Access Control  
    >> Authorised personnel only   
 
   

      

Access Control systems restrict access to certain private zones of a facility (office, warehouse, factory, sports/leisure area) to those people who are not in possession of a credential or authorised identification.

Access to the restricted area is obtained by presenting a unique and exclusive identifier to the compatible reader. Access can be allowed or denied when said identifier is authorised/unauthorised in the system.

The access restrictions can be as complex as desired: to allow access to everyone that has a credential, to restrict access to certain zones (space restriction) or to allow access only within stipulated periods of time (temporary restriction).


>> Advantages  
 
>> Difficult to copy.

>> If the identifier of a user is lost or removed, the corresponding authorisation is terminated or is replaced by another, with no need to change locks and keys of the rest of the users.

>> The access each user has to certain zones can be selected, always using the same identifier. The key system requires a key for each zone.

>> A record can be created of each user's frequency of use of each access (incidents).


>> Other services  
 

In contrast to other systems, MDS access controls enable you to integrate other complementary functions with no need for additional controllers:

>> Intercommunication. For accesses where people from outside the facility are to be permitted entry. Pressing a button contacts the control centre and access is permitted from there.

>> Lifts. Access to certain floors may be restricted depending on the identifier.

>> Technical or intruder alarms. Each input and output can be programmed with a detection and activation timing.

>> Automatisation. A weekly scheduler that can plan up to 32 relay activations daily and sensor enabling in groups or individually.

Any application, no matter how complex, can be approached with this system. The knowledge and dominion of the technology totally developed by FERMAX enables us to carry out adaptations in line with the needs of our clients. Long-standing experience and qualified technical support is the best guarantee of success in any installation. The customer attention service will guide you through any problems that may arise.


  >> Specifications  
   
 
     
 

The user information and associated restrictions are stored in a Central Unit which is responsible for taking decisions on allowing or denying access.

    Each unit REF. 2434 manages (V5.0):
 

>>  1020 Users.

>>  32 Accesses with timing restriction.

>>  32 secure Zones. Each zone may implement an anti-passback system, which prevents two people using the same identifier and ensures capacity limitation.

>>  64 users groups (Profiles). Each one composed of three pairs of space (Area) and time (Time slots) restrictions.

>>  32 Areas. Each one specified up to 32 valid zones.

>>  32 Schedule, with indication of 2 valid time slots and week days.

>>  20 annual holidays and 3 vacation periods when access is not permitted to users.

>>  Record of the last 3,000 incidents, (entries, exits, accesses denied, alerts, etc.)

>>  Automatic changeover from summer time/winter time.

>>  Continuous testing of devices.

>>  1,000 interphone panels / 1,000 sensors / 1,000 relays.

 

 

In facilities where these specifications are exceeded (more readers or more users), up to 63 central units may be grouped together, with potential for up to 1,953 readers, 64,260 users, 63,000 sensors and 63,000 relays. Each central unit stores the incidents of the transactions it handles.


  >> Installation
         
 

Absolute simplicity. The central unit communicates with the readers by means of an installation bus with 2 wires and one twisted pair.

Basic equipment for 2 accesses:

Centralisation:
1 Central Unit ref. 2434
1 Power supply ref. 88403
1 Adaptor RS-485 ref. 2338

Accesses:
2 Proximity readers ref. 23351
2 Door releases ref. 2958
Identifications:

Nº Proximity cards ref. 23361

  >> Readers and Identifiers  
 

Bruto/CityLine

         
 

The readers identify users by means of their personal identifiers. The reader incorporates several devices:

>>  Door release actuator (electrical or electromagnetic). Output NA 12Vdc 500 mA max. For inverted or electromagnetic door release, use a ref. 2013 relay. To enhance security, use a ref. 2434 relay decoder.

>>  Egress pushbutton connection.

>>  Door sensor connection, to detect if the door has been forced or left open.

>>  Flush box. For surface installation, check the reference indicated.

