background image

2N Access Unit Configuration Manual

56

 /  

134

Make sure that the image resolution is 214 x 214 pixels

. Other sizes will be adjusted to the 

display resolution automatically.

Click the magnifier 

icon  

 to 

view the loaded image, 

press 

 to 

delete an image and 

click 

 to 

hide a selected image/video on the device display.

If no image is loaded, the Slideshow mode will never be activated.

Tip

To hide the "Start with touch" display on the display, load an image of the 
resolution of 214 x 320 pixels.

Summary of Contents for Access Unit

Page 1: ...2N Access Unit Configuration Manual v 2 34 www 2n com ...

Page 2: ...idays 5 3 Hardware 5 3 1 Switches 5 3 2 Door 5 3 3 Audio 5 3 4 Backlight 5 3 5 Display 5 3 6 Card Reader 5 3 7 Digital Inputs 5 3 8 Extenders 5 3 9 Lift Control 5 4 Services 5 4 1 E mail 5 4 2 Mobile Key 5 4 3 Automation 5 4 4 HTTP API 5 4 5 User Sounds 5 4 6 Web Server 5 4 7 SNMP 5 5 System 5 5 1 Network 5 5 2 Date and Time 5 5 3 Licence 5 5 4 Certificates 5 5 5 Auto Provisioning 5 5 6 Syslog 5 5...

Page 3: ...em in your company 2N Access Unit can be equipped with a relay to control eletric lock or any other device connected to this access system There are a lot of possibilities to set up when and how to activate these switches with code automaticaly by pressing a button etc The following symbols and pictograms are used in the manual Safety Always abide by this information to prevent persons from injury...

Page 4: ...he latest Chrome Firefox or Internet Explorer Edge versions as 2N Access Unit is not fully compatible with earlier browser versions Use the name admin and password 2n i e default reset password for your first login to the configuration interface We recommend you to change the default password upon your first login refer to the Password parameter in the Services Web Server menu Remember the passwor...

Page 5: ... the switch in the Switch Enabled parameter on the Hardware Switches Switch 1 tab set the Controlled Output to the intercom output to which the electric door lock is connected Now set one or more activation codes for the electric door lock switching ...

Page 6: ...or the 2N Access Unit version that is equipped with a 13MHz card reader Part No License Name 916012 2N Access Unit NFC license 9160401 2N Access Unit Lift module license factory value licensed function to be purchased additionally unavailable Info Activate the 800 hour license trial versions via the web interface in the System Licenses section Note The licenses are not available for the US Latin A...

Page 7: ...2N Access Unit Configuration Manual 7 134 The service availability depends on the mobile provider s network configuration The scrambled keypad function is only available for 2N Access Unit 2 0 ...

Page 8: ...e Users subsection for the deactivation code settings Profile activated This tone signals profile activation This function helps enable alerting of a user group in an office for example Refer to the Profile subsection for the activation code settings Profile deactivated This tone signals profile deactivation Refer to the Profile subsection for the deactivation code settings Internal application la...

Page 9: ...his tone combination signals UTP cable disconnection from the 2N Access Unit Default reset of network parameters Upon power up a 30 s timeout is set for the default reset code entering Refer to the Device Configuration subsection in the 2N Access Unit Installation Manual for details ...

Page 10: ...fer to the Display Name parameter in the Services Web Server Basic Settings Select the web interface language with the CZ EN DE FR IT ES and RU buttons Press the Log out button in the right hand upper corner to log out The start screen is also the first menu level and quick navigation click on a tile to selected intercom configuration sections Some tiles also display the state of selected services...

Page 11: ...Directory Users settings for user phone numbers quick dial buttons access cards and switch control user codes Time Profiles time profile settings Holidays holiday settings Hardware Switches electric lock lighting etc settings Audio audio signalling tone etc volume settings Keyboard keyboard and code input settings Backlight intensity of backlight Card Reader card reader Wiegand interface settings ...

Page 12: ... password settings SNMP functionality enabling remote monitoring of intercoms in the network using SNMP protokol System Network LAN connection settings 802 1x packet capturing Date and time real time and time zone settings Licence licence settings trial licence activation Certificates certificate and private key settings Auto Provisioning automatic firmware and configuration update settings Syslog...

Page 13: ... adequately technically equipped Should the customer use a product device version other than the latest one or a version determined by the manufacturer as incompatible with certain versions of other products or should the customer use the product device in contradiction to the manufacturer s instructions guidelines or recommendations or in conjunction with unsuitable products devices of other supp...

Page 14: ... The Status menu provides clear status and other essential information on the 2N Access Unit The menu is divided into the following tabs Device This tab displays basic information on the device model its features firmware and bootloader versions and so on ...

Page 15: ...2N Access Unit Configuration Manual 15 134 Services This tab displays the statuses of the network interface and selected services ...

Page 16: ...N Access Unit including their current availability on the basis of a valid licence key entered in the System Licences menu Access Log The Access Log tab displays the last 10 records on the cards applied Each record includes the card tapping time card ID and type and description details validity card owner etc ...

Page 17: ...2N Access Unit Configuration Manual 17 134 ...

Page 18: ...s on keypad etc It also allows filtering between events through the 13 optional parameters press the button to export all recorded events to a CSV file 5 2 Directory Here is what you can find in this section 5 2 1 Users 5 2 1 1 User Fingerprint Setting Instructions 5 2 1 2 USB RFID Card Reader 5 2 2 Time Profiles 5 2 3 Holidays ...

Page 19: ...t lengths they are compared from the end and match has to be found in 6 characters at least If they have identical lengths all the characters are compared This ensures mutual compatibility of the internal and external readers All cards applied via the reader or the Wiegand interface are recorded Refer to the Status Access Log menu for the last 10 cards including the card ID type card tapping time ...

Page 20: ... table column display the default table setting displays the user name e mail and assigned accesses Press to remove a user and delete its details The icons in the access column describe the active user authentications Every record in the Users list includes the following parameters Name a mandatory parameter for easier user search for example E mail user e mail address for sending missed call info...

Page 21: ...me profiles or set the time profile for this element manually Validity term Valid from set the beginning of the mode validity term Valid to set the end of the mode validity term Each user can be assigned a private switch activation code The user switch codes can be arbitrarily combined with the universal switch codes defined in the Hardware Switches menu If the codes are identical with the codes a...

Page 22: ... code Virtual card ID set the user virtual card ID for user identification in the devices that are integrated with the 2N IP intercoms via a Wiegand interface Each user can be assigned just one virtual card The virtual card ID is a sequence of 6 32 characters 0 9 A F After the user is validated via the Bluetooth biometric reader the identifier is sent to the device integrated with the 2N IP interc...

Page 23: ...Subs 5 2 1 1 User Fingerprint Setting Instructions for user fingerprint loading details 2N Access Unit helps you use the recognized license plates sent in the HTTP request by the AXIS cameras equipped with additional VaxALPR to api lpr licenseplate refer to the HTTP API manual for IP intercoms The function can be disabled or enabled whenever the license plate is recognized for a user who has curre...

Page 24: ...in the directory unambiguously the first entry assigned the specified license plate is selected and given the access rights License Plates set the car license plates for the selected record in the directory A record can be assigned multiple license plates separated with commas up to 20 The set license plates are used for recognizing license plates from external camera images refer to the Interoper...

Page 25: ...nts via the 2N Access Unit Fingerprint reader use the web interface at the selected user and click Load via fingerprint reader module in Directory Users User fingerprints 1b To load fingerprints via an external USB fingerprint scanner use the 2N IP USB Driver and select Fingerprint reader in the Settings and press OK for confirmation Click Load via fingerprint reader module in Directory Users User...

Page 26: ...2N Access Unit Configuration Manual 26 134 2 Click to select a finger for fingerprint loading Up to two fingerprints may be saved for each user 3 Click SCAN FINGER to load a fingerprint ...

Page 27: ... Configuration Manual 27 134 4 Place the selected finger on an external USB reader This process is repeated three times for greater precision Repeat the process if any inconsistency occurs during fingerprint reading ...

Page 28: ... the icon to display the list of available functions Door opening Silent alarm configurable only if Door opening is active Automation F1 generate the FingerEntered event in Automation F1 helps distinguish the applied finger in Automation Automation F2 generate the FingerEntered event in Automation F2 helps distinguish the applied finger in Automation ...

Page 29: ...2N Access Unit Configuration Manual 29 134 Click SAVE AND QUIT to confirm the fingerprint enrolment and selected functions 6 You can check the current settings in the User tab ...

Page 30: ... 5 2 1 2 USB RFID Card Reader It is possible to read the card ID via an RFID card reader Proceed as follows Go to the 2N USB Driver settings Set up the COM port for the connected reader Press the Read button via the 2N Access Unit web interface ...

Page 31: ...de access for example can be time limited by being assigned a time profile By assigning a time profile you can block all calls to a selected user beyond the set time interval block calls to selected user phone numbers beyond the set time interval block RFID access for a user beyond the set time interval block numeric code access for a user beyond the set time interval block switch activation beyon...

Page 32: ...e time profiles can be defined not only using the week time sheet but also manually with the aid of special activation deactivation codes Enter the activation deactivation codes using the numeric keypad of your 2N Access Unit to activate deactivate a function after arriving in before leaving your office for example Refer to the Directory Time Profiles menu for the time profile settings List of Par...

Page 33: ...d A profile is active when it matches the set intervals If a day is marked as holiday refer to Directory Holidays the last table row Holiday is applied regardless of the day in a week Make sure that the real time settings are correct refer to the Date and Time subsection to make this function work properly ...

Page 34: ...Unit Configuration Manual 34 134 Note You can set any number of intervals within a day 8 00 12 00 13 00 17 00 18 00 20 00 e g To make a profile active for the whole day enter one day covering interval 00 00 24 00 ...

