Installation and Setup Manual

Welcome

Camera Recording

Action cameras are small, rugged devices designed to capture high-quality video and images in extreme conditions. They are often used for sports and adventure photography, featuring wide-angle lenses and robust waterproof and shockproof casings. Their compact size and durability make them ideal for capturing fast-paced and immersive footage.

Camera Types

Dome Cameras (Indoor)

Dome Cameras

Dome cameras are named for their dome-shaped housing, making them discreet and less noticeable. These cameras are typically mounted on ceilings or walls and offer a wide-angle view, ideal for monitoring large areas such as retail stores, offices, and warehouses.

Bullet Cameras

Wall Mounted Bullet Cameras

Bullet cameras, also known as cylindrical cameras, are characterized by their long and tapered shape. They are often used outdoors due to their weatherproof design.

PTZ Cameras

Pole Mounted PTZ Cameras

Pan-Tilt-Zoom (PTZ) cameras are highly versatile and capable of covering large areas with a single device. These cameras can pan, tilt, and zoom, allowing for comprehensive surveillance.

Wireless Cameras

Wireless cameras transmit video signals over Wi-Fi, eliminating the need for extensive cabling. They are easy to install and offer flexibility in placement.

IP Cameras

Internet Protocol (IP) cameras send and receive data over a network, enabling remote viewing and monitoring from anywhere with an internet connection. They offer high-resolution video and advanced features such as motion detection, video analytics, and cloud storage.

Each type serves distinct security needs, ranging from home monitoring to business surveillance.

Basic operations such as powering on/off, using the viewfinder, and the LCD screen.

ISO stands for International Organization for Standardization, indicating the camera's sensitivity to light. Utilize a low ISO in bright conditions and a high ISO in dim lighting.

Aperture refers to the opening in the camera lens through which light passes, measured in F-stops. A lower F-stop means more light is let in, while a higher F-stop is ideal for bright conditions and sharper focus.

A practical, step-by-step guide for camera installation teams working with Camect, ExacqVision and Avycon Systems. This manual covers essential procedures including system re-imaging, camera integration, remote viewing setup, troubleshooting, and advanced software features. Designed for technicians with hands-on experience, it delivers clear instructions, best practices, and quick-reference workflows to ensure reliable, professional surveillance deployments in any environment.

Internet of Things

IoT Flow Diagram

The Internet of Things (IoT) refers to the way everyday devices—like smart thermostats, security cameras, and even printers—are connected and able to communicate with each other. These smart devices collect and share data to make our lives easier, from automating routine tasks to personalizing our experiences, often without us having to lift a finger.

All of this relies on strong connections

Whether wired or wireless, think of the network as the backbone of IoT—a channel that lets devices talk to each other. In a typical office, for example, you'll find a WiFi network connecting laptops and computers, a separate network for printers, and remote connections that link different office locations together, making it feel like everyone's in the same room, even if they're miles apart.

Thanks to these networks, you can send a document from your computer to the printer with a click, or cast a presentation from your laptop to the conference room TV via Bluetooth, allowing everyone to share information instantly. Networks also act as a security barrier: people inside the office can access resources from the outside world, but outsiders can't easily reach sensitive information inside—much like looking through a one-way mirror.

In short

IoT and the networks that support it are what make our modern, connected lives possible, seamlessly linking people, devices, and information. Networks in IoT systems are designed with security in mind, using encryption and authentication to protect data and devices from unauthorized access. They also allow for centralized management, making it easier to monitor device health, update software, and enforce security policies.

Network Fundamentals

Network Protocols Overview

1. What Is a Network?

2. Network Types & Scale

3. The OSI 7-Layer Model

OSI 7-Layer Tech Model

The OSI (Open Systems Interconnection) 7-Layer Model is a framework that standardizes how devices communicate over a network by breaking the process into seven distinct layers. Each layer has a specific role, working with the layers above and below to ensure data flows smoothly from sender to receiver. Here's a simplified breakdown:

The 7 Layers Explained (From Bottom to Top)

Layer Key Role Example Protocols/Technologies
1. Physical Transmits raw bit streams (0s/1s) over physical media (cables, Wi-Fi) Ethernet cables, Fiber optics, Wi-Fi
2. Data Link Manages direct communication between devices on the same network. Adds MAC addresses and error checking. Ethernet, MAC addresses, Switches
3. Network Routes data between different networks using IP addresses. IP (Internet Protocol), Routers
4. Transport Ensures reliable end-to-end data delivery (error-checking, flow control). TCP (reliable), UDP (fast/unreliable)
5. Session Establishes, maintains, and terminates connections between applications. NetBIOS, RPC
6. Presentation Translates data into formats applications understand (encryption, compression). SSL/TLS, JPEG, ASCII
7. Application Provides interfaces for end-user applications (web browsers, email). HTTP, FTP, SMTP

Memorizing all the layers isn't important; understanding their existence is. A layer is a setup partition often discussed by IT, useful for detailed planning. Think of it like a biological environment: microscopic life at the smallest level, trees and flowers at the macroscopic level, and mountains and oceans at the largest level. "High-level" refers to non-technical explanations.

