Page 1
DS-K2800 Series Access Controller User Manual...
Page 2
This Manual is subject to domestic and international copyright protection. Hangzhou Hikvision Digital Technology Co., Ltd. (“Hikvision”) reserves all rights to this manual. This manual cannot be reproduced, changed, translated, or distributed, partially or wholly, by any means, without the prior written permission of Hikvision.
Page 3
Access Controller·User Manual Regulatory Information FCC Information Please take attention that changes or modification not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment. FCC compliance: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules.
Page 4
Access Controller·User Manual Preventive and Cautionary Tips Before connecting and operating your device, please be advised of the following tips: • Ensure unit is installed in a well-ventilated, dust-free environment. • Keep all liquids away from the device. • Ensure environmental conditions meet factory specifications. •...
Page 5
Access Controller·User Manual Safety Instruction These instructions are intended to ensure that user can use the product correctly to avoid danger or property loss. The precaution measure is divided into Warnings and Cautions: Warnings: Neglecting any of the warnings may cause serious injury or death. Cautions: Neglecting any of the cautions may cause injury or equipment damage.
Page 6
Access Controller·User Manual Please keep all wrappers after unpack them for future use. In case of any failure occurred, you need to return the device to the factory with the original wrapper. Transportation without the original wrapper may result in damage on the device and lead to additional costs. ...
Access Controller·User Manual Chapter 1 Product Description 1.1 Overview DS-K2800 is a powerful and stable access controller, using the logical architecture design. DS-K2800 is designed with TCP/IP network interface and its signal processed with special encryption and can be run offline. Anti-tampering function is also supported. 1.2 Main Features ...
Access Controller·User Manual Chapter 2 Component Description Take DS-K2804 as an example, the component schematic diagram is shown below. DS-K2800 component descriptions are as follows: Component Description DS-K2801 DS-K2802 DS-K2804 Door Lock 1 Door Lock 1/2 Door Lock 1/2/3/4 Indicator...
Access Controller·User Manual 3.3 DS-K2804 Terminal Description DS-K2804 Terminal descriptions are as follows: DS-K2804 Event Input 4 Grounding Event Input 3 Alarm Input Event Input 2 Grounding Event Input 1 Door Lock Relay Output (Dry Contact) Door 4 BUTTON Door Button Input Grounding SENSOR Door Magnetic detector...
Page 16
Access Controller·User Manual DS-K2804 Door Lock Relay Output (Dry Contact) Door 2 BUTTON Door Button Input Grounding SENSOR Door Magnetic detector Door Lock Relay Output (Dry Contact) Door 1 BUTTON Door Button Input Grounding SENSOR Door Magnetic detector Indicator of Card Reader Control Output (Valid Card Output) Indicator of Card Reader Control Output (Invalid Card Output)
Page 17
Access Controller·User Manual DS-K2804 Card Reader Buzzer Control Output Wiegand Head Read Data Input Data1 Wiegand Head Read Data Input Data0 Card Reader Power Output DC12V Grounding Power +12V DC12V Input COM4 Alarm Output 4 Alarm Relay Output 4 (Dry Contact) NO/NC4 COM3 Alarm Output 3...
4.1 Card Reader Wiring 4.1.1 Wiegand Card Reader Wiring You must connect the OK/ERR/BZ, if using access controller to control the LED and buzzer of Note: the Wiegand card reader. 4.1.2 DS-K1800 Series Card Reader Wiring Controller Card Reader 4.2 DS-K2801 External Terminals...
3. When the beep stopped, jump the jumper cap back to Normal. 4. Disconnect the power and restart the access controller. DS-K2801 Initialization Dial-up DS-K2802/DS-K2804 Initialization Dial-up Note: The initializing of the hardware will restore all the parameters to the default setting and all the device events are wiping out.
Access Controller·User Manual Lock Relay Normally Closed Status: 5.2.2 Alarm Relay Output Status Alarm Relay Output Normally Open: Alarm Relay Output Normally Closed: Work Flow of Software For detailed information, please see the user manual of the client software. Refer to the following work flow:...
