You are on page 1of 315

Operator's Manual

Bioscrypt V-Station 4G Bioscrypt V-Flex 4G


Document Version 1.0

Copyright Information

COPYRIGHT INFORMATION
2009, L-1 Identity Solutions, Inc. All rights reserved. This product and related documentation are protected by copyright and distributed under licenses restricting their use, copying, distribution, and de-compilation. No part of this product or related documentation may be reproduced in any form by any means without written permission from L-1 Identity Solutions and its licensors, if any. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. Neither the name of the BioAPI Consortium nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. TRADEMARKS The trademarks identified herein are the trademarks or registered trademarks of L-1 Identity Solutions, Inc. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders or manufacturers. THE PRODUCT AND PUBLICATION ARE PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. THIS PUBLICATION COULD INCLUDE TECHNICAL INACCURACIES OR TYPOGRAPHICAL ERRORS. CHANGES ARE PERIODICALLY ADDED TO THE INFORMATION HEREIN; THESE CHANGES WILL BE INCORPORATED IN NEW EDITIONS OF THE PUBLICATION. L-1 IDENTITY SOLUTIONS, INC MAY MAKE IMPROVEMENTS AND/OR CHANGES IN THE PRODUCT(S) AND/OR THE PROGRAM(S) DESCRIBED IN THIS PUBLICATION AT ANY TIME. IMPORTANTPlease refer to the L-1 Identity Solutions End User License Agreement document and read it carefully before using any L-1 Identity Solutions software on your computer. This document contains important information about your legal rights.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

ii

Table of Contents

TABLE OF CONTENTS
1. Introduction ......................................................................................................................................... 1-2 1.1. Symbols Used in this Guide................................................................................................ 1-2 1.2. Product Overview................................................................................................................ 1-3 1.2.1. V-Station 4G ...................................................................................................... 1-3 1.2.2. V-Flex 4G ........................................................................................................... 1-4 1.3. Template Support ............................................................................................................... 1-5 1.4. Proximity Cards................................................................................................................... 1-8 1.4.1. Command Cards ................................................................................................ 1-8 1.4.2. Smart Cards........................................................................................................ 1-8 2. Operating the V-Station 4G from the Front Panel............................................................................... 2-4 2.1. Accessing Administrator Mode ........................................................................................... 2-5 2.2. System Menu ...................................................................................................................... 2-6 2.2.1. LED Settings ....................................................................................................... 2-6 2.2.1.1. Illumination Type .................................................................................. 2-7 2.2.1.2. Low Intensity Value ...............................................................................2-7 2.2.1.3. High Intensity Value...............................................................................2-8 2.2.2. Data Transfer Menu ............................................................................................ 2-9 2.2.2.1. Transferring a Firmware File ................................................................ 2-9 2.2.2.2. Transferring a Wiegand File .............................................................. 2-10 2.2.2.3. Transferring a Language File ............................................................ 2-10 2.2.2.4. Transferring a Device Parameter File ............................................... 2-11 2.2.2.5. Transferring an Access Schedule File............................................... 2-12 2.2.2.6. Transferring Log Files........................................................................ 2-12 2.2.3. Device Settings ................................................................................................ 2-14 2.2.3.1. Soft Reboot........................................................................................ 2-14 2.2.3.2. Change Device Name ....................................................................... 2-15 2.2.3.3. Change Device Password ................................................................. 2-16 2.2.3.4. Firmware Upgrade............................................................................. 2-17 2.2.3.5. Date/Time Settings ............................................................................ 2-18 2.2.3.6. Set Factory Default............................................................................ 2-19 2.2.3.7. SDC/Tamper Settings........................................................................ 2-21 2.2.4. Transaction Log ............................................................................................... 2-25 2.2.4.1. View Log............................................................................................ 2-25 2.2.4.2. Erase Log .......................................................................................... 2-27

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

iii

Table of Contents

2.2.5. Display Settings ............................................................................................... 2-28 2.2.6. Change CVE Mode Menu ................................................................................ 2-29 2.2.7. Erase Verify Queue.......................................................................................... 2-30 2.3. System Information Menu ................................................................................................ 2-31 2.3.1. Device Information ........................................................................................... 2-31 2.3.2. Firmware Information ....................................................................................... 2-33 2.3.3. Template Information ....................................................................................... 2-33 2.3.4. Communication Information ............................................................................. 2-35 2.4. Security Menu .................................................................................................................. 2-37 2.4.1. Duress Mode.................................................................................................... 2-37 2.4.2. Password Mode ............................................................................................... 2-38 2.4.3. Biometric Mode ................................................................................................ 2-39 2.4.4. Aux Port State.................................................................................................. 2-40 2.4.5. Access Schedule ............................................................................................. 2-41 2.4.6. Global Security................................................................................................. 2-42 2.4.6.1. Verify Security ................................................................................... 2-42 2.4.6.2. Identify Security ................................................................................. 2-43 2.4.7. Multi User Verify............................................................................................... 2-43 2.4.7.1. Multi User Verify Fingers ................................................................... 2-44 2.4.7.2. Multi User Verify Timeout .................................................................. 2-44 2.5. Communication Menu ...................................................................................................... 2-45 2.5.1. Wiegand Admin Menu...................................................................................... 2-45 2.5.1.1. Wiegand Settings .............................................................................. 2-46 2.5.1.2. Display Wiegand Format ................................................................... 2-48 2.5.2. Verify Actions ................................................................................................... 2-49 2.5.2.1. Host Port............................................................................................ 2-49 2.5.2.2. Auxiliary Port ..................................................................................... 2-50 2.5.3. Network Interface............................................................................................. 2-51 2.5.3.1. Ethernet ............................................................................................. 2-51 2.5.3.2. WLAN ................................................................................................ 2-54 2.5.3.3. Ethernet Security ............................................................................... 2-59 2.5.4. Serial Communication...................................................................................... 2-59 2.5.4.1. Host Baud Rate ................................................................................. 2-59 2.5.4.2. Host Protocol ..................................................................................... 2-60 2.5.4.3. Net ID................................................................................................. 2-60

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

iv

Table of Contents

2.6. Multimedia Menu ............................................................................................................. 2-61 2.6.1. Audio Files ....................................................................................................... 2-61 2.6.1.1. Copying a Device Event Audio File from a USB Key to the Device.. 2-62 2.6.1.2. Changing a Device Event Audio File on the Device.......................... 2-63 2.6.1.3. Deleting Device Event Audio Files from the USB Key ...................... 2-65 2.6.1.4. Deleting Device Event Audio Files from the Device ......................... 2-66 2.6.1.5. Copying All Device Event Audio Files to the USB Key ..................... 2-67 2.6.1.6. Copying All Device Event Audio Files from USB Key to Device ....... 2-68 2.6.2. Display Files..................................................................................................... 2-69 2.6.3. Audio State ..................................................................................................... 2-70 2.6.4. Audio State ..................................................................................................... 2-71 2.6.4.1. Device Audio Volume and Key Press Sound .................................... 2-71 2.6.4.2. Key Press Sound .............................................................................. 2-72 2.6.5. Initialize USB ................................................................................................... 2-72 2.6.6. Format USB .................................................................................................... 2-74 2.7. Template Menu ............................................................................................................... 2-75 2.7.1. Enroll (Add) User ........................................................................................... 2-75 2.7.2. Delete User .................................................................................................... 2-80 2.7.3. Delete All Users ............................................................................................. 2-82 2.7.4. Delete Smart Card ......................................................................................... 2-83 2.7.5. Verify User ..................................................................................................... 2-85 2.7.6. Edit User ........................................................................................................ 2-86 2.7.7. Bypass Next Verification ................................................................................. 2-90 2.7.8. Template Type ................................................................................................ 2-91 2.8. Keypad Verification .......................................................................................................... 2-93 2.9. Keypad Identification........................................................................................................ 2-94 2.10. Keypad Identification on 50K Products ......................................................................... 2-94 3. Managing Users ................................................................................................................................. 3-2 3.1. Users Tab............................................................................................................................ 3-2 3.2. User Groups Tab ................................................................................................................ 3-4 3.3. Companies Tab .................................................................................................................. 3-6 3.4. Sites Tab ............................................................................................................................. 3-8 3.5. Departments Tab ............................................................................................................. 3-10 4. Enrollment Tab.................................................................................................................................... 4-2 4.1. Quick Enrollment ................................................................................................................ 4-3 4.2. Advanced Enrollment.......................................................................................................... 4-6 4.3. 50K Enrollment ................................................................................................................ 4-11