         
      >> Proximity            
      User is identified by proximity card . No physical contact needed between reader and identifier. REF.23351
City proximity reader
 
REF.2552
Bruto proximity reader
 
REF.23361
Proximity Card ISO
 
REF.2336
Proximity Card BM
     
 
         
      >> Keypad  
      The user has to key in a personal code . The code may be 4, 5 or 6 digits long, depending on the security level you wish to implement.            
   
REF.23291
City Keypad
REF.2553 Bruto Keypad
   
         
                   
>> Contact    
The contact reader identifies its user by means of their button key. REF.23261 City contact reader
REF.2554 Bruto contact reader
      REF.2328 Button Key
   
   
         
         
      >> RF            
      Suitable for vehicle access to garages, it enables a broader reading range than other devices (up to 30 mts). The receiver is installed in the secure part of the zone, out of reach and view of others. Operates on 433Mhz. Covered in black ABS.    
REF.1065 RF digital receiver
   
REF.2465 RF digital transmitter
   
REF.2551 RF dual transmitter
   
   
         
         
      >> Combinations  
     

•  Maximum security. Combining proximity card or button key with a pin code (4 digits)

Display shows the hour, date and a message indicating if access has been allowed/denied.
           
   
   
REF.2327 Prox reader/display/keypad
   
REF.2325 Contact reader/display/keypad
   
   
   
         
       
    WIEGAND INTERFACE     Lets you use any reader on the market with Wiegand-26 bit protocol. With this interface it is possible to replace old access control facilities, keeping the readers (Wiegand) and user identifiers. The interface is installed in the secure point of the zone, out of reach and view of others.            
REF.2476 Wiegand Interface
   
         

  >> Intercommunication  
         

The central unit can manage a radial intercommunication system between interphone panels and a central console, to allow access to visitors, calls for help, etc. The interphone panels are linked to the central unit by a 6-wire “decoder bus” (cable ref. 5918) via the panel decoders. Panel-decoder connection is by six 0.5 mm2 wires.

   


2463 Central console


8300 City Panel 1/L


2436 4-Panel Decoder


2246 Bruto P.1/L
 
               
       
       

  >> Door release  
         
  Two types of locks: electrical (fitted to the original lock) and electromagnetic (there is no possibility of connecting them or a security system is required).
         
 
Electrical
 
 
       
      REF.2958 Door release N-412-S
       
      REF. 2967 Door release N-512-S
       
       
       
         
 
Electromagnetic
 
 
      REF.3050 Embedded 300 Kg
      REF.3051 Surface 500 Kg
      REF.3052 Surface 300 Kg
      REF.3077 Bracket ref 3051
      REF.3078 Bracket ref 3052
      REF.3079 Double Bracket Z
      REF.2013 Auxiliary relay
         

  >> Management software  
 
Recommended equipment
 
         
 

• Pentium IV Processor 1Ghz or higher.
• HD 1Gb or higher.
• 256 Mb memory.
• 1 RS-232 serial port.
• SVGA graphics card.
• OS Windows 2000, NT or XP professional.

 
 
 
 
         
  The Wincom+ software included in the central unit enables you to configure the installation, check it is running correctly and record incidents as they arise. The operator is identified for access to the different functions by a login and password words.

There are three distinct access levels: installer, administrator and operator.

Operator level simply lets you add, modify or delete users. Administrator level enables you to configure the system restrictions, defining user groups, schedules, vacations, etc. Installer level allows you to configure the installation hardware: accesses, decoders, etc. This configuration is set at installation level, regardless of the number of central units.

The three levels permit access to the incidents register and generation of reports.

A picture of the user can be included for easy identification in the database and in the incidents register.

         
 
Ref. 2349 . Desktop proximity reader for easy authorisation of proximity identifiers on the PC with the management software. RS-232 connection.
         
  >> Technical alarms  
         
  It is possible to monitor several sensors to communicate the incidents to the central console or to activate different relays (ref. 2430), depending on the origin of the incident. These sensors are managed by ‘sensor decoders' and communicate with the central unit via decoder bus. Sensors must be potential-free contact type and can be configured for NO or NC operation. Relay activation or switching from a given reader or sensor armed/disarmed can be associated to each identifier.
         
 

REF.2429 8 sensor-decoder

REF.2430 8 relay-decoder

REF.2466 Decoder programmer