No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

eSight V300R009C00 Operation Guide 09

Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Access Control Management

Access Control Management

The access control system provides access control management, event record management, timezone management, and card holder management.

Access Management Overview

This section describes the basic functions provided by door access controllers and the procedure for access management.

Context

The Camera Management function option is not displayed in the main menu by default. To display it in the main menu, you need to enable the function in the eSight Infrastructure Management Maintenance Tool. For details, see Configuring eSight Infrastructure Manager Menu Options in the eSight Product Documentation.

Functions
Table 21-56 describes the access control functions provided by door access controllers.
Table 21-56 Access management functions

Access Controller

Access Controller_TycoSun_A8802_ACESCTRL/Access Controller_TycoSun_A8802RS_ACESCTRL

Access Controller_TycoSun_A8804_ACERCTRL/Access Controller_TycoSun_A8804RS_ACESCTRL

AccessController_ShengJiu_MS899_ACESCTRL

Acesctrl_AccessActuator_01001_BIN4

ELOCK_ELOCK_01001_BIN4

Formatting

Supported Supported Supported Unsupported Unsupported

Enabling a time group

Supported Supported Unsupported Unsupported Unsupported

Sending controller rights

Supported Supported Supported Supported Supported

Synchronizing log information

Unsupported Unsupported Unsupported Supported Supported

Synchronizing user information

Unsupported Unsupported Unsupported Supported Supported

Remote door opening

Supported Supported Supported Supported Supported

Remote door closing

Supported Supported Unsupported Unsupported Unsupported

Setting door parameters

Supported Supported Unsupported Unsupported Unsupported

Two door interlock

Unsupported Supported Unsupported Unsupported Unsupported

Time group

Supported Supported Unsupported Unsupported Unsupported

Holiday

Supported Supported Unsupported Unsupported Unsupported
Procedure
Figure 21-92 shows the basic operation procedure for access management.
Figure 21-92 Access management procedure

Access Controller Management

This section describes how to use the access control management function to view, modify, add, and delete access control items and display switch status for an access control item in real time.

Creating an Access Controller on the eSight Infrastructure Manager

You can add a door access controller in the park, building, floor, equipment room, container, rack, DDF or part of the PDU for security management.

Prerequisites

  • You have logged in to the eSight Infrastructure Manager client by web browser.
  • You are authorized to use View Infrastructure Right.
    The operation right consist of all operation rights for the following function menus:
    • Resource > Infrastructure > Monitor
    • Resource > Infrastructure > Alarm
    • Resource > Infrastructure > Business
    • Resource > Infrastructure > Analysis
    • Resource > Infrastructure > Configuration > Configuration Management > Access Control Management
    • Resource > Infrastructure > Configuration > Configuration Management > Device Software Management
    • Resource > Infrastructure > Configuration > Autocontrol > Autocontrol Strategy
    • Resource > Infrastructure > System

Procedure

  1. Choose Resource > Infrastructure > Configuration > Configuration Management > Access Control Management from the main menu. The Access Control Management window is displayed.
  2. Click Create on the Controllers tab page.

    The Data Center Planning page is displayed.

  3. Add an access controller to the Data Center Planning page. For details about how to add an access controller, see Adding Devices.

    After an access controller is created successfully, you can view information about the access controller in the access controller list, as show in Figure 21-93.
    Figure 21-93 Checking the access controller information

    After the access controller is added. To avoid the access controller initialization failure, format the added access controller manually in the access controller list. For details, see Formatting an Access Controller.

Formatting an Access Controller

This topic describes how to format access control cards, historical records, timezones, and holidays and restore door parameters and the authentication mode to the default values.

Prerequisites

  • You have logged in to the eSight Infrastructure Manager client by web browser.
  • You are authorized to use View Infrastructure Right.
    The operation right consist of all operation rights for the following function menus:
    • Resource > Infrastructure > Monitor
    • Resource > Infrastructure > Alarm
    • Resource > Infrastructure > Business
    • Resource > Infrastructure > Analysis
    • Resource > Infrastructure > Configuration > Configuration Management > Access Control Management
    • Resource > Infrastructure > Configuration > Configuration Management > Device Software Management
    • Resource > Infrastructure > Configuration > Autocontrol > Autocontrol Strategy
    • Resource > Infrastructure > System

Context

The door access controller synchronized by the ECC800 to the eSight Infrastructure Manager does not support formatting.

