Back to Front Page

Fargo Printers Fargo Printers

TCP/IP Intercoms Commend Intercoms

Access Control Access Control Vertx

Access Control Quorum

Fingerprints Biometric L1

Biometric Safran

Readers Readers

Proximity
i-Class
bioClass
OEM

Cards and Peripherals Peripherals

Proximity
i-Class
bioClass
OEM

HID on the desktop Hotd

Global Downloads Click here if you know what you want!

Design Specifications

Putting It Together

Architect Specs

 

 

FAQ's - Simple ID

    Will the system continue to function if the computer is turned off?

    Yes, of course. IP readers have internal memory and are capable of storing up to 50,000 users and up to 100,000 events.

    Are controllers required?

    No, IP readers have all the necessary inputs and outputs to control an electric lock and monitor a door contact, exit button, as well as additional alarm inputs and outputs.

    Does Power-over-Ethernet provide enough current for electric locks?

    Yes, in most cases. For example, HID Edge IP reader can supply 600mA at 12Vdc to an electric lock while powered via PoE. Power consumption of a regular magnetic lock is around 500mA and a strike takes around 250mA. The option of using standard 12Vdc power supplies instead of PoE is also available.

    Is it possible to connect IP readers to a wireless network?

    Yes, there are IP readers with built-in WiFi cards available. For the IP readers that do not have such option, wireless network bridges may be used.

    Is it safe to have access control system connected to a company network?

    Network security technologies are well developed. Most people use Internet to send sensitive information, make purchases using credit cards and perform banking tasks. Therefore if we believe that network security technologies are reliable enough for financial transactions, they should be sufficient for access control as well. Theoretically using company network for access control increases the risk, but there are ways to mitigate it: fire walls, anti-virus software and properly configured network should provide sufficient protection in standard projects. In addition to that, SimpleID software employs industry standard encryption and password protection to prevent unauthorized access. In case of sensitive installations, however, we recommend to install a completely separate LAN/WAN for the security system.

    Is it possible to open a door by removing the IP reader?

    Yes, such possibility exists if the electric lock is controlled by the internal relay of the reader. Therefore such type of wiring should be used in locations where readers are exposed to authorized personnel only (i.e. inside a building or secure area). A certain degree of protection is offered by "tamper alarm" that is generated if a reader is removed from the wall, also a "reader offline" message is generated if the reader is disconnected from the network.

    However there are three ways to eliminate this threat entirely:

    1. Do not use the internal relay of an IP reader to control the lock. Instead, use an external, digitally controlled relay, such as SecureIO by Suprema Inc, mounted in a secured location. This makes it impossible for an intruder to unlock the door by removing the reader, as he cannot access lock wiring. The communication between the reader and the external digitally controlled relay is encrypted.

    2. Use the IP reader that supports an external read-head. The IP reader that controls the lock should be installed inside the secured area, while the external read-head should be installed on the unsecured side. An intruder would not be able to open the door by removing the read-head as there would be no wires that control the lock.

    3. Instead of an IP reader use IP controller, such as HID Edge E400 for sensitive locations. The lock would be controlled by the controller, that is mounted in the secured location (the typical wiring of the most access control systems).

    Would an intruder be able to access company network by removing the IP reader?

    Yes, such possibility exists. Therefore such type of wiring should be used in locations where readers are exposed to authorized personnel only (i.e. inside a building or secure area). A certain degree of protection is offered by "tamper alarm" that is generated if a reader is removed from the wall, also a "reader offline" message is generated if the reader is disconnected from the network.

    However there are three ways to eliminate this threat entirely:

    1. Separate the network used by security system from the company network. This may be done having two completely separate networks, or by using network management equipment.

    2. Use the IP reader that supports an external read-head. The IP reader with the network connection should be placed inside the secured area, and the external read-head should be installed on the unsecured side. An intruder would not be able to access the company network by removing the read-head (see the diagram "Using external read-head to increase security" above).

    3. Instead of an IP reader use IP controller, such as HID Edge E400 for sensitive locations. The network connection would be located at the controller in a secured location. Removing a reader from the wall, would not provide access to network (see the diagram "Using IP controller to increase security" above).

Profile | Products | Software | Latest News | FAQ's | Downloads | Contact

© 2011, evolving management solutions