Page 35: ...dar is displayed for you to select unselect a holiday Fixed annual holidays are marked green and variable holidays valid for the particular year only are blue Click a date once to select a fixed holiday click twice to select a variable holiday and click for the third time to remove the holiday from the holiday list 5 3 Hardware Here is what you can find in this section 5 3 1 Switches 5 3 2 Door 5 ...

Page 36: ...ctivation by a time profile receiving an HTTP command from another LAN device the Action ActivateSwitch action via Automation Switch activation can be blocked by an appropriately selected time profile if necessary Switch locking and hold The switch activation conditions are modified using two functions switch locking and switch hold If a switch is locked it is permanently deactivated and cannot be...

Page 37: ...nction is activated deactivated according to the time profile setting If not the last locking state before the device power off is set or hold is set to inactive the switch is not held If a switch is active you can activate any logical output of the 2N Access Unit relay power output activate the output to which the 2N IP Security Relay module is connected send an HTTP command to another device The...

Page 38: ...outputs relay power output extender output If you select None the switch will not control any electric output but can control external equipment via HTTP commands Output type if you use the 2N IP Intercom Security Relay module set the output type to Security In the Security mode the output works in the inverse mode i e remains closed and controls the 2N IP Intercom Security Relay module using a sp...

Page 39: ...ch hold and lock are active at the same time the switch is locked Off the switch not held in position 1 Switch Hold by Time Profile assign a predefined time profile to the switch or set a time profile manually that allows for switch activation If the assigned time profile is inactive the switch can be activated by tapping a valid RFID card making a call entering a code or pressing a quick dial but...

Page 40: ...de length is up to 16 characters Time Profile assign a time profile to the switch code to control its validity Distinguish on off codes Set a switch code mode in which odd codes 1 3 are used for switch activation and even codes 2 4 are for switch deactivation This mode can only be used if the switch is set to the bistable mode Caution In case the switch is locked and the device is turned off and o...

Page 41: ...g upon switch activation The command is sent via the HTTP GET request and must be as follows http ip_address path E g http 192 168 1 50 relay1 on Switch Off Command set the command to be sent to the external device WEB relay e g upon switch deactivation The command is sent via the HTTP GET request and must be as follows http ip_address path E g http 192 168 1 50 relay1 off Username enter the usern...

Page 42: ...n off http ip_address state xml relayState 0 e g http 192 168 1 10 state xml relayState 0 In case of use external relay part no 9137411E are used next HTTP commands Symbol X should be replaced with a number of the desired switch To turn on the switch http ip_address state xml relayXState 1 e g http 192 168 1 10 state xml relay1State 1 To turn on for pre defined time default value is 1 5 s http ip_...

Page 43: ...reen door symbol green LED Assigned input define one or none of the logical inputs for open door detection Input Mode set the active input mode polarity Non Inverted Inverted Unauthorised door open detection detect if the door is open when switch has been locked Door open too long detection door open too long detection Maximum door open time maximum permitted door open duration in seconds ...

Page 44: ...olarity Enabled enable connection with the Genetec Synergis external security system Synergis server address Synergis server IP address or domain name Username authentication user name Format set the card reading format for sending card IDs to Genetec Synergis Connection state display the current Synergis server connection state or error state description if necessary Failure reason display the fa...

Page 45: ...ide Time profile choose one or more time profiles to be applied Set the time profiles in Directory Time profiles select one of the pre defined profiles or set the time profile for the given element manually Authentication mode set the authentication mode for the time profile in this row including multiple authentication for enhanced security Select Access denied to ban access ...

Page 46: ...dible For switch sound settings refer to 5 4 5 Uživatelské zvuky Virtual card to Wiegand select a group of Wiegand outputs to which the Virtual user card No shall be sent after successful authentication Can be combined with any authentication method including codes fingerprints etc Silent alarm enabled a virtual code higher by 1 than the access code is assigned to each access code and used for sil...

Page 47: ...st The RFID card record will be cancelled and access via this card will be blocked Plus card ID enter the service card ID for adding cards to the Installed cards a sequence of 6 to 32 characters including 0 9 A F Minus card ID enter the service card ID for removing cards from the Installed cards a sequence of 6 to 32 characters including 0 9 A F Anti Passback is a security function preventing user...

Page 48: ...he given element manually Authentication mode set the authentication mode for the time profile in this row including multiple authentication for enhanced security Select Access denied to ban access Zonal code enable the zonal code for the time profile and authentication combination in this row You can use the zonal code instead of the user PIN REX button enable the exit button function for the sel...

Page 49: ... be sent after successful authentication Can be combined with any authentication method including codes fingerprints etc Silent alarm enabled a virtual code higher by 1 than the access code is assigned to each access code and used for silent alarm activation For example if the access code is 0000 then the silent alarm activation code is 0001 It means for instance that silent alarm is 0000 for acce...

