background image

 

Page 20 

Simplified access rights evaluation 

The model of access rights contains time schedules and a table of holidays. A block diagram 
for access right evaluation can be seen in 

Pic.7

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Pic. 7: Simplified access rights evaluation 

Useful links 

 

Wiring diagrams: 

http://techfass.cz/diagrams-aps-mini-plus-en.html

 

 

Program equipment: 

http://techfass.cz/software-and-documentation-en.html

 

 

VALID 

UNKNOWN 

ID FOUND 

ACCESS DRIVEN 

BY TIME SCHED. 

ACCESS ALWAYS 

GRANTED 

HOLIDAY? 

ACCESS GRANTED 

FOR HOLIDAY 

AND ACTUAL TIME 

ACCESS GRANTED 

FOR ACTUAL 
DAY & TIME 

READING ID 

 

YES 

NO 

YES 

NO 

NO 

YES 

INVALID 

YES 

NO 

NO 

YES 

NO 

YES 

Summary of Contents for 53431000

Page 1: ...A terminal for APS mini Plus system User s guide 2004 2019 TECH FASS s r o V t nsk 1611 19 153 00 Prague Czech Republic www techfass cz techfass techfass cz Date of release 2019 06 03 valid for FW ver...

Page 2: ...operties and settings 8 5 1 Terminal control 8 5 2 Factory defaults 10 5 3 Configuring terminal from the configuration screen 10 5 4 TCP IP parameters setting via TELNET terminal 3 11 5 5 Setting para...

Page 3: ...nes is not limited The terminal is intended for mounting in the indoor environment 1 Commercial designation of available versions is described in table 1 3 Technical parameters 3 1 Product version Pro...

Page 4: ...otential free contact 2nd input Logical potential free contact Outputs Door lock Relay NC NO 2A 24V Alarm Transistor output 5V 5mA Output 3 OC for external reader buzzer control Reading synchronizatio...

Page 5: ...ired with appropriate reader module before use 3 5 Mechanical design Mechanical design Weight 0 210 kg Operating temperature 10 40 C Humidity Max 75 non condensing Cover Plastic Environment Indoor Col...

Page 6: ...in any alarm state Table 10 Standard connection The door monitoring contact IN1 is operational after its first change of status since switching on the module Full door lock timing acc to tab 8 is use...

Page 7: ...slot 1 After mounting the installation box into a wall fasten the rear part of the terminal to it using screws 2a 2b It is appropriate to create a coil with the cables C1 and C2 enwinding them throug...

Page 8: ...erformed similarly Open the unit using a screwdriver in the slot 1 Continue with an opposite procedure than performed when mounting the terminal 5 Terminal functional properties and settings 5 1 Termi...

Page 9: ...ndication 6 Day in a week in preset format 7 Date in preset format 8 Selected reason 9 Text description of the preset reason 10 Time in preset format 11 Arrows allowing movement among the reason icons...

Page 10: ...next character touch the empty space just next to the first character and then press the OK button After entering the configuration screen you can change terminal communication screen and security set...

Page 11: ...termianl and you cannot use the reset button to set the default parameters the IP address can be temporarily set for a single connection with this procedure Insert a record into the ARP table with th...

Page 12: ...separated by the Enter key If the entered value is not allowed the subnet mask is not changed After inserting all of the address bytes the final subnet maskis displayed and you are returned back to t...

Page 13: ...0 255 s 0 s Automatic summer time adjustment YES NO YES Module advanced function YES NO NO Release lock with REX button while tamper alarm active YES NO YES Saving events in the module s archive Door...

Page 14: ...n case the toggle function of the door lock relay is set the door lock relay status is switched and the beeper is activated when not disabled when the Door Open function is activated The beeper stays...

Page 15: ...ut is activated It can drive a low input transistor relay which contact can control any alarm device directly or it can be processed further After terminating all alarm conditions the alarm output is...

Page 16: ...e The default length is 40 bits This setting is only used when unifying of the ID media codes length is required in combined systems with WIEGAND output readers with a fixed WIEGAND data format IDs mo...

Page 17: ...of TECHFASS readers is implemented enabling to cancel the mutual disturbance of the modules The reader module offers the Wiegand data interface synchronization in SLAVE mode In the external reader mo...

Page 18: ...disconnected 6 10 1 Time Antipassback The Time Antipassback is defined by the ABP timer initial value in minutes which is set to the ID after passing at the reader module If the users uses the ID at...

Page 19: ...d is not affected by the disabling function Remote door open function cannot be performed Remote identification with ID is disabled for users with access driven by a time schedule The disabling status...

Page 20: ...fied access rights evaluation 8 Useful links Wiring diagrams http techfass cz diagrams aps mini plus en html Program equipment http techfass cz software and documentation en html VALID UNKNOWN ID FOUN...

Reviews: