ADIP TEC 19012103 EN
Installation Guide
http://www.acie-adip.com/
Au départ usine l’USER est: adip et the PASSWORD installateur est: insta
AC
IE R
ue
de
l’in
dust
rie,
19
/Ctr
e en
trep
. Jo
nca
ux 6
47
00
Hen
day
e (F
RAN
CE)
In accordance with the Webserver y Firmware versions: ADIP 10Y_
2 ADIPInstallation Guide
CHAPTERS MENUS SOUS-MENUS PAGESystem description 4Compatible elements tcp/ip Network 5
Bus reader WIEGAND and DATA&CLOCK WIEGAND Format 6DATA&CLOCK Format 6
Confi guration and cabling ADIP Unity - Characteristic HARDWARE Characteristic 7SOFTWARE Characteristic 7
ADIP Unity - Conenection bounds description Connectivity overview 8Connection bounds description 8-9
N-P Programmation bridge Recovering factory passwords 10DHCP Adressing 10Factory reset 10
Lights operation and electro-lock connection Operation of the red light 11Operation connectors RJ45 lights 11Electro-lock connection 11
Cable type and lenght Network cable type 12Network type 12Connection readers cable type 12
System tree Direct connection off -line (PC+MASTER+SLAVE) 13Ethernet network connection (PC+MASTER+31 SLAVES) 13Internet Connexion (PC+MASTER+31 SLAVES) 13
Functions descriptions Input functions 14Output functions 14-15SAS operation 16Area counters 16Visits 16-17Free access 17Antipassback 17Anti-Timeback 17Degraded mode 17PUSH Notifi cations 18-20
Installation parameters IP Adressing procedure for the ADIP controller 21-22 IP Device Confi guration 23 Identifi cation of Access point 24 Access point Confi guration Confi guration of the 2 readers of the access point (pag.1/4) 25
Inputs confi guration (pag.2/4) 25Outputs confi guration (pag.2/4) 25-26PUSH notifi cations to Mobile (pag.3/4) 26E-mails (pag.4/4) 26
SAS 27 Date/Time Clock Update 28
Sync with server NTP 28Manual time setting 28
Propagate Date/Time 29 Register unknown users 30 Access keys Installer access key (pag.1/4) 31
Administrator access key (pag.2/4) 31Consultant access key (pag.3/4) 31User name (pag.4/4) 31
Communication and security codes 32
Index
3 ADIPInstallation Guide
Data Introduction 33 Users 34-35 Time Tables 36 Time Areas 37 Security areas controlled 38 Access groups 39 Area counters 40 Visits 41 Free access 42 Antipassback Possibility of unlocking the antipassback of a user 43
Possibility of unlocking the antipassback of an access group 43-44Possibility to reset the antipassback weekly 44Possibility to reset the antipassback monthly 44
Synchronize data 45Tables Users by number 46
Users by name 47 Time tables 48 Time Areas 49 Security areas controlled 50 Access Group 51 Access points 52
Delete Delete events 53 Delete data Delete users 54
Delete visits 54Delete time tables 54Delete time areas 54Delete access groups 54
Firmware update (BOOTLOADER) 55 Supervision 56
Events General list of events 57-61 List of users present 62 List of users missing 62
Accessories Protection circuit WIEGAND and DATA&CLOCK: SEPRO 63Adaptater WIEGAND and DATA&CLOCK for USB reader 63
System description
4 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
ADIP System Description
The access system with an innovatrice architecture which avoids to use expensives
centrals.
A simple connection of point access controllers to the Ethernet network and/or Internet
suffice to established a performance access system, reaching up to 64 readers/door.
The point access controller has the required connections for 2 readers (WIEGAND or
DATA&CLOCK) with all the inputs to manage 1 or 2 doors.
Economy of installation. No need to instal the communication BUS. The système use the
Ethernet network.
Use « peer to peer » connection between controllers allows to have a bigger autonomy of
operation. Even in degraded mode, without network, the controller remains at 80% of its
functionality (It does not control the antipassback).
User interface in the device memory (WEBSERVER).No need to install any software...
The integration of a DynDns is possible with an affordable installation cost.
Operation in autonomy mode (stand-alone). Webserver for management from any
computer or mobile terminal with network connection.
Automatic calendar thanks to the NTP server with Internet connection. Possibility to send
notifications and alarms to multiple devices.
ACManager supervision software available for larger installations.
SDKs available for integration.
Compatible elements
5 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
TCP/IP NETWORK
ADIP CONTROLLERS
COMPUTER
(PC or MAC)
TABLET(Android, iOS,
Windows Phone, etc)
SMARTPHONES(Android, iOS,
Windows Phone, etc)
The network is local Ethernet type, but Internet also.The IP connection must have a speed of at least 3 Mbps
The devices that can be part are those below:
Compatible elements
6 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
Bus reader WIEGAND and DATA&CLOCK
WIEGAND Formats
DATA&CLOCK Formats
0000 0000 0000 0000 0000 0000 0000 1001 1101 0010 0110
0 0 0 0 0 0 0 9 D 2 6bit 1…bit 40 bit 41…bit 44
MSBit Data in first position LRC
LRC: 4 bits = XOR between each number
Data: MSByte hexdecimal numbers in first position. Each hexadecimal number at 4 bits, MSBit in first positionExample: Entered code : 2514 - Hexadecimal value : 0000009D2 in Wiegand 44 format
FORMAT1) 16 bits at zero2) Start code SS (B) + odd parity bit.3) 10 or 13 reverse BDC nibbles, corresponding to the ID code + odd parity bit.4) Transmission end code ES (F) + odd parity bit.5) Linear redundancy code of previous nibbles, except start zeros + odd parity bit.LCR = SS N1⊕ N2 ⊕ N3 ⊕ N4 ⊕ N5 ⊕ N6 ⊕ N7 ⊕ N8 ⊕ N9 ⊕ N10 ⊕ ES (⊕ = Function O exclusive)
LINESTwo lines : DATA & CLOCK normally at «1» (5Vcc) that produce pulses at «0» (0,4Vcc) for 1/3 of the clock period, of 1 ms. DATA at «0» to send «1» logical and at «1» to send a logical «0» .
Longest possible code : 99999999
NOTE: If the code of the tag cannot be represented in BDC 10 characters, it is recommended to use format BCD 13.