Page 50: ...cards to the Installed cards a sequence of 6 to 32 characters including 0 9 A F Minus card ID enter the service card ID for removing cards from the Installed cards a sequence of 6 to 32 characters including 0 9 A F Anti Passback is a security function preventing users to use their access cards or other identifiers to re enter an area without leaving it before i e preventing users from sharing card...

Page 51: ...et master volume Warning tone volume set the volume of warning and signalling tones described in the Signalling of Operational Statuses section The volume values are relative against the set master volume Switch activation tone volume set the volume of the switch activation tone The volume values are relative against the set master volume ...

Page 52: ...alling LED brightness levels separately Backlight set the backlight brightness value for the day mode Set the value as a percentage of the maximum possible LED brightness Signaling LEDs set the signaling LED brightness value for the day mode Set the value as a percentage of the maximum possible LED brightness ...

Page 53: ...ametag and button backlight value may if the ambient light level is low dazzle the persons standing in front of the intercom and in general increase the power consumption of the device A low LED brightness value on the other hand may if the intercom is placed in direct sun result in a lower LED on off contrast and potential LED state identification problems ...

Page 54: ... and the showing time can be set for each image Display Phonebook Displayed enable disable display of the phone book function Entry Keypad enable the keypad keypad type Disabled disable the keypad Regular Keypad set the regular keypad type Scramble Keypad enable disable keypad button scrambling random button transposing before every new display to prevent other persons from watching the code enter...

Page 55: ... Showcase Mode Activation set the idle timeout in the range of 1 to 600 seconds after which the device goes into the mode of representation Original Language download the localisation file template for own translation It is an XML file with all the texts to be displayed Custom Language remove download and upload a localisation file of your own Slideshow This tab helps you configure a list of image...

Page 56: ...play resolution automatically Click the magnifier icon to view the loaded image press to delete an image and click to hide a selected image video on the device display If no image is loaded the Slideshow mode will never be activated Tip To hide the Start with touch display on the display load an image of the resolution of 214 x 320 pixels ...

Page 57: ... Departure for the Attendance system purposes Associated Switch select a switch to be activated whenever a valid card is applied The set value is not applied when a valid user card is tapped on the reader while the double authentication mode is enabled In this case a numeric switch activating code is required to identify the switch to be activated RFID Interface choose the permitted types of cards...

Page 58: ...s Unit Configuration Manual 58 134 Caution Unlike earlier Access Unit versions where card readers were displayed separately the 2N Access Unit 2 0 card readers are set in the Hardware Extending modules section ...

Page 59: ...ssigned input define one or none of the logical inputs for secured state detection The secured state is then signalled by a red LED on the 2N Access Unit Input mode set the active level of the input polarity The tamper switch equipped models help detect opening of the device cover and signal this event as TamperSwitchActivated The events are written into a log and read out via HTTP API refer to th...

Page 60: ...onnected TamperSwitchActivated signals the tamper switch activation Enable automatic switch blocking block the switches by tamper activation for 30 minutes Switch blocking state display and make switch blocking settings Note From PCB version 599v2 up each of the models is equipped with an optical tamper switch From PCB version 599v2 up the assigned input is indicated by a module pictogram backligh...

Page 61: ...e Inductive loop module Display module Fingerprint reader Touch keypad Touch keypad RFID reader 125 kHz 13 56 MHz Bluetooth RFID reader 125 kHz 13 56 MHz The modules are chain like interconnected Each of the modules has its number depending on the chain position the first module has number 0 You can configure each module separately The parameters are specific for the given module type Caution The ...

Page 62: ... also be configured via the text row with a list of parameters parameter_name parameter_value separated with semicolons At present just a few of these parameters are available The other parameters are not public as they are rather experimental and can be modified in the future Note Module Name has to be unique Unnameable modules can be addressed via ext module_position ...

Page 63: ...iguration Button Functions press the buttons to dial selected Automation functions Keypad Module Configuration Module Name set the module name for logging events from the keypad Door set the reader direction Door Entry Door Exit for the Attendance system purposes ...

Page 64: ...ration Manual 64 134 Forward to Wiegand Output set a group of Wiegand outputs to which all pressed keys are to be forwarded Transmitted Code Format select a 4bit or 8bit higher security format for the codes to be transmitted ...

Page 65: ...iguration No parameters are available to the public at present 125 kHz Card Reader Module Configuration Module Name set the module name for card reader logging purposes Door set the reader direction Not specified Arrival Departure for the Attendance system purposes ...

Page 66: ...tput set a group of Wiegand outputs to which all the received RFID card IDs will be resent 13 56 MHz Card Reader Module Configuration Module Name set the module name for card reader logging purposes Door set the reader direction Door Entry Door Exit for the Attendance system purposes Associated Switch set the switch to be activated after user authentication via this module If you set Door Lock Swi...

Page 67: ...card to be accepted by the card reader The card reader supports just one card type at an instant Samsung NFC Compatibility enable NFC compatibility with the Samsung phones Forward to Wiegand Output set a group of Wiegand outputs to which all the received RFID card IDs will be resen ...

