Showing posts with label Turnstiles. Show all posts
Showing posts with label Turnstiles. Show all posts

Wednesday, February 1, 2023

Access Control Commissioning Checklist

Access Control Commissioning Checklist 

All customers are not knowledgeable to understand Access control system. When we are getting order it’s our responsibility to commissioned in proper way. In India maximum system integrator do not follow their own check list and as a result after few month call logging is started. Some call forward to OEM and System Integrator with customer’s blame on products are not good. But no one drilldown about commissioning report. Ultimately system integrator don’t know commissioning also a part of BOQ, yes they put importance only installation. I hope this checklist helps end users, integrators and consultants verify that access control installation and commissioning is complete. Take print edit as per your projects and fill all point. After that attached this with handover documents.

It covers the following sections:

  • Door Hardware Checks
  • Reader Checks
  • Controller Checks
  • Fire Alarm Loop Confirmation
  • Backup Power Compliance
  • RTE and 'Free Egress' Confirmation
  • Door Timing Checks
  • Turnstiles or Gate/Door Operator Checks
  • Credential Enrolment
  • Credential Issuance
  • Database Migration
  • Management Software User Creation
  • Access Levels and Schedules
  • Access Event Notifications
  • Door Held Open / Forced Open Troubleshooting
  • Anti-Passback Troubleshooting
  • Mapping and Custom Reporting Creation
  • Viewing Clients Installation 
  • Integration with VMS and Other Systems
  • Workstation Setup
  • Network Setup
  • Cable Verification

We recommend each person using this customize the list for their own needs / situations. There is no 'one size fits all' checklist but this list is meant to serve as a starting point to make it easier and quicker to build your own.

Door Locks and Hardware

This section covers commissioning of doors and opening locks, strikes, or other electro-mechanical hardware, including mounting and physical considerations.

Physical Operation, For every controlled opening:

  • Check all lock / hardware fasteners or mounts are secure and without play, slack, or gaps exceeding tolerances on installation instructions.
  • Ensure operation of lock is free of binding, grinding, or interference for door or frame features or other components.
  • Close and open door, or operate several cycles, the opening to ensure that no binding or warping is affecting operation. 
  • If Exit Devices are used, confirm appropriate 'Push to Exit' signage is displayed.
  • If Door Closers or Operators are used, confirm electronic access devices do not interfere with operation.
  • Confirm secure installation and function of Door Position Switches/ Contacts/ DPS.
  • Weatherproof and lightly apply grease per specification to mechanical hardware like hinges
  • Ensure any cabling or system wiring is hidden, tucked behind raceway or frames, and is not being pinched or cut by features like hinges.
  • Confirm that accessibility clearances are satisfied and any additional access control devices comply with codes.
  • If standalone, battery powered locks are used, confirm remaining battery life is strong and document commission date of batteries for future reference.

Door Controller Install Checks

  • Confirm that all terminated wiring at controller is secured and terminated without short for each device.
  • If kept in a metal enclosure, ensure panel tamper contacts and panel locks are used.  Gather panel keys for central, secure management.
  • If controllers are located at the door, confirm they are installed on the secure/locked side of the opening and located behind a tamper-resistant or semi-obscured location, such as above tiles at the door.
  • For wireless locks, confirm that all hubs or repeaters are clearly labeled as companions to the separate system readers or controllers.

Free Egress and Fire Alarm Loop Check

  • Confirm that upon fire alarm activation, all door maglocks release and are not powered.
  • Confirm that upon fire alarm activation, all emergency exit doors and openings can be freely opened and are not locked for any reason.
  • Confirm that during normal operating conditions, all 'Request To Exit' devices are located in code compliant arrangements and function properly.
  • Check that any delayed egress openings have specifically been approved by the AHJ, and delays do not exceed 15 seconds, unless specifically excepted by AHJ.
  • Confirm that all Pushbutton style RTE switches are properly labeled and displayed per local code requirements, and directly interrupt power to locks and not controller, unless specifically excepted by AHJ.

Credential Reader Checks

  • Confirm that reader device is securely anchored without gaps to the wall, frame, post, or bollard.  Seal or install trim guards where needed.
  • Confirm 'normal operation' status lights are displayed per intended behavior. (On/Off/Red/Green/Blue, etc.)
  • Confirm audible beep or siren registers when credential is read.
  • Check that reader tamper device is connected and configured.
  • If contactless type reader, present test card to confirm read range meets spec.  
  • If biometric type reader, confirm unit positioning will not be interfered with by environmental features (ie: sun movement, HVAC downdrafts, etc)
  • Confirm that accessibility clearances are satisfied and any additional access control devices comply with codes.