Access Controller·User Manual Chapter 6 Activating the Access Control Terminal Purpose: You are required to activate the terminal first before using it. Activation via SADP, and Activation via client software are supported. The default values of the control terminal are as follows. ...
Access Controller·User Manual segment with your computer by either modifying the IP address manually or checking the checkbox of Enable DHCP. 6. Input the password and click the Modify button to activate your IP address modification. 6.2 Activating via Client Software The client software is versatile video management software for multiple kinds of devices.
Page 27
Access Controller·User Manual 2. Click the Device Management to enter the Device Management interface. 3. Check the device status from the device list, and select an inactive device. 4. Click the Activate button to pop up the Activation interface. 5. In the pop-up window, create a password in the password field, and confirm the password. STRONG PASSWORD RECOMMENDED–...
Page 28
Access Controller·User Manual 6. Click OK button to start activation. 7. Click the Modify Netinfor button to pop up the Network Parameter Modification interface. 8. Change the device IP address to the same network segment with your computer by either modifying the IP address manually.
Access Controller·User Manual Chapter 7 Client Operation You can set and operate the access control devices via the client software. This chapter will introduce the access control device related operations in the client software. For integrated operations, refer to User Manual of iVMS-4200 Client Software. 7.1 Function Module Control Panel of iVMS-4200: 7.2 User Registration and Login...
Access Controller·User Manual A user name cannot contain any of the following characters: / \ : * ? “ < > |. And the length of the password cannot be less than 6 characters. For your privacy, we strongly recommend changing the password to something of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
Access Controller·User Manual Steps: 1. Click Tool – System Configuration. 2. In the System Configuration window, check the Auto-synchronize Access Control Event checkbox. 3. Set the synchronization time. The client will auto-synchronize the missed access control event to the client at the set time. 7.4 Access Control Management Purpose: The Access Control module is applicable to access control devices and video intercom.
Access Controller·User Manual Notes: Once the scene is configured, you cannot change it later. When you select Non-Residence mode, you cannot configure the Attendance Rule when adding person. The Access Control module is composed of the following sub modules. Managing the organizations, persons, and assigning Person and Card cards to persons.
Page 33
Access Controller·User Manual Note: After adding the device, you should check the device arming status in Tool – Device Arming Control. If the device is not armed, you should arm it, or you will not receive the events via the client software.
Page 34
Access Controller·User Manual resetting the password monthly or weekly can better protect your product. 5. (Optional) Enable Hik-Connect service when activating the device if the device supports. 1) Check Enable Hik-Connect checkbox to pop up the Note dialog. 2) Create a verification code. 3) Confirm the verification code.
Page 35
Access Controller·User Manual Adding Online Device Purpose: The active online devices in the same local subnet with the client software will be displayed on the Online Device area. You can click the Refresh Every 60s button to refresh the information of the online devices.
Page 36
Access Controller·User Manual minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product.
Page 37
Access Controller·User Manual Adding Devices by IP or Domain Name Steps: 1. Click Add to open the device adding dialog box. 2. Select IP/Domain as the adding mode. 3. Input the required information. Nickname: Edit a name for the device as you want. Address: Input the device’s IP address or domain name.
Page 38
Access Controller·User Manual Adding Devices by IP Segment Steps: 1. Click Add to open the device adding dialog box. 2. Select IP Segment as the adding mode. 3. Input the required information. Start IP: Input a start IP address. End IP: Input an end IP address in the same network segment with the start IP. Port: Input the device port No..
Page 39
Access Controller·User Manual list. Importing Devices in Batch Purpose: The devices can be added to the software in batch by inputting the device information in the pre-defined CSV file. Steps: 1. Click Add to open the device adding dialog box. 2.
Page 40
Access Controller·User Manual added via IP server; 3 indicates that the device is added via HiDDNS; 4 indicates that the device is added via EHome protocol; 5 indicates that the device is added by serial port; 6 indicates that the device is added via Hik-Connect Domain. Address: Edit the address of the device.
Access Controller·User Manual 7.4.2 Viewing Device Status In the device list, you can select the device and then click Device Status button to view its status. Note: The interface may different from the picture displayed above. Refer to the actual interface when adopting this function.