Page 68: ...tch to be activated after user authentication via this module If you set Door Lock Switch the authentication rules specified in Hardware Door will be used Signal Range set the maximum signal range i e the distance within which the Bluetooth module can communicate with the mobile phone Short less than 2 m for most phones Long maximum possible range Tip To accelerate card reading you are recommended...

Page 69: ...h the input and output Wiegand interfaces which are mutually independent have separate settings and can receive and send codes at the same time The Wiegand input helps you connect such equipment as RFID card readers biometric readers and so on With the Wiegand output you can connect the intercom to the security system in your building for example to send IDs of the RFID cards tapped on the RFID re...

Page 70: ...at set the format for the codes to be received Wiegand 26 32 37 and RAW Output Wiegand Group assign the output Wiegand to a group to which the codes from the connected card readers or Wiegand inputs can be resent Transmitted Code Format set the format for the codes to be transmitted 26 bit 32 bit 37 bit and RAW format 35 bit Corp 1000 48 bit Corp 1000 and Auto Change Facility Code set the first co...

Page 71: ...DP line Baudrate set the communication rate in compliance with the device connected Encryption Key set your own key for encrypted communication Mode use the installation mode for encryption key remote setting on the peripheral if enabled Once the encryption key is received the normal operation is switched on automatically The installation mode is signaled by a fast flashing of the LED indicator on...

Page 72: ...r means a wider range but less power for other intercom functions The convenient default value is 0 25 W under normal circumstances Display Module Configuration Module Name set the module name for input output specification in the SetOutput GetInput and InputChanged objects in the 2N Automation Door set the reader direction Arrival Departure for the Attendance system purposes Caution ...

Page 73: ...user authentication via this module If you set Door Lock Switch the authentication rules specified in Hardware Door will be used The display is not supported on Access Unit 1 0 from FW version 2 27 Caution Whenever the fingerprint reader is disconnected the User fingerprints will be hidden in the user profile after restart This section displays how many user fingerprints have been uploaded to the ...

Page 74: ...Door Exit for the Attendance system purposes Blink at Keystroke set keystroke light signalling for noisy environments where acoustic signals are difficult to hear Forward to Wiegand Output set a group of Wiegand outputs to which all pressed keys are to be forwarded Transmitted Code Format select a 4bit or 8bit higher security format for the codes to be transmitted ...

Page 75: ...2N Access Unit Configuration Manual 75 134 Touch Keypad RFID Reader 125 kHz 13 56 MHz 13 56 MHz 125 kHz Card Reader serial number ...

Page 76: ... an instant Samsung NFC Compatibility enable NFC compatibility with the Samsung phones Forward to Wiegand Output set a group of Wiegand outputs to which all the received RFID card IDs will be resent Touch keypad serial number Module Name set the module name for logging events from the touch keypad module Door set the reader direction Door Entry Door Exit for the Attendance system purposes Blink at...

Page 77: ...2N Access Unit Configuration Manual 77 134 Bluetooth RFID Reader 125 kHz 13 56 MHz 13 56 MHz 125 kHz Card Reader serial number ...

Page 78: ...RFID card IDs will be resent Bluetooth serial number Module Name set the module name for logging events from the Bluetooth module Door set the reader direction Not specified Arrival Departure for the Attendance system purposes Associated Switch set the switch to be activated after user authentication via this module If you set Door Lock Switch the authentication rules specified in Hardware Door wi...

Page 79: ...s connect the AXIS A9188 relay module to the 2N Access Unit Up to 5 relay modules can be connected to one 2N Access Unit each of which can control up to 8 floors which makes a total of 64 Make sure that the 2N Access Unit Lift module license is active Part No 9160401 to make this function work ...

Page 80: ...e the AXIS A9188 module used for lift control for up to 8 floors IP address AXIS A9188 IP address State display the state of the connected AXIS A9188 module Error Access denied Ready Offline Serial number AXIS A9188 serial number Username external device authentication username The parameter is only mandatory if the external device requests authentication ...

Page 81: ...2N Access Unit Configuration Manual 81 134 Password external device WEB relay etc authentication password The parameter is only mandatory if the external device requests authentication ...

Page 82: ...cation Profile select one or more time profiles to be applied Set the time profiles in the Directory Time Profiles section mark the selection from predefined profiles or manual setting of a time profile for the given element set a time profile for the given element Caution You just need one authentication username and password for all the modules ...

Page 83: ...ect Preferences Additional device configuration in the menu A new device configuration window gets displayed Select System Options Security Certificates Click Create self signed certificate to create a certificate Complete all the required fields and click OK for confirmation Go to System Options Security HTTPS Select the certificate in a pop up menu and press Save to save it Move to the 2N Access...

Page 84: ...you can automatically attach one or more snapshots taken during the call or ringing The intercom sends e mails to all the users whose valid e mail addresses are included in the users list If the E mail parameter in the user list is empty e mails are sent to the default e mail address You can also send e mails via Automation using the Action SendEmail action SMTP SMTP service enabled enable disable...

