
Connecting readers and modules using Wiegand and
an SPI
The Wiegand connections and SPI connection are not encrypted or authenticated. If you connect
readers and modules, complete the following steps:
•
Ensure that you isolate and secure the connection wires inside the walls of the installation in
a safe area.
•
Ensure that you cannot access wires from an exterior wall.
•
Use a tamper contact to signal an alarm if someone tries to breach security.
Connecting readers and modules using an RS-485
bus (with encrypted protocol)
•
Connect readers and modules, such as the ioSmart card reader, that interconnect with an
encrypted and secure 485 link. These devices include a mechanical or optical contact alarm
that does not require additional wires.
Updating to the latest firmware
The latest security features are included in firmware 3.xx and higher. To ensure your controller has
up-to-date security features, use the latest available firmware version.
•
To update from version 2.xx to 3.xx, see
.
Security configuration
You can view, monitor, and access the controller in one of three modes: stand-alone, with EntraPass,
or with the cloud service.
If it is required, as you complete the installation wizard, you are prompted to reconfigure your user
account, activate additional password security measures, or disable the access point mode.
Connecting to the internet
Depending on your configuration and deployment architecture, you may require internet access.
To access cloud services, you require an internet connection. For a convenient stand-alone
deployment, you can configure the KT-1 over the internet.
•
When you connect to the internet, use a private LAN.
Managing users
Follow best practice guidelines for managing user accounts, credentials, and permissions. Best
practice guidelines include the following:
•
Do not share accounts.
•
Change passwords every 90 days.
•
Create strong passwords. Passwords must contain at least eight characters, and include one
lowercase, one uppercase, one number, and one special character.
•
Give users access only to what they need.
•
Set temporay accounts to expire after a set amount of time.
Protecting the network
•
When the trust deviation is beyond the risk tolerance, control the flow of data between
trusted and untrusted networks by using a switch or a router with data flow control
capabilities, such as a firewall.
•
Isolate the KT-1 system from networks of lower trust.
Deployment
To ensure the safe and secure deployment of the KT-1, see the following guidelines:
•
Restricting physical access to the controller
32
KT-1 One-Door Controller Installation Guide
Содержание Tyco KT-1
Страница 1: ...KT 1 One Door Controller Installation Guide D29008966R009 2021 03 08 DN2186 2103 ...
Страница 2: ......
Страница 8: ......
Страница 24: ...Figure 5 KT 1 PCB inputs and outputs 22 KT 1 One Door Controller Installation Guide ...
Страница 26: ...Figure 6 KT 1 controller with KT PS4085 power supply 24 KT 1 One Door Controller Installation Guide ...
Страница 29: ...Figure 8 KT 1 PCB EU inputs and outputs KT 1 One Door Controller Installation Guide 27 ...
Страница 56: ...KT 1 One Door Controller Installation Guide 54 ...