Doors

From Telcred documentation
Jump to navigation Jump to search

Settings

Door detail page


On the door detail page, the administrator can see and change settings relevant to the individual door. The door name cannot be changed from here as it is defined in the door config. The settings which are possible to change are:

  • Description. Optional
  • Door groups. Optional. For more information on door groups, see this page.
  • Unlocked during. The door will be unlocked according to a schedule (e.g. weekdays between 09.00 and 17.00). If the door has two locks, both will be unlocked.
  • Lock 2 unlocked during. Allows to unlock only the second lock according to a schedule (typically a night lock / motor lock).

Status

Four statuses are displayed in the right-hand column for a door:

  • Connection
  • Lock mode
  • Lock state
  • Door state

Possible values for Connection are:

  • Online
  • Offline
  • Incomplete configuration. This means that the controller is not fully configured yet and has never been online.
  • Ready to connect. This means that the controller is fully configured and ready to be connected to the Telcred service.
  • Failing. This means that the controller is online, but is having problems to sync with the Telcred service. If this happens it is necessary to reset the controller.

Lock mode is what the lock is expected to be when the door is at rest. It is the result of combining (1) schedule override if any, (2) unlock schedules if any, and (3) the number of locks that the door is configured with. An example of when the door is not at rest is when access has been granted. If the door is locked and access is granted, then the lock will become unlocked during the time of the access but the lock mode will remain “Locked”. Possible values for Lock mode are:

  • Unlocked
  • Locked. The door is locked with one lock. If the door has two locks, lock 2 is unlocked.
  • Double locked. The door has two locks and both are locked.
  • Blocked. The door is locked and grant access is prevented, even with a valid credential.

Lock state is the state indicated by the latest related event received from the controller. If the door is locked, but access is granted, lock state will change during the time of the access. Possible values for Lock state are:

  • Unlocked
  • Locked. The door is locked with one lock. If the door has two locks, lock 2 is unlocked.
  • Double locked. The door has two locks and both are locked.
  • Unknown. It is not possible to determine the lock state, e.g. because the controller has not been configured yet.

Possible values for Door state are:

  • Open
  • Closed
  • Unknown

If the door has no door monitor, the door state will always be unknown. It could also be unknown due to the fact that the controller is currently offline.

Actions

It is possible for an administrator, or officer, to Grant access on a door. This is equivalent to presenting a valid credential to the reader (or using one of the mobile access methods). The door will unlock for the time determined by the Access time setting, an alert will be triggered if the door is open longer than the time defined by the Open too long alarm setting, etc. In the Events log, the Method will be recorded as Officer and the officer username will be displayed.

A second group of actions have to do with overriding the schedule(s) that determine when the door's lock(s) should unlock. It is possible to override whatever lock state the door is in to one of:

  • Unlocked
  • Locked
  • Double locked
  • Blocked

A door where Override schedule has been set will stay in this state until the administrator presses Return to schedule. When this happens the door will switch back to whatever lock state it should have been in at that time according to the schedule(s) defined for Unlock and Unlock lock 2 only.

Note: If the door has a wireless lock from SimonsVoss SmartIntego and it happens to be offline while the Axis controller it is connected to is online, an action may be reported as successful even if did not have the desired effect on the physical lock. More information about this scenario can be found here.

Commands

In the lower part of the right-hand column it is possible to perform user defined origin dependent Commands.

Validating access

At the bottom of the page, there is a link that lets you check who has access to the door.