Page 85: ... empty if not Password enter the SMTP server login password Client certificate specify the client certificate and private key for the intercom SMTP server communication encryption Choose one of the three sets of user certificates and private keys refer to the Certificates subs or keep the SelfSigned setting in which the certificate automatically generated upon the first intercom power up is used F...

Page 86: ...ayed in the window for you to detect an e mail setting problem if any on the intercom or another network element E mail on Access Set that an e mail shall be sent whenever an RFID card is tapped on the card reader and or Bluetooth fingerprint reader identification is made Send E Mail at set e mail sending The following options are available Do Not Send E mail no e mail message will be sent All Acc...

Page 87: ... User Called username DateTime Current date and time AuthId User authentication ID DeviceName Intercom identification AuthIdType Authentication type define the identifier source Card Bluetooth or Fingerprint AuthIdValid Identifier validity valid for a valid identifier Invalid for an invalid identifier An extended syntax can be used for the AuthIdType and AuthIdValid placeholders to replace the val...

Page 88: ... Subject set the e mail subject to be sent E Mail Body edit the text to be sent Use the HTML formatting marks in the text You can insert special symbols substituting the username date time and device ID These symbols will be replaced with the actual value before sending Refer to the table of substitute symbols below User Called username DateTime Current date and time DeviceName Intercom identifica...

Page 89: ...edit the text to be sent Use the HTML formatting marks in the text You can insert special symbols substituting the username date time and device ID These symbols will be replaced with the actual value before sending Refer to the table of substitute symbols below User Called username DateTime Current date and time DeviceName Intercom identification If the placeholder value is not found in the strin...

Page 90: ... and edit the Auth ID value for each user in the Mobile Key section of the 2N Access Unit phone book You can move Auth ID to another user or copy it to another intercom By deleting the Auth ID value you can block the user s access Encryption Keys and Locations The 2N Mobile Key 2N Access Unit communication is always encrypted 2N Mobile Key cannot authenticate a user without knowing the encryption ...

Page 91: ...in the 2N Access Unit phone book Physically you can pair a user locally using the USB Bluetooth module connected to your PC or remotely using an integrated Bluetooth module The results of both the pairing methods are the same The following data is transmitted to a mobile device for pairing Location identifier Location encryption key User Auth ID Encryption Key for Pairing An encryption key other t...

Page 92: ...ation ID and current encryption keys into a file Subsequently the exported file can be imported to another device Devices with identical location IDs and encryption keys form a so called location Import push the button to import the location ID and current encryption keys from a file exported from another 2N Access Unit Devices with identical location IDs and encryption keys form a so called locat...

Page 93: ... use this key from authentication Delete secondary key the 2N Mobile Key users that still use this key will not be able to authenticate themselves unless they have updated the encryption keys in their mobile devices before deletion The mobile device keys are updated at every use of the 2N Mobile Key application Pairing PIN validity set the authorisation PIN validity for user mobile device pairing ...

Page 94: ...ile Key Auth ID value for the user to block the lost phone and avoid misuse Re generate the primary encryption key optionally to avoid misuse of the encryption key stored in the mobile device Warnung With the upgrade to version 2 30 the bluetooth modules will also be upgraded When downgrading to version 2 29 and lower they may malfunction ...

Page 95: ...h or call modes e g are insufficient and so 2N Access Unit offers a special programmable interface 2N Automation Typically 2N Automation is used in applications that require complex interconnections with third party systems Refer to the 2N Automation Configuration Manual for the 2N IP Automation function and configuration details Note The Automation function is available with the Gold or Enhanced ...

Page 96: ...g etc I O API provides intercom logic input output control and monitoring Audio API provides audio playback control and microphone monitoring Camera API provides camera image control and monitoring Display API provides display control and user information display E mail API provides sending of user e mails Logging API provides reading of event records Set the transport protocol HTTP or HTTPS and w...

Page 97: ...2N Access Unit Configuration Manual 97 134 ...

Page 98: ...ication refer to 5 3 1 Door Switch 1 Activation Signaling set the sound to be generated when a switch 1 is activated Switch 2 Activation Signaling set the sound to be generated when a switch 2 is activated 5 4 6 Web Server You can configure your 2N Access Unit using a standard browser with access to the integrated web server Use the secured HTTPS protocol for communication between the browser ...

Page 99: ...ons if available 2N IP Manager 2N IP Network Scanner etc Web Interface Language set the default language for administration web server login Use the upper toolbar buttons to change the language temporarily Password set the intercom access password Press to change the password The 8 character password must include one lower case letter one upper case letter and one digit at least HTTP port set the ...

Page 100: ...generated upon the first intercom power up is used Remote access enabled enable remote access to the intercom web server from off LAN IP addresses Original Language download the original file containing all the user interface texts in English The file format is XML see below User Language record load and remove if necessary a user file containing your own user interface text translations ...

Page 101: ...0 ACTIVE s s id enum bool_profile_state 1 INACTIVE s strings While translating modify the value of s elements only Do not modify the id values The language name specified by the language attribute of the strings element will be available in the selections of the Web interface language parameter The abbreviation of the language name specified by the languageshort attribute of the strings element wi...