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

Table of Contents

5. Managing Templates........................................................................................................................... 5-2 5.1. Viewing Templates on a Device.......................................................................................... 5-2 5.2. Exporting Templates from a Device ................................................................................... 5-3 5.3. Exporting Templates from a Database .............................................................................. 5-4 5.4. Viewing Templates in a Database ..................................................................................... 5-5 5.5. Editing Templates .............................................................................................................. 5-6 5.6. Applying Dynamic Messages to Templates ....................................................................... 5-7 5.7. Verifying Templates ........................................................................................................... 5-7 5.8. Importing Templates into the Database ............................................................................. 5-8 5.9. Converting Templates ..................................................................................................... 5-12 5.10. Comparing Templates ................................................................................................... 5-13 5.11. Managing Templates on 1:50K Devices ....................................................................... 5-14 5.12. Managing Dynamic Messages ...................................................................................... 5-15 6. Managing Device Settings ................................................................................................................. 6-2 6.1. General Tab ........................................................................................................................ 6-2 6.2. Time and Attendance Tab................................................................................................... 6-3 6.3. Communication Tab............................................................................................................ 6-4 6.4. LED Table Tab .................................................................................................................... 6-6 6.5. Tamper Tab......................................................................................................................... 6-7 6.6. Single Door Access Control Tab......................................................................................... 6-8 6.6.1 Configuring Single Door Access Control ..............................................................6-8 6.6.2 Activating Time Override Mode ............................................................................6-9 6.7. Access Schedules Tab .................................................................................................... 6-10 6.8. Holiday Schedules Tab .................................................................................................... 6-12 6.9. Miscellaneous Tab ........................................................................................................... 6-14 6.10. Audio Tab....................................................................................................................... 6-16 6.11. Dynamic Message Tab .................................................................................................. 6-18 6.12. LCD Tab......................................................................................................................... 6-20 6.13. General Purpose I/O Tab............................................................................................... 6-22 6.14. Wiegand Tab.................................................................................................................. 6-25 6.15. Biometrics Tab ............................................................................................................... 6-31 6.16. Clock Tab ....................................................................................................................... 6-34 6.17. Biometric Schedules Tab ............................................................................................... 6-35 6.18. Database - Managing Wiegand Formats ....................................................................... 6-37 7. Managing Network Settings ................................................................................................................ 7-2 7.1. View Devices in Network .................................................................................................... 7-3 7.2. Register Device via Server ................................................................................................. 7-4

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

vi

Table of Contents

7.3. Register Device via Client................................................................................................... 7-6 8. Managing Smart Cards ....................................................................................................................... 8-2 8.1. Smart Card Device Manager .............................................................................................. 8-3 8.1.1. Smart Card Security Settings ............................................................................ 8-6 8.1.1.1. Changing the Site Key.......................................................................... 8-7 8.1.2. Configure Card Layout........................................................................................ 8-9 8.1.2.1. iCLASS Cards ...................................................................................... 8-9 8.1.2.2. MiFARE Cards................................................................................... 8-11 8.1.2.3. DESFire Cards .................................................................................. 8-17 8.2. Smart Card Manager ....................................................................................................... 8-17 8.2.1. Deleting Templates ......................................................................................... 8-18 8.2.2. Deleting Wiegand Strings ................................................................................ 8-18 8.2.3. Securing Cards ................................................................................................ 8-18 8.2.4. Resetting Cards ............................................................................................... 8-18 8.3. Smart Card Template Support ........................................................................................ 8-19 9. Managing Site Keys ............................................................................................................................ 9-2 9.1. Site Keys ............................................................................................................................. 9-2 9.2. Site Key Files ...................................................................................................................... 9-2 9.3. Site Key Sidebar Tab .......................................................................................................... 9-3 9.4. Creating a Site Key File ...................................................................................................... 9-3 9.5. Resetting a Site Key ........................................................................................................... 9-6 9.6. Forgotten Site Keys ............................................................................................................ 9-6 9.7. Compromised Site Keys ..................................................................................................... 9-6 10. Broadcasting Settings ................................................................................................................... 10-2 10.1. Broadcast Device Settings............................................................................................. 10-3 10.1.1. LED Table Tab ................................................................................... 10-5 10.1.2. Tamper Tab ........................................................................................ 10-6 10.1.3. Wiegand Tab ...................................................................................... 10-7 10.1.4. Single Door Access Control Tab ...................................................... 10-13 10.1.5. Miscellaneous Tab............................................................................ 10-14 10.1.6. General Purpose I/O Tab ................................................................. 10-16 10.1.7. Access Schedule Tab....................................................................... 10-19 10.1.8. Holiday Schedule Tab ....................................................................... 10-21 10.1.9. Biometric Schedules Tab.................................................................. 10-23 10.1.10. Clock Tab ....................................................................................... 10-25 10.1.11. Time and Attendance Tab .............................................................. 10-26 10.2. Broadcast Firmware Package...................................................................................... 10-27 10.3. Broadcast Image File ................................................................................................... 10-29
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

vii

Table of Contents

10.4. Broadcast Audio File.................................................................................................... 10-30 10.5. Broadcast Smart Card Layout File............................................................................... 10-31 11. Managing Logs............................................................................................................................... 11-2 11.1. SecureAdmin Event Log ................................................................................................ 11-3 11.2. Transaction Log ............................................................................................................. 11-5 11.3. Device Event Log........................................................................................................... 11-7 12. Menu Bar ....................................................................................................................................... 12-2 12.1. File Menu ....................................................................................................................... 12-2 12.1.1. Sign In As ...................................................................................................... 12-2 12.1.2. Change Password.......................................................................................... 12-3 12.1.3. Exit ................................................................................................................ 12-3 12.2. Manage Menu ................................................................................................................ 12-3 12.3. Tools Menu .................................................................................................................... 12-4 12.3.1. Firmware Upgrade ........................................................................................ 12-4 12.3.2. Sensor Test.................................................................................................... 12-7 12.3.3. Sensor Calibration ........................................................................................ 12-8 12.3.4. Synchronization ........................................................................................... 12-10 12.3.5. Reset to Factory Default ............................................................................. 12-11 12.3.6. Get MAC Address ........................................................................................ 12-12 12.4. Help Menu.................................................................................................................... 12-13 12.4.1. Help Content ............................................................................................... 12-13 12.4.2. Product Registration .................................................................................... 12-13 12.4.3. About SecureAdmin ..................................................................................... 12-13 13. Enrollment Best Practices ............................................................................................................. 13-2 13.1. Enrollment Basics ......................................................................................................... 13-2 13.1.1. Suggested Fingers ........................................................................................ 13-2 13.1.2. Consistent Finger Placement ........................................................................ 13-2 13.1.3. Proper Finger Orientation ............................................................................. 13-5 13.1.4. Centering the Core ........................................................................................ 13-6 13.2. Finger Placement Feedback ......................................................................................... 13-6 13.2.1. Troubleshooting Enrollment Problems Using FPF ....................................... 13-7 14. Company Contacts......................................................................................................................... 14-1 14.1. Registering your Product .............................................................................................. 14-1