TIME DESCRIPTION MIN. TYP. MAX. UNIT
Tset Data setup time 5 1/6 Tclock µs
Trm Data hold time 0 8 2/3 Tclock µs
Twidth Clock pulse width - 1/3 Tclock - µs
Tclock Clock pulse rate 80 1000 1500 µs
Ttotal Timeout read operation - 76 - Tclock
FORMAT OF TRANSMISSION DATA TRANSMITED
DATA&CLOCK 10 0012345678
DATA&CLOCK 13 0000012345678
TRANSMISSION EXAMPLEUSER CODE : 12345678 (00BC614E in hexadecimal)
FORMAT OF TRANSMISSION DATA TRANSMITED
WIEGAND 26 BC61AE
WIEGAND 34 00BC61AE
WIEGAND 44 0000BC61AE
EXAMPLE OF TRANSMISSIONUSER PIN : 12345678 (00BC614E in hexadecimal)
WIEGAND FORMAT 26 BITS
1-Bit N°1 even parity in bits 1 to 13
2-Bit N°2 to N°25 corresponding to the ID code in 6 hexadecimal (3 bytes)
3-Bit N°26 odd parity in bits 14 to 26
WIEGAND FORMAT 34 BITS
1-Bit N°1 even parity in bits 1 to 16
2-Bit N°2 to N°33 corresponding to the ID code in 8 hexadecimal (4 bytes)
3-Bit N°34 odd parity in bits 17 to 34
WIEGAND FORMAT 44 BITS
1-Bit N°1 to N°40 corresponding to the ID code in 10 hexadecimal maximum (5 bytes)
2-Bit N°41 to N°44 XOR function of previous numbers
DEMARRAGE SS P Nº1 P Nº2 P ... Nº10 TO Nº13 P ES P LRC P FINAL
00000000 1101 0 0000 1 1000 0 ... 111 0 0 1111 1 xxxx Y 0000000
0 B 0 1 ... 7 F 0
TIMINGS
Transmission frequency : 1000bits/s
Logical “0”
DATA1
DATA0
100us40us
100us40us
900us2048us
900us2048us
Logical “1”
Transmission frequency : 1000bits/s
Logical “0”
DATA
WIDTHCLOCK
1 0 0 1
CLOCK
READT
TT
TTRMset
Configuration and cabling
7 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
ADIP Unity - Characteristic
HARDWARE Characteristics
SOFTWARE Characteristics
• Power supply: 12v DC•Max consumption: 280 mA off readers• Inside mounting in dry environment only•Temperature range: -30 ° to + 50 ° C•Dimensions (HxWxD): 150 x 160 x 40 mm•2 IP connections of RJ45 type, one to connect to the network and the other to inter-
connect a second ADIP controller, a video camera, etc.•32 controllers maximum on the network (64 doors maximum)•2 inputs for readers Wiegand or DATA & CLOCK (W0 / W1)•2 inputs door detection (G) programmable according to input functions table•2 inputs push button (PB) programmable according to input functions table•2 inputs inhibition of readers (I) programmable according to input functions table•4 output relay for door or auxiliary gates order, programmable according to output
functions table•Tamper of tamper alarm (A-P)• Interconnection of 2 controllers for SAS management
• Software in the memory of the Webserver device•DynDns Integrated into the device•Communication peer to peer to distribute zone information•32 ADIP maximum connectable network controllers•65,000 users common to all network controllers (synchronized)•Over 130,000 events in memory per access point•32 Access Groups (Selectable Anti-Return)•32 time grids with holidays and holidays•65.000 visitors•4 free access•Anti-return in 3 levels; Hard, soft or canceled, with programmable reset•8 controlled safety zones (each access point can be placed in or out)• Zone counters with empty area and full area indication for all the groups•The names of the users, groups, etc. are in the controller memory•Manage and report multiple alarm events•Manual or automatic time setting (NTP server under Internet connection)• Supervision of inputs and activation of outputs from computers or mobile devices• Possibility to send the general list of events by e-mail, in CSV format, to print or on a
spreadsheet•8 PUSH notification of multiple events on mobile devices per access point•8 e-mail notifications of multiple events for each access point•Compatible with all mobile devices and computers• Possibility of remote updating by BOOTLOADER• English language
Configuration and cabling
8 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
Power supply
The access point controller must be powered by a 12 V DC power supply and backed up by a battery. The power terminals are polarized.
- +Alim
Auto protec-tion
The A-P terminals follow the status of the mi-croswitch positioned on the motherboard. Un-der pressure the contact is normally closed. Without pressure the contact is normally open. This information can be returned to an alarm center.
A-P
Reader Connection nº1
The reader can be powered by the + and - Vout terminals (12v DC - 500mA max).The controller can receive the reader in Wiegand or Clock & Data formats via the W0-CK and W1-DT terminals.Fresh out of the factory:The IN1 (PB1) input - C is dedicated to the door control (relay 1) by pushbutton normally open at idle.The IN2 (G1) input - C is dedicated to the supervision of the door by normally closed magnetic contact.The IN3 (I1) input - C is dedicated to read enable by sensor normally open when it is not in use. When the sensor switches to the normally closed state, the reading is no longer possible.
W1DT
Vout- +
G1IN2
I1IN3 C
PB1IN1
W0CK
NO C NC NO C NC NO C NC NO C NC - + A-P
READER 1
BATTERYDL1
PROGRAMMING BRIDGE
N P
READER 2
RJ45
RJ45
RL4 RL3 RL2 RL1
W1DT
Vout- +
GIN2
IIN3 C
PBIN1
W0CK
W1DT
Vout- +
GIN5
IIN6 C
PBIN4
W0CK
Connectivity overview
Connection bounds description
ADIP Unity - Connection bounds description
Next page...
Configuration and cabling
9 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
Reader Connexion nº2
The reader can be powered by the + and - Vout terminals (12v DC - 500mA max).The controller can receive the reader in Wiegand or Clock & Data formats via the W0-CK and W1-DT terminals.Fresh out of the factory:The IN4 (PB2) input - C is dedicated to the door control (relay 1) by pushbutton normally open when it is not in use.The IN5 (G2) input - C is dedicated to the supervision of the door by normally closed magnetic contact.The IN6 (I2) input - C is dedicated to the read-ing by sensor, normally open when it is not in use. When the sensor switches to the nor-mally closed state, the reading is no longer possible.
W1DT
Vout- +
G2IN5
I2IN6 C
PB2IN4
W0CK
Door relay 1
The relay N ° 1 is a programmable relay 5A under 30Vdc, dedicated to door control 1 as it left the factory.It can be controlled by time range, input func-tion, by badge, PB-1 push putton input. It can operate in timed mode, on - off or tracking of an input.
NC NO C NCRL1
Door relay 2
The relay N ° 2 is a programmable relay 5A under 30Vdc, dedicated to door control 2 as it left the factory.It can be controlled by time range, input func-tion, by badge, PB-2 push putton input. It can operate in timed mode, on - off or tracking of an input.
NC NO C NCRL1
Optional relay 3
The relay N° 3 is a programmable relay 5A at 30Vdc. It can be controlled by time range, input func-tion, by badge. It can operate in timed mode, on - off or tracking of an input. NC NO C NC
RL1
Optional relay 4
The relay N° 4 is a 5A programmable relay at 30Vdc.It can be controlled by time range, input func-tion, by badge. It can operate in timed mode, on - off or tracking of an input. NC NO C NC
RL1Connector RJ45
RJ45 female connector dedicated to local or remote communication with a computer or with the ADIP network.
Connector RJ45
RJ45 female connector dedicated to local or remote communication with a computer or with the ADIP network.
Battery Type CR2032 for maintaining the calendar
Programma-tion bridge
Performs NEXT procedures:- Recover factory passwords- DHCP Addressing- Reset Factory
N P
Red warming light
Indicates the different configuration phases DL1
Configuration and cabling
10 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
Recovering factory passwordsHow to recover passwords:This procedure allows you to retrieve factory passwords for the webserver for 1 minute:User: AdipPassword installer: instaPassword administrator: adminPassword consultant: consul
Description of the procedure:1 - Disconnect power2 - Set the programming bridge to position P3 - Reconnect power (beep,beep,beep…)4 - Set the programming bridge to position N (end of beeps)
DHCP AdressingDHCP adressing procedure in local network (without Internet): If the terminal and the controller do not have the same network rank.
Description of the procedure:1 - Disconnect power2 - Set the programming bridge to position P3 - Reconnect power (beep,beep,beep…)4 - Set the programming bridge to position N (end of beeps)5 - Place the programming bridge in position P (we have 5s to do it) (beep, beep, beep
...) 6 - Set the programming bridge to position N (end of beeps)7 - After 12 seconds beeps. Now you can address the name of the device or HOST-
NAME. The factory-set HOSTNAME is ADIP01.Then, introduce this HOSTNAME on the browser and validate:
Factory resetProcedure of the factory reset:This procedure will erase all programmed data and installation parameters. The memo-ry will return as factory.
Description of the procedure (5 beep beep beep in total):1 - Disconnect power2 - Set the programming bridge to position P and reconnect power (beep, beep, beep
...)3 - Set the programming bridge to position N (end of beeps)4 - Place the programming bridge in position P (we have 5s to do it) (beep, beep, beep
...)5 - Set the programming bridge to position N (end of beeps)6 - Place the programming bridge in position P (we have 5s to do it) (beep, beep, beep
...)7 - Set the programming bridge to position N (end of beeps)8 - Place the programming bridge in position P (we have 5s to do it) (beep, beep, beep
...)9 - Set the programming bridge to position N (end of beeps)10 - Place the programming bridge in position P (we have 5s to do it) (beep, beep, beep
...)11 - Set the programming bridge to position N (the buzzer makes a rousing sound)
(finally beep, beep)
N-P Programmation bridge
Configuration and cabling
11 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
Lights operation
and electro-lock connection
Operation of the red light
The red light indicates the different configuration phases :
- One blinking and one beep when power is turned on - 2 flashes with beep during authorization - 5 flashes with beep when denied - Flashes and beeps continuously when the N-P bridge is forgotten in position P - Factory reset procedure - DHCP adressing procedure - Passwords recovering procedure - On permanently in degraded mode
Operation of the connectors RJ45 lights
The network connector LEDs (RJ45) indicate the connection states:
- Yellow : indicates network connection - Green : indicates communication
Electro-lock connection
NO C NC-
+Electric-lock
BY 251 Diode
DIRECT CURRENT
NO C NC~
~Electric-lock
Appropriate varistor
ALTERNING CURRENT
Configuration and cabling
12 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
Cable type and lenght
Cable Network type Max. recom-mended dis-
tance
CAT-5 Can transmit data at 100 Mbps speed.
