any derivative works, without the written permission of an officer of Tyco (except as
provided in Section 3(f) of this EULA with respect to "open source" software). You
may not remove any proprietary notices, marks or labels from the Software. You shall
institute reasonable measures to ensure compliance with the terms and conditions of
this EULA by your personnel and agents.
b. Copyright Notices. You must maintain all copyright notices on all copies of the
Software.
c. Transfer. You may only transfer your rights under this EULA (i) as part of a permanent
sale or transfer of all of the devices for which the Software is licensed as applicable;
(ii) if you transfer all of the Software (including all component parts, the media and
printed materials, any upgrades and this EULA); (iii) if you do not retain any copies
of any portion of the Software; (iv) if the recipient agrees to the terms of this EULA;
and (v) if the Software is an upgrade, such transfer must also include all prior versions
of the Software. You agree that failure to meet all of these conditions renders such
transfer null and void.
d. Termination. Without prejudice to any other rights, Tyco may terminate this EULA
if you fail to comply with the terms and conditions herein. In such event, you must
immediately destroy all copies of the Software and all of its component parts. To
the extent the Software is embedded in hardware or firmware, you will provide
prompt access to Tyco or its representative to remove or lock Software features or
functionality as Tyco determines.
a. Warranty. Tyco warrants that the recording medium on which the Software is
recorded, hardware key, and the documentation provided with it, will be free of
defects in materials and workmanship under normal use for a period of ninety
(90) days from the date of delivery to the first user. Tyco further warrants that
for the same period, the Software provided on the recording medium under this
license will substantially perform as described in the user documentation provided
with the product when used with specified hardware. THE FOREGOING EXPRESS
WARRANTY REPLACES AND IS IN LIEU OF ALL OTHER WARRANTIES OR CONDITIONS,
WHETHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING BUT NOT LIMITED TO,
ANY IMPLIED OR OTHER WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE, TITLE, NON-INFRINGEMENT OR NON-MISAPPROPRIATION
OF INTELLECTUAL PROPERTY RIGHTS OF A THIRD PARTY, CUSTOM, TRADE, QUIET
ENJOYMENT, ACCURACY OF INFORMATIONAL CONTENT, OR SYSTEM INTEGRATION.
TYCO MAKES NO WARRANTY THAT ANY PORTION OF THE SOFTWARE WILL OPERATE
ERROR-FREE, FREE OF ANY SECURITY DEFECTS OR IN AN UNINTERRUPTED MANNER.
TYCO SHALL NOT BE RESPONSIBLE FOR PROBLEMS CAUSED BY CHANGES IN THE
OPERATING CHARACTERISTICS OF THE DEVICE(S) UPON WHICH THE SOFTWARE
IS OPERATING, OR FOR PROBLEMS IN THE INTERACTION OF THE SOFTWARE WITH
NON-TYCO SOFTWARE OR HARDWARE PRODUCTS. TYCO NEITHER ASSUMES NOR
AUTHORIZES ANY OTHER PERSON PURPORTING TO ACT ON ITS BEHALF TO MODIFY
OR TO CHANGE THIS WARRANTY, NOR TO ASSUME FOR IT ANY OTHER WARRANTY
OR LIABILITY CONCERNING THIS SOFTWARE. THE WARRANTY MADE BY TYCO MAY BE
VOIDED BY ABUSE OR MISUSE. THIS LIMITED WARRANTY GIVES YOU SPECIFIC LEGAL
RIGHTS. YOU MAY HAVE OTHER RIGHTS UNDER MANDATORY LAW THAT VARY FROM
STATE TO STATE AND COUNTRY TO COUNTRY.
8. GENERAL. If any provision of this EULA is found to be unlawful, void, or for any reason
unenforceable, then that provision shall be severed from this EULA and shall not affect the
validity and enforceability of the remaining provisions. You should retain proof of the license
fee paid, including model number, serial number and date of payment, and present such
proof of payment when seeking service or assistance covered by the warranty set forth in
this EULA. This EULA is governed by the laws of the State of New York, without regards to its
conflicts of law principles. The parties hereby irrevocably agree that they submit themselves
to the personal jurisdiction of the state and federal courts of New York for purposes of
resolving any and all disputes arising under or related to these terms and conditions. The
parties specifically exclude the application of the provisions of the United Nations Convention
on Contracts for the International Sale of Goods.