Procedure

  1. Choose Resource > Infrastructure > Configuration > Configuration Management > Access Control Management from the main menu. The Access Control Management window is displayed.
  2. In the Controllers tab page, click in the Operation list. The confirm dialog box is displayed.
  3. Click Yes. The access controller is successfully formatted.

    NOTE:
    • After formatting the access controller, click to initialize parameters. In this manner, the timezones are enabled. The access controller is not disabled even if the parameters are not initialized or the timezones are not enabled.
    • Synchronize the timezones and then the access groups or holidays after an access controller is formatted and parameters are initialized.

Enabling a Timezone

This section describes how to enable a timezone after formatting an access controller to enable both the timezone and holiday configuration.

Prerequisites

  • You have logged in to the eSight Infrastructure Manager client by web browser.
  • You are authorized to use View Infrastructure Right.
    The operation right consist of all operation rights for the following function menus:
    • Resource > Infrastructure > Monitor
    • Resource > Infrastructure > Alarm
    • Resource > Infrastructure > Business
    • Resource > Infrastructure > Analysis
    • Resource > Infrastructure > Configuration > Configuration Management > Access Control Management
    • Resource > Infrastructure > Configuration > Configuration Management > Device Software Management
    • Resource > Infrastructure > Configuration > Autocontrol > Autocontrol Strategy
    • Resource > Infrastructure > System

Context

The SJ cabinet lock, the electric cabinet lock and the door access controller synchronized by the ECC800 to the eSight Infrastructure Manager does not support the timezone.

Procedure

  1. Choose Resource > Infrastructure > Configuration > Configuration Management > Access Control Management from the main menu. The Access Control Management window is displayed.
  2. In the Controllers tab page, click . The confirm dialog box is displayed.
  3. Click Yes. The parameters are successfully initialized.
Delivering User Rights Data on an Access Controller

This section describes how to deliver user rights data related to an access controller from the database to the controller.

Prerequisites

  • You have logged in to the eSight Infrastructure Manager client by web browser.
  • You are authorized to use View Infrastructure Right.
    The operation right consist of all operation rights for the following function menus:
    • Resource > Infrastructure > Monitor
    • Resource > Infrastructure > Alarm
    • Resource > Infrastructure > Business
    • Resource > Infrastructure > Analysis
    • Resource > Infrastructure > Configuration > Configuration Management > Access Control Management
    • Resource > Infrastructure > Configuration > Configuration Management > Device Software Management
    • Resource > Infrastructure > Configuration > Autocontrol > Autocontrol Strategy
    • Resource > Infrastructure > System

Context

  • If the door access controller accessed using BIN4.0 is used, the eSight Infrastructure Manager door control user information is delivered to the ECC800.
  • If the door access controller accessed using a protocol other than BIN4.0 is used, the eSight Infrastructure Manager door control user information is delivered as follows:

    • If the fingerprint controller is bound, the information is delivered to the fingerprint controller and door access controller.
    • If no fingerprint controller is bound, the information is delivered to the door access controller.

Procedure

  1. Choose Resource > Infrastructure > Configuration > Configuration Management > Access Control Management from the main menu. The Access Control Management window is displayed.
  2. In the Controllers tab page, click . The confirm dialog box is displayed.
  3. Click Yes. The user rights data of the access controller is delivered.

    NOTE:

    User rights data for the access controller is delivered to the controller during the delivering process.

Follow-up Procedure

You can perform the following operations in the Controllers window for the door access controller delivered from the ECC800 to the eSight Infrastructure Manager.
If You Need To... Then...
Synchronize log information
  1. In the Controllers tab page, click.
  2. In the displayed confirmation dialog box, click OK to synchronize log information.
NOTE:

This operation is used to synchronize log information of the door access controller in the ECC800 to the eSight Infrastructure Manager.