Can reach frequencies of 100 MHz
100m.10BASE-T and 100BASE-TX
Ethernet
CAT-5E Can transmit data at 1 Gbps speed.Can reach frequencies of 100 MHz.
100m.100BASE-TX
and 1000BASE-T Ethernet
CAT-6 Can transmit data at 1 Gbps speed.Can reach frequencies of 250 MHz.
100m.1000BASE-T
Ethernet
CAT-6E Can transmit data at 10 Gbps speed.Can reach frequencies of 500 MHz.
100m.10GBASE-T Ethernet
CAT-7Can transmit data at speeds of 10 Gbps. Can reach fre-
quencies of 600 MHz, not with RJ45 connectors, but with special TERA connectors
100m.
Network cable typeUse shielded category 5,6 or 7 cable.The cable must be symmetrical with a twisted conductor structure in pairs, an outer sheath and shielding against electromagnetic disturbances. Shielded twisted pair (STP) or Foiled twisted pair (FTP) shielding.
Network typeSHARED ETHERNET = 10 Mbit/sFAST ETHERNET = 100 Mbit/s (CAT 5 requirements)GIGABIT ETHERNET = 1000 Mbit/s (1 Gbit/s)
Connection readers cable type
The interface can receive most readers in Wiegand or DATA & CLOCK formats.
Use a shielded unshielded cable 4 to 8 conductors 6 / 10th to 9 / 10th + 1 shielding for a maximum distance of 50m for WIEGAND and 15m for DATA & CLOCK.
For the connection of the I, G and PB inputs, the 8-conductor cable of the reader or a shielded unshielded 2-conductor cable can be used 6 / 10th to 9 / 10th + 1 shielding for a maximum distance of 50m.
A CAT7 cable provides up to 699MHz output and can be up to 100 meters long.
Configuration and cabling
13 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
System tree
Direct connection off-line (PC+MASTER+SLAVE)
Internet connection (PC+MASTER+31 SLAVES)
Ethernet network connection (PC+MASTER+31 SLAVES)
Interconnection of several ADIPsThere are several ways to connect the ADIPs door controllers, each with its advantages and disadvantages:
With a direct connection via the second RJ45 connector, you can also connect the com-puter to the first RJ45 connector on the MASTER or SLAVE controller.
Forming a local area network through an Ethernet switch. In this way, it is possible to connect the maximum number of controllers (32). This network can be made wirelessly with WI-FI access points, connecting up to 2 ADIP controllers to each WI-FI access point.
Interconnection of networks through a router (http port of webserver 80); For example, the local network with the Internet. This allows you to connect remote network control-lers or simply manage the remote installation.
ADIPMASTERPC
ADIPSLAVE
ADIPMASTER
ADIPSLAVE
ADIPSLAVE
PC
ADIPMASTER
ADIPSLAVE
ADIPSLAVE
ADIPSLAVE
PC
ADIPSLAVE
Functions description
14 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
Input Functions Explanation
PB push-button opening door 1The PB input - C is dedicated to the door con-trol 1 by pushbutton normally open at rest
PB push-button opening door 2The PB input - C is dedicated to the door con-trol 2 by pushbutton normally open at rest
G door burglary 1 and maximum opening time
The input G - C is dedicated to the supervi-sion of the door 1 by magnetic contact nor-mally closed
G door burglary 2 and maximum opening time
The input G - C is dedicated to the supervi-sion of the door 2 by magnetic contact nor-mally closed
Inhibition reader door 1
The input I - C is dedicated to read enable by sensor normally open when it is not use. Can be read by door reader 1 when the sensor switches to the closed state
Inhibition reader door 2
The input I - C is dedicated to read enable by sensor normally open when it is not use. Can be read by door reader 2 when the sensor switches to the closed state
Unlock Antipassback Entry for automatic unlocking of all users
InhibitionInput I (Inhibition) disables operation of the reader when it is closed. When this input opens, the drive will resume operation. This serves, for example, to connect a buried magnetic loop, so that the reader operates only when there is a present vehicle.This input also allows to realize a SAS with two doors, equipped with an input reader and an output pushbutton, without SAS time.
Output FunctionsOutput Functions Explanation
Door lock 1 associated with input PB-1
The relay is dedicated to the door control 1, on identification by reader 1. The relay can operate in timed mode
Door lock 1 associated with input PB-2
The relay is dedicated to the door control 1, on identification by reader 2. The relay can operate in timed mode
Door lock 1 In / Out associated with input PB-1
The relay is dedicated to the door 1 control on identification by drives 1 or 2. The relay can operate in time delay mode
Fraud gate 1 associ-ated with input G-1
Activates if door 1 is opened without the door lock output 1 being activated. Wire a door sensor between G-1 and C
Fraud gate 1 associ-ated with input G-2
Activates if door 2 is opened without the door lock output 2 being activated. Wire a door sensor between G-2 and C
Maximum time for the opening of the gate 1 associated to input G-1
Activates when door 1 is opened too long. The relay can op-erate in timed mode. Wire a door sensor between G-1 and C. Indicate the time of the function in seconds, from 0001 to 2400 for this max opening time
Output Functions Explanation
Maximum time for the opening of the gate 2 associated to input G-2
Activates when door 2 is opened too long. The relay can op-erate in timed mode. Wire a door sensor between G-2 and C. Indicate the time of the function in seconds, from 0001 to 2400 for this max opening time
Input Functions
Next page...
Functions description
15 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
Output Functions Explanation
Output of a configurable input
Activates when activating the corresponding input (on this ac-cess point and on another as well). The relay can operate in timed mode, Start / Stop or follower of the input
Access denied by anti-passback
Activates when a user denies access because of the antipass-back. The relay can operate in time-delay mode or on / off
Access denied by un-known user
Activates when a user denies access because he is non-regis-tered on the system. The relay can operate in time-delay mode or on / off
Access denied by number of consecu-tive errors exceeded
Activates during 8 consecutive denied accesses. The relay can operate in timed mode or Start / Stop mode
Access denied by an-other reason
Activates when a user denies access by a different cause than the previous two. The relay can operate in time-delay mode or on / off
Authorized access Activates when the access is authorized for a user. The relay can operate in timed mode or Start / Stop mode
Authorized access group 25
Activates with an authorized access of an user of group 25. The relay can operate in timed mode or Start / Stop mode
Authorized access group 26
Activates with an authorized access of an user of group 26. The relay can operate in timed mode or Start / Stop mode
Authorized access group 27
Activates with an authorized access of an user of group 27. The relay can operate in timed mode or Start / Stop mode
Authorized access group 28
Activates with an authorized access of an user of group 28. The relay can operate in timed mode or Start / Stop mode
Authorized access group 29
Activates with an authorized access of an user of group 29. The relay can operate in timed mode or Start / Stop mode
Authorized access group 30
Activates with an authorized access of an user of group 30. The relay can operate in timed mode or Start / Stop mode
Authorized access group 31
Activates with an authorized access of an user of group 31. The relay can operate in timed mode or Start / Stop mode
Authorized access group 32
Activates with an authorized access of an user of group 32. The relay can operate in timed mode or Start / Stop mode
Area 1 occupiedActivates when one or more users are within security zone 1. Otherwise, it turns off
Area 1 saturatedActivates when the security area 1 has reached its capacity limit. Otherwise, it turns off
Group counter 01 oc-cupied
Activates when one or more users, belonging to group 1, are within the security zone 1. Otherwise, it turns off
Group counter 01 saturated
Activates when the number of users belonging to group 1, within security zone 1, has reached the limit of its counter. Otherwise, it turns off
Group counter 02 oc-cupied
Activates when one or more users, belonging to group 2, are within the security zone 1. Otherwise, it turns off
Next page...
Functions description
16 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
Output Functions Explanation
Group counter 02 saturated
Activates when the number of users belonging to group 2, within security zone 1, has reached the limit of its counter. Otherwise, it turns off
. . . . . . . . . . . . . . . . . . . . . . . .
