Controlled Electronic Management Systems Ltd ETHERPROX Manual De Usuario
EtherProx Entry
Introduction
The EtherProx Entry door access system is ideal for controlling a single door, usually in a
remote area. You can use EtherProx Entry for businesses, leisure facilities, members-only
clubs, and secure areas in public buildings.
remote area. You can use EtherProx Entry for businesses, leisure facilities, members-only
clubs, and secure areas in public buildings.
EtherProx Entry is also ideal for an establishment that initially requires a few readers and
envisions future expansion. For example, you can link EtherProx Entry to a multi-door
Access 2000 system, integrating alarm processing and card production facilities by
changing the firmware.
envisions future expansion. For example, you can link EtherProx Entry to a multi-door
Access 2000 system, integrating alarm processing and card production facilities by
changing the firmware.
EtherProx Entry maintains a database of valid cards that are added by using a web
browser interface. The Web administration pages also allow you to configure EtherProx
Entry for door event times, location names, login names, and passwords.
browser interface. The Web administration pages also allow you to configure EtherProx
Entry for door event times, location names, login names, and passwords.
To connect to the EtherProx Entry for configuration of the unit and for access
management, a personal computer with Microsoft Internet Explorer 5.5 and an Ethernet
network adapter is required. Once the EtherProx Entry has been configured and the
necessary card data has been entered, for backup purposes, you can upload data to the
computer by means of its web server. In the event of data loss on EtherProx Entry,
backup data can be downloaded to the reader’s database. Additionally, EtherProx Entry
may be connected to a local area or wide area network so that it can be controlled and
queried remotely to generate activity, status, and alarm reports.
management, a personal computer with Microsoft Internet Explorer 5.5 and an Ethernet
network adapter is required. Once the EtherProx Entry has been configured and the
necessary card data has been entered, for backup purposes, you can upload data to the
computer by means of its web server. In the event of data loss on EtherProx Entry,
backup data can be downloaded to the reader’s database. Additionally, EtherProx Entry
may be connected to a local area or wide area network so that it can be controlled and
queried remotely to generate activity, status, and alarm reports.
Description
The EtherProx Entry reader is housed in a polycarbonate, fully encapsulated
enclosure that is both weather and vandal resistant. The keypad is required for
PIN validation and for access to the Administration menu. EtherProx Entry
supports HID 26 bit, HID 32 bit, and HID (Software House) 37 bit Wiegand
proximity technology, under license from HID Corporation. The following cards and
read ranges are supported.
enclosure that is both weather and vandal resistant. The keypad is required for
PIN validation and for access to the Administration menu. EtherProx Entry
supports HID 26 bit, HID 32 bit, and HID (Software House) 37 bit Wiegand
proximity technology, under license from HID Corporation. The following cards and
read ranges are supported.
CARDS
READ RANGES
ISOProx® ll Card
9cm (3.6")
ProxCard™ Plus Card
6cm (2.4")
ProxCard® ll Card
10cm (4")
ProxKey™ ll Fob
4cm (1.6")
Each reader can service one InfoProx™ Exit reader configuration supported for
IN/OUT control. Alternatively, a pushbutton can be connected as an input to the
reader to provide egress from a controlled area where no exit reader is mounted.
IN/OUT control. Alternatively, a pushbutton can be connected as an input to the
reader to provide egress from a controlled area where no exit reader is mounted.
In normal door mode, the EtherProx Entry reader has three analog inputs, as listed
in the following table.
in the following table.
INPUT
DOOR MODE
Input 0
Monitors door position (Normally Closed)
Input 1
Monitors lock status (Normally Closed)
Software House
Page 3