How Layers Work Together

Key Concepts

  1. Layer Independence: Each layer only interacts with the layer directly above or below. For example, the Transport Layer (TCP) doesn't need to know if data is traveling over Ethernet or Wi-Fi.
  2. Headers/Trailers: Each layer adds its own metadata (e.g., IP headers for routing, TCP headers for ports).
  3. Real-World vs. OSI: Modern networks (like the internet) often combine layers. For instance, TCP/IP merges Layers 5–7 into a single "Application Layer."

Why This Matters

4. IPv4 Addressing Basics

5. Subnetting, VLSM & Private Space

6. TCP/IP Model (4-Layer)

7. TCP vs UDP

TCP UDP
Connection Oriented (three-way handshake) Connectionless
Reliability Sequencing, ACKs, retransmits "Best effort"
Overhead Higher Minimal
Typical uses File transfer, e-mail, web Voice/video, DNS, games

8. TCP Handshakes & Flow Control

9. More TCP Internals

10. Cisco CLI Primer

11. Ethernet & Switching

12. VLAN Fundamentals

13. VLAN Trunking

14. Access Control Lists (ACLs)

15. ARP Essentials

16. DHCP in a Nutshell

17. DNS Basics

18. Static Routing (ip route)

19. RIP v2 Overview

20. Network Address Translation (NAT)

21. Time Synchronization (NTP)

22. Syslog Fundamentals

How to Use These Notes

  1. Skim before labs — know which layer/protocol to troubleshoot first.
  2. Make flashcards — e.g., "RIP max hops?" → 15.
  3. Revisit after practice — add personal examples (configs, pings, Wireshark captures).

How to Re-Image an ExacqVision NVR

NVR Hardware

Imagine transforming your ExacqVision NVR back to its pristine factory state, ready to tackle new challenges or resolve stubborn software issues. Re-imaging your NVR is like hitting the reset button, giving it a fresh start. But remember, this process wipes out all existing data, so make sure to back up your important files before diving in. Let's get started on this exciting journey to restart your NVR!

Step-by-Step Process

Adding a New Camera

When performing a fresh installation we will add new cameras. The process is analogous to adding new controllers to an Xbox. This includes both the physical site and through the ExacqVision MAP. This setup allows for real-time monitoring, alarms, and AI detection provided by ExacqVision. Maintaining a consistent method for adding new devices will ensure a clean and easy-to-navigate final setup.

Adding New Camera and Replacing Camera on ExacqVision Map

Replacing a Camera

Avycon NVR

Overview

Re-imaging an Avycon NVR is used to restore factory settings or recover from system corruption. This process deletes all data.

How to Use the Avycon CVMS Manual Alarm Triggers

The Avycon CVMS 2.0 software enables manual control of alarm relay outputs for managing external devices such as lights and sirens, enhancing security and enabling real-time monitoring.

Key Functions

Avycon CVMS 2.0: Playback, Backup, and Resource Management

Playback Footage in Sync

Backup Footage

Avycon Resource Management

Time Slice by Event and by Tag

Step-by-Step: Searching by Date, Camera, and Event

Remote Viewing

How to Set Up an ExacqVision NVR for Remote Viewing

How to Set Up an Avycon NVR for Remote Viewing

How to Troubleshoot an Avycon Camera Not Showing Up in NVR

How to Set the IP Address in an Avycon Camera

Camect Hub Installation & Configuration Guide

Installation Overview

1. Purpose & Scope

This guide standardizes the installation and commissioning of Camect Smart Camera Hubs across Integrated Security Consultants (ISC) customer sites—ranging from K-12 campuses to high-throughput facilities such as the Coca-Cola bottling plant. It is written for field technicians who physically install cameras and bring new sites online. Follow these steps exactly to ensure reliable video capture, alerting, and Central Station integration.

Important: ISC's reputation rests on zero-downtime security coverage. Deviations from this playbook require written approval from the Project Engineer of Record (PER).

2. Pre-Installation Checklist

3. Unboxing & Power-Up

  1. Mount the Camect Hub in the designated IDF/MDF rack shelf (leave 1 RU clearance).
  2. Patch Cat-5e/6 from Hub LAN 1 to the security VLAN switch port.
  3. Connect the supplied 12 V DC adapter to conditioned power (UPS recommended).
  4. Verify the LED ring illuminates solid blue within 30 s.

Trouble Tip: A flashing red ring indicates the hub cannot reach the internet—check VLAN ACLs.

4. Commissioning & Authentication

  1. On a technician laptop on the same VLAN, browse to home.camect.com → V2 portal.
  2. Click Sign in with Google and use the site-specific ISC installer account (format isc.<site-code>@integratedsecuritycorp.com).
  3. Accept the Camect Terms & Policy → Add Hub.
  4. The portal auto-discovers the Hub at 192.168.x.x. Select Activate.
  5. Leave default consent check-boxes enabled (auto-password, optimized settings, email alerts) unless instructed by PER.
  6. Rename the Hub following ISC naming schema: SITE-CODE_HUB-## (e.g., COKE-ATL_HUB-01).

Note: Large campuses may use multiple hubs—record Asset ID sticker in ServiceNow.