Page 42
Access Controller·User Manual In the device list, select the device and click Remote Configuration button to enter the remote configuration interface. You can set the detailed parameters of the selected device. Checking Device Information Steps: 1. In the device list, you can click Remote Configuration to enter the remote configuration interface.
Page 43
Access Controller·User Manual Setting System Maintenance Steps: 1. In the Remote Configuration interface, click System -> System Maintenance. 2. Click Reboot to reboot the device. Or click Restore Default Settings to restore the device settings to the default ones, excluding the IP address.
Page 44
Access Controller·User Manual Managing User Steps: 1. In the Remote Configuration interface, click System -> User. 2. Click Add to add the user. Or select a user in the user list and click Edit to edit the user. You are able to edit the user password, the IP address, the MAC address and the user permission.
Page 45
Access Controller·User Manual Setting Security Steps: 1. Click System -> Security. 2. Select the encryption mode in the dropdown list. You can select Compatible Mode or Encryption Mode. 3. Click Save to save the settings. Configuring Network Parameters Click Network -> General. You can configure the NIC type, the IPv4 address, the subnet mask (IPv4), the default gateway (IPv4), MTU address, MTU, and the device port.
Page 46
Access Controller·User Manual 2. Click the to pop up the Relay Parameters Settings window. 3. Set the relay name and the output delay. 4. Click Save to save the paramters. Or click Copy to… to copy the relay information to other relays. Configuring Access Control Parameters Steps: 1.
Access Controller·User Manual Viewing Relay Status Click Status -> Relay to view the relay status. 7.5 Person and Card Management You can add, edit, and delete the organization and person in Person and Card Management module. Click tab to enter the Person and Card Management interface. The interface is divided into two parts: Organization Management and Person Management.
Access Controller·User Manual 2. Input the Organization Name as desired. 3. Click OK to save the adding. 4. You can add multiple levels of organizations according to the actual needs. To add sub organizations, select the parent organization and click Add. Repeat Step 2 and 3 to add the sub organization.
Page 49
Access Controller·User Manual 2. The Person No. will be generated automatically and is not editable. 3. Input the basic information including person name, gender, phone No., birthday details, and email address. 4. Click Upload Picture to select the person picture from the local PC to upload it to the client. Note: The picture should be in *.jpg format.
Page 50
Access Controller·User Manual indoor station. Room No.: You can input the room No. of the person. 3. Click OK to save the settings. Adding Person (Permission) You can assign the permissions (including operation permissions of access control device and access control permissions) to the person when adding person.
Page 51
Access Controller·User Manual 2. Click Add to pop up the Add Card dialog. 3. Select the card type according to actual needs. Normal Card Card for Disabled Person: The door will remain open for the configured time period for the card holder.
Page 52
Access Controller·User Manual Card Enrollment Station: Place the card on the Card Enrollment Station and click Read to get the card No. Note: The Card Enrollment Station should connect with the PC running the client. You can click Set Card Enrollment Station to enter the following dialog. 2) Select the Card Enrollment Station type.
Page 53
Access Controller·User Manual 2. If the person joins in the time and attendance, check the Time and Attendance checkbox to enable this function for the person. Then the person’s card swiping records will be recorded and analyzed for time and attendance. For details about Time and Attendance, click More to go to the Time and Attendance module.
Page 54
Access Controller·User Manual 2) You can click Download Template for Importing Person to download the template first. 3) Input the person information to the downloaded template. 4) Click to select the Excel file with person information. 5) Click OK to start importing. Getting Person Information from Access Control Device If the added access control device has been configured with person information (including person details, fingerprint, issued card information), you can get the person information from the device...
Page 55
Access Controller·User Manual Managing Person Modifying and Deleting Person To modify the person information and attendance rule, click in the Operation column, or select the person and click Modify to open the editing person dialog. You can click to view the person’s card swiping records. To delete the person, select a person and click Delete to delete it.
Access Controller·User Manual 3. Input the password of the card itself in the Card Password field. The card password should contain 4 to 8 digits. Note: The password will be required when the card holder swiping the card to get enter to or exit from the door if you enable the card reader authentication mode as Card and Password, Password and Fingerprint, and Card, Password, and Fingerprint.