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

viii

List of Figures

LIST OF FIGURES
Figure 1-1: V-Station 4G Device ............................................................................................................ 1-3 Figure 1-2: V-Flex 4G Device ................................................................................................................ 1-4 Figure 1-3: HID Prox Card ..................................................................................................................... 1-8 Figure 2-1: V-Station 4G Device Keypad................................................................................................ 2-4 Figure 2-2: Enter Admin Password ......................................................................................................... 2-5 Figure 2-3: Admin Menu - Top Level ...................................................................................................... 2-5 Figure 2-4: System Menu Icon................................................................................................................ 2-6 Figure 2-5: System Menu Screen ........................................................................................................... 2-6 Figure 2-6: LED Settings Menu .............................................................................................................. 2-6 Figure 2-7: Illumination Type ................................................................................................................. 2-7 Figure 2-8: Low Intensity Value ............................................................................................................. 2-7 Figure 2-9: High Intensity Value ............................................................................................................. 2-8 Figure 2-10: Data Transfer Item ............................................................................................................. 2-9 Figure 2-11: Data Transfer Menu ........................................................................................................... 2-9 Figure 2-12: Firmware File ..................................................................................................................... 2-9 Figure 2-13: Wiegand File ................................................................................................................... 2-10 Figure 2-14: Language File Item ......................................................................................................... 2-10 Figure 2-15: Device Parameter File .................................................................................................... 2-11 Figure 2-16: Device Parameter File Screen ........................................................................................ 2-11 Figure 2-17: Language File Item ......................................................................................................... 2-12 Figure 2-18: Log Files Item ................................................................................................................. 2-12 Figure 2-19: Log Files Screen ............................................................................................................. 2-12 Figure 2-20: Event Log Filter Criteria................................................................................................... 2-13 Figure 2-21: Filtered Transaction Log Filter Criteria ........................................................................... 2-13 Figure 2-22: Device Settings Item........................................................................................................ 2-14 Figure 2-23: Device Settings Menu...................................................................................................... 2-14 Figure 2-24: Soft Reboot Item.............................................................................................................. 2-14 Figure 2-25: Perform Soft Reboot........................................................................................................ 2-15 Figure 2-26: Device Name ................................................................................................................... 2-15 Figure 2-27: F2 Keyboard .................................................................................................................... 2-15 Figure 2-28: Old Device Password ...................................................................................................... 2-16 Figure 2-29: New Device Password..................................................................................................... 2-16 Figure 2-30: Confirm New Device Password ....................................................................................... 2-16

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

ix

List of Figures

Figure 2-31: Firmware Upgrade........................................................................................................... 2-17 Figure 2-32: Date/Time Settings Menu ................................................................................................ 2-18 Figure 2-33: Daylight Savings Time Menu........................................................................................... 2-18 Figure 2-34: Clock Settings Menu........................................................................................................ 2-19 Figure 2-35: Set Factory Default Item.................................................................................................. 2-19 Figure 2-36: Factory Default Reset Menu............................................................................................ 2-20 Figure 2-37: SDC/Tamper Settings Menu............................................................................................ 2-21 Figure 2-38: GPIO General Mode........................................................................................................ 2-21 Figure 2-39: SDC Mode ....................................................................................................................... 2-22 Figure 2-40: TOM Options Item ........................................................................................................... 2-23 Figure 2-41: TOM State Menu ............................................................................................................. 2-23 Figure 2-42: Tamper Settings Item ...................................................................................................... 2-24 Figure 2-43: Tamper Settings Menu .................................................................................................... 2-24 Figure 2-44: Transaction Log Menu..................................................................................................... 2-25 Figure 2-45: Transaction Log Menu..................................................................................................... 2-25 Figure 2-46: Filter Criteria .................................................................................................................... 2-26 Figure 2-47: Log Display Filter............................................................................................................. 2-26 Figure 2-48: Transaction Log............................................................................................................... 2-26 Figure 2-49: Erase Log ........................................................................................................................ 2-27 Figure 2-50: Confirm Erase.................................................................................................................. 2-27 Figure 2-51: Display Settings Item....................................................................................................... 2-28 Figure 2-52: Display Options Menu ..................................................................................................... 2-28 Figure 2-53: Change CVE Mode Menu................................................................................................ 2-29 Figure 2-54: Enable CVE Mode ........................................................................................................... 2-29 Figure 2-55: Erase Verify Queue Item ................................................................................................. 2-30 Figure 2-56: Erase Verify Queue ......................................................................................................... 2-30 Figure 2-57: System Information Icon.................................................................................................. 2-31 Figure 2-58: System Info Menu............................................................................................................ 2-31 Figure 2-59: Device Info Menu - Device ID.......................................................................................... 2-31 Figure 2-60: Device Info Menu - Device Name.................................................................................... 2-32 Figure 2-61: Device Info Menu - Device Type ..................................................................................... 2-32 Figure 2-62: Device Info Menu - Serial Number .................................................................................. 2-32 Figure 2-63: Firmware Information Item............................................................................................... 2-33

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

List of Figures

Figure 2-64: Firmware Info................................................................................................................... 2-33 Figure 2-65: Template Info - Template Type ....................................................................................... 2-33 Figure 2-66: Number of Enrolled Templates........................................................................................ 2-34 Figure 2-67: Maximum Number of Templates ..................................................................................... 2-34 Figure 2-68: Communication Information Item .................................................................................... 2-35 Figure 2-69: Communication Info - Ethernet IP Address ..................................................................... 2-35 Figure 2-70: Ethernet MAC Address.................................................................................................... 2-35 Figure 2-71: Communication Info - WLAN IP Address ........................................................................ 2-36 Figure 2-72: Communication Info - WLAN MAC Address.................................................................... 2-36 Figure 2-73: Communication Info - Host Protocol................................................................................ 2-36 Figure 2-74: Communication Info - Baud Rate .................................................................................... 2-36 Figure 2-75: Security Menu Icon.......................................................................................................... 2-37 Figure 2-76: Security Menu.................................................................................................................. 2-37 Figure 2-77: Enable Duress Mode ....................................................................................................... 2-37 Figure 2-78: Password Mode Item....................................................................................................... 2-38 Figure 2-79: Enable Password Mode................................................................................................... 2-38 Figure 2-80: Biometric Mode................................................................................................................ 2-39 Figure 2-81: Disable Biometric Mode................................................................................................... 2-39 Figure 2-82: Aux Port State Item ......................................................................................................... 2-40 Figure 2-83: Disable Aux Port.............................................................................................................. 2-40 Figure 2-84: Access Schedule Item ..................................................................................................... 2-41 Figure 2-85: Enable Access Schedule................................................................................................. 2-41 Figure 2-86: Global Security Item ........................................................................................................ 2-42 Figure 2-87: Global Security Menu - Verify Security Item.................................................................... 2-42 Figure 2-88: Global Security Menu - Identify Security Item ................................................................. 2-43 Figure 2-89: Multi User Verify Item ...................................................................................................... 2-43 Figure 2-90: Multi User Options Menu ................................................................................................. 2-44 Figure 2-91: Multi User Verify Timeout ................................................................................................ 2-44 Figure 2-92: Communication Menu Icon.............................................................................................. 2-45 Figure 2-93: Wiegand Admin ............................................................................................................... 2-45 Figure 2-94: Wiegand Settings ............................................................................................................ 2-46 Figure 2-95: Wiegand Formats ............................................................................................................ 2-46 Figure 2-96: Wiegand Input Port.......................................................................................................... 2-47 Figure 2-97: Wiegand Output Port ....................................................................................................... 2-47