5. Network Configuration

Setting Value Notes
Hostname Matches Hub name Visible in DHCP & NMS.
Full Network Scan Disabled Prevents discovery of non-security IoT devices. Navigate ⚙️ Gear → Advanced → Scan local network — uncheck both boxes.
Static IP Yes Assign per cut-sheet; set DNS to customer internal resolver.

6. Adding Cameras

6.1 Auto-Discovery (Default)

6.2 Manual RTSP URL

Use when cameras are on separate subnets or require sub-stream selection.

rtsp://<username>:<password>@<IP>:554/1 # mainstream
rtsp://<username>:<password>@<IP>:554/2 # sub-stream

Steps: ⚙️ Gear → Cameras → Add Camera → Stream URL. Paste URL → Save. Test live view.

Tip: Click the ⚙️ icon under a camera name → Edit URL to switch streams without re-adding.

7. Alert & Analytics Configuration

Feature Configuration Navigation
Object Detection Limit alerts to person, vehicle, animal as required by SOW. ⚙️ Gear → Alerts → Object List
Notification Channels Email (installer), messaging (client), Camect App. ⚙️ Gear → Alerts → Send alerts by...
Disable Auto-Suppression Required for 24 × 7 monitoring sites (schools). Alerts → Advanced → Do not auto-suppress similar events
Areas of Interest & Ratings Exclude sidewalks; enforce no-loiter zones. Camera View → Draw Box → Rating
Time Constraints Detect package trucks 07:00–18:00 only. Alerts → Time Constraints
Loitering Alert if person stationary > 20 s near entrance. Create Thumbs-Down rating (loitering=20 s)
Line Crossing Trigger when vehicle crosses perimeter line → gate opens. Camera View → Draw Red Line (double-click to flip)
Sensitivity Mode Improve thermal/night cameras; expect more false positives. Alerts → Sensitivity Mode (per camera)
Long-Distance Mode Sporting fields, parking lots. Requires 4K camera & added CPU. Alerts → Long Distance Mode

8. Clip Management & Evidence Export

  1. Hover Bell 🔔 to view unacknowledged alerts; click a timestamp to jump in Timeline.
  2. Drag brackets [ ] to set start/end → Download (MP4) or Share.
  3. First-time share prompts Google Drive link creation—use the ISC service account.
  4. Option: Summarized Video for condensed evidentiary review.

9. Immix Integration (Central Station)

  1. Port-forward Hub WAN to 443 & 554 at customer firewall.
  2. In Immix: Add Site → fill address, customer code.
  3. Add Device → Type =Camect, WAN IP, Secure Port = 443, credentials (local Hub admin).
  4. Auto-Configure Cameras—pull list from Hub.
  5. Enable Alarms in Hub → Immix receives events; verify talk-down audio (press-to-talk > 2 s).

10. Maintenance & Support

Task Frequency Action
Review resource usage bar After adding each camera Hub Dashboard
Submit bug report As needed ⚙️ Gear → System → Report Bug (attach logs)
Firmware update Quarterly release ISC Change Control SOP 16-Q
Verify alert delivery to NOC Post-install & monthly Immix event log

11. Post-Installation QA Checklist

Testing and QA Check

12. Troubleshooting Quick Reference

Issue Cause Solution
Blue ring absent No power or bad adapter Check UPS outlet, press power button.
Hub not discovered VLAN mismatch Use laptop on same subnet; manually browse to Hub IP.
Excess false alerts Sensitivity mode on Disable per camera; review lighting.
Immix not receiving alarms Port 443/554 blocked Confirm NAT/ACL; test with telnet.
Talk-down one-way Mic muted in Immix Check PC audio permissions; verify Hub FW ≥ x.x.

KamTech Tutorials

Entrapass GoPass Mobile Credentials Training: Programming and Use

Mobile Access Setup

🔑 EntraPass GoPass enables mobile credentials by requiring users to enter a passcode, select sites, and add doors to favorites for quick access.

Card Holder Management

👤 Adding new card holders in EntraPass GoPass involves inputting essential details like name, email, card type/number, end date, and assigning the appropriate access level.

Application Activation

📱 Activating EntraPass GoPass requires users to check for an activation email, download the app via the provided link, and use mobile credentials to complete the setup process.

Replacing lithium battery on KT 1 controller

Battery Replacement Procedure

🔧 To replace the lithium battery on a KT-1 controller, first remove it from the faceplate by gently pulling, then pinch the clamp at the end and gently push it out, repeating for all four clamps.

Kantech Onboard Guide

Integration and Cost Savings

🔗 Kantech EntraPass Corporate Edition integrates access control with video recording on exacqVision recorders, providing hardware, power, and cooling cost savings.

Installation and Configuration

🔑 To install, log into the restricted user account, then the administrator account (password: admin256) on the exacqVision recorder and follow the installation walkthrough.

🎯 Configure backup targets by launching the Workstation application, logging in with admin admin256, clicking Options > Backup Scheduler, and changing the default location to a removable media or network share.

Registration and Cleanup

📋 Kantech certified technicians must perform the registration process by providing the system serial number to Kantech.

🗑️ After installation, delete the Interpass web icon and Interpass folder to free up over 1 GB of space on the exacqVision server.

Kantech Access Control, exacqVision

Integration and Control

🔐 2 integrates with Kantech Entrapass access control system, enabling users to control doors and locks directly from the live view page.