Access Controller·User Manual You can manage the schedule of access control permission including Week Schedule, Holiday Schedule, and Template. For permission settings, please refer to Chapter 7.7 Permission Configuration. 7.6.1 Week Schedule Click Week Schedule tab to enter the Week Schedule Management interface. The client defines two kinds of week plan by default: Whole Week Schedule and Blank Schedule, which cannot be deleted and edited.
Access Controller·User Manual period of time, the configured permission is activated. Note: Up to 8 time periods can be set for each day in the schedule. 5. When the cursor turns to , you can move the selected time bar you just edited. You can also edit the displayed time point to set the accurate time period.
Access Controller·User Manual information. 4. Click Add Holiday icon on the right to add a holiday period to the holiday list and configure the duration of the holiday. Note: Up to 16 holidays can be added to one holiday group. 1) On the period schedule, click and drag to draw the period, which means in that period of time, the configured permission is activated.
Page 60
Access Controller·User Manual There are two pre-defined templates by default: Whole Week Template and Blank Template, which cannot be deleted and edited. Whole Week Template: The card swiping is valid on each day of the week and it has no holiday group schedule.
Access Controller·User Manual 5. Select holiday groups to apply to the schedule. Note: Up to 4 holiday groups can be added. Click to select a holiday group in the list and click Add to add it to the template. You can also click Add Holiday Group to add a new one.
Access Controller·User Manual 7.7.1 Adding Permission Purpose: You can assign permission for persons to enter/exist the access control points (doors) in this section. Steps: 1. Click Add icon to enter following interface. In the Permission Name field, input the name for the permission as desired. 3.
Access Controller·User Manual permission to enter/exit the selected door/door station with their linked card(s) or fingerprints. 7. (Optional) after adding the permission, you can click Details to modify it. Or you can select the permission and click Modify to modify. You can select the added permission in the list and click Delete to delete it.
Access Controller·User Manual Click icon to enter the following interface. 7.8.1 Access Control Parameters Purpose: After configuring the person, template, and access control permission, you can configure the advanced functions of access control application. Click Access Control Parameters tab to enter the parameters settings interface. Door Parameters Steps: 1.
Page 65
Access Controller·User Manual 2. You can editing the following parameters: Door Magnetic: The Door Magnetic is in the status of Remain Closed (excluding special conditions). Exit Button Type: The Exit Button Type is in the status of Remain Open (excluding special conditions).
Access Controller·User Manual the card reader for longer than the set time, the card reader will turn offline automatically. Note: For DS-K2800 series access controller, the function is not supported yet. Buzzing Time: Set the card reader buzzing time. The available time ranges from 0 to 5999s. 0 represents continuous buzzing.
Access Controller·User Manual 6. Click Save button to save parameters. 7.8.3 Open Door with First Card Purpose: You can set multiple first cards for one access control point. After the first card swiping, it allows multiple persons access the door or other authentication actions. The first card mode contains Remain Open with First Card, Disable Remain Open with First Card, and First Card Authorization.
Access Controller·User Manual 3. Select the first card mode in the drop-down list for the access control point. 4. (Optional) If you select Remain Open with First Card, you should set remain open duration. Notes: The Remain Open Duration should be between 0 and 1440 minutes. By default, it is 10 minutes.
Page 69
Access Controller·User Manual You should enable the anti-passing back function on the access control device first. Setting the Path of Swiping Card (Card Reader Order) Steps: 1. Click Anti-passing Back tab to enter the following interface. 2. Select an access control device from the device list on the left. 3.
Access Controller·User Manual 7.8.5 Authentication Password Purpose: You can open the door by inputting the authentication password on the card reader keypad after finishing the operation of setting authentication password. Notes: This authentication password function is only valid during the schedules when the card reader authentication mode for the access control device is set as Card or Authentication Password.
Page 71
Access Controller·User Manual Steps: 1. Click Custom Wiegand to enter the Custom Wiegand tab. 2. Select a custom wiegand on the left of the interface. 3. Check Enable checkbox to enable the custom wiegand. 4. Set the wiegand name. 5. Select device. 1) Click Select Device.
Access Controller·User Manual 3) Click to move the selected rules to the right list. 4) (Optional) Click to change the rule order. 5) (Optional) Select the rules in the Selected Rule list and click to remove the rule from the list on the right. 6) Click OK to save the settings.