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

xi

List of Figures

Figure 2-98: Display Wiegand Format ................................................................................................. 2-48 Figure 2-99: Current Wiegand Format - Standard 26 Wiegand Format .............................................. 2-48 Figure 2-100: Verify Actions Item......................................................................................................... 2-49 Figure 2-101: Host Port........................................................................................................................ 2-49 Figure 2-102: Auxiliary Port ................................................................................................................. 2-50 Figure 2-103: Network Interface Item .................................................................................................. 2-51 Figure 2-104: Ethernet Item ................................................................................................................. 2-51 Figure 2-105: IP Configuration............................................................................................................. 2-52 Figure 2-106: DHCP............................................................................................................................. 2-52 Figure 2-107: Static IP ......................................................................................................................... 2-52 Figure 2-108: Static IP ......................................................................................................................... 2-52 Figure 2-109: Subnet Mask.................................................................................................................. 2-53 Figure 2-110: Gateway Address .......................................................................................................... 2-53 Figure 2-111: Show IP Information ...................................................................................................... 2-53 Figure 2-112: WLAN ............................................................................................................................ 2-54 Figure 2-113: WLAN Configuration Item.............................................................................................. 2-54 Figure 2-114: WLAN Network Type ..................................................................................................... 2-54 Figure 2-115: WLAN Scanning ............................................................................................................ 2-55 Figure 2-116: WLAN Parameters......................................................................................................... 2-55 Figure 2-117: Ad-hoc WLAN Network Type......................................................................................... 2-56 Figure 2-118: Enter ESSID .................................................................................................................. 2-56 Figure 2-119: WLAN Options Menu..................................................................................................... 2-57 Figure 2-120: Show IP Information ...................................................................................................... 2-57 Figure 2-121: Operating Wirelessly ..................................................................................................... 2-57 Figure 2-122: Ethernet Security Item ................................................................................................... 2-58 Figure 2-123: Confirm Ethernet Security ............................................................................................. 2-59 Figure 2-124: Serial Communication Item ........................................................................................... 2-59 Figure 2-125: Host Baud Rate ............................................................................................................. 2-59 Figure 2-126: Host Protocol ................................................................................................................. 2-60 Figure 2-127: Net ID............................................................................................................................. 2-60 Figure 2-128: Multimedia Icon ............................................................................................................. 2-61 Figure 2-129: Multimedia Menu ........................................................................................................... 2-61 Figure 2-130: Audio Files Item............................................................................................................. 2-61 Figure 2-131: Audio Files -Tamper ...................................................................................................... 2-62

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

xii

List of Figures

Figure 2-132: On USB Item ................................................................................................................. 2-62 Figure 2-133: Audio Files On USB....................................................................................................... 2-63 Figure 2-134: On Device Item.............................................................................................................. 2-63 Figure 2-135: Audio Files On Device ................................................................................................... 2-63 Figure 2-136: Confirm As Default ........................................................................................................ 2-64 Figure 2-137: File Set As Default......................................................................................................... 2-64 Figure 2-138: Delete All from USB Item............................................................................................... 2-65 Figure 2-139: Confirm Delete All From USB........................................................................................ 2-65 Figure 2-140: Delete All from Device Item ........................................................................................... 2-66 Figure 2-141: Confirm Delete All From Device .................................................................................... 2-66 Figure 2-142: Copy All From Device to USB Item ............................................................................... 2-67 Figure 2-143: Confirm Copy All to USB ............................................................................................... 2-67 Figure 2-144: Copy All from USB to Device Item ................................................................................ 2-68 Figure 2-145: Confirm Copy All from USB to Device........................................................................... 2-68 Figure 2-146: Display Files Item .......................................................................................................... 2-69 Figure 2-147: Display Files .................................................................................................................. 2-69 Figure 2-148: Logo Menu..................................................................................................................... 2-69 Figure 2-149: Audio State Item ............................................................................................................ 2-70 Figure 2-150: Message Attention Audio State ..................................................................................... 2-70 Figure 2-151: Device Audio Settings Item ........................................................................................... 2-71 Figure 2-152: Device Audio Volume Item ............................................................................................ 2-71 Figure 2-153: Key Press Sound Item................................................................................................... 2-72 Figure 2-154: Initialize USB ................................................................................................................. 2-72 Figure 2-155: Confirm Initialize USB.................................................................................................... 2-73 Figure 2-156: Initialize USB Status ...................................................................................................... 2-73 Figure 2-157: Folder Structure............................................................................................................. 2-73 Figure 2-158: Format USB Item........................................................................................................... 2-74 Figure 2-159: Confirm Format USB Device ......................................................................................... 2-74 Figure 2-160: Format USB Device Status............................................................................................ 2-74 Figure 2-161: Template Icon................................................................................................................ 2-75 Figure 2-162: Enroll Item...................................................................................................................... 2-75 Figure 2-163: Enroll Menu - Enroll (Add) User .................................................................................... 2-75 Figure 2-164: Enter Enroll ID ............................................................................................................... 2-76 Figure 2-165: Place Finger Prompt...................................................................................................... 2-76

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

xiii

List of Figures

Figure 2-166: Enroll Quality ................................................................................................................. 2-76 Figure 2-167: Select Finger Menu ....................................................................................................... 2-77 Figure 2-168: User Name..................................................................................................................... 2-77 Figure 2-169: Security Level ................................................................................................................ 2-77 Figure 2-170: Enroll User Menu - Duress Finger................................................................................. 2-78 Figure 2-171: Access Schedule ........................................................................................................... 2-78 Figure 2-172: User Type ...................................................................................................................... 2-78 Figure 2-173: Template Index.............................................................................................................. 2-78 Figure 2-174: Password ....................................................................................................................... 2-79 Figure 2-175: Save To ......................................................................................................................... 2-79 Figure 2-176: Template Saved ............................................................................................................ 2-79 Figure 2-177: Delete Item .................................................................................................................... 2-80 Figure 2-178: Delete User Menu.......................................................................................................... 2-80 Figure 2-179: Enter Delete ID .............................................................................................................. 2-80 Figure 2-180: Enter Template Index .................................................................................................... 2-81 Figure 2-181: Confirm User Deletion ................................................................................................... 2-81 Figure 2-182: Template Erased ........................................................................................................... 2-81 Figure 2-183: Delete All Users Item..................................................................................................... 2-82 Figure 2-184: Confirm Delete All Users ............................................................................................... 2-82 Figure 2-185: All Users Deleted........................................................................................................... 2-82 Figure 2-186: Delete Smart Card Item................................................................................................. 2-83 Figure 2-187: Place Smart Card .......................................................................................................... 2-83 Figure 2-188: Select Delete Slot .......................................................................................................... 2-83 Figure 2-189: Enter Site Key................................................................................................................ 2-84 Figure 2-190: Confirm Delete Template............................................................................................... 2-84 Figure 2-191: Delete Success.............................................................................................................. 2-84 Figure 2-192: Verify.............................................................................................................................. 2-85 Figure 2-193: Edit User ........................................................................................................................ 2-86 Figure 2-194: Enter Edit ID .................................................................................................................. 2-86 Figure 2-195: Enter Template Index .................................................................................................... 2-86 Figure 2-196: Select Finger ................................................................................................................. 2-87 Figure 2-197: F2 User Name Keyboard............................................................................................... 2-87 Figure 2-198: Security Level ................................................................................................................ 2-87 Figure 2-199: Duress Finger ................................................................................................................ 2-88

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

xiv

List of Figures

Figure 2-200: Access Schedule ........................................................................................................... 2-88 Figure 2-201: User Type ...................................................................................................................... 2-88 Figure 2-202: Template Index.............................................................................................................. 2-88 Figure 2-203: Password ....................................................................................................................... 2-89 Figure 2-204: Save To ......................................................................................................................... 2-89 Figure 2-205: Save Successful ............................................................................................................ 2-89 Figure 2-206: Bypass Next Verification Item ....................................................................................... 2-90 Figure 2-207: Next Verification Bypassed............................................................................................ 2-90 Figure 2-208: Template Type............................................................................................................... 2-91 Figure 2-209: Select Template Type.................................................................................................... 2-91 Figure 2-210: Confirm Template Type Change ................................................................................... 2-91 Figure 2-211: Template Type Set ........................................................................................................ 2-92 Figure 2-212: Enter Verify ID ............................................................................................................... 2-93 Figure 2-213: Place Finger .................................................................................................................. 2-93 Figure 3-1: Users Tab ............................................................................................................................ 3-2 Figure 3-2: Add User Dialog Box ........................................................................................................... 3-3 Figure 3-3: User Groups Tab ................................................................................................................. 3-4 Figure 3-4: Add User Group Dialog Box ................................................................................................ 3-5 Figure 3-5: Assigning Roles and Permissions ....................................................................................... 3-5 Figure 3-6: Companies Tab ................................................................................................................... 3-6 Figure 3-7: Add Company Dialog Box ................................................................................................... 3-7 Figure 3-8: Sites Tab .............................................................................................................................. 3-8 Figure 3-9: Add Site Dialog Box ............................................................................................................. 3-9 Figure 3-10: Departments Tab ............................................................................................................ 3-10 Figure 3-11: Add Department Dialog Box ........................................................................................... 3-11 Figure 4-1: Enrollment Tab .................................................................................................................... 4-2 Figure 4-2: Quick Enrollment Dialog Box ............................................................................................... 4-3 Figure 4-3: FPF Crosshairs .................................................................................................................... 4-3 Figure 4-4: Quick Enrollment Dialog Box - Scan Results ...................................................................... 4-4 Figure 4-5: Quick Enrollment - Select Destination ................................................................................. 4-5 Figure 4-6: Store Template to Device Dialog Box ................................................................................. 4-5 Figure 4-7: Advanced Enrollment Dialog Box ........................................................................................ 4-6 Figure 4-8: Advanced Enrollment Dialog Box - Scan Results ............................................................... 4-7 Figure 4-9: Advanced Enrollment Dialog Box - Manual Selection Accept Buttons ................................ 4-8 Figure 4-10: Advanced Enrollment Dialog Box - User Data .................................................................. 4-9