🕹️ Users can perform access control functions like arming, unlocking, disabling, bypassing, and activating through the live view page and camera links feature.

Event Management and Visualization

🔗 The event linking page allows users to associate access control inputs with events, triggering actions like video recording or notifications when device status changes.

🗺️ exacqVision's mapping function provides a clear visual representation of access control status, showing which entryways are triggered, unlocked, or armed.

Configuration

🔧 The add access control section in the configuration tree displays available functions, including relays, door locks, and readers, based on the connected access control device.

Converting ioProx cards from 24 to 32 bits

Card Encoding and Compatibility

🔐 ioProx cards are dual encoded with a 26-bit number and an extended family code for 32-bit compatibility, enabling flexible usage across different systems.

Conversion Process

🔄 To convert all cards to a specific 32-bit extended family code, navigate to Options > Display Format, select 32-bit global card format, and choose Yes to create a backup and perform the conversion.

🔁 For auto-converting ioProx cards from 24-bit to 32-bit, select 32-bit global card format in Options > Display Format, choose No to convert all cards, then Yes for auto-conversion, requiring an initial access denied swipe for each card.

System Flexibility

🔓 The dual encoding feature of ioProx cards allows for seamless transition between 26-bit and 32-bit systems without replacing existing cards.

User Experience

👤 During the auto-conversion process, users will experience a one-time access denied message, which is automatically corrected on the subsequent card swipe.

Kantech email server

Configuration

  1. 🖥️ To configure a Kantech email server, gather essential SMTP server information including IP address, domain name, email port, sender, encryption, authentication, username, and password.
  2. 🔒 SmartLink must be installed and running to enable sending emails from triggers or reliance using the SmartLink email tab in the devices application.

Functionality

  1. 📊 Automatic report emails can be sent using the email reports tab in the devices application for Entry Pass and Corporate editions, while the Global edition uses a separate email reports tab.
  2. 🧪 Test the email server configuration by entering a valid email and test area, then clicking the test button to ensure proper setup and receive an "OK" confirmation message.

EntraPass IP communication Troubleshooting

Troubleshooting Process

  1. 🔍 Gather critical information including IP address, subnet, gateway, protocol, MAC address, and broadcast configuration to effectively diagnose and resolve IP communication issues.
  2. 🌐 Verify the enterprise gateway's communication status as the first step, which can reveal issues like "gateway not connected", "IP device disabled", or "failed to reach IP device".

Technical Checks

  1. 🖥️ Test TCP port 1802 using the telnet function from a laptop to determine if communication is possible and identify potential antivirus or firewall blockages.
  2. 🔄 If controllers communicate initially but then reboot and fail to reconnect, it likely indicates incorrect information programmed in "devices connection".
  3. 🏷️ Ping the controller's IP address before and after disconnecting it to identify potential IP conflicts if responses continue after disconnection.

12 things you may not know about EntraPass

Advanced Features

  1. 🔧 EntraPass offers a driver builder software for creating custom card drivers, accessible via Start > All Programs > Kantech Server > Database Utility.
  2. 🔄 The software supports free upgrades to any build within the same version and provides self-extracting backups containing version and edition information.

Efficiency Tools

  1. ⌨️ Shortcut keys for quick access to various features are pre-built into EntraPass, viewable in the Help menu.
  2. 🖨️ A printer icon for card list printing and automatic time synchronization in Corporate and Global editions enhance user efficiency.

Maintenance and Support

  1. 🛠️ EntraPass includes a database utility tool for running scans, correcting mistakes, cleaning the database, and removing deleted items, alongside a how-to section with instructional videos in the Help menu.

Driver Builder

Card Driver Creation Process

🔢 Driver Builder requires entering the exact card number, clicking "scan to match", and swiping the card to create a driver for a standard card or legacy controller.

🧮 The raw data from the card must be matched with its binary representation in Notepad, obtained by converting the card number and site code using the Windows calculator.

Card Data Structure

🃏 In the Wiegand format standard, the 8-bit site code (hexadecimal for alpha characters) is displayed on the left, while the 16-bit card number (binary) is on the right.

Legacy Controller Support

🏛️ Driver Builder supports creating drivers for legacy controllers by selecting the appropriate option and following a similar process to standard card driver creation.

ioSmart 485

Reader Capabilities

🔖 ioSmart card readers can read 6 card types, while multi-technology readers support 9 card types, including additional 125 kHz formats.

Connectivity and Installation

🔌 ioSmart readers connect to controller's D0 and D1 terminals and can be wired in daisy chain or star pattern configurations.

Configuration and Management

🖥️ Reader serial numbers can be retrieved through the operation controller or devices controller interfaces, enabling easy identification and management.

Input/Output Flexibility

🔧 ioSmart readers offer configurable inputs and outputs, including LED inputs, lock outputs, and open collector relay outputs, with up to 750 mA capacity for relay/lock outputs.

Advanced Features

⌨️ ioSmart readers can include an optional keypad, with the ability to define inputs and outputs directly from the reader interface.

KT 1 standalone

Security and Configuration

🔐 The KT-1 requires firmware version 2.0.14 or above for standalone mode and demands encrypted installer or operator login creation, which cannot be reset, emphasizing the importance of password retention.

