To make sure that your access control deployment goes smoothly, you need to perform a series of pre-configuration steps.
Have a network diagram showing all public and private networks used within your
organization, and their IP address ranges.
For public networks, you also need the name and public IP address of their proxy servers. Ask your IT department for this information.
Install the following Security Center software
Security Center Server software on your
The main server is the computer hosting the Directory role.
(Optional) Security Center Server software
on expansion servers.
An expansion server is any other server on the system that does not host the Directory role. You can add expansion servers at any time.
- Security Center Client software on at least one workstation.
- Security Center Server software on your main server.
Have a list of partitions (if any).
Partitions are used to organize your system into manageable subsystems. This is especially important in a multi-tenant environment. If, for example, you are installing one large system in a shopping center or, office tower, you might want to give local administration privileges to the tenants. By using partitions, you can group the tenants so that they can only see and manage the contents of their store or office, but not the others.
Have a list of all known users with their names and responsibilities.
To save time, identify users who have the same roles and responsibilities, and organize them into user groups.NOTE: For large installations, users and user groups can be imported from a Windows Active Directory.
Install all access control units (door
controllers and edge readers) on your company’s IP network, and wire them to your doors,
all the while collecting the following information:
Tip: A site map or floor plan showing door, elevator, controller and reader locations would be helpful.
- Manufacturer, model, and IP address of each unit.
- Manufacturer and model of the interface modules connected to each unit.
- Login credentials (username and password) for each unit.
- Which access points is each unit or interface module connected to.
- Are the doors Card-in/Card-out or Card-in/REX-out?
- Which inputs are connected to the door sensors, REX, and manual stations?
- Which outputs are connected to the door locks, buzzers, our push buttons?
- Have a list of secured areas with their perimeter doors where access is controlled.
Have a list of all known cardholders (and cardholder groups where applicable).
Cardholders are people who have physical access to the monitored site.NOTE: For large installations, cardholders can be imported from a CSV file or from a Windows Active Directory.
- Have a list of available credentials with their facility codes and card numbers.
- Have a list (and details) of all required schedules (office hours, holidays, and so on).
- Have a list (and details) of all required access rules (who is allowed where and when).
If you are integrating Omnicast™, have a list
indicating which cameras will be associated with which access points (door side and
NOTE: A camera can be associated with more than one door, and vice versa.