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

xv

List of Figures

Figure 4-11: Advanced Enrollment - Select Destination ..................................................................... 4-10 Figure 4-12: Store Template to Device Dialog Box ............................................................................ 4-10 Figure 4-13: Quick Enrollment - Enter Bin Number ............................................................................ 4-11 Figure 4-14: Advanced Enrollment - Enter Bin Number ..................................................................... 4-12 Figure 5-1: Templates on Device ........................................................................................................... 5-2 Figure 5-2: Export Templates Dialog Box .............................................................................................. 5-3 Figure 5-3: Browse for Folder Dialog Box .............................................................................................. 5-4 Figure 5-4: Template Export Successful ................................................................................................ 5-4 Figure 5-5: Templates in Database ........................................................................................................ 5-5 Figure 5-6: Edit Template Dialog Box .................................................................................................... 5-6 Figure 5-7: Edit Enrollment Dialog Box .................................................................................................. 5-6 Figure 5-8: Import Templates Dialog Box .............................................................................................. 5-8 Figure 5-9: Import Templates - Templates Selected ............................................................................. 5-9 Figure 5-10: Import Templates - Added Without Link ......................................................................... 5-10 Figure 5-11: Import Templates - Linked Record .................................................................................. 5-10 Figure 5-12: Import Successful ........................................................................................................... 5-11 Figure 5-13: Template Conversion ..................................................................................................... 5-12 Figure 5-14: Compare Templates Dialog Box .................................................................................... 5-13 Figure 5-15: Template Manager - Bin Icons ....................................................................................... 5-14 Figure 5-16: Dynamic Message on Device ......................................................................................... 5-15 Figure 5-17: Dynamic Message Tab ................................................................................................... 5-16 Figure 5-18: Audio Tab - Selecting Dynamic Message Attention Item ............................................... 5-17 Figure 5-19: Audio Tab - Set Volume ................................................................................................. 5-18 Figure 5-20: Templates Tab - Template Selected .............................................................................. 5-19 Figure 5-21: Message Options Dialog Box ......................................................................................... 5-20 Figure 5-22: Text Message ................................................................................................................. 5-20 Figure 5-23: Setting Start and End Date ............................................................................................. 5-20 Figure 5-24: Dynamic Message Test Button ....................................................................................... 5-21 Figure 5-25: SecureAdmin File Selection Dialog Box ......................................................................... 5-22 Figure 5-26: Preview Button Enabled ................................................................................................. 5-23 Figure 5-27: Image Viewer .................................................................................................................. 5-23 Figure 5-28: Message Options Dialog Box - Image Selected ............................................................. 5-24 Figure 5-29: Detaching Dynamic Message from Template ................................................................ 5-25 Figure 6-1: General Tab.......................................................................................................................... 6-2 Figure 6-2: Time and Attendance Tab .................................................................................................... 6-3 Figure 6-3: Communication Tab ............................................................................................................. 6-4

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

xvi

List of Figures

Figure 6-4: LED Table Tab ..................................................................................................................... 6-6 Figure 6-5: Tamper Tab .......................................................................................................................... 6-7 Figure 6-6: Single Door Access Control Tab .......................................................................................... 6-8 Figure 6-7: Access Schedules Tab ...................................................................................................... 6-10 Figure 6-8: Access Schedules Tab - New Access Schedule............................................................... 6-11 Figure 6-9: Holiday Schedules Tab...................................................................................................... 6-12 Figure 6-10: Holiday Schedules Tab.................................................................................................... 6-13 Figure 6-11: Miscellaneous Tab........................................................................................................... 6-14 Figure 6-12: Audio Tab ........................................................................................................................ 6-16 Figure 6-13: Audio Tab - New Audio File............................................................................................. 6-17 Figure 6-14: Dynamic Message Tab.................................................................................................... 6-18 Figure 6-15: Dynamic Message Tab - New File .................................................................................. 6-19 Figure 6-16: Dynamic Message Preview ............................................................................................. 6-19 Figure 6-17: LCD Tab .......................................................................................................................... 6-20 Figure 6-18: General Purpose I/O Tab ................................................................................................ 6-22 Figure 6-19: Wiegand Tab ................................................................................................................... 6-25 Figure 6-20: Wiegand Output Settings Dialog Box .............................................................................. 6-28 Figure 6-21: Custom Wiegand Settings Dialog Box ............................................................................ 6-29 Figure 6-22: New Wiegand Format Dialog Box ................................................................................... 6-29 Figure 6-23: New Wiegand Format Dialog Box- Add User .................................................................. 6-30 Figure 6-24: Biometrics Tab................................................................................................................. 6-31 Figure 6-25: Clock Tab......................................................................................................................... 6-34 Figure 6-26: Biometric Schedules Tab................................................................................................. 6-35 Figure 6-27: Database - Wiegand........................................................................................................ 6-37 Figure 6-28: Browse for Folder Dialog Box.......................................................................................... 6-38 Figure 6-29: Add Button ....................................................................................................................... 6-38 Figure 6-30: New Wiegand Format Dialog Box ................................................................................... 6-39 Figure 6-31: New Wiegand Format Dialog Box-Add User ................................................................... 6-39 Figure 7-1: Network Tab ........................................................................................................................ 7-2 Figure 7-2: Network Tree ....................................................................................................................... 7-3 Figure 7-3: Register Via Server Dialog Box ........................................................................................... 7-4 Figure 7-4: Register Device Dialog Box ................................................................................................. 7-5 Figure 7-5: Device Summary Dialog Box ............................................................................................... 7-5 Figure 7-6: Step 1 Find Device Dialog Box ............................................................................................ 7-6 Figure 7-7: Step 2 Device Information Dialog Box ................................................................................. 7-7

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

xvii

List of Figures

Figure 7-8: Step 3 Server Communication Parameter Dialog Box ........................................................ 7-7 Figure 7-9: Step 4 Register Device Dialog Box ..................................................................................... 7-8 Figure 7-10: Device Summary Dialog Box ............................................................................................. 7-8 Figure 8-1: Smart Card Sidebar Tab Dialog Box ................................................................................... 8-2 Figure 8-2: Smart Card Device Manager ............................................................................................... 8-3 Figure 8-3: Smart Card Security Settings Dialog Box ............................................................................ 8-6 Figure 8-4: Change Site Key Dialog Box ............................................................................................... 8-7 Figure 8-5: Change Site Key Warning ................................................................................................... 8-7 Figure 8-6: 16k iCLASS Smart Card Layout Manager ........................................................................... 8-9 Figure 8-7: 32K iCLASS Smart Card Layout Manager ....................................................................... 8-10 Figure 8-8: Smart Card Type Dialog Box ............................................................................................ 8-11 Figure 8-9: 1 kilobyte MiFARE Smart Card Layout Manager ............................................................. 8-11 Figure 8-10: 4 kilobyte MiFARE Smart Card Layout Manager ........................................................... 8-12 Figure 8-11: DESFire Card Layout Dialog Box ................................................................................... 8-16 Figure 8-12: Smart Card Manager ...................................................................................................... 8-17 Figure 9-1: Site Key Dialog Box ............................................................................................................. 9-3 Figure 9-2: Create Site Key Dialog Box ................................................................................................. 9-4 Figure 9-3: Reset Site Key Dialog Box .................................................................................................. 9-6 Figure 10-1: Broadcast Screen ........................................................................................................... 10-2 Figure 10-2: Device Settings - General Tab ....................................................................................... 10-3 Figure 10-3: Device Settings - Tab Selection Menu ........................................................................... 10-4 Figure 10-4: Device Settings - All Tabs Displayed ............................................................................. 10-4 Figure 10-5: LED Table Tab ............................................................................................................... 10-5 Figure 10-6: Tamper Tab .................................................................................................................... 10-6 Figure 10-7: Wiegand Tab .................................................................................................................. 10-7 Figure 10-8: Wiegand Output Settings Dialog Box ........................................................................... 10-10 Figure 10-9: Custom Wiegand Settings Dialog Box ......................................................................... 10-11 Figure 10-10: New Wiegand Format Dialog Box .............................................................................. 10-11 Figure 10-11: New Wiegand Format Dialog Box - Add User ............................................................ 10-12 Figure 10-12: Single Door Access Control Tab ................................................................................ 10-13 Figure 10-13: Miscellaneous Tab ...................................................................................................... 10-14 Figure 10-14: General Purpose I/O Tab ........................................................................................... 10-16 Figure 10-15: Access Schedules Tab ............................................................................................... 10-19 Figure 10-16: Holiday Schedules Tab ............................................................................................... 10-21 Figure 10-17: Biometric Schedules Tab ............................................................................................ 10-23