🛠️ Standalone mode allows selection of two card formats from 31 built-in drivers, adjustment of PIN digits (4-6), and entry of I/O smart serial number for communication setup.

Functionality and Integration

🚪 Users can configure doors, set specific daily/weekly/monthly/annual actions, and integrate with alarm systems using keys exclusive to the door tab.

Data Management

💾 The system prompts for automatic backup of card and schedule information, which is strongly recommended for data preservation and programming purposes.

Activation Process

📋 Customer and installer information must be entered to activate the KT-1, either through the web configuration page, Kantech website, or by contacting technical support.

ioSmart Wiegand

Reader Compatibility

🔑 IoSmart reader supports multiple card technologies including io smart, Mifare plus, SSF, can tech, and Mifare classic, while Multi tech reader adds compatibility for HID 125 kHz and Tak io procs cards.

Configuration

🔧 When connecting a reader for the first time, select the output format using beep codes: 3 beeps for SSF, 2 for XSF, 1 for 26 bit, and 34 bits for 34 bit format.

Data Processing

🔒 Multi tech readers send raw HID data to the controller for decryption, requiring the correct reader type to be selected under devices controller for proper functionality.

Factory Defaulting Intevo

Factory Default Process

  1. 🔄 To factory default an Intevo unit, press F8 repeatedly during startup until reaching the "Repair Your Computer" page, then enter the restoration password "1-2-3-4-5" to initiate the recovery process.
  2. 💾 Before defaulting, backup critical data including archives, video events, and client version information using the Exact Vision Client's Backup Scheduler.

System Configuration

  1. 🖥️ After defaulting, reconfigure the unit by selecting language, accepting licensing, setting computer name, time zone, and entering static IP addresses for each Ethernet adapter in the First Boot Wizard.

Post-Default Steps

  1. 🔍 Verify and upgrade if necessary the versions of H DVR (or Exact Vision) and Entry Pass after completing the factory default process.
  2. 🔒 Record essential information before defaulting, including computer name, workgroup/domain, and IP information for both Ethernet adapters using ipconfig /all command.

Basics of Access Control

Core Components

🔐 Access control systems comprise five key elements: an access controller, reader/keypad, door contact, door strike/magnetic lock, and request to exit unit.

🧠 The access controller acts as the system's brain, continuously monitoring door status and granting access based on programmed credentials.

Functionality

🚪 Door strikes or magnetic locks physically secure entrances, releasing only when the controller grants access.

👋 Request to exit units, utilizing motion infrared detectors or manual buttons, allow credential-free egress from controlled areas.

Security Mechanism

🔢 Access controllers use decryption templates to translate binary reader data into card numbers, granting entry if the decryption matches the card's encryption.

How to blank the database for Special, Corporate or Global Edition

Database Management

  1. 🗑️ To blank the database for EntraPass Special, Corporate, or Global Editions, delete all files in the "C:\Program Files x86\Kantech\Server SE/CE/G\Data" folder and replace them with files from the "Server uncore C\Data SRC" folder.
  2. 🔄 This process applies to all Editions and versions of EntraPass, providing a universal solution for database reset across different software variants.

Troubleshooting

  1. 🛠️ Blanking the database is a crucial troubleshooting step when facing database corruption or when customers are locked out of the system, offering a clean slate for system recovery.

Software Specifics

  1. 🔒 The instructions are specific to Kantech's EntraPass software and its Server SE/CE/G versions, highlighting the importance of following manufacturer-specific guidelines for security management systems.

Post-Reset Procedure

  1. 🖥️ After blanking the database, users must close the folder and restart the EntraPass software to access the system with the newly created blank database, ensuring proper initialization of the reset environment.

How to integrate a Neo panel to a KT-400 or KT-1 with version 4 communicator

Integration Requirements and Setup

🔧 Minimum firmware versions required: KT-400 (1.17 rev 1 or 1.23+), KT-1 (1.03+), Neo panel (1.10+), and TL-28R module (4.10+) for successful integration.

🔌 Hardware connection involves linking the Neo panel to TL-28R module via Ethernet, which then communicates with KT-400/KT-1 over Ethernet network.

Programming and Configuration

🖥️ Program Neo panel by accessing subsection 382, selecting option 5 for alternate communications, and ensuring "yes" is selected.

🌐 Configure TL-28R module's IP address in Neo panel by activating numbers 3 and 5 in subsection 851 and 663, then entering KT-400/KT-1's static IP in subsection 693.

Functionality

🔐 Enable arm/disarm from door by selecting door in Entrapass, enabling multi-swipe, choosing double-swipe action for arm/disarm, and selecting partition to control.

How to factory default a KT-400

Factory Default Process

  1. 🔄 To factory default a KT-400 to DHCP: remove jumpers JP 2 and JP 3, press reset button for 5 seconds, wait for heartbeat LED to go solid then flash.
  2. 🔒 For static IP factory default: keep only jumper JP 2 on, press reset button for 5 seconds, observe heartbeat LED flashing with 3 long pulses twice.

Post-Reset Configuration

  1. 🔌 After factory defaulting to static IP, replace jumper JP 3 before saving configuration to prevent reverting to static IP.

