Access control unit - HID - Peripherals tab - Security Center 5.12

Security Center Administrator Guide 5.12

Product
Security Center
Content type
Guides > Administrator guides
Version
5.12
Language
English
Last updated
2024-09-13

This section lists the settings found in HID access control unit Peripherals tab, in the Access control task. In this tab, you can view and change the name and settings of the peripherals (readers and I/O devices) controlled by the unit.

The informations displayed on this page are:
Name
Name of the interface module or peripheral. The peripherals are displayed in a hierarchical view by default.

Click Viewing mode () to select the Flat view if it is your preference.

Type
Peripheral type: In (Input), Out (Output), Reader. Blank if it is not a peripheral.

(Output relays only) Click Trigger output () at the bottom of the list to send an output behavior (Active, Normal, or Pulse) to the selected device.

State
Live peripheral state: Active, Normal, Shunted (inputs only), Trouble (inputs only), or Unknown.

Use this column to test the connected interface modules and validate the wiring configuration of the I/O devices.

Additional info
Settings specific to the type of peripheral.

Double-click a peripheral, or click Edit () at the bottom of the list to edit the settings of the selected peripheral.

Controlling
Entity (door, elevator, zone) controlled by this peripheral.

Click Jump to () at the bottom of the list to view the configuration tabs of the entity controlled by the selected peripheral.

Logical ID
(Hidden by default) Logical ID assigned to this peripheral for ease of reference in macros and SDK programs.
Physical name
(Hidden by default) Static name assigned to this peripheral by the system.
Tip: Information on this page is also available to Security Desk users through the System status task, when monitoring peripherals.

Editable reader settings

The editable reader settings are:
Name
Reader name.
Logical ID
Must be unique among all peripherals attached to the same unit.
Shunted
This feature is not supported by HID units.
Type of reader
Select one of the following.
  • Wiegand
  • Clock & Data
  • Wiegand (Dorado)
  • Clock & Data (Dorado)

Discover interfaces

If the HID unit is operating with Secure mode enabled, the new interfaces you attach to the unit will not appear automatically in the Peripherals tab after rebooting the unit. To show them, click the Discover interfaces () button at the bottom of the page. Note that clicking this button causes the unit to go offline briefly.

Editable input settings

The editable input settings are:
Name
Input device name.
Logical ID
Must be unique among all peripherals attached to the same unit.
Shunted
Select this option to ignore the inputs. Once shunted, the state of the input remains at Normal, regardless how you trigger it.
Debounce
The amount of time an input can be in a changed state (for example, changed from Active to Normal) before the state change is reported. This option filters out signals that are unstable.
Contact type/ Presets
Set the normal state of the input contact and its supervision mode.
Not supervised / Normally closed
The normal state of the input contact is closed, and the access control unit does not report if the input is in the trouble state.
Not supervised / Normally open
The normal state of the input contact is open, and the access control unit does not report if the input is in the trouble state.
4-state supervised / Normally closed
The normal state of the input contact is closed, and the access control unit reports when the input is in the trouble state.
4-state supervised / Normally open
The normal state of the input contact is open, and the access control unit reports when the input is in the trouble state.
Contact type/ Manual
Manual settings.
Allows you to set your custom range of values for Active and Normal input states.

Editable output settings

The editable reader settings are:
Name
Output device name.
Logical ID
Must be unique among all peripherals attached to the same unit.
Minimum time (Action)
If a relay is being used as part of a zone (either hardware or virtual), set a minimum number of seconds the relay stays closed when triggered by an event (for example, Request to exit).