Credential Enrolment

  • Confirm that the only credentials to be immediately carried/used by cardholders are activated, and no batched activation of unissued/ stored credentials is done.
  • Check that each user issued a credential is accurately classified and identified in the access control software.  Include Picture ID images if possible.
  • If credentials are being renewed or exchanged, confirm physical possession, disposal, and deactivation of old credential in system.
  • If biometric credentials are enrolled, confirm multiple digits or templates are enrolled.
  • If multi-factor credentials are issued, confirm that all factors are recorded, active, and valid in the system.

Access Management Software Servers

This section covers commissioning of Management Software servers and appliances, including both hardware/network setup as well as OS and software. Some of these items may not be used depending on OS and access platform. For example, appliances typically do not require OS updates. OEM to OEM process are slight different.

Access Management Software Configuration

  • Configure Unlock, Extended unlock, Door Hold Open, and Relock event periods, as appropriate.
  • Configure user access schedules (e.g., 24/7, 8am-5pm, off-hours, holidays, etc.)
  • Configure user access levels (e.g., Managers, Workers, Visitors, Temporaries, etc.)
  • Confirm Polling Interval, or settings update push duration as prompt and as close to real-time to be accurate as recorded in system.
  • Configure any Maps or floorplans used to display and manage system control points.
  • Confirm successful integration and configuration of features like 'Video Verification', or integration with video surveillance, intrusion, fire alarm, and intercom systems.
  • Configure alarm or event notifications (email, text, etc.)
  • Download and retain copies of all door/controller configurations
  • Confirm any imported databases are clean and without problems if populating access management system.
  • For 'Anti-Passback' rules, ensure that users will not unwittingly or inadvertently cause alarms if they use atypical or uncontrolled openings.

Hardware/Security

  • Document MAC address(es) (often more than one if using multiple network cards), or if hosted/cloud access is used, document hostnames of all remote servers.
  • Assign and document IP address(es) of every networked device, endpoint, or server.
  • Apply latest OS updates (unless not recommended by manufacturer);
  • Create secure admin password
  • Create additional users as specified
  • Test UPS operation and runtime (if supplied);

Network/Security Settings

  • Document Controller and other ethernet-based devices MAC address;
  • Assign and document Controller and other ethernet-based device IP address
  • Update firmware to latest version (or manufacturer recommended/tested if different)
  • Change Controller admin password from default
  • Create multiple users if required (by specification or manufacturer recommendation)
  • Set NTP server and verify time and date;
  • Disable unused services/close unused ports (FTP, telnet, SSH, etc.);

General Server Settings

  • Confirm any requisite services or policies are free to operate and will restore automatically after reboot events.
  • Change access management admin password from default
  • Create operator/user logins
  • If LDAP or Active Directory is used, confirm valid implementation and provisioning of service.
  • Confirm and document any external database connections or dependencies by the access software.

Workstations

This list involves client workstations, including hardware, OS, and access client setup and commissioning. Some of these steps may be omitted if appliances are used. OEM to OEM process are slight different.

  • Document MAC address(es) of each workstation
  • Assign and document IP address(es)
  • Apply latest OS updates (unless not recommended by manufacturer)
  • Create secure admin password
  • Create additional users as specified
  • If dongles or hardware keys are required for client access, document location of key on workstation (e.g., Port Location, Key Serial Number)

Network

This section outlines commissioning of network hardware, including switches, routers, firewalls, etc. Some of these devices may not be used in all systems, or managed by the installing integrator.

  • Document MAC address(es) of each device
  • Assign IP address and document
  • Update switch/firewall/router firmware to latest version
  • Change admin password from default
  • Configure VLAN(s) as required; 
  • Configure QoS as required;
  • Disable unused switch ports as specified
  • Configure SNMP monitoring if required;
  • Configure MAC filtering if required
  • Download and retain configuration for each switch
  • Test UPS operation and runtime for each endpoint, if supplied

Cabling

This section covers commissioning of the access control cabling system, including labeling, supports, aesthetic concerns, and testing. OEM to OEM process are slight different.

  • Label all cables, patch panels, wall outlets, etc., as specified
  • Ensure cables are secured to supports (J-hooks, ceiling truss, etc.)
  • Conceal cables where possible/required
  • Leave properly coiled and dressed service loops at Controller or Switch location and head end as required;
  • Test all terminations and document results as specified
  • Document cable test results as specified (if certification is required)


 If need any expert comment on your projects we can help you free of cost over voice or text.