LED Indicators

  1. 💡 Heartbeat LED behavior during reset: goes solid temporarily, then flashes to indicate process completion.

Reset vs. Factory Default

  1. 🔁 Reset process for both DHCP and static IP is identical to factory default procedure for respective configurations.

How to create and manage access levels

Access Management

🔑 Create new access levels by selecting schedules for each door, allowing granular control over user access rights across different areas of a facility.

🔄 Modify access level schedules in the "definition schedule" section to update access rights for all associated doors simultaneously, streamlining security management.

Card Administration

💳 Add new cards to the system by assigning them names, card numbers, and specific access levels, enabling customized user permissions.

🚪 Swipe cards at readers to test functionality and receive status messages, including "access denied card unknown" for unregistered cards.

Efficient User Management

👤 Quickly add new users by right-clicking on access denial events and selecting "edit" then "card," automatically populating the card number field for streamlined onboarding.

How to create and manage holidays

Holiday Management

  1. 📅 Create holidays in Enterp Pass software by navigating to Definition > Holiday, entering name and date, selecting recurring option, and choosing holiday type for different schedules.
  2. 🔄 Selective holidays can be applied to specific sites or connections, while recurring holidays automatically repeat annually on the same date.

Schedule Integration

  1. 🗓️ Create holiday schedules by going to Definition > Schedule, applying different schedules to various holiday types and dates.
  2. 🚪 Test holiday-schedule relationships by defining a holiday and checking the operation door to observe schedule effects.

System Indicators

  1. 🔍 Detect active holidays in the system by looking for an orange dot in the bottom left corner, which displays "Holiday detected" on mouseover.

Creating Backups in Corporate and Global Edition

Backup Management

  1. 🔄 Entrapass Corporate and Global Edition offers flexible backup options including data, archive, In-N-Out, and video types, with customizable frequency settings (now, weekly, monthly, daily) and location choices (default or specific folder).
  2. 🗂️ The system supports nested backups, allowing users to create backups within backups for enhanced data organization and security.

Restoration Process

  1. 🔙 Restoring backups is streamlined through the Server > Backup > Restore Data path, with a simple folder selection process and automatic event generation upon successful restoration.

System Features

  1. 📁 Default backups are stored in C:\Program Files\Program Files x86\Contact Ser_CE\Backup with folders named using a "D" prefix followed by date and time.
  2. 📊 The platform provides real-time event generation for backup and restore processes, ensuring users are informed of progress and potential issues throughout the operation.

Creating a KT-400 IP site

Network Configuration

🌐 KT-400 IP site setup requires selecting a corporate Gateway, specifying the number of controllers, and choosing between "secure IP kt4 100" for KT-400 or "secure IP IP Link" for IP Link as the connection type.

🖧 For non-DHCP configurations, enter a private IP address with subnet, mask, and gateway, then select either TCP or UDP protocol and specify the communication port.

Installing a Remote Workstation

Installation Requirements

🔑 Remote workstations require additional licenses beyond the 2 included in Global Edition and 4 in Corporate Edition of KC Entropass software.

🖥️ The remote workstation must be the exact same version as the server, with firewall exceptions for TCP ports 18000, 18112, and 18101 on both machines.

Setup Process

🔢 Before installation, select the workstation in the registration window and note the workstation installation code for use during setup.

🔗 After installation, register the workstation to the server using the server's TCP/IP address or domain name, authentication password (default: canch), and workstation installation code.

Access and Operation

🔐 To access the remote workstation, click the login button and enter username and password when the workstation is running.

Hard resetting a KT-400 or IP-Link

Hardware Reset Procedures

🔧 Hard resetting a KT-400 requires removing JP2 and JP3, pressing reset for 2 seconds, waiting for heartbeat blinking, replacing AP2, and repeating reset process.

🔌 To default an IP-Link, place jumpers between PGM1-I1 and PGM2-I2, wait for rapid heartbeat flash followed by solid light, then remove jumpers.

Network Configuration

🌐 KT-400's default IP is 192.168.1.2, with laptop configured to 192.168.1.3 for setup.

⚙️ Configuring KT-400 involves entering server IP/domain, disabling DHCP if unused, setting local IP, subnet mask, gateway IP, DNS, and selecting UDP/TCP protocol and port.

Define a new card in Special Edition

Card Management

🔑 Special Edition software allows adding new cards via the "user card" menu by entering a card number or swiping the card to generate an "access denied" event.

📸 Right-clicking on a card enables adding a picture from file, which will display when the card accesses a door.

Access Control

🔐 The "access level" setting determines card privileges, ranging from "none" (no access) to "always valid" (24/7 access to all doors).

🗓️ Setting a "card expiration date" automatically deletes the card on the specified date, while changing the "card state" to "expired" deletes it immediately.

How to send email notifications for EntraPass events

Email Notification Setup

🔧 Ensure Smart Link is running and communicating with the server, and the email server doesn't require authentication or face antivirus blocking.

📧 Create an email task in the Definition Task Builder for Smart Link, specifying from address, subject, and body with event text, date, and time in a specific format.

Event Triggering

🔔 Configure the event trigger by linking it to a specific event, selecting the door component, and specifying either a single door or trigger group.