Group counter 32 oc-cupied
Activates when one or more users, belonging to group 32, are within the security zone 1. Otherwise, it turns off
Group counter 32 saturated
Activates when the number of users belonging to group 32, within security zone 1, has reached the limit of its counter. Otherwise, it turns off
SAS operation [MENU: INSTALLATION PARAMETERS/SAS]A SAS is a part between two different environments, equipped with two doors, which never allows that its two doors are opened at the same time. SAS are used for security, antipassback or watertightness issues. There are SAS in the case of locks, clean rooms, industrial kitchens, containment compartments, etc.
There are 2 possible achievements of SAS:[menu: installation parameters/access point configuration (pag.2/4)]
1- Both doors are equipped with an input reader and an output push button, with-out SAS time:A single controller is capable of managing these two doors without the declaration of the SAS.Wire the normally closed magnetic contact of the outer door to the I (Inhibition) input of the inner door.Wire the normally closed magnetic contact of the inner door to the outer door I (Inhibi-tion) input.
Both doors are equipped with input Input (reader 1 obligatorily) and output (read-er 2 obligatorily) drives or you need to have a SAS time:2 controllers declared as SAS. This SAS will have an internal access point and another outside. The SAS time is the time during which access to the SAS is prohibited, follow-ing the entry of a user into the SAS. Declare the SAS in the SAS option in the “Installa-tion Settings” menu, obligatorily in both controllers of the sas.Wire the normally closed magnetic contact of the outer door to the G inlet of this door.Wire the normally closed magnetic contact of the inner door to the G inlet of this door.
Area counters [MENU: DATA/zONE COUNTERS]The area counters only operate on area 1 and allow counting the number of users who are in it. An area counter can only be operated if area 1 is created in the “Controlled Security Zones” option of the “Data” menu and includes at least 2 drives; One selected in ENTER and the other selected in OUTPUT, in the option “Configuration of the access point” in the menu “Installation parameters”.
There is a global counter for area 1 (without group distinction) and special counters for each user group in the same area 1.In the “Counters” option in the “Data” menu, it is possible to specify the maximum capacity of each counter, from 00001 to 65000 (65000 = no limit). This option also al-lows you to see how many users are in it.
There are 2 functions linked to counters: 1- Occupied counter Activates when one or more users, belonging to group 1, are within the security zone 1. Otherwise, it turns off
2- Saturated counter Activates when the number of users within the security area 1 has reached the capacity limit of its counter. Otherwise, it turns off
Visits [MENU: DATA/vISITS]Visits are temporary profile users. The access of these users is conditioned by a start date /
Next page...
Functions description
17 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
time and an end date / time of validity.It can also be conditioned by a number of access or days requests not to be exceeded, but only the users nº00001 to nº16000.These 3 criteria can be cumulated, but the user-visit must also be associated with an AC-CESS GROUP which gives him different access rights.In the “Visits” option in the “Data” menu it is possible to indicate the year, month, time and minute of start and end of validity, as well as the number of accesses available for each visit.
Free access [MENU: DATA/FREE ACCESS]The “Open access” option in the “Data” menu allows you to open the doors on schedule. There can be 4 different open accesses.The different schedules are integrated into access groups, which must be selected. The relays controlling the doors in question must also be indicated.
Antipassback [MENU: DATA/ANTIPASSbACk]The antipassback function works only on area 1 and can only be operated if area 1 is created in the option “Controlled security areas” in the “Data” menu and includes at least 2 readers; One selected in ENTER and the other selected in OUTPUT, in the option “Configuration of the access point” in the menu “Installation parameters”.
This is a system option that prevents a user from accessing a request 2 times in a row. The user who first appears on an input player is authorized and enters the security area 1. Once again, the user returns to an input player and is denied access, ask the system administrator to be granted access again. If the user presents himself on an output read-er and leaves the security area 1, he can then present himself again on an input reader.
Degree of antipassback Soft: Antipassback is enabled only on input readers.Degree of antipassback Hard: Antipassback is enabled on input and output readers.- In case of access denied by antipassback, an output function can be triggered.- An entry can be dedicated to “Unblocking Antipassback” of all users.- A user can be dedicated to unlocking the antipassback of all users if he triggers the function “Output of a configurable input” on a relay connected to the entry “Unlocking Antipassback”
Unblocking of the antipassback:In order to unblock the antipassback, the user must be placed in the correct place, ie; In the security area, outside the security area or awaiting synchronization. The latter option allows the user to be automatically placed on his next access request.
Unblocking of an user: Allows unblocking by the system administrator of a specific user.
Unblocking of a group: Allows unblocking by the system administrator of a specific user group.
Weekly reset day: Puts all users on hold for synchronization at the specified time on each day of the week specified.
Monthly reset day: Puts all users on hold for synchronization at the specified time, speci-fied day, specified month, or every month.
Anti-Timeback[MENú: INSTALLATION PARAMETERS/ACCESS POINT CONFIGURATION (PAG.2/4)]Prevents a user from accessing again by the same reader before a specific time passes, programmable between 1 and 99 minutes.
Access verification: allows the user to try to access a second time, if the first time has not been consummated and whenever another user has not been identified in the meantime, in this same reader. It is imperative that the corresponding G door input and deadbolt door Output have been connected for the selection of access verification works
Degraded modeThe access point controller enters this mode when the network communication with the MASTER controller is interrupted for more than 30s. If the communication recovers, the controller exits the degraded mode.
During this period, access permissions and denials on this controller will be decided with the local data, irrespective of area counters or antipassback. The other controllers will continue to decide on access permissions and denials, taking into account the area counters and the antipassback.
Functions description
18 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
App for PUSH notifications of ADIP controllers. Download the “PUSH ADIP” app from the PlayStore or AppStore first.
Once downloaded, open the app.
Select “Register”. This will register our device on Google and get a unique identifier, linked with our mobile device.
Choose the language.
On the main page is indicated if the app is registered.
Select “Configuration” and enter the parameters: IP, Port, communication code and security code. Introduce also the position (1 to 8), which will take on the index of the 8 mobile devices available on the ADIP controller and the device designation (all this must be done for each ADIP controller that will send PUSH notifications).
PUSH notifications
Next page...
Functions description
19 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
Once these parameters have been entered, the configu-ration must be saved.
Now we need to transfer the ID of our mobile device to the ADIP controller.
If all goes well, the following message will appear to confirm that the ID of our mobile device has been suc-cessfully transferred to the ADIP controller.
Next page...
Functions description
20 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
Now we need to access the webserver of the ADIP controller on which we have just transferred the ID of our mobile device. Select the “Installation Settings / Access Point Configuration” menu. On page 3 of this menu ...
We see the name and ID Reg of our mobile device. Now only would select a function on the list and SAVE the configuration.
NOTE 1: In order to avoid the need to open the “ADIP PUSH” application every time we turn on our mobile device, it is possible to use the AUTOSTART app (available in PlayStore). AUTOSTART automatically opens applications.
NOTE 2: It may be necessary to download the REPRODUCTOR MX app (available in PlayStore) in order to view video streaming.
Installation parameters
INSTALLER
21 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
IP Addressing Procedure for the ADIP Controller
There are 2 ways:
1- Direct procedure: If the terminal and the controller already have the same network rank (the same initial part of the IP address 192.168.1)
Use a browser such as CHROME, MOZILLA, etc.
Not compatible with INTERNET EXPLORER
The address when it left the factory is 192.168.1.123
Introduce this address on the browser and VALIDATE:
It is also possible to address the device name or HOSTNAME, but this method only works if the terminal and the ADIP controller are on the same network.This factory HOSTNAME is ADIP01.
Enter this HOSTNAME on the browser and validate:
2- Procedure DHCP in LAN (without the Internet): If the terminal and the controller do not have the same network rank 1 - Disconnet power2 - Place the N-P programming bridge in position P3 - Reconnect power (beep, beep, beep ...)4 - Place the N-P programming bridge in position N (end of beeps)5 - Place the N-P programming bridge in position P (we have 3s to do it) (beep, beep,
beep ...)6 - Set the N-P programming bridge to position N (end of beeps)7 - After 12 seconds beeps. Now you can address the name of the device or HOST-
NAME. The factory HOSTNAME is ADIP01.
Enter this HOSTNAME into the browser and validate:
Use a browser such as CHROME, MOZILLA, etc.
Not compatible with INTERNET EXPLORER
Next page...
Installation parameters
INSTALLER
22 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
IP Addressing Procedure for the ADIP Controller
Then the main menu appears as shown in the following image:
Once the language is chosen:You must choose “installer”, then a USER and PASSWORD will be requested.When it left the factory USER is: adip and the installer PASSWORD is: insta
The following window will open, once the ADIP controller is addressed:
If the menu stops, change to the menu SUPERVISION or START and press the F5 key (computer) or slide your finger down on the touch screen (Tf or tablet) to refresh the page.
