AXIS Secure Entry for XProtect
Inhalt
Zutrittskontrolle ............................................................................................................................................3
Türen und Bereiche..................................................................................................................................5
Hinzufügen eines Zugangs.................................................................................................................6
Einstellungen der Tür ........................................................................................................................8
Sicherheitsstufe der Tür.....................................................................................................................8
Zeitoptionen ..................................................................................................................................10
Zugangsmonitor hinzufügen ............................................................................................................10
Leser hinzufügen ............................................................................................................................12
REX-Gerät hinzufügen.....................................................................................................................13
Zone hinzufügen ............................................................................................................................13
Sicherheitsstufe der Zone ................................................................................................................14
Überwachte Eingänge .....................................................................................................................15
Manuelle Aktionen .........................................................................................................................16
Kartenformate und PIN ..........................................................................................................................16
Identifizierungsprofile............................................................................................................................20
Verschlüsselte Kommunikation ...............................................................................................................21
OSDP mit Secure Channel................................................................................................................21
.....................................................................................................................................22
Vorgehensweise..............................................................................................................................22
Subserver sperren ...........................................................................................................................22
Subserver entfernen........................................................................................................................22
Zutrittsverwaltung ................................................................................................................................23
Karteninhaber hinzufügen ...............................................................................................................23
Zugangsdaten hinzufügen ...............................................................................................................24
Gruppe hinzufügen .........................................................................................................................27
Zugangsregel hinzufügen ................................................................................................................27
Import und Export ..........................................................................................................................30
2