S2000-2 S2000-2
Programming
81
www.bolid.com
The
Access Group
(the number of the access group) defines the access rights and restrictions for
the
User
key, as well as its rights to arm/disarm loops (see Access Rights Section of this Manual).
The
Master
key access group is inherited by all the keys programmed by hardware (see Key Pro-
gramming Section of this Manual).
If the
Validity Limitation
parameter is set, the date of the key validity starting and validity expiration
are set by the
Validity Period
parameter. Otherwise the key never expires. The validity limitation is
used for all the key types.
ACCESS KEY PATTERN CONFIGURATION PARAMETERS
In order to gain access for key owners that are not stored in controllers’ memory it can be possible to
program up to 5 different key patterns which are used for key identification. Each key pattern is de-
scribed by a set of parameters shown in Table 11.
Table 11. Key Pattern Configuration Parameters
Parameter Name
Function Description
Range
Pattern Is Locked
This attribute provides disabling the key pattern
On/Off
Key Pattern Type
Destination of all the keys fitting the key pattern
User
Base Code
A base code the specified digits of which must be equal
to relevant digits of all codes of the keys fitting the key
pattern (see below)
Code Mask
A set of code positions in digital sequence of a presented
key, digits in these positions must be identical with the
relevant digits of the base pattern code (see above)
Access Group
A number of an access group which defines common
access rights and limitations which are applied to this
key and are common for all keys assigned to this access
group
0…32
Validity Limitation
Defines key activity limitations depending on date
On/Off
Validity Period
Defines the period of dates when the key is active
01.01.2000 …
… 31.12.2255
The
Pattern is locked
switch setting on disables a key pattern. By default this parameter is switched
on for all five key patterns disabling the possibility to gain user access based on access key patterns.
The
Pattern Type
parameter describes what operation the key met the pattern requirements is des-
tined to. All keys fitting to any pattern can only have the
User
type and cannot be
Unlocking
,
Locking
,
or
Master
.
The
Base Code
parameter represents a base key code which will be covered by the
Code Mask
while identifying keys based on the pattern. Digits of the base code which positions match with the
‘opened’ mask positions must be equal to relevant digits of all the keys fitting the pattern. The base
Summary of Contents for S2000-2
Page 1: ...Orion ISS Access Controller S2000 2 User s Manual ISO 9001 ...
Page 5: ...S2000 2 Features and Design 5 www bolid com FEATURES AND DESIGN ...
Page 8: ...Orion ISS www bolid com 8 ...
Page 9: ...S2000 2 Specifications 9 www bolid com SPECIFICATIONS ...
Page 12: ...Orion ISS www bolid com 12 ...
Page 13: ...S2000 2 Operating 13 www bolid com OPERATING ...
Page 47: ...S2000 2 Installation 47 www bolid com INSTALLATION ...
Page 67: ...S2000 2 S2000 2 Programming 67 www bolid com S2000 2 PROGRAMMING ...
Page 89: ...S2000 2 Maintenance 89 www bolid com MAINTENANCE ...
Page 94: ...Orion ISS www bolid com 94 ...
Page 95: ...S2000 2 95 www bolid com Appendix Connecting Some Models of Readers to the S2000 2 Controller ...