Installation parameters
INSTALLER
23 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
Introduce the parameters of the IP connection:
Access point: 01-Master
HOSTNAME: ADIP01
Modify it if you will contact by HOSTNAME (recommended)
Enable DHCP if you want to find an IP address automatically, then and leave this
menu. To see the new address enter again in this menu.
Enable DHCP
Adresse IP: . . .
Port: 19
Subnet mask: . . .
Default gateway: . . .
DNS1: . . .
DNS2: . . .
Do not forget to save the changes made with
If you have a DYNDNS service, click on the button DYNDNS to configure it.
Click on the button PREVIOUS to return to the previous page.
HostName DYNDNS: ********************************
UserName DYNDNS: ********************************
Client Key: ********************************
Do not forget to save the changes made with
If you want to Delete , press
IP Device Configuration
Installation parameters
INSTALLER
24 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
It could have up to 32 networked devices. The IP parameters must be entered locally on
each, but it is necessary to do this also on this table.
Access point: select from 1 to 32
Designation:
Click on one of the two options :
Adresse IP: . . .
DynDNS Host: ********************************
Indicate the port :
Port:
Do not forget to save the changes made with
If you want to Delete , press
NO MASTER to indicate that this controller is not the MASTER.
Status: indicates whether the devices are located on the network.
01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16
17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
Indicates device not installed
Indicates the device is localized and in communication
Indicates device not located or without communication
Identification of Access Point
Installation parameters
INSTALLER
25 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
Configuration of the 2 readers of the access point pag.1/4
Access point Reader 1:
Designation: Indicate DesignationInput: Output: Free: Active: the reader works
Anti-Timeback: 00 mn. time indicated in minutes, from 00 to 99Access verification: permission to access a second time, if the first one is not con-sumed
Access point Reader 2:
Designation: Indicate DesignationInput: Output: Free: Active: the reader works
Anti-Timeback: 00 mnAccess verification: Exit with schedule control: Do not select to allow to exit off-hours.
Do not forget to save the changes made with
Press to advance to the next page
Input configuration pag.2/4
Input: IN6 select inputs IN1 to IN6
Function: select input function Normally open Normally closed
Designation of the function:
Do not forget to save the changes made with
Outputs configuration pag.2/4
Output: RL4 select outputs RL1 to RL4Configuration relay :
Timed --> Temporisation relay: Activation time from 1 to 240 seconds Start/Stop Follower
Function: select output function
Timing function: tempo of the selected output function
Function input: Function Access point: 1
Function designation:
Access Point Configuration
Next page...
Installation parameters
INSTALLER
26 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
Do not forget to save the changes made with
Press to advance to the next page or press to return to the previous page
PUSH notifications to Mobile pag.3/4
Up to 8 different PUSH notifications can be made on the same access point. Each PUSH notification indicates on a mobile device (smartphone or tablet) that the associated function has occurred.
Select PUSH notifications from 1 to 8 1
Device Name: ID reg: Identification of the mobile device from the APP
Function: ...... select out-put function
Message IOS: sends a PUSH message to IOS devices
Do not forget to save with or delete with
Press to advance to the next page or press to return to the previous page
E-mails pag.4/4
Possibility of having up to 8 different e-mails for each access point.It will be possible to send event lists to those emails.It will also be possible to associate an output function to each e-mail to send notifica-tions. Each notification send by e-mail indicates that the associated output function has occurred and shows the entered message.
E-mail: 1 Select from 1 to 8
Email address:
Function: Any select out-put function
Message: Write message
Do not forget to save with or delete with
Press to return to the previous page
Access point configuration
Installation parameters
INSTALLER
27 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
SAS Definition
Indicate on each access point the pair of points that integrate the SAS. Since there is a
maximum of 32 access points, there will be a maximum of 16 SAS.
Outside Access point Access point 3
Inside Access point Access point 5
SAS time: 240 SAS time in seconds
Do not forget to save the changes made with
OK OK to indicate correct and NOK to indicate error
SAS
Installation parameters
ADMINISTRATOR
28 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
Clock Update
Date PC: 31/05/2016
Hour PC: 12:53:44
Access point hour: 12:53:32
Select whether the date / time will be automatically taken from an Internet NTP server
or if it will be entered manually:
SYNC WITH SERVER NTP
Server NTP:
If you chose NTP server, select the server from the list.
Once the NTP server option is selected and saved, the connection with the controller is
lost and we have to press F5 to connect again.
MANUAL
Day: Month: Year:
Hours: Minutes: Seconds:
Time area: Select the time zone of the region where
the device is located
Change summer / winter time:
Do not forget to save the changes made with
Date/Time
Installation parameters
ADMINISTRATOR
29 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
Propagate Date/Hour
This option is not useful in the case of time setting with NTP server.
A button on the screen allows you to propagate master date / time to all slaves.
PROPAGATE DATE/TIME THE MASTER TO ALL SLAVES
NO MASTER to indicate that this controller is not the MASTER.
Installation parameters
ADMINISTRATOR
30 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
Register unknown users
Click to activate the option:
Register unknown users
Do not forget to save the changes made with
Installation parameters
INSTALLER
31 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
Access keys
Installer password access pag.1/4
Old Installer Password: **********
New Installer Password:
Confirm New Installer Password:
Do not forget to save the changes made with
A message indicates if the password is changed
Administrator password access pag.2/4
Old Administrator Password: **********
New Administrator Password:
Confirm New Administrator Password:
Do not forget to save the changes made with
A message indicates if the password is changed
Consultant password access pag.3/4
Old Consultant Password: **********
New Consultant Password:
Confirm New Consultant Password:
Do not forget to save the changes made with
A message indicates if the password is changed
User name pag.4/4
Old User name: **********
New User name:
Confirm User name:
Do not forget to save the changes made with
A message indicates if the password is changed
Press to advance to the next page or press to return to the previous page
Passwords are no longer visible. Only if one enters with the procedure of the bridge P-N (on the circuit), these passwords will be visible during 3 minutes.Other measures to strengthen against computer vulnerability.
Installation parameters
INSTALLER
32 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
Communication and security codes
These codes are used to secure communications with all access points
Security code (8 digits): 00000000
Communication code (4 digits): 0000
Encryption code (32 digits): CODE USINE
The Encryption Code is intended to be used with SDKs. All connected ADIPs must have
the same encryption code
Do not forget to save the changes made with
Data
33 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
Introduction
All the users of the access control system and these rights constitute the data base.These rights are gathered in the form of Access groups, but each access group contains special rights, concerning access points, different schedules, etc.
The diagram shows this structure:
Access groups(to 32)
Antipassback
Time tables(to 32)
Security areas controlled (to 8)
Access points(to 32)
Readers(1,2)
Holidays(to 24)
Vacation(to 4)
Days of the week
Time areas(to 30)
Time frame 1 Time frame 2
1 Security areas controlled + 1 Time tables(to 8)
Data
ADMINISTRATOR
34 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
Nº User: 00001 between 00001 and 65000 for all of the installed controllers
User id: ******************************** introduce the user name
Identifier code: FFFFFFFF Enter the 8-character code and fill in with “F” in case of
less than 8 characters. For example, code 123 would be 123FFFFF.
Selecting Active √ allows you to enable or disable a user in a click.
It is possible to enter a unique random code by pressing AUTOMATIQUE CODE
This code is decimal and is never repeated.
Access group: 1 select from 1 to 32
Possibility to delete a user identity and code with
Do not forget to save the changes made with
OK to indicate correct, USER NOK to indicate user number error,
NOK CODE to indicate ID code error, CODE USER XXXXX REPEAT to indicate code already
used for another user (XXXXX indicates this user’s number) and NO MASTER to indicate
that this controller is not the MASTER.
Possibility of going to the previous or next user
VISITS Button that allows you to bridge between the Users and Visits pages. This
makes it easier to profile the user as a visitor.
SEND TO EMAIL Button that allows the sending of an e-mail there the user and
a confirmation e-mail (see next page).
Users
Next page...
Data
ADMINISTRATOR
35 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
Users
Send to e-mail
Message:
This message corresponds to the text that will be sent in the email, as well as to the
following selected information.