Synchronize user information
  1. In the Controllers tab page, click.
  2. In the displayed confirmation dialog box, click OK to synchronize user information.
NOTE:

This operation is used to synchronize user information of the door access controller in the ECC800 to the eSight Infrastructure Manager.

Modifying Door Information

This section describes how to modify door name and group information of an access controller.

Prerequisites

  • You have logged in to the eSight Infrastructure Manager client by web browser.
  • You are authorized to use View Infrastructure Right.
    The operation right consist of all operation rights for the following function menus:
    • Resource > Infrastructure > Monitor
    • Resource > Infrastructure > Alarm
    • Resource > Infrastructure > Business
    • Resource > Infrastructure > Analysis
    • Resource > Infrastructure > Configuration > Configuration Management > Access Control Management
    • Resource > Infrastructure > Configuration > Configuration Management > Device Software Management
    • Resource > Infrastructure > Configuration > Autocontrol > Autocontrol Strategy
    • Resource > Infrastructure > System

Procedure

  1. Choose Resource > Infrastructure > Configuration > Configuration Management > Access Control Management from the main menu. The Access Control Management window is displayed.
  2. Perform operations according to the scenario.

    Application Scenario

    Operation

    Modifying door information in the access controller list

    For detailed operations, see 3.

    Modifying door information in the door list

    For detailed operations, see 4.

  3. Modify the door information on the Access Controllers List page.

    1. Choose Access Controller > Access Controllers List.
    2. Select an access controller in the list, click in the Operation column, and modify the door information on the displayed page.
    3. Click OK after the modification.

  4. Modify the door information on the Doors List page.

    1. Choose Access Controller > Doors List.
    2. Click in the Operation column for the door whose information needs to be modified, and modify the door information on the displayed page.
    3. Click OK after the modification.

Remotely Opening or Closing a Door

This topic describes how to remotely open or close a door for an access controller.

Prerequisites

  • You have logged in to the eSight Infrastructure Manager client by web browser.
  • You are authorized to use View Infrastructure Right.
    The operation right consist of all operation rights for the following function menus:
    • Resource > Infrastructure > Monitor
    • Resource > Infrastructure > Alarm
    • Resource > Infrastructure > Business
    • Resource > Infrastructure > Analysis
    • Resource > Infrastructure > Configuration > Configuration Management > Access Control Management
    • Resource > Infrastructure > Configuration > Configuration Management > Device Software Management
    • Resource > Infrastructure > Configuration > Autocontrol > Autocontrol Strategy
    • Resource > Infrastructure > System
  • You have created a door access controller in the Data Center Planning window.
  • The communication between the door access controller and door is normal, and the door access controller is online.

Context

  • The Tycosun door access controller automatically locks a door 6 seconds after the door is remotely opened. To prolong the automatic locking time, see Setting Door Parameters. Close the door remotely if you need to close them in advanced.
  • Doors in the door access controller synchronized by the ECC800 to the eSight Infrastructure Manager cannot be remotely closed. The doors are automatically closed within 6 seconds after they are opened. However, doors managed by the electric cabinet lock needs to be manually closed after they are remotely opened.
  • Shengjiu door access controllers do not support remote door opening or closing.

Procedure

  1. Choose Resource > Infrastructure > Configuration > Configuration Management > Access Control Management from the main menu. The Access Control Management window is displayed.
  2. Perform operations according to the scenario.

    NOTE:
    • Remotely open doors in batches: Select multiple doors and click Open.
    • Remotely close doors in batches: Select multiple doors and click Close.

    Application Scenario

    Operation

    Remotely opening or closing a door in the access controller list

    For detailed operations, see 3.

    Remotely opening or closing a door in the door list

    For detailed operations, see 4.

  3. Remotely open or close a door on the Access Controllers List tab page.

    1. Perform the following operations in the Operation column of the corresponding access controller:
      • Click to remotely open a door.

