S2000-2
Operating
15
www.bolid.com
¾
The time periods when arming/disarming alarm loops of the S2000-2 are allowed (see Time
Schedules Section below)
The following access rights and restrictions
are set individually
for each access key involved in an
access group:
¾
The type of the key (is this key intended to be used as User, Locking, Unlocking or Master)
¾
The key lockout (a key be locked if necessary, e.g. if the key is lost or stolen)
¾
The additional code for the key or permission to use only main code in case of two-factor au-
thentication (see Two Factor Authentication Section below)
¾
The validity period of the key
The access key can be preprogrammed either by hardware or software ways
see Key Program-
ming Section of this Manual.
Moreover, access control based on five different key patterns can be implemented through the access
point. In such a case the codes of presented keys are stored neither in the S2000-2 memory nor in
ARM Orion database, but instead to gain access they must meet on of the controller key pattern (see
Key Pattern Based Access Control Section below).
Summary of Contents for S2000-2
Page 1: ...Orion ISS Access Controller S2000 2 User s Manual ISO 9001 ...
Page 5: ...S2000 2 Features and Design 5 www bolid com FEATURES AND DESIGN ...
Page 8: ...Orion ISS www bolid com 8 ...
Page 9: ...S2000 2 Specifications 9 www bolid com SPECIFICATIONS ...
Page 12: ...Orion ISS www bolid com 12 ...
Page 13: ...S2000 2 Operating 13 www bolid com OPERATING ...
Page 47: ...S2000 2 Installation 47 www bolid com INSTALLATION ...
Page 67: ...S2000 2 S2000 2 Programming 67 www bolid com S2000 2 PROGRAMMING ...
Page 89: ...S2000 2 Maintenance 89 www bolid com MAINTENANCE ...
Page 94: ...Orion ISS www bolid com 94 ...
Page 95: ...S2000 2 95 www bolid com Appendix Connecting Some Models of Readers to the S2000 2 Controller ...