Troubleshooting

🔍 Check system and operator logs for concurrent login and Smart Link transactions to verify successful email sending.

📊 Validate email sending by reviewing the Smart Link transaction list for successful sends and confirming receipt in the recipient's email account.

How to configure alarms and sounds on door forced open in EntraPass

Alarm Configuration Steps

Alarm Configuration Process

  1. 🔧 Configure alarms for door forced open events in EntraPass through 5 key steps: system event parameter, system instruction, multimedia device sound, alarm desktop setup, and workstation alarm settings verification.
  2. 🚪 The "door first open" event is selected under "enterprise events" in the event parameter, linked to a specific door and instruction, with an alarm sound assigned higher priority and a specific wave file.

Alarm Desktop Setup

  1. 🖥️ Set up the alarm desktop by right-clicking, selecting properties, relabeling as "alarm desktop", and configuring it to display both event and message screens.

Alarm Settings and Behavior

  1. ⏱️ Verify alarm settings for workstations, assigning higher priority alarm sounds with specific wave files, and set acknowledgment system delay to 1 minute and suspend delay to 1-60 minutes.
  2. 🔔 Generate an alarm by selecting the "door first open" event, choosing a specific door and workstation, selecting an instruction, and saving, with the alarm sound continuing until acknowledged.

Different ways to add a card in EntraPass and getting a card list

Card Management Techniques

  1. 🔑 EntraPass offers four methods to add cards: user card menu, desktop events, batch load operation, and CSV file import, with communication to the controller being crucial for card download.
  2. 📊 The batch load operation allows for efficient addition of multiple cards simultaneously, though initially without assigned access levels or times.

Access Control Features

  1. 🕒 Cards can be configured with expiration dates and automatic deletion, enhancing security for temporary access scenarios like visitor management.
  2. 🚪 When adding cards, users can specify card types (e.g., "security"), access levels (e.g., "visitor"), and time restrictions (e.g., 8am-4pm Mon-Wed) for granular access control.

System Management and Auditing

  1. 📋 EntraPass enables generation of a comprehensive user list including card numbers and access levels, exportable as a CSV file for auditing purposes.
  2. 🔢 The system supports both 26-bit and 32-bit card number formats, maintaining consistency in side code and corner loop across formats.

Import CSV file in EntraPass Corporate

CSV Import Process

  1. 📊 The CSV import/export feature in EntraPass Corporate allows importing or exporting card files saved in CSV format, enabling data sharing between applications like Excel or Notepad.
  2. 🔢 When importing a CSV file, each field must contain a specific value format with predefined or custom patterns that include card access group, card type fields, and must identify which column contains access levels.

Data Validation and Formatting

  1. 🔐 The card type must be validated first, followed by the card access group and access level, and schedules must be created using military time format (e.g., 0800 to 1700 hours).
  2. 📅 Up to ten fields of card information can be imported, including start date, card status, PINs, and other relevant data.

File Preparation

  1. 💾 The CSV file must be saved as a comma-separated value file, with the file path located and selected in the EntraPass software, matching the format of the predefined or custom pattern used.

Elevator setup with KT-400

Elevator Control Setup

🛗 KT-400 requires either two KT module RL8 or one KT module output 16 for elevator control, with additional 12V 1A power supply needed if SPI module draws over 500mA.

🏢 Maximum cab flow is 64 floors with module RL8 and 4 connected with output 16, while max cabs per controller are 32 (RL8) or 16 (output 16).

Software Configuration

🖥️ In EntraPass software, define modules as elevator equipment under Devices Controller > Gateway > Controller > Kit Number > Package 400 tab, specifying door numbers and relay outputs for each cab.

🔓 Unlock schedules for floor groups are set in the Elevator tab, allowing access to specific floors based on predefined time periods.

Access Control

🔑 User access to floor groups is managed by creating new access levels in the Users > Edit Card section, enabling controlled elevator usage based on individual permissions and schedules.

How to install USB-485

Installation and Configuration

  1. 🔌 Connect the USB-485 adapter to the KT 400 controller by linking x-, x+, and ground pins, then install the driver by updating it in the device manager using the provided installation package.
  2. 🖥️ The USB-485 adapter appears as a COM port in Windows device manager, which must be selected in the software to establish communication with the KT 400 controller.

Software Setup

  1. 🛠️ Configure the KT 400 controller in the Enterprise Special Edition software by defining the site, selecting direct RS232 or USB connection, and choosing the correct COM port.
  2. 🔑 Define a card in the software by entering the card number detected by the driver when swiped, and assign an access level to grant permissions.

Testing and Functionality

  1. 🚪 Test the system by swiping the card at the door or using the Rex button to verify proper unlocking and access granting functionality.

Chapter: Gentec Vendor Training -- CCTV, Security, and Alarm Systems

Overview of Gentec

Gentec is a leading provider of advanced security and surveillance solutions, recognized for its innovative products in video surveillance, access control, and alarm management. Gentec's product suite is widely used in commercial, industrial, and institutional environments, offering scalable and integrated security platforms designed to protect people, property, and data.