      • Click to remotely close a door.

    2. In the displayed dialog box, click OK.

  4. Remotely open or close a door on the Doors List tab page.

    1. Perform the following operations in the Operation column of the corresponding door:
      • Click to remotely open a door.

      • Click to remotely close a door.

    2. In the displayed dialog box, click OK.
    NOTE:
    You can remotely open or close a door using the following methods:
    • In the tool box of the Data Center View window, create a door status switch (DSS) control to remotely open or close a door. For detailed operations, see Creating an Icon for a Door Status Sensor.
    • In the Data Center Planning window, create an equipment room door component to remotely open or close a door in the Data Center View window. For detailed operations, see Adding Devices to a Room.

Setting Door Parameters

This section describes how to set the open delay, lock statues, bidirectional door, and output linkage.

Prerequisites

  • You have logged in to the eSight Infrastructure Manager client by web browser.
  • You are authorized to use View Infrastructure Right.
    The operation right consist of all operation rights for the following function menus:
    • Resource > Infrastructure > Monitor
    • Resource > Infrastructure > Alarm
    • Resource > Infrastructure > Business
    • Resource > Infrastructure > Analysis
    • Resource > Infrastructure > Configuration > Configuration Management > Access Control Management
    • Resource > Infrastructure > Configuration > Configuration Management > Device Software Management
    • Resource > Infrastructure > Configuration > Autocontrol > Autocontrol Strategy
    • Resource > Infrastructure > System

Context

The cabinet-level door access controller SJ and the electric cabinet lock synchronized by the ECC800 to the eSight Infrastructure Manager do not support parameter setting.

Procedure

  1. Choose Resource > Infrastructure > Configuration > Configuration Management > Access Control Management from the main menu. The Access Control Management window is displayed.
  2. Click the Door setting tab.

    NOTE:

    On the Controllers tab page, click in the operation column of the corresponding door access controller. In the displayed Parameter Setting dialog box, set parameters.

  3. On the Door setting tab page, click in the Operation column of the corresponding door. The Parameter Setting page is displayed, as shown in Figure 21-94.

    Figure 21-94 Setting parameters for a door access controller

  4. Set parameters according to Table 21-57, and select the door control of the parameters to be set.

    Table 21-57 Parameter description
    Parameter Description
    Open delay The Tycosun access controller allows you to set a time for the delayed door lock. The default value is 6 seconds. It can be changed.

    The value is an integer ranging from 1 to 255.

    Door open alarm duration This parameter specifies the period after which an event log is reported and an alarm is generated because the door stays open for this period. This parameter can be set for the Tycosun controller. The period is 60 seconds by default and can be changed.

    The value is an integer ranging from 1 to 255.

    NOTE:
    • Door Not Closed Alarm is not reported to the eSight Infrastructure Manager by default. If you want to report Door Not Closed Alarm to the eSight Infrastructure Manager, select this parameter.

    • After setting Door open alarm duration, if a door is opened for longer than the sum of Open delay and Door open alarm duration, a door open event log and an alarm will be reported. The door open duration starts after the open delay elapses. After the door is closed, a door close event will be reported and the alarm indicating that the door is open will be automatically cleared.

    Lock status The power state while doors are locked.
    • Locked in power-on state: Means that the power is on while the door is locked. While the authentication is successful, the power is off and doors open.
    • Locked in power-off state: Means that the power is off while the door is locked. While the authentication is successful, the power is on and doors open.
    Bidirectional door You can enable or disable the bidirectional door to determine whether two doors share the same lock.

    You can enable the bidirectional door using either of the following two methods:

    • Use the line to connect two doors to the same lock. In this situation, you do not need to set Enabling bidirectional door.
    • Set Enabling bidirectional door.

    The binding relationship of the bidirectional door is fixed. For example, for a four-door controller, door 1 and door 2 are a bidirectional door, and door 3 and door 4 are a bidirectional door.

    NOTE:

    The following lists the effect of setting Enabling bidirectional door:

    The access card must have the permission to door 1 and door 2. Otherwise, you cannot open the doors.