Click to indicate the information to send:
User Id
Code
Visits dates
Number of access availables
Number of consumable days
User
Email: e-mail del
usuario
Confirmation email: 1 [email protected] ssend confirmation email selec-
tor. These confirmation e-mails correspond to those declared in the menu:
Parámetros de instalación then submenus: Configuration of the access point page
4/4.
ENVIAR EMAIL Sends the email to the user and another confirmation email.
Data
ADMINISTRATOR
36 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
Time Tables
Time Table: 1 Select the time tables from 1 to 32
Designation: ******************************** introduce the Designation in the time
tables.
Each time table can have up to 30 time areas simultaneously:
Click to indicate time areas.
01 √ 02 √ 03 √ 04 √
05 √ 06 √ 07 √ 08 √
…………..
…………..
Press HOLIDAYS to go to the next page.
Each time table can have 4 Holiday periods:
From: Day: Month: select Day / Month
To: Day: Month: select Day / Month
Each time table can have 24 holiday days:
Holiday Day 01: Month: select Day / Month
Holiday Day 02: Month: select Day / Month
…………..
…………..
Do not forget to save the changes made with
Press to return to the previous page
Data
ADMINISTRATOR
37 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
Time Area: 1 to select the time areas
Designation: ******************************** introduce the time areas designation.
Every time areas may have 2 time frame (hour / minute) :
Period 1
From H: 00h Min: 00’ to H: 23h Min: 59’
Period 2
From H: 00h Min: 00’ to H: 23h Min: 59’
Click to indicate days of the week.
Mo √ Tu √ We √ Th √ Fr √ Sa √ Su √
Do not forget to save the changes made with
Time Areas
Data
ADMINISTRATOR
38 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
Security area controlled: Area 1 to select the area from 1 to 7 or out area.
Designation: ******************************** introduce the area designation
Every security areas may have 32 access points with their respective readers:
There is the possibility to select all or deselect all,
√ Select/Deselect all
Then, click to indicate access points
Access Points:
01: L1 √ L2 √ 02: L1 √ L2 √
03: L1 √ L2 √ 04: L1 √ L2 √
…………..
…………..
Each reader will be in the selected area. If a reader is not in any area, it will be out of
areas.
Do not forget to save the changes made with
Security areas controlled
Data
ADMINISTRATOR
39 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
Access group: 1 select the groupe 1 to 32
Designation: ******************************** introduce the designation of the
group
Possibility to select simultaneously up to 8 safety controlled areas with its correspond-
ing time tables (one time table per security area controlled). Also, possibility to select
out of the areas.
Security area controlled: 1
Time tables: 01
…………..
…………..
Antipassback: Oui Indicate if the group is submitted or not to the antipassback
Do not forget to save the changes made with
Access groups
Data
ADMINISTRATOR
40 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
The counters are also valid for the security area controlled nº1. There is a total counter
and a counter per access group.
The value “Present:” shows the number of users who are inside the security area con-
trolled nº1. Press F5 (computer) or
Slide your finger down on the touch screen (Tf or tablet) to refresh the value.
Total capacity area 1: Present:
Access Group capacity 01: Present:
Access Group capacity 02: Present:
…………..
…………..
Maximum meter capacity to 65,000 users
Do not forget to save the changes made with
OK to indicate correct, NOK to indicate error and NO MASTER to
indicate that this controller is not the MASTER.
Area counters
Data
ADMINISTRATOR
41 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
The 65,000 users can be visitors.
Nº User:
User id:
The user will be allowed :
• from the date Day / Month /Year, from the hour Hour / Minute
• to the date Day / Month /Year, to the hour Hour / Minute
From:
Day: Month: Year: H: 00h Mn: 00’
To:
Day: Month: Year: H: 00h Mn: 00’
The number of available accesses or days indicates what remains to the user, but this
value can be changed. Only users 1 to 16,000 have this possibility. The first 16,000 us-
ers have the following options available:
Number of available accesses (User <= 16,000): **** max number 9,999
Number of consumable days (User <= 16,000): *** max number 250
Do not forget to save with or delete with
OK to indicate correct, USER NOK to indicate user number error,
NOK to indicate access number error and NO MASTER to indicate that this controller is
not the MASTER.
USERS Button that allows you to bridge between the Users and Visits pages.
Visits
Data
ADMINISTRATOR
42 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
It can have up to 4 free accesses, profiled by means of an access group and relays
1: Any R1 R2 R3 R4
2: Access group 1 R1 R2 R3 R4
3: Any R1 R2 R3 R4
4: Any R1 R2 R3 R4
Click on the relays that will be controlled by the free access, within the hours and ac-
cess points indicated on the access group.
Do not forget to save the changes made with
Free access
Data
ADMINISTRATOR
43 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
The antipassback valve only operates on safety area 1.
Select the degree of antipassback; Hard, soft or canceled. Hard limits input and output,
but Soft only limits the input.
Degree of Antipassback Canceled
Do not forget to save the changes made with
NOK to indicate error and NO MASTER to indicate that this controller
is not the MASTER.
Possibility of unlocking the antipassback of a user
Nº User:
User name:
Select one of the three options to place the user in the security area, out-
side the security area or waiting for synchronization at the next identification.
Waiting for sync
Do not forget to save the changes made with
NOK to indicate error and NO MASTER to indicate that this controller
is not the MASTER.
Possibility of unlocking the antipassback of an access group
Select the group or all the groups at the same time
Select the access group: All Aceess group
Select one of the three options for placing users of the group in the security area, out-
side the security area or waiting for synchronization at the next identification.
Antipassback
Next page...
Data
ADMINISTRATOR
44 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
Antipassback
Waiting for sync
Do not forget to save the changes made with
NOK to indicate error and NO MASTER to indicate that this controller
is not the MASTER.
Possibility to reset antipassback weekly
The antipassback will be reset to the selected hour of each day indicated:
H: 00h Mn: 00’
Click to indicate days of the week
Mo Tu We Th Fr Sa Su
Do not forget to save the changes made with
Possibility to reset antipassback monthly
The antipassback will be reset to the selected time of the specified day and month
H: 00h Mn: 00’ Day: Month: All
Do not forget to save the changes made with
NOK to indicate error and NO MASTER to indicate that this controller
is not the MASTER.
Data
ADMINISTRATOR
45 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
This procedure lasts a little while, but it is indicated by a progress bar.
Click to indicate data to SYNCHRONIZE:
Users
Time Tables
Time Areas
Security areas controlled
Access groups
Visits
A button on the screen allows the sync of all access points.
SYNCHRONIZE DATA
NO MASTER to indicate that this controller is not the MASTER. Once
synchronization is started, a window shows the current access point.
Access point 01/04 Access point 1 in progress out of a total of 4
OK to indicate that the synchronization has successfully completed
NOK to indicate synchronization error
Synchronize data
Tables
ADMINISTRATOR
46 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
Viewing users by number
Nº User: 00001 Enter the number and click
OK to indicate correct and NO USER to indicate that the user can not
find it.
User id:
Identifier code:
Access group: 1
Possibility of going to the previous or next user
To select the e-mail:
Send all users to the e-mail: 1 indicate the email SEND
Users by number
Tables
ADMINISTRATOR
47 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
Users by name
Viewing users with the indicated text
enter the text and click
OK to indicate correct and NO USER to indicate that the user can not
find it.
User id:
Nº User:
Identifier code:
Access group:
Possibility of going to the next user
Tables
ADMINISTRATOR
48 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
Time Tables
Time tables display
Time Tables: 1 is the designation of the time
tables
Time Areas:
01 √ Schedule Parking 02 √ Schedule Shop 03 √ Schedule Office 04 √ Schedule Workshop
05 √ 06 √ 07 √ 08 √
09 √ 10 √ 11 √ 12 √
13 √ 14 √ 15 √ 16 √
17 √ 18 √ 19 √ 20 √
21 √ 22 √ 23 √ 24 √
25 √ 26 √ 27 √ 28 √
29 √ 30 √
Possibility of going to the previous or next table
Tables
ADMINISTRATOR
49 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
Time Areas display
Time Areas: 1 is the designation of the time
areas
Period 1
From H: 00h Mn: 00’ To H: 23h Mn: 59’
Period 2
From H: 00h Mn: 00’ To H: 23h Mn: 59’
Mo √ Tu √ We √ Th √ Fr √ Sa √ Su √
Possibility of going to the previous or next area
Time Areas
Tables
ADMINISTRATOR
50 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
Security areas controlled
Visualisation of the security areas controlled
Area 1
is the designation of the security area controlled
Access points:
01: L1 √ L2 √ 02: L1 √ L2 √ 03: L1 √ L2 √ 04: L1 √ L2 √
Input Parking Output Parking Input Pedestrian Output Pedestrian
05: L1 √ L2 √ 06: L1 √ L2 √ 07: L1 √ L2 √ 08: L1 √ L2 √
Input Shop Output Shop Input Office Output Office
09: L1 √ L2 √ 10: L1 √ L2 √ 11: L1 √ L2 √ 12: L1 √ L2 √
Input Workshop Output Workshop
13: L1 √ L2 √ 14: L1 √ L2 √ 15: L1 √ L2 √ 16: L1 √ L2 √
17: L1 √ L2 √ 18: L1 √ L2 √ 19: L1 √ L2 √ 20: L1 √ L2 √
21: L1 √ L2 √ 22: L1 √ L2 √ 23: L1 √ L2 √ 24: L1 √ L2 √
25: L1 √ L2 √ 26: L1 √ L2 √ 27: L1 √ L2 √ 28: L1 √ L2 √
29: L1 √ L2 √ 30: L1 √ L2 √ 31: L1 √ L2 √ 32: L1 √ L2 √
Possibility of going to the previous or next area
Tables
ADMINISTRATOR
51 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
Visualisation of the access groups
Access group 1 is the designation of the ac-
cess group.
Security area controlled 01
Time tables 01
Security area controlled 02
Time tables 01
Security area controlled 03
Time tables 01
Security area controlled 04
Time tables 01
Security area controlled 05
Time tables 01
Security area controlled 06
Time tables 01
Security area controlled 07
Time tables 01
Security area controlled Outside
Time tables 01
Antipassback: Yes
Possibility of going to the previous or next group
Access Group
Tables
ADMINISTRATOR
52 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
Access points
01 IP or DynDns: 192.168.001.220 Port: 19220 ***************************
02 IP or DynDns: ***.***.***.*** Port: ***** ***************************
03 IP or DynDns: ***.***.***.*** Port: ***** ***************************
04 IP or DynDns: ***.***.***.*** Port: ***** ***************************
05 IP or DynDns: ***.***.***.*** Port: ***** ***************************
06 IP or DynDns: ***.***.***.*** Port: ***** ***************************
07 IP or DynDns: ***.***.***.*** Port: ***** ***************************
08 IP or DynDns: ***.***.***.*** Port: ***** ***************************
09 IP or DynDns: ***.***.***.*** Port: ***** ***************************
10 IP or DynDns: ***.***.***.*** Port: ***** ***************************
11 IP or DynDns: ***.***.***.*** Port: ***** ***************************
12 IP or DynDns: ***.***.***.*** Port: ***** ***************************
13 IP or DynDns: ***.***.***.*** Port: ***** ***************************
14 IP or DynDns: ***.***.***.*** Port: ***** ***************************
15 IP or DynDns: ***.***.***.*** Port: ***** ***************************
16 IP or DynDns: ***.***.***.*** Port: ***** ***************************
17 IP or DynDns: ***.***.***.*** Port: ***** ***************************
18 IP or DynDns: ***.***.***.*** Port: ***** ***************************
19 IP or DynDns: ***.***.***.*** Port: ***** ***************************
20 IP or DynDns: ***.***.***.*** Port: ***** ***************************
21 IP or DynDns: ***.***.***.*** Port: ***** ***************************
22 IP or DynDns: ***.***.***.*** Port: ***** ***************************
23 IP or DynDns: ***.***.***.*** Port: ***** ***************************
24 IP or DynDns: ***.***.***.*** Port: ***** ***************************
25 IP or DynDns: ***.***.***.*** Port: ***** ***************************
26 IP or DynDns: ***.***.***.*** Port: ***** ***************************
27 IP or DynDns: ***.***.***.*** Port: ***** ***************************
28 IP or DynDns: ***.***.***.*** Port: ***** ***************************
29 IP or DynDns: ***.***.***.*** Port: ***** ***************************
30 IP or DynDns: ***.***.***.*** Port: ***** ***************************
31 IP or DynDns: ***.***.***.*** Port: ***** ***************************
32 IP or DynDns: ***.***.***.*** Port: ***** ***************************
Delete
ADMINISTRATOR
53 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
Clearing old events until a date
To Day: Month: Year: indicate the date
Press to delete and to delete permanently
Automatic deletion of old events
Maximum number of days saved: (max. 99 days and 00 to cancel)
Do not forget to save the changes made with
Delete events
Delete
ADMINISTRATOR
54 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
Delete Users
Click to clear all the users or a part
Delete all
Delete a part
From user nº: indicate the fisrt user number
To user nº: indicate the last user number
Press to delete and to delete permanently
Delete Visits
Click to clear all the visitors or a part
Delete all
Delete a part
From visitor nº: indicate the first visitor number
To visitor nº: indicate the last visitor number
Press to delete and to delete permanently
Delete Time tables
Select time tables
Press to delete and to delete permanently
Delete Time areas
Select time areas
Press to delete and to delete permanently
Delete Access groups
Select access group
Press to delete and to delete permanently
Delete data
Delete
INSTALLER
55 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
Firmware Update (Bootloader)A bottom on the screen allows to launch the process.
Click FIRMWARE UPDATE (BOOTLOADER)
Then click CONFIRM FIRMWARE UPTDATE (BOOTLOADER) to really launch the process.
We only have 12 seconds to start the update
It is strongly recommended to prepare before starting what is described below:
Ensure that the antivirus and firewall are disabled.Use the app tftpd32.exe, as well as the update firmware XXXXX.ipl.
Execute tftpd32. exe
Select Tftp Client, then put the address 192.168.1.AAA (AAA is the device address, if it doesn’t respond,use AAA=61) and the fixed port 69.Indicate on Local File, the location of XXXXX.ipl file (for example; ADIP_1_1_E.ipl).Indicate on Block Size, the fixed value 512.
Enter in the ADIP menu Delete / Firmware Update (BOOTLOADER) and execute the firmware update process. We only have 12 seconds to press Put and start the bootloader.
Supervision
ADMINISTRATOR
56 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
Input and output supervision for a specific access point. The outputs can be ordered as
indicated:
• Activation
• Activation maintained
• End of the activation
Access Point Hostname:
OUTPUTS:
Red colour = no activated, Green colour = activated
REL 1 ◙ REL 2 ◙ REL 3 ◙ REL 4 ◙
Select: (End Activation) (Permanent Activation) (Activation) and
INPUTS:
Red colour = no activated, Green colour = activated
IN1 IN2 IN3 IN4 IN5 IN6
Access type for this point; - Normal - Universal (without restriction, for all the users) - Forbidden
Acces type for this point: Normal access select, then
NO MASTER to indicate that this controller is not the MASTER.
Access type for all points; - Normal - Universal (without restriction, for all the users) - Forbidden
Acces type for all points: Normal access select, then
Events
57 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
General List of Events pag.1/2Visualization of the events in memory of each access point
To select the period od the dates:
From Day:
To select the period od the dates:1 Month:
To select the period od the dates:Juillet Year: 2016 indicate starting date
To Day: 28 Month: Juillet Year: 2016 indicate ending date
To select the users:
From user: 00000 indicate the first user number
To user: 65000 indicate the last user number
To select the user group:
Access Group:
To select the user group:All indicate the group
To select the reader:
Reader: All indicate the reader
Possibility of going to the previous , next or last user
To show the 10 last events, the previous 10 or the following 10:
00001MARTIN CAROL 01/01/02 01:00:48 L2 I STOCK FCN
User Nº User Identity Date HourL1=Reader 1L2=Reader 2L0=Function
I=InputO=Output
Access pointdenomination
Type
00001 MARTIN CAROL01/01/0201:00:48
L2 I STOCK FCN
New boutton: SEND TO EMAIL open a second page
General List of Events pag.2/2
Send to the email the general list of events in the memory
To select the period od the dates:
From Day:
To select the period od the dates:1 Month:
To select the period od the dates:Juillet Year: 2016 indicate starting date
To Day: 28 Month: Juillet Year: 2016 indicate ending date
To select the users:
From user: 00000 indicate the first user number
To user: 65000 indicate the last user number
To select the user group:
Access Group:
To select the user group:All indicate the group
To select the reader:
Reader: All indicate the reader
Next page...