Page 102: ...support the SNMP version 2c List of Parameters SNMP Enabled enable the SNMP function Community String text string representing the access key to the MIB table objects Trap IP Address IP address to which the SNMP traps are to be sent Download MIB File download the current MIB definition from a device Contact enter the device manager contact name e mail etc Name enter the device name ...

Page 103: ...alid IP addresses for SNMP agent access to block access from other addresses If the field is empty the device may be accessed from any IP address 5 5 System Here is what you can find in this section 5 5 1 Network 5 5 2 Date and Time 5 5 3 Licence 5 5 4 Certificates 5 5 5 Auto Provisioning 5 5 6 Syslog 5 5 7 Maintenance ...

Page 104: ...EAP TLS authentication Set this function on the 802 1x tab The Trace tab helps you launch capture of incoming and outgoing packets on the 2N Access Unit network interface The file with captured packets can be downloaded for Wireshark processing e g www wireshark org List of Parameters Tip To know the current IP address of your 2N Access Unit use the 2N IP Network Scanner which can be freely downlo...

Page 105: ...lt gateway which provides communication with off LAN equipment Primary DNS set the primary DNS server address for translation of domain names to IP addresses The primary DNS value is 8 8 8 8 upon factory reset Secondary DNS set the secondary DNS server address which is used in case the primary DNS is inaccessible The secondary DNS value is 8 8 4 4 upon factory reset Hostname set the 2N IP intercom...

Page 106: ...he Ping command in standard operating systems Press Ping to display a dialogue enter the IP address domain name and click Ping to send test data to this address If the selected IP address domain name is invalid a warning is displayed and Ping remains inactive until the given IP address becomes valid The function progress and result are also displayed in the dialogue Failed means either inaccessibi...

Page 107: ...ess Unit will become inaccessible Trusted Certificate specify the set of trusted certificates for verification of the RADIUS server public certificate validity Choose one of three sets of certificates refer to the Certificates subsection If no trusted certificate is included the RADIUS public certificate is not verified User Certificate specify the user certificate and private key for verification...

Page 108: ...d by a certification authority is specified the OpenVPN server public certificate is not validated Client Certificate specify a set of client certificates to verify the client s identity by the OpenVPN server Choose one of three certificate sets see the Certificates subsection If no client certificate is specified the OpenVPN client identity is not validated State display the OpenVPN connection st...

Page 109: ...capture buffer is full the oldest packets are rewritten automatically We recommend that you lower the video stream transmission rate below 512 kbps while capturing packets locally Press to start to stop and to download the packet capture file Press to start remote capturing Specify the capturing time interval s for the incoming and outgoing packets When the set time value passes the packet capture...

Page 110: ...ynchronise button Practically the 2N Access Unit real time circuit accuracy is approximately 0 005 which may mean a deviation of 2 minutes per month Therefore we recommend you to synchronise time with the NTP server to achieve the highest accuracy and reliability The 2N Access Unit sends a query to the NTP server periodically to update its time value Note The 2N Access Unit does not need the curre...

Page 111: ...e automatically found time zone In case the function is unavailable or disabled N A is displayed Manual Selection set the installation site time zone Set the time shift and summer winter time transitions Custom Rule if the device is installed on a site that it not included in the Time Zone parameter set the time zone rule manually The rule is applied only if the Time Zone parameter is set to Manua...

Page 112: ... licence key only Refer to the Function Licensing subsection for the list of 2N Access Unit licensing options List of Parameters Serial Number display the serial number of the device for which the licence is valid Licence Key enter the valid licence key Licence Key Valid check whether the used licence key is valid ...

Page 113: ...functions activated Lift Control Support check whether the functions activated by the Lift Module license are available Automatic update enable automatic license key update from the 2N License server Manual update manual license availability check request Manual update state running updated unspecified failed license is not available Trial Licence State check the trial licence state Non Activated ...

Page 114: ...rtificates can be uploaded to the 2N Access Unit which are used for identity verification of the device that the intercom is communicating with and also of User certificates and private keys for communication encryption Each certificate requiring service can be assigned one of the three certificate sets available refer to the Web Server E Mail and Streaming subsections The certificates can be shar...

Page 115: ...e uploads is shown in the following two folders Press to load a certificate saved on your PC Select the certificate or private key file in the dialogue window and push Load Press to remove a certificate from the intercom Caution The CA certificates must use the X 509 v3 format Note If you use the Self Signed certificate for encryption of the intercom web server browser communication the communicat...

Page 116: ...2N Access Unit Configuration Manual 116 134 Caution For certificates based on elliptic curves use the secp256r1 aka prime256v1 aka NIST P 256 and secp384r1 aka NIST P 384 curves only ...

Page 117: ...predefined rules You can configure the TFTP and HTTP server address manually The 2N Access Unit supports automatic address identification via the local DHCP server Option 66 My2N Serial Number display the serial number of the device to which the valid My2N code applies My2N Security Code display the full application activating code GENERATE NEW the active My2N Security Code will be invalidated and...

