DOCUMENT SSE-0000077399-01 - V
35
–
Access control presentation
S
TAN
D
ALO
N
E
MO
DES
(
N
ETW
OR
KE
D
OR
NO
T
)
S
TA
ND
ALO
N
E
MO
DES
(
NE
TW
OR
KED
OR
NO
T
)
S
TA
ND
ALON
E
MO
DE
S
(
NETW
O
RK
ED
OR
NO
T
)
S
TA
ND
ALO
N
E
MO
DES
(
NE
TW
ORK
ED
OR
NO
T
)
S
TA
N
D
ALO
N
E
MO
DE
S
(
NE
TW
OR
KE
D
OR
NOT
)
S
TA
ND
ALO
N
E
MO
DE
S
(
N
ETW
OR
KE
D
OR
NO
T
)
UDP/TCP User Id Emission
The ID of the recognized user can be sent through the IP link (Ethernet or
Wi-Fi
TM
) using UDP or TCP protocol (unsecured TCP or SSL).
The administrator may select the port adress.
See
SSL Solution for MorphoAccess
®
documentation for details about SSL.
RS485 User ID emission
The ID of the recognized user can be sent through RS485.
Please refer to
MorphoAccess
®
Remote Messages Specification
for more
information about the format of the User ID message sent through an IP link
and through a RS485 port.
Wi-Fi
TM
Instead of Ethernet connection, the terminal can be connected using a wireless
b/g connection. Please refer to paragraphs "Network Wi-Fi™ configuration"
and "Wi-Fi™ configuration".
The message format and the protocols supported are the same: UDP, TCP or
SSL.
It is not possible for a terminal to be connected through Ethernet and through
Wi-Fi™ at the same time.
Access request result : Local Diary (log)
When enabled, the terminal creates a record for each access request in a local
file. Each record includes: the date/hour of the access request, the user
identifier (if available) and the result of the access rights local check.
The content of this file can be downloaded by the Host System.
The capacity of the file is 8 000 records: when the file is full, the recording of
access request result automatically stops.
The record file can be erased using relevant command, by the Host System.
"
Proxy
"
mode
Proxy mode is not, strictly speaking, a recognition mode. In this mode, the
MorphoAccess
®
works as a slave, waiting for external orders such as:
•
user identification,
•
user verification,
•
relay activation,
•
read data on a contactless smart card,
•
...
Содержание MorphoAccess J-Bio
Страница 13: ...SECTION 1 INTRODUCTION...
Страница 19: ...SECTION 2 TERMINAL PRESENTATION...
Страница 25: ...SECTION 3 TERMINAL CONFIGURATION...
Страница 39: ...SECTION 4 STAND ALONE MODES NETWORKED OR NOT...
Страница 49: ...SECTION 5 ACCESS CONTROL BY IDENTIFICATION...
Страница 53: ...SECTION 6 ACCESS CONTROL BY AUTHENTIFICATION...
Страница 67: ...SECTION 7 PROXY MODE...
Страница 71: ...SECTION 8 TERMINAL CUSTOMIZATION...
Страница 89: ...SECTION 9 MAN MACHINE INTERFACE...
Страница 103: ...SECTION 10 APPENDIX...
Страница 115: ...SECTION 11 SUPPORT...