Sagem Securite Groupe SAFRAN MA1XXBC 사용자 설명서

다운로드
페이지 118
35
Access control presentation
S
TAN
D
 
ALO
N
E
 
MO
DES
 
(
N
ETW
OR
KE
D
 
OR
 
NO
T
)
S
TA
ND
 
ALO
N
E
 
MO
DES
 
(
NE
TW
OR
KED
 
OR
 
NO
T
)
S
TA
ND
 
ALON
E
 
MO
DE
S
 
(
NETW
O
RK
ED
 
OR
 
NO
T
)
S
TA
ND
 
ALO
N
E
 
MO
DES
 
(
NE
TW
ORK
ED
 
OR
 
NO
T
)
S
TA
N
D
 
ALO
N
E
 
MO
DE
S
 
(
NE
TW
OR
KE
D
 
OR
 
NOT
)
S
TA
ND
 
ALO
N
E
 
MO
DE
S
 
(
N
ETW
OR
KE
D
 
OR
 
NO
T
)
UDP/TCP User Id Emission
The ID of the recognized user can be sent through the IP link (Ethernet or 
Wi-Fi
TM
) using UDP or TCP protocol (unsecured TCP or SSL). 
The administrator may select the port adress.
See SSL Solution for MorphoAccess
®
 documentation for details about SSL.
RS485 User ID emission
The ID of the recognized user can be sent through RS485.
Please refer to MorphoAccess
®
 Remote Messages Specification for more
information about the format of the User ID message sent through an IP link
and through a RS485 port.
Wi-Fi
TM
Instead of Ethernet connection, the terminal can be connected using a wireless
b/g connection. Please refer to paragraphs "Network Wi-Fi™ configuration"
and "Wi-Fi™ configuration".
The message format and the protocols supported are the same: UDP, TCP or
SSL.
It is not possible for a terminal to be connected through Ethernet and through
Wi-Fi™ at the same time.
Access request result : Local Diary (log)
When enabled, the terminal creates a record for each access request in a local
file. Each record includes: the date/hour of the access request, the user
identifier (if available) and the result of the access rights local check.
The content of this file can be downloaded by the Host System.
The capacity of the file is 8 000 records: when the file is full, the recording of
access request result automatically stops.
The record file can be erased using relevant command, by the Host System.
"
Proxy
"
 mode
Proxy mode is not, strictly speaking,  a recognition mode. In this mode, the
MorphoAccess
®
  works as a slave, waiting for external orders such as:
  user identification,
 user verification,
 relay activation,
 read data on a contactless smart card,
 ...