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

xviii

List of Figures

Figure 10-18: Clock Tab .................................................................................................................... 10-25 Figure 10-19: Time and Attendance Tab .......................................................................................... 10-26 Figure 10-20: Select File Dialog Box - Firmware File ....................................................................... 10-27 Figure 10-21: SecureAdmin File Selection Dialog Box ..................................................................... 10-27 Figure 10-22: Select File Dialog Box - Firmware File ....................................................................... 10-28 Figure 10-23: Broadcast Status - Success ....................................................................................... 10-28 Figure 10-24: Select File Dialog Box - Image File ............................................................................ 10-29 Figure 10-25: Select File Dialog Box - Image Directory Drop-down List .......................................... 10-29 Figure 10-26: Select File Dialog Box - Audio File ............................................................................. 10-30 Figure 10-27: Select File Dialog Box - Audio Directory Drop-down List ........................................... 10-30 Figure 10-28: Select File Dialog Box - Smart Card Layout File ....................................................... 10-31 Figure 11-1: Log Tab ........................................................................................................................... 11-2 Figure 11-2: SecureAdmin Event Log.................................................................................................. 11-3 Figure 11-3: Transaction Log............................................................................................................... 11-5 Figure 11-4: Device Event Log ............................................................................................................ 11-7 Figure 12-1: File Menu ........................................................................................................................ 12-2 Figure 12-2: Login Dialog Box ............................................................................................................. 12-2 Figure 12-3: Change Password Dialog Box ........................................................................................ 12-3 Figure 12-4: Manage Menu.................................................................................................................. 12-4 Figure 12-5: Tools Menu ...................................................................................................................... 12-4 Figure 12-6: Firmware Upgrade - Step 1 ............................................................................................. 12-5 Figure 12-7: Firmware Upgrade - Step 2 ............................................................................................. 12-5 Figure 12-8: Firmware Upgrade - File Selection ................................................................................. 12-6 Figure 12-9: Firmware Upgrade - Step 3 ............................................................................................. 12-6 Figure 12-10: Final Confirmation ......................................................................................................... 12-6 Figure 12-11: Sensor Test Dialog Box................................................................................................. 12-7 Figure 12-12: Sensor Test Dialog Box................................................................................................. 12-8 Figure 12-13: Calibration Wizard Step 2.............................................................................................. 12-8 Figure 12-14: Calibration Wizard Step 3.............................................................................................. 12-9 Figure 12-15: Synchronize Templates Dialog Box ............................................................................ 12-10 Figure 12-16: Synchronization Result Dialog Box ............................................................................. 12-10 Figure 12-17: Reset To Factory Defaults Dialog Box ........................................................................ 12-11 Figure 12-18: Get MAC Address Dialog Box ..................................................................................... 12-12 Figure 12-19: Help Menu ................................................................................................................... 12-13 Figure 12-20: Product Registration Dialog Box ................................................................................. 12-13

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

xix

List of Figures

Figure 12-21: About SecureAdmin Dialog Box .................................................................................. 12-13 Figure 13-1: Suggested Fingers ......................................................................................................... 13-2 Figure 13-2: Amber LED ..................................................................................................................... 13-3 Figure 13-3: Fingertip on Ridge-Lock ................................................................................................. 13-3 Figure 13-4: Slide Finger Across Ridge-Lock ..................................................................................... 13-3 Figure 13-5: Position Joint on Ridge-Lock .......................................................................................... 13-3 Figure 13-6: Apply Correct Pressure .................................................................................................. 13-4 Figure 13-7: Wait for Green LED ........................................................................................................ 13-4 Figure 13-8: Lift Finger Up and Off ..................................................................................................... 13-4 Figure 13-9: Correct Placement .......................................................................................................... 13-5 Figure 13-10: Incorrect Placement ...................................................................................................... 13-5 Figure 13-11: Place Finger Close to Center ........................................................................................ 13-5 Figure 13-12: Do Not Rotate Finger .................................................................................................... 13-6 Figure 13-13: Finger Cores ................................................................................................................. 13-6 Figure 13-14: FPF Function ................................................................................................................ 13-7

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

xx

List of Tables

LIST OF TABLES
Table 1-1: Template Support Comparison ............................................................................................. 1-7 Table 6-1: Wiegand Formats and Associated Valid Values................................................................. 6-26 Table 8-1: Smart Card Template Support............................................................................................ 8-19 Table 10-1: Wiegand Formats and Associated Valid Values .............................................................. 10-8

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

xxi

List of Tables

This page left blank intentionally

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

xxii

List of Acronyms

LIST OF ACRONYMS
These acronyms and abbreviations are used in this document: AUX ESI FPF TFT LCD LED MAC PIN Auxiliary External Storage Interface Finger Placement Feedback Thin Film Transistor Liquid Crystal Display Light Emitting Diode Media Access Control Personal Identification Number

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

xxiii

List of Acronyms

This page left blank intentionally

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

xxiv

Glossary

GLOSSARY
1:1 Mode - In 1:1 mode, a user enters his or her User ID first. Then the user is requested to place a finger or enter a PIN. In 1:1 Mode, the users scanned fingerprint is matched against the one fingerprint specified by the user ID. 1:N Mode - In 1:N mode, a user places his or her finger on the device without entering an ID. The device compares the users scanned fingerprint with the many enrolled fingerprints in its internal database. Administrator - A user who is authorized to manage the settings and user information of a fingerprint reader. Administrators can enroll or delete users and change device settings. BIN - A number between 0 and 9 that is assigned to a user during enrollment for 1:10 and 1:50k VSeries 4G devices. The user must input this BIN number during identifications. BIN numbers are stored in ten blocks, numbered 0 through 9, of 5000 Biometric User Record each. Core - a term used to describe an area of the finger-scan characterized by ridgelines with the tightest curvature and most unique content. Although the entire finger-scan has significant data, the "core" is the most data-intensive area and thus is extremely important to the algorithm. Normally, the core is located in the middle of the fingerprint. Duress Mode - A mode that offers users a way to indicate a duress situation (such as being forced to open a door for example) by verifying with a specially designated duress finger. Enrollment - The process of extracting features of a fingerprint image obtained from a fingerprint sensor and saving them into the internal memory of a device. The fingerprint data is called a fingerprint template. External Storage Interface (ESI) - the functionality within the device that controls the interface and communications with the device. The ESI was once a distinct module within the device hardware, but now has been incorporated into the firmware. Finger Placement Feedback (FPF) - FPF is a feature that allows an administrator to direct users in correct finger placement during enrollment and helps users learn correct placement. The FPF feature helps an administrator to know when an enrolling user has positioned their fingerprint core optimally on the scanning surface. Without this feature, the administrator has to try to recognize the core visually and then make a judgment call as to whether the placement was optimal. The FPF also allows the fingerprint image to remain hidden to add to personal biometric privacy. Finger scan - the image of a fingerprint that is captured by the sensor. Host Mode - the normal mode of operation; when the unit is waiting for a card to be presented to the device. Identification (Searching or 1:N) - the operation of Identifying a user by comparing a live finger scan against all stored finger-scan records in a database to determine a match. Identification uses the finger scan only -- no cards or PINs. Identification is only available on devices that are in 1:N mode. Primary Template - This is the template that resides in the first template slot on the smart card. When a verification is initiated, this primary template is the first fingerprint that is used in that verification process. Secondary Template - This is an optional second template stored on the smart card that is also used in the verification process if the primary template verification fails.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

xxv

Glossary

Single Door Access Control - The capability of controlling/monitoring all functions related to a single entry/exit point. Template - a term used to describe the data that is stored during the enrollment process. The data is a mathematical representation of the ridge pattern of the enrolled finger scan. Verification (Authentication or 1:1) - the operation of confirming a user is who he claims to be by comparing a live finger scan image against a stored fingerprint template. The result (pass or fail) that is returned is based on whether the score is above a pre-defined threshold value. Some type of credential (PIN, prox card, smart card, etc.) is necessary to initiate the biometric verification.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

xxvi

Introduction

CHAPTER 1 - INTRODUCTION
Chapter Overview
This chapter presents an introduction to the V-Station 4G and V-Flex 4G devices, together with a summary of template types used and proximity cards supported.

Chapter Index
1. Introduction ......................................................................................................................................... 1-2 1.1. Symbols Used in this Guide................................................................................................ 1-2 1.2. Product Overview................................................................................................................ 1-3 1.2.1. V-Station 4G ...................................................................................................... 1-3 1.2.2. V-Flex 4G ........................................................................................................... 1-4 1.3. Template Support .............................................................................................................. 1-5 1.4. Proximity Cards .................................................................................................................. 1-8 1.4.1. Command Cards ................................................................................................ 1-8 1.4.2. Smart Cards ............................................................................................ 1-8

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

1-1

Introduction

1. INTRODUCTION
This manual provides step-by-step procedures for operating a V-Station 4G or V-Flex 4G device. This manual should be used in conjunction with the Quick Start Guide and the Installation Guide.

1.1. SYMBOLS USED IN THIS GUIDE The symbols shown below are used throughout this manual. They denote special issues the user might encounter. Their definitions are given below.

DANGER
This symbol denotes a danger condition that may cause death or excessive damage to property.

WARNING
This symbol denotes a warning condition that may cause severe injury or major damage to property.

CAUTION
This symbol denotes a cautionary condition that may cause injury or minor damage to property.

NOTICE
This symbol denotes a situation needing additional advice to avoid incorrect usage.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

1-2

Introduction

1.2. PRODUCT OVERVIEW

1.2.1. V-STATION 4G

Tricolor Pass/Fail Indicator LEDs (Amber/Off/Green/Red) Finger Scan Sensor 2.5 backlit TFT LCD (QVGA, 16 million color)

Ridge-Lock

Power Indicator LED

Function Keys

Optional Internal Smart Card or Proximity Reader

Navigation Keypad Illuminated Keypad

Housing

USB Port

Figure 1-1: V-Station 4G Device

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

1-3

Introduction

1.2.2. V-FLEX 4G

Tricolor Pass/Fail Indicator LEDs (Amber/Off/Green/Red) Finger Scan Sensor

Ridge-Lock

Power Indicator LED

Optional Internal Smart Card or Proximity Reader

Housing

USB Port

Figure 1-2: V-Flex 4G Device

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

1-4

Introduction

1.3. TEMPLATE SUPPORT All biometric systems operate on the simple concept of comparing a stored record of a user's biometric data (fingerprint, face, etc.) with data being supplied in real-time by the user requesting access. The real-time data is converted into a form that can be compared to the record, and if the two data sets match with enough certainty, the user is authenticated. In Bioscrypts case, the record contains a mathematical representation of a fingerprint, which is compared with a live fingerprint image captured from a sensor attached to the unit. The process of first capturing the biometric data is called enrolling, while the action of authenticating the user is called verification. During the enrollment process, the original fingerprint image is processed, highly compressed, and stored on the unit (or another storage system like the PC) as a template. User data such as a unique ID number, name, and other information is added to associate a person with the template. These five types of templates are used by Bioscrypt products: 348-byte Template (.tem) 1:200 Searching Template (.mtm) 1:500 Searching Template (.tms) User Record (.vur) Biometric User Record (.bur)

348-byte Templates A 348-byte template (*.tem) contains a unique ID, which is usually associated with a single individual. If multiple enrollments for additional fingers of the same person are required, the same ID is used but a unique index value (0-255) is assigned to each enrollment under that ID. It is important to note that multiple indexes for the same ID are still considered individual and separate templates. The template is fixed in size at 348 bytes. Out of these, 64 bytes are used for User Data, such as Template ID, Name, etc., and 284 bytes are used for fingerprint data, also called in-phase data. 1:200 Searching Templates A 1:200 searching template (*.mtm) contains the entire 1:1 template, which is 348 bytes, with the addition of 2004 bytes of data needed for searching functionality, making the total length of 1:200 searching template 2352 bytes. A maximum of 200 templates can be stored and identified on the flash memory of the device in 1:200 searching mode. 1:500 Searching Templates A 1:500 searching template (*.tms) contains the entire 1:1 template, which is 348 bytes, with the addition of 2140 bytes of data needed for searching functionality, making the total length of this searching template 2488 bytes. A maximum of 500 templates can be stored and identified on the flash memory of the device in 1:500 searching mode. User Records A User Record (*.vur) includes these elements: Global data - This is information relevant to the entire record, such as user ID, name, password, etc. Some fields are "Required" while others are "Optional." The User ID field, for example, is required.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

1-5

Introduction

Enrollment data - This is data pertaining only to a particular finger. It is a section of data that contains compressed fingerprint information along with specific information relating to that enrollment, such as which sensor was used, which finger was enrolled, the security level for the finger, and the index. A User Record can contain more than one enrolled finger when stored on the device. User data - This is a user-defined variable length block of data that can either be global or enrollment specific. Data in this block is accessed all at once, rather than being divided into separately named fields. There are two data storage options for User Records: Minimum (ID only) and Standard. The amount of data stored in the Global Veri-Series data section depends on the option chosen. The Field Name is the name given to the data element. Biometric User Records The Biometric User Record (*.bur) is a tag-based, variable length record which can be utilized on the 4G products for the following authentication purposes: 1:1 Verification 1:10K Identification 1:50K Identification (separate firmware required). A Biometric User Record includes these elements: Global data - This is information relevant to the entire record, such as user ID, name, password, etc. Some fields are "Required" while others are "Optional." The User ID field, for example, is required. Enrollment data - This is data pertaining only to a particular finger. It is a section of data that contains compressed fingerprint information along with specific information relating to that enrollment, such as which sensor was used, which finger was enrolled, the security level for the finger, and the index. A User Record can contain more than one enrolled finger when stored on the device. User data - This is a user-defined variable length block of data that can either be global or enrollment specific. Data in this block is accessed all at once, rather than being divided into separately named fields. Refer to Table 1-1 on the next page for a comparison between the template support capabilities of the different Bioscrypt products.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

1-6

Introduction

Product Name in SecureAdmin V-Flex 4G (U) V-Flex 4G (U, P) V-Flex 4G (U, G) V-Flex 4G (U, H) V-Flex 4G (S) V-Flex 4G (S) V-Flex 4G (S, G) V-Flex 4G (S, H) V-Station 4G (U) V-Station 4G (U) V-Station 4G (U, P) V-Station 4G (U, P) V-Station 4G (U, G) V-Station 4G (U, H) V-Station 4G (S) V-Station 4G (S) V-Station 4G (S, P) V-Station 4G (S, P) V-Station 4G (S, G) V-Station 4G (S, H)