    • If the bidirectional door is enabled only for door 1, door 1 and door 2 are opened at the same time when you swipe the access card at door 1. However, only door 2 is opened when you swipe the access card at door 2.
    • If the bidirectional door is enabled only for door 2, door 1 and door 2 are opened at the same time when you swipe the access card at door 2. However, only door 1 is opened when you swipe the access card at door 1.
    • If the bidirectional door is enabled for both door 1 and door 2, door 1 and door 2 are opened at the same time when you swipe the access card at door 1 or 2.
    Output linkage You can set this parameter to enable the alarm input/output linkage.
    Two door interlock
    The following door access controllers support the two door interlock function:
    • Access Controller_TycoSun_A8804_ACERCTRL
    • Access Controller_TycoSun_A8804RS_ACESCTRL
    NOTE:
    • If four door aisles are bound to the door status sensor or fingerprint controller, ST and GND do not need to be short-circuited. If a door aisle is not bound to the door status sensor or fingerprint controller, short-circuit ST and GND for the aisle.

    • Service impact of the two door interlock function: Assume that the two door interlock function is enabled for doors 1, 2, 3, and 4. After door 1 is opened, door 2, 3, or 4 cannot be opened. Other doors for which the two door interlock function is enabled can be opened only after door 1 is closed.

    • Effect of enabling both the two door interlock and bidirectional door functions: If you swipe the card at door 1, doors 1 and 2 are opened at the same time, but door 3 or 4 is not opened.

  5. Click Finish.
  6. In the displayed confirm dialog box, click Yes.
Setting the Authentication Mode

This section describes how to set the authentication mode of the door access controller.

Prerequisites

  • You have logged in to the eSight Infrastructure Manager client by web browser.
  • You are authorized to use View Infrastructure Right.
    The operation right consist of all operation rights for the following function menus:
    • Resource > Infrastructure > Monitor
    • Resource > Infrastructure > Alarm
    • Resource > Infrastructure > Business
    • Resource > Infrastructure > Analysis
    • Resource > Infrastructure > Configuration > Configuration Management > Access Control Management
    • Resource > Infrastructure > Configuration > Configuration Management > Device Software Management
    • Resource > Infrastructure > Configuration > Autocontrol > Autocontrol Strategy
    • Resource > Infrastructure > System

Procedure

  1. Choose Resource > Infrastructure > Configuration > Configuration Management > Access Control Management from the main menu. The Access Control Management window is displayed.
  2. Choose Access Controller in the navigation tree on the left.
  3. Click the Doors List tab.
  4. On the Doors List tab page, click Authentication Mode Settings. The Authentication Mode Settings page is displayed, as shown in Figure 21-95.

    Figure 21-95 Setting the authentication mode of the door access controller

  5. Set parameters according to Table 21-58, and select the door control of the parameters to be set.

    NOTE:
    • The supported authentication mode varies depending on the type of the door access controller. Therefore, when a different authentication mode is selected, the door list information displayed in the left navigation tree will be different.
    • For authentication modes related to the fingerprint, choose Configuration > Configuration Management > Data Center Planning . Bind the access controller and the door passage that are to be set in Bind AccessController on the right of the created fingerprint controller.
    Table 21-58 Parameter description
    Parameter Description
    Authentication mode
    • Card: indicates that you need to swipe one card to open the door.
    • Fingerprint: indicates that you need to enter the fingerprint to open the door.
    • Card + password: indicates that you need to swipe one card and then type the four digits password in 6 seconds.
      NOTE:

      If the door access controller is bound to a fingerprint controller, press # to confirm the entering after you enter the password. If the door access controller is bound to a card reader, you do not need to press # after entering the password.

    • Dual cards: indicates that you need to swipe one card and then swipe another card in 6 seconds.
    • Card or Password or Fingerprint: indicates that you need to swipe one card, enter the password, or use your fingerprint to open the door.

      If you select the password authentication mode, you need to enter the finger user ID, press *, enter the password, and press # to confirm the password.

      NOTE:
      This authentication mode is applicable only to the Tycosun access controller that is bound to a fingerprint controller.
    • Fingerprint + password: indicates that you need to enter the fingerprint and then type the 4-digit password in 6 seconds.
      NOTE:

      If you enter the password in the fingerprint reader, you must press # to confirm the entering after you enter the password.

    • Card + fingerprint: indicates that you need to swipe one card and then enter the fingerprint in 6 seconds.
    • Card + password + fingerprint: If you select this authentication mode, you need to swipe your card and then enter the password in 6 seconds. After entering the password, you need to press # and then enter the fingerprint in 6 seconds.

  6. Click Finish.
  7. In the displayed confirm dialog box, click Yes.

Event List Management

This section describes events recorded on an access controller, such as opening doors using swipe cards.

Querying Event Records

This section describes how to query event records on an access controller.

Prerequisites

  • You have logged in to the eSight Infrastructure Manager client by web browser.
  • You are authorized to use View Infrastructure Right.
    The operation right consist of all operation rights for the following function menus:
    • Resource > Infrastructure > Monitor
    • Resource > Infrastructure > Alarm
    • Resource > Infrastructure > Business
    • Resource > Infrastructure > Analysis
    • Resource > Infrastructure > Configuration > Configuration Management > Access Control Management
    • Resource > Infrastructure > Configuration > Configuration Management > Device Software Management
    • Resource > Infrastructure > Configuration > Autocontrol > Autocontrol Strategy
    • Resource > Infrastructure > System

Procedure

  1. Choose Resource > Infrastructure > Configuration > Configuration Management > Access Control Management from the main menu. The Access Control Management window is displayed.
  2. Choose Event List > Event Records.
  3. In the navigation tree, select an access controller whose event records are to be queried, and specify Time period to set the time range for querying event records.

    NOTE:

    You can set the time range only after selecting an access controller.

    You can also enter a door name in the Search by door name text box to query the corresponding event records.

  4. Click Search.
  5. On the Event Records tab page, click in the upper left corner and select Selected Records or All to export selected or all event records.

Timezone Management

This section describes how to configure access permission by timezones or holidays.

Creating a Timezone

This topic describes how to create a time segment in which users can use access control. Shengjiu door access controllers and the door access controllers synchronized by the ECC800 to eSight Infrastructure Manager do not support timezone setting.

Prerequisites

  • You have logged in to the eSight Infrastructure Manager client by web browser.
  • You are authorized to use View Infrastructure Right.
    The operation right consist of all operation rights for the following function menus:
    • Resource > Infrastructure > Monitor
    • Resource > Infrastructure > Alarm
    • Resource > Infrastructure > Business
    • Resource > Infrastructure > Analysis
    • Resource > Infrastructure > Configuration > Configuration Management > Access Control Management
    • Resource > Infrastructure > Configuration > Configuration Management > Device Software Management
    • Resource > Infrastructure > Configuration > Autocontrol > Autocontrol Strategy
    • Resource > Infrastructure > System

Procedure

  1. Choose Resource > Infrastructure > Configuration > Configuration Management > Access Control Management from the main menu. The Access Control Management window is displayed.
  2. Choose Timezone Management > Timezone. The Timezone page is displayed.
  3. Click Create. The Create Timezone page is displayed, as shown in the following figure.
  4. Configure the timezone name and select the duration as required.
  5. Click OK. The timezone is successfully created.

    NOTE:

    At most 15 timezones are permitted to create, currently 1 timezone have been created.

    The start time and end time of a time period must be on the same day.

    If an access controller is offline, a message will be displayed, indicating that the timezone of the access controller failed to be created. In this case, synchronize the timezone to the access controller.

Follow-up Procedure

You can perform the operations described in Table 21-59 on the Timezone tab page.
Table 21-59 Setting a timezone

Operation Name

Operation Description

Operation Method

Querying timezone information

You can query access groups based on a timezone.

Click a name in the timezone list. The page containing detailed timezone information is displayed.

On the displayed page, query the access groups of the timezone.

Modifying a timezone

You can modify a timezone if required.

NOTE:

If an access controller is offline, a message will be displayed, indicating that the timezone of the access controller failed to be modified. In this case, synchronize the timezone to the access controller.

  1. Click in the Operation column of a timezone. The page for modifying the timezone is displayed.
  2. After modifying the timezone, click OK.

Deleting a timezone

You can delete a timezone that is not needed.

NOTE:

Before deleting a timezone, ensure that its associated access groups and holidays have been deleted.

  1. Click in the Operation column of a timezone. The confirm dialog box is displayed.
  2. Click Yes to delete the timezone.

Synchronizing timezone data on access controllers

The timezone is synchronized on all the Tycosun door access controllers in system.

  1. Click , the confirm dialog box is displayed.
  2. Click Yes. The timezone is synchronized.
Creating a Holiday

This section describes how to create a holiday and periods for the holiday. Shengjiu door access controllers and the door access controller synchronized by the ECC800 to the eSight Infrastructure Manager does not support the holiday setting.

Prerequisites

  • You have logged in to the eSight Infrastructure Manager client by web browser.
  • You are authorized to use View Infrastructure Right.
    The operation right consist of all operation rights for the following function menus:
    • Resource > Infrastructure > Monitor
    • Resource > Infrastructure > Alarm
    • Resource > Infrastructure > Business
    • Resource > Infrastructure > Analysis
    • Resource > Infrastructure > Configuration > Configuration Management > Access Control Management
    • Resource > Infrastructure > Configuration > Configuration Management > Device Software Management
    • Resource > Infrastructure > Configuration > Autocontrol > Autocontrol Strategy
    • Resource > Infrastructure > System

Procedure

  1. Choose Resource > Infrastructure > Configuration > Configuration Management > Access Control Management from the main menu. The Access Control Management window is displayed.
  2. Choose Timezone Management > Holiday. The Holiday page is displayed.
  3. Click Create. The Create Holiday page is displayed, as shown in the following figure.
  4. Enter the holiday name and select the timezone, periods, and holiday dates as required.
  5. Click OK. The holiday is successfully created.

    NOTE:

    The number of holiday days is 33 at most, and the start time and end time of a time period must be on the same day.

    If an access controller is offline, a message will be displayed, indicating that the holiday of the access controller failed to be created. In this case, synchronize the timezone to the access controller.

Follow-up Procedure

You can perform the operations described in Table 21-60 on the Holiday tab page.
Table 21-60 Setting a holiday

Operation Name

Operation Description

Operation Method

Modifying a holiday

You can modify a holiday when the timezone needs to be changed.

NOTE:

If an access controller is offline, a message will be displayed, indicating that the holiday of the access controller failed to be modified. In this case, synchronize the timezone to the access controller.

  1. Click . The Create Holiday page is displayed.
  2. After modifying the holiday, click OK.

Deleting a holiday

You can delete a holiday that is not needed.

NOTE:

To delete a holiday, ensure that all access controllers that support timezone management are online.

  1. Click in the Operation column of a holiday. The confirm dialog box is displayed.
  2. Click Yes to delete the holiday.

Synchronizing holidays data on access controllers

You can synchronize a holiday to all access controllers connected to the system.

NOTE:

The holiday data is synchronized on all the access controllers in the system. The holiday data has higher priority to synchronize over timezone data.

  1. Click , the confirm dialog box is displayed.
  2. Click Yes. The holidays data is synchronized.

Access User Management

This section describes how to use the access user management function to view, modify, add, and delete information about access user. You can import access user information in batches, and view information about the user group to which the access user belongs and other members in the access group.

Creating a Access Group

This section describes how to create a access group. You need to configure basic access group information and door information to create a access group.