Key Gentec Product Lines

CCTV and Video Surveillance Systems

Omnicast -- Video Management System

Omnicast is Gentec's flagship VMS, supporting a wide range of IP cameras from various manufacturers. Key features include:

Access Control Systems

Synergis -- IP-Based Access Control

Synergis offers a flexible and scalable access control solution:

Alarm and Intrusion Detection

Gentec's Security Center platform allows for unified alarm management:

Automated License Plate Recognition (ALPR)

AutoVu -- ALPR Solution

AutoVu enables automated detection and logging of vehicle license plates:

Unified Security Platform: Security Center

Genetec Security Center brings together all Gentec systems into a single interface:

Popular Gentec Products Summary Table

Product Name Function Key Features
Security Center Unified security platform Video, access, ALPR, alarms integration
Omnicast Video management system (VMS) Multi-brand IP camera support, analytics
Synergis IP access control Real-time monitoring, credential management
AutoVu ALPR system Fixed/mobile cameras, watchlist integration
Streamvault Security appliances/servers Optimized for Genetec software
Mission Control Incident management Automated workflows, response coordination
Clearance Digital evidence management Secure sharing, case management

Chapter: Avigilon Vendor Training -- Newest CCTV, Security, and Surveillance Products

Overview of Avigilon

Avigilon, a Motorola Solutions company, is renowned for its advanced security and surveillance technologies. The company focuses on delivering high-definition video, AI-powered analytics, and unified security platforms for enterprise, commercial, and public sector environments.

Newest Avigilon Product Lines

CCTV and Video Surveillance Systems

H6A and H6X Camera Series

Cloud-Native Security Solutions

Avigilon Alta (Cloud Platform)

Unified Security Management

Avigilon Unity Platform

Advanced Video Analytics

Avigilon Appearance Search™ and AI Analytics

Access Control and Video Intercom

Avigilon Video Intercom

Popular Avigilon Products Summary Table

Product Name Function Key Features
H6A/H6X Camera Series AI-enabled surveillance cameras 4K/8K video, advanced analytics, WDR
Avigilon Unity Platform Unified security management Video, access, analytics integration
Avigilon Alta Cloud-native security Remote management, AI analytics, mobile app
Avigilon Control Center 8 Video management software Advanced analytics, Appearance Search™
Avigilon Video Intercom Access control & visitor management Touchscreen, camera, AI analytics
Avigilon Radio Alert Instant notifications Radio integration, real-time alerts

Runoffs and Cable Estimation

In physical security and network infrastructure, a "runoff" is the critical process of estimating the total length of cabling required for a project before physical installation begins. Accurate runoffs ensure that teams order the correct amount of CAT6 for IP cameras, fiber optic cable for network uplinks, and electrical wiring for power supplies, minimizing both material waste and project delays.

Construction Runoffs Example

Technicians and estimators typically calculate runoffs using digital blueprints. This involves mapping the exact path a cable will take from the IDF/MDF (telecom room) to the edge device (like a camera or card reader). Calculations must account for horizontal distances across the floor plan, vertical drops through walls or conduits, and "service loops" (extra cable left at the ends for future maintenance).

Adobe Line Measuring Tool for Blueprints

Digital estimation tools, such as the measuring features in Adobe Acrobat or specialized CAD software, allow technicians to set a scale (e.g., ¼ inch = 1 foot) and trace the wire paths directly on the digital floor plan.

Detailed Runoff Calculations Total Runoffs Summary

Floor Plan Wire Runs

Entire Building Floorplan

Designing Wire Maps

[ELECTRICAL PANEL]
│
├───[POWER]──────Office 1 (Outlet)
│   │
│   ├──────Office 2 (Outlet)
│   │
│   └──────Conference Room (Outlet)
│
├───[DATA]───────Server Room (Ethernet Switch)
│   │
│   ├──────Access Point 1 (CAT6)
│   │
│   └──────Security Cameras (Coaxial/PoE)
│
└───[COMMS]──────Telecom Room (Fiber Optic)
    │
    └──────Front Desk (Phone Line)
    

Using AI to Calculate Distances

Have made significant progress in automating parts of the runoff process. What about preventing miscalculations from the AI? The method uses source documents which I provide from the training manual, which grounds the AI in truth. Then I set guardrails to be factual. This uses Perplexity AI Pro.

Prompt:

"For the building blueprint, count the number of smoke alarms, the number of rooms, the number of manual pull stations, the number of strobes"

Result:

Perplexity AI: Here are the counts based on the provided building blueprints:

SMOKE ALARMS; 82

Room Area & Wiring Requirements

Room Labels Wire (ft) Detectors Area (sqft) # Rooms Total Building Wire (ft) Total Building Area
A1 118 2 > 939 44 5,192 41,316
A2 93 2 > 911 10 930 9,110
A3 109 2 > 822 1 109 822
B1 63 3 > 900 92 5,796 82,800
B2 40 3 > 902 9 360 8,118
B3 69 3 > 1027 10 690 10,270
B4 118 3 > 939 9 1,062 8,451
B5 93 3 > 911 10 930 9,110
B6 109 3 > 822 20 2,180 16,440
C1 68 3 > 1178 20 1,360 23,560
C2 83 4 > 1166 2 166 2,332
Total > 963 31 > 10,517 227 18,775 212,329