9.09.2013

The <><> Q and A <><> on ISONAS SECURITY SYSTEMS!!!!

Frequently Asked Questions About Isonas!!!!








Q: What is a TCP/IP enabled door reader-controller?

A: ISONAS door reader-controllers connect directly to the company’s data network. The reader-controllers support using either Ethernet wiring onto the customer's LAN or wireless connections onto the customer's WLAN. The ISONAS solution is the original panel-free door access control system.

Q: Do you need a unique IP address for each reader-controller?

A: Yes. If desired, port forwarding techniques can used to conserve your company's network-wide IP Addresses.

Q: Is anything required in addition to the Door Readers?

A: Yes, to complete an access system you will need locking devices, lock power and any door input device, which directly connects to our reader controllers

Q: What makes the Door Reader work?

A: Those with authorized access are given credit card — sized proximity cards utilizing Radio Frequency Identification (RFID) technology. When the card is waved in front of the door reader, access is authorized or denied based on your parameters.

Q: How are authorizations and permission parameters put on the cards or badges?

A: ISONAS Crystal Matrix EN Software™ allows authorized security personnel to input individual users permissions using a Windows® user friendly interface to make changes in real time.

Q: Can Door Readers be used with other access control devices?

A: Yes. ISONAS has made it possible for many other devices to integrate with its readers with a number of enabling tools: a TCP/IP interface; the Simple Network Management Protocol (SNMP) interface; and the ISONAS SDK are a few of the methods available.

Q: How many readers can be used and how many users can be on a system?

A: The ISONAS solution can support an unlimited number of reader-controllers and users on a system, limited only by the host PC's memory, CPU, and hard drive capabilities. A host that is properly sized for it's operating system can support an installation with hundreds of doors.

Q: How is access control protected if the network goes down?

A: In case of an emergency, the door readers automatically switch to the “stand-alone mode" and continues to function normally until network service is restored.

Q: Does the software have more than one method of identification for individual users?

A: Yes. Multiple identifiers can be used such as name, address, phone number, department identifiers and social security numbers the system can incorporate a personal photo to take validation to the next level.

Q: How does an ISONAS reader-controller control an electric locking device and monitor the REX and Door Position Switch?

A: The reader controller has a set of wires (called a pig-tail) that are connected directly to various switches and controls at the door. One of the wires is for a door sense switch. Another is for a REX signal coming from a switch, infrared sensor or other rex device. There is a third input signal which is called AUX (for auxiliary, that can be programmed to act in a variety of ways). The controllers also have an onboard relay, with a normally open, normally closed and common connection for the relay. This relay can be directly connected to an electronic or magnetic lock to unlock the door when a valid badge is presented. There are two additional output signals which we call TTL1 and TTL2 that can be programmed to behave in a variety of ways.

Q: Will the readers work with magstripe and HID Proximity Cards?

A: Our readers can be programmed to read HID prox cards. If you use magstripe HID prox cards, our readers will read the card ID as defined by the electronic prox card assignment. We do not read information from mag stripes

Q: How are the IP and wireless IP readers deployed; that is, connected to power supplies, and data networks?

A: The PowerNet IP reader-controller can be powered in two ways. Power-over-Ethernet (PoE) can supply the required power over the Ethernet cable. In addition, both the PowerNet and Wireless readers can be powered with standard low-voltage wiring. Data communications is facilitiated with either the Powernet's Ethernet connection or the wireless reader-controller's 802.11b/g connection.

Q: What models are offered?

A: Models offered include: PowerNet IP Reader (RC-001 series), ClearNet IP Reaeder (PRC-001B series), ClearNet Wireless IP Reader (PRC-001B-WP series). All models include the Cystal Matrix Software

Q: Will the readers work with magstripe and HID Prox? How is configuration done?

A: Our readers can be programmed to read HID prox cards. If you use magstripe HID prox cards, our readers will read the card ID as defined by the electronic prox card assignment. We do not read information from mag stripes.

Q: What encryption options are available with the new ISONAS Wireless IP Reader?

A: You can choose the older WEP (Wireless Encryption Protocol) or the more secure WPA (WiFi Protected Access.) The WEP and WPA is automatically there, you just enable and configure it on your Wireless access point and on the Lantronix WiPort inside.

Q: Are there additional steps I can take to encrypt data?

A: In addition to the protection of the Wireless signal, you can optionally provide end to end protection of the signals using 256 bit Rijndael encryption, which requires some additional programming. We support this for both our Wireless and Wired IP readers and strongly recommend that it be used for the Wireless.

Q: How is the antenna protected?

A: The antenna is mounted internally inside our reader controller housing. The housing was already designed to be transparent to radio frequency signals to allow the proximity cards to be read. In the unlikely event that the housing is broken to expose the antenna, a tamper alarm would be generated in your system.

Q: Are there circumstances where the wireless access control solution is not practical?

A: Interference and shielding are considerations in certain physical environments. For instance, if you have an industrial building with steel walls and you are trying to control access to an internal area where the wireless signals can’t reach, you have no choice but to run wire.

Q: Are there circumstances where the wireless solution is especially attractive?

A: Yes there are. Installation of wiring has always been a significant component an access control system's costs but there are some cases where costs become extreme and prohibitive. One example is where the wire would have to be run through several reinforced concrete walls or floors that don’t currently have any conduits. The cost to drill through the concrete can be very high. Another example is where a public thoroughfare may pass through an industrial complex or campus. If cableways are not existing under the road it may be both time consuming and expensive to work with the controlling entity to get permission for cabling. A wireless solution is especially attractive in both of these examples.

No comments:

Post a Comment