Prerequisites

  • You have logged in to the eSight Infrastructure Manager client by web browser.
  • You are authorized to use View Infrastructure Right.
    The operation right consist of all operation rights for the following function menus:
    • Resource > Infrastructure > Monitor
    • Resource > Infrastructure > Alarm
    • Resource > Infrastructure > Business
    • Resource > Infrastructure > Analysis
    • Resource > Infrastructure > Configuration > Configuration Management > Access Control Management
    • Resource > Infrastructure > Configuration > Configuration Management > Device Software Management
    • Resource > Infrastructure > Configuration > Autocontrol > Autocontrol Strategy
    • Resource > Infrastructure > System

Procedure

  1. Choose Resource > Infrastructure > Configuration > Configuration Management > Access Control Management from the main menu. The Access Control Management window is displayed.
  2. Choose Access User Management > Access Groups. The Access Groups window is displayed.
  3. Click Create. In the displayed Create Group page, configure access group information.
  4. In the Create Group page, click Create. In the displayed Select Permission dialog box, Select the doors to be added, as shown in Figure 21-96.

    Figure 21-96 Configuring door information

  5. Click Finish, back to the Create Group page.
  6. In the Create Group page, click OK.

Follow-up Procedure

You can perform the operations described in Table 21-61 on the Access Groups tab page.
Table 21-61 Setting access groups

Operation Name

Operation Description

Operation Method

Modifying access group information

You can modify the information about an access group after the access group information is changed.

  1. In the displayed Group area, select a access group in the access group list and click in the operation column. In the displayed Modify Group area, modify access group information.
    NOTE:
    When modifying door information for the access group, you can add and delete doors.
  2. Click OK.
NOTE:

If involves the jurisdiction, must guarantee its connection the controller online, will otherwise not modify successfully.

Deleting an access group

You can delete unnecessary access groups if some users or access groups are no longer needed after the workforce structure is modified.
NOTE:

Before deleting an access group, ensure that all users in the access group have been deleted.

  1. In the Group area, click of a access group. The confirm dialog box is displayed.
  2. Click Yes.
NOTE:
Default access group cannot be deleted.

Searching access group information

If there are multiple access groups, you can search for the information about an access group.

  1. Select a search criterion from the Search by drop-down list.
  2. Type a keyword in the Search criteria text box.
  3. Click Search.

Delivering user rights data on access controllers

You can deliver user information to all access controllers in the corresponding access group.

  1. Click . The confirm dialog box is displayed.
  2. Click Yes. The user group is delivered.
Managing the Dual Card Authentication Group

This section describes how to check information about the dual card authentication group and change the name of the dual card authentication group as required.

Prerequisites

  • You have logged in to the eSight Infrastructure Manager client by web browser.
  • You are authorized to use View Infrastructure Right.
    The operation right consist of all operation rights for the following function menus:
    • Resource > Infrastructure > Monitor
    • Resource > Infrastructure > Alarm
    • Resource > Infrastructure > Business
    • Resource > Infrastructure > Analysis
    • Resource > Infrastructure > Configuration > Configuration Management > Access Control Management
    • Resource > Infrastructure > Configuration > Configuration Management > Device Software Management
    • Resource > Infrastructure > Configuration > Autocontrol > Autocontrol Strategy
    • Resource > Infrastructure > System

Procedure

  1. Choose Resource > Infrastructure > Configuration > Configuration Management > Access Control Management from the main menu. The Access Control Management window is displayed.
  2. Choose Access User Management > Dual Cards Authentication Group. The Dual Cards Authentication Group window is displayed.

    In the Dual Cards Authentication Group window, you can check Authentication Group Name, Description, and Modification Time.

    NOTE:

    The name of the dual card authentication group is G1-G16 by default and it can be changed.

Follow-up Procedure

Perform the following operations in the Dual Cards Authentication Group window:

If You Need To... Then...
Modify the dual card authentication group
  1. Click in the operation column.
  2. In the displayed Modify Authentication Group window, modify Authentication Group Name and Description.
  3. Click OK.
Search for the dual card authentication group Type the name of the dual card authentication group on the toolbar and click Search.
Download
Updated: 2019-05-17

Document ID: EDOC1100011877

Views: 283371

Downloads: 542

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next