Page 118: ...2N Access Unit compares the server file with its current firmware file periodically and if the server file is more recent automatically updates firmware and gets restarted approx 30 s Hence we recommend you to update when the 2N Access Unit traffic is very low at night e g The 2N Access Unit expects the following files MODEL firmware bin 2N Access Unit firmware MODEL common xml common configuratio...

Page 119: ...ddress 00 87 12 AA 00 11 downloads the following files from the TFTP server au firmware bin au common xml au 00 87 12 aa 00 11 xml List of Parameters Firmware Configuration Update Enabled enable automatic firmware configuration updating from the TFTP HTTP server Address Retrieval Mode select whether the TFTP HTTP server address shall be entered manually or a value retrieved automatically from the ...

Page 120: ...ficate User Certificate specify the user certificate and private key to validate the intercom right to communicate with the ACS At Boot Time enable check and or execution of update upon every 2N Access Unit start Update Period set the update period Set an automatic update to take place hourly daily weekly monthly or set the period manually Update At set the update time in the HH MM format for peri...

Page 121: ... name is invalid due to wrong configuration or unavailability of the DNS server Server Not Found The requested HTTP TFTP server fails to reply Download failed An unspecified error occurred during file download File not found The file has not been found on the server File invalid The file to be downloaded is corrupted or of a wrong type Configuration Use the Configuration tab to set automatic confi...

Page 122: ...prefix on the server The intercom expects the XhipY_firmware bin XhipY common xml and XhipY MACADDR xml files where X is the prefix specified herein and Y specifies the intercom model Use Authentication enable authentication for HTTP server access Username enter the user name for server authentication Password enter the password for server authentication Verify Server Certificate set the set of CA...

Page 123: ...date At last update time Update Result Common Config last update result The following options are available DHCP option 66 failed Firmware is up to date Server connection failed Running File not found Communication Result Detail Common Config server communication error code or TFTP HTTP status code Update Result Private Config private configuration follows the common configuration update The devic...

Page 124: ... disabled in the intercom My2N TR069 Enabled enable connection to My2N or another ACS server Active Profile select one of the pre defined profiles ACS or choose a setting of your own and configure the ACS connection manually Next Synchronisation in display the time period in which the intercom shall contact a remote ACS Connection Status display the current ACS connection state or error state desc...

Page 125: ...icates for validation of the ACS public certificate Choose one of three sets see the Certificates subsection If none is selected the ACS public certificate is not validated Client Certificate specify the client certificate and private key to validate the intercom right to communicate with the ACS Choose one of three sets refer to the Certificates subsection Periodic inform enabled enable periodica...

Page 126: ...his service for common 2N Access Unit operation List of Parameters Send Syslog Messages enable sending of system messages to the Syslog server Make sure that the server address is set correctly Server Address set the IP MAC address of the server on which the Syslog application is running Severity Level set the severity level of the messages to be sent Debug 1 3 level setting is only recommended to...

Page 127: ...2N Access Unit Configuration Manual 127 134 General overview of local syslog messages ...

Page 128: ...r the directory network parameters or SIP exchange connection settings from the configuration file shall be applied Backup Configuration back up the complete current configuration of your 2N Access Unit Press the button to download the configuration file to your PC Reset Configuration reset default values for all of the 2N Access Unit parameters except for the network settings Use the respective j...

Page 129: ...ercom FW upgrade does not affect configuration as the 2N Access Unit checks the FW file to prevent upload of a wrong or corrupted file Check Firmware Online check online whether a new firmware version is available If so download the new FW version and an automatic device upgrade will follow Restart Device restart the 2N Access Unit The process takes about 30 s When the 2N Access Unit has obtained ...

Page 130: ...ge to the manufacturer These data do not include any sensitive information such as passwords access codes or phone numbers This information helps 2N TELEKOMUNIKACE a s improve the software quality reliability and performance Your participation is voluntary and you can cancel this sending any time Caution The 2N Access Unit configuration change writing takes 3 15 s depending on the 2N Access Unit c...

Page 131: ...tal device pursuant to part 15 of the FCC Rules NOTE These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that inte...

Page 132: ...The manufacturer assumes no responsibility for any malfunction damage or destruction of the product caused by incompetent replacement of parts or due to the use of reproduction parts or components The manufacturer shall not be liable and responsible for any loss or damage incurred as a result of a natural disaster or any other unfavourable natural condition The manufacturer shall not be held liabl...

Page 133: ...ctric Waste and Used Battery Pack Handling Do not place used electric devices and battery packs into municipal waste containers An undue disposal thereof might impair the environment Deliver your expired electric appliances and battery packs removed from them to dedicated dumpsites or containers or give them back to the dealer or manufacturer for environmental friendly disposal The dealer or manuf...

Page 134: ...Konfigurační manuál 2N Access Unit 134 134 ...

Reviews: