Sunday, February 1, 2026

Open Access Controller Guide

 Open Access Controller Guide

In the access control market, there are many software platforms, but only a few companies that make non-proprietary door controllers.

In 2019, Axis released a 3rd party-only controller, while HID purchased Mercury Security.

In this note, we contrast common access hardware providers and which brands of hardware many access management systems use.

·        The 3rd party offerings of Axis, HID, Isonas, and Mercury

·        How their pricing compares

·        Why ONVIF for Access Control Is Not A Big Factor

·        A chart explaining which controllers 34 notable access platforms support

·        The three factors that may complicate takeovers

What is an Access Control System?

An access control system is a security measure designed to regulate who can enter or exit a building or specific areas within it. These systems can range from simple mechanical locks to advanced biometric and cloud-based solutions. Modern access control systems often include features like keycards, PIN codes, mobile credentials, and facial recognition technology.

Select Access Hardware Components

Your access control system will require various hardware elements:

·        Control Panels: The brain of the system, managing access points and credentials.

·        Readers: Devices that scan keycards, biometrics, or mobile credentials.

·        Electric Locks: Magnetic or strike locks that secure doors.

·        Door Sensors: Detect whether a door is open or closed.

·        Request to Exit Buttons: Allow users to leave secured areas.

·        IT: If you run an on-premises access control system you will need a computer to run the software on and network connectivity.

Choose hardware compatible with your desired technology and ensure it meets your building’s security standards.

'Open' Controller Options

In the access market, the number of manufacturers producing door controller hardware is comparatively small to the total number of vendors writing management software.

While some companies choose to produce their own proprietary controller designs, a significant portion of the market chooses to integrate with 'open' 3rd party devices manufactured by others.

For the access control market, the most widely recognized non-proprietary door controllers are produced by three companies:

·        Axis: The company offers two different controllers, the A1001 and A1601. Both models are two-door controllers, but the A1601 is built with higher memory capacity, faster processors, form C relays. Both units use Axis' VAPIX API, although the free embedded Axis Entry Manager software is only an option for the A1001.

·        HID Global: Owned by Assa Abloy, HID also manufactures two series of controllers, Edge and Aero, that with a firmware update can be added to over 15+ different access systems.

·        Isonas: The Allegion owned access hardware manufacturer opened it's line of controllers to being integrated into other platforms in 2017. The company's line of combo readers/controllers are IP based and PoE powered.

·        Mercury Security: Purchased by HID in 2017, the hardware manufacturer sells only to other businesses. Mercury produces several lines of controllers and expansion modules, including the IP-based LP and EP series and Series 3 Redboard panels with a common firmware framework. Over 35 companies use Mercury designed hardware, or other hardware using Mercury's standard firmware.

These offerings compose most of the 'open' controller options in the market.

Defining 'Open' for Access

In the case of access control and the broader security market, 'Open' has a different general meaning than IT and software development use. 'Open' for access essentially means 'non-proprietary' that is potentially compatible with several systems.

This differs from 'openness' in other tech areas where 'open-source' generally means use is free, collaboration is public, and licensing (if implemented) is light and provisional.

Cost Comparison

While pricing varies for each controller, the hardware cost alone may also be subject to additional software licensing. However, on a hardware only basis, pricing looks like:

·        Axis A1001 & A1601: The A1001 is widely available online for ~$500, while the A1601 runs ~$700.

·        HID Edge EVO: The single door controller is available from distribution with a street price of ~$350, with options for units with integrated readers for ~$450.

·        HID Aero: The base controller and two-door expansion module is available through resellers for ~$650, but total cost varies depending on which base controller and how many expansion modules are used.

·        Isonas: The company's line of RC-04, PowerNet, and IP Bridge controllers range from $700 (single door) - $1,100 (three door bridge) depending on configuration of the included reader.

·        Mercury Security: None of these products are available as direct purchases from Mercury or through distribution. Single door controllers typical range in price from $250 - $400, but the final cost is often heavily negotiated and drops for projects with large door counts.

Compatibility Chart

The chart below provides a look at leading access brands, and which door controllers they work with:-

The Disadvantages of Proprietary Solutions

Discussions around the “myth” of open architecture often come from advocates of proprietary solutions who argue against the flexibility of open systems. However, this perspective can be compared to the fox guarding the henhouse—those who benefit from vendor lock-in are the ones discouraging open architecture. The primary aim of proprietary manufacturers is to secure ongoing reliance on their products, leaving organizations with little ability to switch to alternative solutions without a major cost.

Hardware installation is typically the most expensive part of an initial Physical Access Control System (PACS) deployment. By opting for a proprietary solution, organizations essentially commit to that manufacturer for the duration of the product’s lifespan. If the solution no longer meets operational needs, a costly overhaul is required to migrate to another system. This dependency aligns perfectly with the goals of proprietary vendors, keeping organizations tied to one source indefinitely.

The Advantages of Open Architecture Solutions

Open architecture solutions offer a range of benefits that boost security, flexibility, and efficiency. Companies like Mercury Security, HID Aero, and Axis provide open hardware platforms that are interoperable and supported by numerous technology partners. Choosing an open architecture approach means futureproofing your hardware investment, allowing for a flexible transition across providers without needing a complete system replacement.

For example, Mercury Security has the world’s largest access control hardware base, supported by over 20 OEMs. This extensive adoption enables users to switch to another Mercury OEM if the current solution is insufficient, preserving the existing hardware infrastructure and avoiding significant costs.

Five Reasons to Choose Open Architecture

1.   Interoperability and Integration: Open architecture supports seamless integration across various hardware and software, enabling vendor independence, smooth communication between platforms, and easy customization to meet unique security needs.

2.   Scalability and Flexibility: Open architecture systems are scalable and flexible, allowing for expansion and adaptability. Incremental upgrades are possible without major overhauls, reducing costs and supporting long-term system value.

3.   Cost-Effectiveness: Open architecture reduces expenses tied to proprietary systems, such as costly upgrades and vendor-specific maintenance. By supporting partial upgrades and enabling competitive pricing, it provides short- and long-term savings.

4.   Enhanced Security: Open systems allow organizations to implement the latest security protocols and quickly respond to emerging threats. They also support compliance with industry standards, ensuring a resilient and compliant security environment.

5.   Future-Proofing: Open architecture preserves initial hardware investments by allowing integration of new technologies through standard protocols. This approach ensures long-term relevance, efficiency, and cost savings.

Proprietary Private Brand Hardware Common

Notice not all platforms use or are compatible with third party panels.

For example, major providers like Tyco's Software House use proprietary controllers, which differ and are not compatible with other Tyco access products like the distribution access line Kantech that uses its own proprietary panels.

Startups like Openpath and Proxy sell 3rd-party compatible mobile readers, but also are available in versions that use their own proprietary controller boards/relays in a standalone management software.

Access ONVIF Not A Factor

When it comes to interoperability standards, access control is significantly less accepting of standards like ONVIF and no 3rd party standard is widely adopted.

As noted in Access Control Does Not Want ONVIF, despite being so readily adopted by video platforms, both ONVIF interoperability standards, Profile A and Profile C have weak adoption with support from only two vendors:

Three Common Takeover Exceptions

While generally possible, 'takeovers', where controllers associated with one platform are switched to another, have exceptions.

The three common factors that complicate system takeovers and controller interoperability are:

·        Unsupported Features/Integrations

·        New Licensing/OEM Mask Codes

·        Voided Warranty or Support

Unsupported Features/Integrations

First, in terms of existing system integrations and features, just because another system supports the same controller hardware, there is no certainty a new platform supports the same range of features and integrations. Individual features, like OSDP or event cross-linking may be supported at the panel in one system, but not the other.

New Licensing/OEM Mask Codes

Another pitfall, as noted in Does Lenel Support Unbranded Mercury Security Hardware? is some platforms may observe a 'Product OEM Mask' that codes hardware to a specific brand.

The codes are not always observed and not all 3rd party vendors have them in place, but adding existing hardware to a new system can be blocked and potentially require additional licensing fees or risk being refused by the new vendor.

In other cases, like Honeywell Prowatch, physically changing chips on the controller board may be required.

Voided Warranty or Support

Finally, vendors may choose to not 'tech support' taken-over devices, nor do they typically warranty them when something goes wrong.

Thanks to Mr. Brian Rhodes, IPVM writer.


Friday, January 16, 2026

How to add a microphone to an IP Camera

How to add a microphone to an IP Camera

Most security cameras that are outdoor rated do not come with built-in microphones to ensure that no water can leak in. This means that you must add an external security camera microphone to these cameras in order to record audio. CCTV Camera World carries microphones for indoor or outdoor cameras. Most IP security cameras with audio input capabilities have an RCA audio connector on their pigtail for connecting a microphone. Some dome IP cameras have a connection block on the inside of the dome. In either case, physically connecting and configuring external microphones to an IP security camera is easy as shown in this guide.

How to tell which camera you have?

In case you are unsure, here's a quick image to help you understand which type of audio connection your IP camera has.

audio-connector-types

Depending on whether your camera has a RCA or two-wire line in connection, please follow the appropriate section below.

1.   Connecting a microphone using RCA input

2.   Connecting a microphone using two-lead wire

3.   Enabling audio-input on the camera

 

 

How to connect an Alarm device or Audio device to VIGI Camera | TP-Link  Nederland

 

Setup for IP Cameras with RCA Audio Input connectors

What's needed?

Here is what you need to connect a microphone to an IP camera that has RCA audio inputs:

  1. Outdoor Microphone (sku 71891) or Indoor Microphone (sku 7100CC)
  2. 12V DC 500mA Power Supply (sku 12V5MA)
    You can also use PoE Power Splitter (sku POE101D) with DC Power Splitter Cable (sku DC-PJJ)
  3. RCA Male to RCA Male Adapter (sku RCA01)

How to connect a microphone to an IP camera that has RCA audio input

Below is a diagram of how to connect an external microphone to the RCA audio connector on an IP camera.

ipc-rca-ext-mic-setup_sm

It is easy to connect a mic by following these easy to follow steps:

  1. Connect the microphone to the RCA audio input on the camera's pigtail using a RCA Male to RCA Male connector
  2. For longer runs between the camera and microphone you can use an RCA cable with male ends to connect the input and output.
  3. Connect the power connector from the 12V DC Power Supply to the female power jack on the microphone.

Alternatively, you can also use a PoE Power Splitter with a 1-to-2 DC Power Splitter to use PoE power for the microphone and camera. Simply connect the PoE cable into the PoE splitter. Then split the power to the camera and microphone using the DC splitter. The data cable for the PoE splitter then connects to the camera for data.

After you have correctly wired the microphone to the camera you can continue to the rest of the article to find out how to enable the cameras audio input for listening and recording.

Setup for IP Cameras with Audio Line-in Input

Some IP security cameras include an internal audio line-in block or a two-wire lead that requires a two-lead connection for connecting a microphone. At first it may seem puzzling how a microphone with a RCA connection would connect to a two-wire input. As an example, in the section below we use a video balun, BNC to RCA connector, and two-lead wire to connect the microphone to the line-in block.

Good News! Tutorials on setting up Hikvision SMART EVENTS (Intrusion  Detection, Line crossing) in Surveillance Station | Synology Community

What's needed?

You will need the following items to connect a microphone to a camera with a line-in audio connection consisting of two-lead cabling.

1.   Outdoor Microphone - (sku 71891) or Indoor Microphone (sku 7100CC)

2.   12V DC 500mA Power Supply (sku 12V5MA)
You can also use PoE Power Splitter (sku POE101D) with DC Power Splitter Cable (sku DC-PJJ)

3.   Video Balun (sku VB2PHD)

4.   BNC Female to RCA Male Connector (sku BNCRCA02)

5.   Two-lead Wire for the balun

Best Practices for Using A Two-Way Audio Security Camera

Whether you have a security camera system for a home or business, the need for two-way audio interaction with talk-back capability may arise. CCTV Camera World offers solutions for both one-way and two-way audio. One-way audio is great for listening to sound originating from the location of a camera, but it will not allow interaction with a person at that location. To be able to interact with a person at the camera, the camera would have to have two-way talk capabilities, i.e. a speaker and microphone built-in similar to an intercom.

Two-Way Audio Setup With PoE NVR

Step 1) Connect cameras to NVR

In this guide, we will be using our security camera with two-way audio, sku IP3MPA.  It is a two-way audio IP camera that allows the user to not only listen-in, but also talk back to the person at the camera. These cameras are very easy to connect using the plug-and-play technology. In the video demonstration above we show how easy it is to connect our PoE IP cameras to our PoE NVRs. Simply connect the cables between the camera and the NVR. A single network cable transmits power and data to each camera from the NVR, and plug-and-play technology handles IP address configuration between the camera and NVR without user intervention.

Using a Web Browser for Two-Way Audio

Our camera systems allow the user to engage in two-way talk over the network by using Internet Explorer on a computer or by using our iOS and Android apps for both phones and tablets. First, we will demonstrate how to use the web portal called Web Service in our security systems. A Windows PC running Internet Explorer is required for two-way talk capability through the web browser. To be able to talk-back, you will need to make sure you have a headset or combination of microphone and speaker on your PC to listen and talk-back.

All DVRs and NVRs from CCTV Camera World are network devices and have their own IP address. You first need to connect your security camera system to your network by assigning the DVR/NVR an IP address that fits your network scheme. Once that is complete, you will be able to view your system from a computer or smartphone and use the two-way audio feature over the network. If you wish to view the system over the web when away from home, you will need to set port forwarding rules on your router's firewall to allow remote viewing from the internet.

Once your system is properly connected to your network and port forwarding rules have been created on your firewall, you will be able to engage in two-way audio communication using your smartphone, tablet, or PC from anywhere in the world where Internet is available.

Step 2) How to use two-way talk on Internet Explorer

1.   Open an Internet Explorer window on your Windows PC and type in either your NVR's IP address for local viewing, or external IP address for remote viewing.

2.   Type in your system's username and password, and select Login.

3.   Make sure audio is enabled in your two-way camera by going to Setup and Encode.

4.   Click the Audio Enable check boxes for both the Main and Sub Streams (if they are not already checked).

5.   Select OK to ensure your settings have been saved.

6.   Click the Preview tab to view your camera's live feed.

7.   Select the channel by clicking the quadrant containing the video feed. A green frame will appear around the video feed to distinguish the selected channel.

8.   Select the Speaker Icon in the top-right corner of the selected camera's video feed for one-way audio. This will allow you to hear audio that's taking place at the location of your camera.

9.   To talk back and send out audio through the camera's speaker, select the Microphone Icon in the top-right corner of the selected camera's video feed. You will need either a headset with microphone, or a combination of microphone and computer speakers to listen and talk back.

Now you will be able to listen and talk back to someone at the location of your camera. Note that you will be able to listen to camera audio feeds one at a time - you will not be able to listen to multiple audio feeds simultaneously. Multiple users can listen to one-way audio from a camera, but the talk back function is done by one user at a time.

If a computer is not available to view your two-way audio camera system, then proceed to the next section where we explain how to use two-way talk with a smartphone or tablet.

Two-Way Audio Interaction Using iOS or Android Phone/Tablet

A more convenient way of viewing you security camera system and engaging in two-way audio talk is through your mobile device. The App allows the user to hear incoming audio from the camera and uses the microphone from the phone to talk back, sending out audio through the camera's speaker.

Step 3) How to use Two-Way Talk with a Smartphone or Tablet

1.   First, Open the app (iDMSS) on your iPhone or Tablet (or gDMSS for Android devices).

2.   Select the Menu Icon in the top-left corner, and choose Device Manager.

3.   From here, select the Plus Sign in the top right corner,  Wired Device and then IP/Domain.

4.   Fill out the appropriate credentials of your NVR. You will need to create two entries - one for viewing at the location of your system using Wi-Fi, and second entry for when viewing remotely over the internet away from home. We have a tutorial on how to create entries for both local and remote viewing. After all credentials have been entered, select Start Live Preview.

5.   Select the camera channel you want to engage in two-way audio with by tapping the video feed from that camera, and then press the Speaker Icon. The speaker icon allows the user to  listen to incoming audio from the camera and talk-back sending out audio through the camera's speaker.

Arindam Bhadra: HOW TO USE IP CAMERA ALARM I/O

Briefly, here is what we did:

1.   Open the dome cover of the camera using the included hex-key tool. Do not use powered screwdrivers or drills or you will damage the dome.

2.   Connect the BNC Female to RCA Male connector to the balun.

3.   Connect the RCA Male tip to the RCA input on the microphone.

4.   Use the video balun to wire in the two lead wire, tighten the screw-downs for the wires.

    1. Make sure that you remember the polarity for your wires. We suggest using Red for the positive wire, and Black/Striped for the ground/negative wire.
    2. Having a bad connection or the wrong polarity will not record sound or have loud interference.

5.   Locate the small rubber insert next to the Audio/Alarm block and create a small hole for the wires.

6.   Slightly unscrew the screw-down for the Audio-In connector on the block. Insert the positive wire from the video balun and screw it down.

7.   Slightly unscrew the screw-down for the ground connector (GND). Insert the ground wire from the video balun and screw it down.

8.   Run the power cable for the microphone to the 12V DC power supply that is connected to a 220V AC power outlet. Connect the power supply to the microphone.

a)   Alternatively you can use a PoE splitter with a 1-to-2 DC power splitter.

b)   Connect the PoE cable for the camera to the PoE splitter. Then connect the PoE splitter to the 1-to-2 DC power splitter.

c)   Connect the camera and microphone to the DC power splitter connectors.

d)   Connect the RJ45 jack coming from the PoE splitter into the pigtail on the camera.

Once you finally have your camera and microphone connected you can continue to follow the rest of this guide to learn how to enable audio input on the camera.

How to enable audio recording on an IP camera

After everything is connected you must configure the camera to recognize and use the external microphone. This step is extremely important before trying to listen and record a camera. Do not assume that the camera is automatically recording audio when you plug the microphone in.

Using Internet Explorer to enable and modify audio settings

In the video below we show how to use Internet Explorer to login and modify the settings on an IP camera. This process requires knowing what the IP address of the camera is. After that it is as easy as logging in and going to the Settings page. Navigate to the Camera > Audio page. There you will find the audio settings for the camera. You can enable audio for Main-stream or Sub-stream, fine tune the volume settings, and enable the noise filter. Also if a camera has a built-in microphone you can set it to use the external microphone instead.