Sunday, March 5, 2017

Access control in education sector

Access Control in Education Sector

Controlling access to school campuses and buildings is an important issue for school administrators. They need to maintain a user-friendly, welcoming school climate while ensuring that the facility is safe and secure, both when school is in session and when the buildings are unoccupied.

What is access control?
Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round a building or site.

Access control is essential for all businesses to protect people and assets and has the added benefit of being expanded from controlling, for example, a single entrance door, to a large integrated security network. There are also huge potentials in terms of integrating HR and other systems, such as Time and Attendance, Visitor Management, ANPR, Fire, Intruder and CCTV, which can cut costs and streamline administration costs.
What risks does the average office face and how can these be countered by access control?
Electronic access control systems are increasingly being used to enhance safety and security in educational establishments.

The average educational establishment has a transient population with many high value goods such as computers and IT equipment, not to mention the personal possessions of staff and students, which are extremely attractive for thieves.
Access control systems are all designed to allow access only to people with the necessary authority to ensure that goods and people are protected.

Educational establishments have a duty of care to provide a safe environment for pupils and staff and the application of access control can therefore help manage known or anticipated threats.

Generally systems comprise three component parts:
1. The physical barrier – to physically restrict access to a building or location via such methods as:
• Doors: secured by either a electromagnetic or strike Lock or can be revolving or sliding.
• Turnstiles and speedgates: designed to limit access to one person for one card presented.

2. The identification device – There are a number of different technologies used to identify users of an access control system, such as:
• A proximity card and reader using RFID – cards can either work at a short read range or a long read range.
• A smart card and reader.
• A swipe card and reader.
• PIN pads.
• Biometric (fingerprint, iris scanning).

3. The door controller and software – The door controller and software are at the heart of the system and are used to decide who can gain access through which access point at what time of the day. These can vary dependent on the size of the system and how many readers or sites you are trying to control from one point.
Some of the options include:
• A standalone door controller linked to a single door with no software.
• A number of door controllers all linked together to a single PC to control one site.
• A number of sites all interlinked together over a wide network area.

What added benefits can access control systems bring to educational establishments?
Protection during school hours is paramount, and the following added benefits come from access control:

Visitor monitoring
In an environment where visitors can blend in with the staff and pupils, the use of PC and computer networks should be considered. These systems can print photographic ID and allow access to be restricted to certain areas within the office. Moving to a software solution for visitor management is an easy and inexpensive solution and can provide a number of added benefits.

The system was designed to ensure the smooth operation of a 100,000 square metre complex, spread over five buildings with both students, staff and visitors accessing the different facilities sometimes at high volumes. A Smart Card system was developed which provides not only access to designated areas, but also allows all sites to be linked via a modem, allowing administration from a central point.

Automatic Number Plate Recognition
For college and university sites where students may be driving in and parking onsite, Automatic Number Plate Recognition may be a viable option. To monitor the entrance of vehicles on site, CCTV-style cameras and computer software can be used to identify number plates of vehicles. Some systems can also store photographs of the driver and vehicle for subsequent analysis. This sophisticated software allows critical information to be passed to the police to assist in the pursuit, identification and capture of offenders.

What key considerations should be taken into account when considering access control?
The outcome of the risk assessment for your office will determine the level of security you require and in turn influence your choice of access control system to be used. BSIA access control members and professional security consultancies can assist with this.

BSIA members go through rigorous checks before they are admitted into membership, meaning you are selecting quality companies to achieve peace of mind. Below are just some of the reasons why you could benefit from using the services of a BSIA member:

·        Independently inspected to the quality standard ISO 9001 with a UKAS accredited inspectorate.
·        Compliant with relevant British and European Standards and codes of practice.
·        Financially sound.
·        Professional.
·        Staff vetting conducted (where appropriate).
·        Technically proficient.
·        Committed to quality training and development.
·        Up-to-date with the latest developments in British and European policy and legislation.

Is there any legislation I should be aware of?
The Disability Discrimination Act was amended in 2005 and has significant impact not only in terms of the design of new systems, but also means that many systems may need to be upgraded to ensure compliance. This is of particular importance also for educational establishments as employees, pupils and visitors will all need to have adequate and user-friendly access to the building.
The BSIA has created a guide to help design access control systems following the introduction of the revisions which can be downloaded from www.bsia.co.uk/publications

Other legislation to be considered in relation to educational establishments is:

National minimum care standards
Health and Safety at Work Act
Occupiers Liability Act
Management of Health and Safety at Work Regulations