Access Controller·User Manual Steps: 1. Select the source. You can select Client or Device. 2. Enter the search condition (source, event type/card holder name/card No./capture/start & end time). 3. Click Search to get the search results. 4. View the event information in the event list. 5.
Page 74
Access Controller·User Manual Note: The linkage here refers to the linkage of the client software’s own actions. Steps: 1. Click the Access Control Event tab. 2. The added access control devices will display in the Access Control Device panel on the left. Select the access control device, or alarm input, or access control point (door), or card reader to configure the event linkage.
Access Controller·User Manual Alarm Triggered The image with alarm information pops up when alarm is Pop-up Image triggered. 7.10.2 Access Control Alarm Input Linkage Purpose: The access control alarm inputs can be linked to some actions (e.g., alarm output, host buzzer) when it is triggered.
Page 76
Access Controller·User Manual The linkage here refers to the linkage of the client software’s own actions. Select the access control device from the list on the left. Click Add button to add a new linkage. You can select the event source as Event Linkage or Card Linkage.
Access Controller·User Manual 5. Click Save button to save and take effect of the parameters. 7.10.4 Cross-Device Linkage Purpose: You can assign to trigger other access control device’s action by setting up a rule when the access control event is triggered. Click Cross-Device Linkage tab to enter the following interface.
Access Controller·User Manual Alarm Output: The alarm output will be triggered for notification. Access Control Point: The door status of open, close, remain open, and remain close will be triggered. Note: The door status of open, close, remain open, and remain close cannot be triggered at the same time.
Page 79
Access Controller·User Manual 3. Perform the following steps to add the group. 1) Click to open the Add Group dialog box. 2) Input a group name as you want. 3) Click OK to add the new group to the group list. You can also check the checkbox Create Group by Device Name to create the new group by the name of the selected device.
Access Controller·User Manual 5. After importing the access control points to the group, you can click , or double-click the group/access control point name to modify it. 7.11.2 Anti-control the Access Control Point (Door) Purpose: You can control the status for a single access control point (a door), including opening door, closing door, remaining open, and remaining closed.
Access Controller·User Manual 1. Select an access control group on the left. For managing the access control group, refer to Chapter 7.11.1 Access Control Group Management. 2. The access control points of the selected access control group will be displayed on the right. Click icon on the Status Information panel to select a door.
Page 82
Access Controller·User Manual Steps: 1. Click to select a door from the access control device list on the left. 2. On the Door Status Configuration panel on the right, draw a schedule for the selected door. 1) Select a door status brush as Remain Open: The door will keep open during the configured time period.
Access Controller·User Manual time bar settings to the other days in the week. 4. You can select the time bar and click Delete Duration to delete the time period. Or you can click Clear to clear all configured durations on the schedule. 5.
Access Controller·User Manual Steps: All access control alarms will display in the list in real time. You can view the alarm type, alarm time, location, etc. Click to view the alarm on E-map. You can click to view the live view or the captured picture of the triggered camera when the alarm is trigged.
Page 85
Access Controller·User Manual You can arm or disarm the device. After arming the device , the client can receive the alarm information from the device. Steps: 1. Click Tool->Device Arming Control to pop up the Device Arming Control window. 2. Arm the device by checking the corresponding checkbox. Then the alarm information will be auto uploaded to the client software when alarm occurs.
Access Controller·User Manual Appendix A Sound Prompt and Indicator After the card reader is powered on, LED status indicator will turn blue and blink for 1 time. Then it will turn red and blink for 3 times. At last the buzzer will send out a beep sound indicating the starting up process is completed.
Access Controller·User Manual Appendix B Custom Wiegand Rule Take Wiegand 44 as an example, the setting values in the Custom Wiegand tab are as follows: Custom Wiegand Name: Wiegand 44 Total Length Transformation Rule (Decimal byFormatRule[4]=[1][4][0][0] Digit) Parity Mode XOR Parity Odd Parity Start Bit Length Even Parity Start Bit...
Need help?
Do you have a question about the DS-K2801 and is the answer not in the manual?
Questions and answers