Events
58 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
To select the e-mail:
E-mail: 1 indicate the email SEND
√ Send ALL movements automatically every week to the e-mail: 1 [email protected] (every Monday at 00:00)
√ Send ALL movements automatically every month to the e-mail: 1 [email protected] (all the 1st of the month at 02:00)
Do not forget to save the changes made with
The Type column indicates:AUT: Authorized access
AUE: Authorized access in a slave for consumable days (only in the master)
RZT: Denied access, excluding time areas
RAS: Denied access, door not allowed
RAN: Denied access, violation of the antipassback
RFE: Denied access due to holiday
RVI: Denied access, exceeding visiting period
RCN: Denied access, full area
RCA: Denied access, number of accesses exceeded
RCD: Rejected by number of consumable days (visits)
FCN: Input / output function
RPH: Denied access, prohibited access
RLI: Denied access, reader not active
AUN: Access authorized, universal access
RTT: Denied access, excluding timetables
RSA: Denied access, block SAS
RIN: Denied access, inhibition reader
DES: Denied access, unidentified user
AUS: SAS authorized
RNE: Number of consecutive errors exceeded
RAT: Denied access by anti-timeback
NID: Unknown user
ANC: Uncommitted access
Events
59 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
Next page...
Meaning of special events:USER MEANING
65101 Activation input nb1
65102 Activation input nb2
65103 Activation input nb3
65104 Activation input nb4
65105 Activation input nb5
65106 Activation input nb6
65111Activation input nb1 of another device associated with an output function on this same device
65112Activation input nb2 of another device associated with an output function on this same device
65113Activation input nb3 of another device associated with an output function on this same device
65114Activation input nb4 of another device associated with an output function on this same device
65115Activation input nb5 of another device associated with an output function on this same device
65116Activation input nb6 of another device associated with an output function on this same device
65201 Activation output nb1 from webserver or monitoring software
65202 Activation output nb2 from webserver or monitoring software
65203 Activation output nb3 from webserver or monitoring software
65204 Activation output nb4 from webserver or monitoring software
65209 Permanent activation output nb1
65210 Permanent activation output nb2
65211 Permanent activation output nb3
65212 Permanent activation output nb4
65217 End permanent activation output nb1
65218 End permanent activation output nb2
65219 End permanent activation output nb3
65220 End permanent activation output nb4
65221Activation output nb1 from an input of the same device, using the output func-tion; Output of a configurable input
65222Activation output nb2 from an input of the same device, using the output func-tion; Output of a configurable input
65223Activation output nb3 from an input of the same device, using the output func-tion; Output of a configurable input
65224Activation output nb4 from an input of the same device, using the output func-tion; Output of a configurable input
65225Activation output nb1 from an input of another device, using the output func-tion; Output of a configurable input
65226Activation output nb2 from an input of another device, using the output func-tion; Output of a configurable input
65227Activation output nb3 from an input of another device, using the output func-tion; Output of a configurable input
65228Activation output nb4 from an input of another device, using the output func-tion; Output of a configurable input
Events
60 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
Next page...
USER MEANING
65229End activation output nb1 from an input of another device, using the out-put function; Output of a configurable input
65230End activation output nb2 from an input of another device, using the output function; Output of a configurable input
65231End activation output nb3 from an input of another device, using the output function; Output of a configurable input
65232End activation output nb4 from an input of another device, using the output function; Output of a configurable input
65233End activation output nb1 from an input of the same device, using the output function; Output of a configurable input
65234End activation output nb2 from an input of the same device, using the output function; Output of a configurable input
65235End activation output nb3 from an input of the same device, using the output function; Output of a configurable input
65236End activation output nb4 from an input of the same device, using the output function; Output of a configurable input
65237 Reset/Unlocking ANTIPASSBACK user
65238 Reset/Unlocking ANTIPASSBACK group
65250 Activation degraded mode
65251 Desactivate degraded mode
65300 Activation output door lock 1 associated with input PB-1
65301 Activation output door lock 2 associated with input PB-2
65302 Activation output fraud gate 1 associated with input G-1
65303 Activation output fraud gate 2 associated with input G-2
65304Activation output maximum time for the opening of the gate 1 associated to input G-1
65305Activation output maximum time for the opening of the gate 1 associated to input G-1
65306 Activation output access denied by number of consecutive errors exceeded
65307 Activation output access denied by antipassback
65308 Activation output access denied by unknown user
65309 Activation output access denied by another reason
65310 Activation output authorized access
65311 Activation output area 1 occupied
65312 Activation output area 1 saturated
65313 Activation output group counter 01 occupied
65314 Activation output group counter 01 saturated
65315 Activation output group counter 02 occupied
65316 Activation output group counter 02 saturated
653… ………………………………….
653… ………………………………….
65375 Activation output group counter 32 occupied
65376 Activation output group counter 32 saturated
65380 Authorized access group 25
653... ………………………………….
65387 Authorized access group 32
Events
61 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
USER MEANING
65400 Log in with installer password
65401 Login with administrator password
65402 Login with consultant password
65403 E-mail sending of movements in progress
65404 Error sending e-mail movements
65405 Properly sending e-mail
65406 Sending users e-mail in progress
65407 Error sending users e-mail
65408 Sending users e-mail correctly
65409 E-mail sending of presents in progress
65410 Error of sending e-mail of presents
65411 Sending the e-mail of presents correctly
65412 Missing e-mail in progress
65413 Missing e-mail sending error
65414 Correctly sending e-mails
Events
62 ADIPInstallation Guide
System
desc
riptio
n
Installatio
n
para
met
ers
Even
ts
Acces
sorie
s
Supe
rvisi
on
Config
urat
ion
and
cabl
ing
Tabl
es
Data
Compa
tible
elem
ents
Func
tions
desc
riptio
n
Delet
e
List of users present
Visualisation of the users present in the site
Access Group: All indicate the groupe
SEND To send to the e-mail 1 [email protected]
To show the last 10 users, the previous 10 or the following 10:
NO MASTER to indicate that this controller is not the MASTER.
TOTAL: 65000 PRESENTS: 00000
User
Possibility of going to the previous or next group
List of users missing
Visualisation of the users missing in the site
Access group: All indicate the group
SEND To send to the e-mail 1 [email protected]
To show the last 10 users, the previous 10 or the following 10:
NO MASTER to indicate that this controller is not the MASTER.
TOTAL: 65000 ABSENTS: 00000
User
Possibility of going to the previous or next group
Accessories
63 ADIPInstallation Guide
System
description
Installation
parameters
EventsAccessories
Configuration
and cabling
Tables
Data
Compatible
elements
Functions
description
DeleteSupervision
Protection circuit WIEGAND and DATA&CLOCK: SEPRO
Adapter WIEGAND and DATA&CLOCK for USB reader
Designation Protection circuit for ELA bus and reader bus
Serial intercalation of buses WIEGAND and DATA&CLOCK
Power supply None
Dimensions and Weigth 40x15mm and 0.05Kg
Installation environment Indoor from 0° to 50°c
Designation Adapter WIEGAND and DATA&CLOCK for USB reader
Serial intercalation of buses WIEGAND and DATA&CLOCK per USB
Power supply None
Dimensions and Weigth 42x25x14mm and 0.05Kg
Installation environment Indoor 0° to 50°c
Bus UP-STREAM
Connector receiving the signal or RS485 or Wiegand or DATACLOCK original to be protected. The electric ground must be connected to GND either on the bus upstream, or on the bus downstream.
GND B/W1 A/W0LINE
Bus DOWN-STREAM
Connector turning over signal RS485 or WIEGAND or protected DATACLOCK.The electric ground must be connected to GND either on the bus upstream, or on the bus downstream.
A/W0 B/W1 GNDDEVICE
Communication D1 : DATA / WIEGAND1C0 : CLOCK / WIEGAND0
C0D1
Power supply Enroller Reader
Internal Power supply 12V CC/100 TuIn the event of use external power supply for the reader, connect the ground or negative voltage to (-) terminal +-
12V CC
W0-W1 Enter WiegandW0-W1 Enter DATACLOCK
W0-W1 Exit WiegandW0-W1 Exit DATACLOCK
Electrical grounding point Electrical grounding point
GN
DB/
W1
A/W
0LI
NE
A/W
0B/W
1G
ND
DEVICE
C0 CLOCK/ WIEGAND0
D1 DATA / WIEGAND1
USB
ENROLLER READER COMPUTER
12 V CC}+-Green operation indicator