Maximum Templates 10 000 100 000 100 000 100 000 10 000 100 000 100 000 100 000 10 000 50 000 100 000 50 000 100 000 100 000 10 000 50 000 100 000 50 000 100 000 100 000

Template Supported (Unit Mode) Default Template 1:N BUR TEM UR 1:1 MTM TMS Type (1:1) (1:1) BUR (1:200) (1:500) 1:10K 1:50K 1:N BUR 1:1 BUR TEM TEM 1:N BUR 1:1 BUR TEM TEM 1:N BUR 1:N BUR 1:1 BUR 1:N BUR TEM TEM 1:N BUR 1:N BUR 1:1 BUR 1:N BUR TEM TEM Yes Yes Yes Yes Yes Yes Yes Yes Yes N/A Yes N/A Yes Yes Yes N/A Yes N/A Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes N/A Yes N/A Yes Yes Yes N/A Yes N/A Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes N/A N/A Yes Yes N/A N/A Yes N/A Yes N/A N/A N/A Yes N/A Yes N/A N/A N/A Yes Yes N/A N/A Yes Yes N/A N/A Yes N/A Yes N/A N/A N/A Yes N/A Yes N/A N/A N/A Yes Yes N/A N/A Yes Yes N/A N/A Yes N/A Yes N/A N/A N/A Yes N/A Yes N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A Yes N/A Yes N/A N/A N/A Yes N/A Yes N/A N/A

Table 1-1: Template Support Comparison

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

1-7

Introduction

1.4. PROXIMITY CARDS All V-Station 4G devices that have embedded proximity card reading capability can be programmed to use a given card ID number as a standard User ID. The majority of proximity cards are of the User Card type. Once a card has been designated as one type, it will remain that type unless it is deleted and re-enrolled.

n-01234
Card Number

Prox Card

Site/Facility Code

Figure 1-3: HID Prox Card Note that not all proximity cards have card numbers printed on them. There are two basic categories of proximity cards: User Cards Command Cards (Enroll or Delete).

1.4.1. COMMAND CARDS Command cards allow users to be added or removed from a V-Station 4G device without requiring PC-based administrative software. These can be useful for creating and removing temporary visitors badges or administering the system when the PC is malfunctioning or otherwise unavailable. There are two types of Command cards: Enroll command cards Delete command cards.

Command cards must be created with the SecureAdmin software.

1.4.2. SMART CARDS Some models of the V-Station 4G device incorporate a contact-less smart card reader. The users template is written to a smart card during enrollment and then later read from the smart card during verification, eliminating the need for network-based template management operations.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

1-8

Front Panel Operation

CHAPTER 2 - FRONT PANEL OPERATION


Chapter Overview
Occasionally, there are situations when it is more convenient to use the V-Station 4G devices front panel for system set-up, such as when enrolling a new user in a remote location. Most of the common set-up functions can be performed from the front panel using the keypad. This chapter shows how to operate the device from the front panel. It provides detailed procedures for using the menu systems and for performing commonly used operations.

Chapter Index
2. Operating the V-Station 4G from the Front Panel............................................................................... 2-4 2.1. Accessing Administrator Mode ........................................................................................... 2-5 2.2. System Menu ...................................................................................................................... 2-6 2.2.1. LED Settings ....................................................................................................... 2-6 2.2.1.1. Illumination Type .................................................................................. 2-7 2.2.1.2. Low Intensity Value ...............................................................................2-7 2.2.1.3. High Intensity Value...............................................................................2-8 2.2.2. Data Transfer Menu ............................................................................................ 2-9 2.2.2.1. Transferring a Firmware File ................................................................ 2-9 2.2.2.2. Transferring a Wiegand File .............................................................. 2-10 2.2.2.3. Transferring a Language File ............................................................ 2-10 2.2.2.4. Transferring a Device Parameter File ............................................... 2-11 2.2.2.5. Transferring an Access Schedule File............................................... 2-12 2.2.2.6. Transferring Log Files........................................................................ 2-12 2.2.3. Device Settings ................................................................................................ 2-14 2.2.3.1. Soft Reboot........................................................................................ 2-14 2.2.3.2. Change Device Name ....................................................................... 2-15 2.2.3.3. Change Device Password ................................................................. 2-16 2.2.3.4. Firmware Upgrade............................................................................. 2-17 2.2.3.5. Date/Time Settings ............................................................................ 2-18 2.2.3.6. Set Factory Default............................................................................ 2-19 2.2.3.7. SDC/Tamper Settings........................................................................ 2-21 2.2.4. Transaction Log ............................................................................................... 2-25 2.2.4.1. View Log............................................................................................ 2-25 2.2.4.2. Erase Log .......................................................................................... 2-27

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-1

Front Panel Operation

Chapter Index (contd.)


2.2.5. Display Settings ............................................................................................... 2-28 2.2.6. Change CVE Mode Menu ................................................................................ 2-29 2.2.7. Erase Verify Queue.......................................................................................... 2-30 2.3. System Information Menu ................................................................................................ 2-31 2.3.1. Device Information ........................................................................................... 2-31 2.3.2. Firmware Information ....................................................................................... 2-33 2.3.3. Template Information ....................................................................................... 2-33 2.3.4. Communication Information ............................................................................. 2-35 2.4. Security Menu .................................................................................................................. 2-37 2.4.1. Duress Mode.................................................................................................... 2-37 2.4.2. Password Mode ............................................................................................... 2-38 2.4.3. Biometric Mode ................................................................................................ 2-39 2.4.4. Aux Port State.................................................................................................. 2-40 2.4.5. Access Schedule ............................................................................................. 2-41 2.4.6. Global Security................................................................................................. 2-42 2.4.6.1. Verify Security ................................................................................... 2-42 2.4.6.2. Identify Security ................................................................................. 2-43 2.4.7. Multi User Verify............................................................................................... 2-43 2.4.7.1. Multi User Verify Fingers ................................................................... 2-44 2.4.7.2. Multi User Verify Timeout .................................................................. 2-44 2.5. Communication Menu ...................................................................................................... 2-45 2.5.1. Wiegand Admin Menu...................................................................................... 2-45 2.5.1.1. Wiegand Settings .............................................................................. 2-46 2.5.1.2. Display Wiegand Format ................................................................... 2-48 2.5.2. Verify Actions ................................................................................................... 2-49 2.5.2.1. Host Port............................................................................................ 2-49 2.5.2.2. Auxiliary Port ..................................................................................... 2-50 2.5.3. Network Interface............................................................................................. 2-51 2.5.3.1. Ethernet ............................................................................................. 2-51 2.5.3.2. WLAN ................................................................................................ 2-54 2.5.3.3. Ethernet Security ............................................................................... 2-59 2.5.4. Serial Communication...................................................................................... 2-59 2.5.4.1. Host Baud Rate ................................................................................. 2-59 2.5.4.2. Host Protocol ..................................................................................... 2-60

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-2

Front Panel Operation

Chapter Index (contd.)


2.5.4.3. Net ID................................................................................................. 2-60 2.6. Multimedia Menu.............................................................................................................. 2-61 2.6.1. Audio Files ....................................................................................................... 2-61 2.6.1.1. Copying a Device Event Audio File from a USB Key to the Device.. 2-62 2.6.1.2. Changing a Device Event Audio File on the Device.......................... 2-63 2.6.1.3. Deleting Device Event Audio Files from the USB Key ...................... 2-65 2.6.1.4. Deleting Device Event Audio Files from the Device.......................... 2-66 2.6.1.5. Copying All Device Event Audio Files to the USB Key ..................... 2-67 2.6.1.6. Copying All Device Event Audio Files from USB Key to Device ....... 2-68 2.6.2. Display Files..................................................................................................... 2-69 2.6.3. Audio State ...................................................................................................... 2-70 2.6.4. Audio State ...................................................................................................... 2-71 2.6.4.1. Device Audio Volume and Key Press Sound .................................... 2-71 2.6.4.2. Key Press Sound............................................................................... 2-72 2.6.5. Initialize USB.................................................................................................... 2-72 2.6.6. Format USB .................................................................................................... 2-74 2.7. Template Menu ................................................................................................................ 2-75 2.7.1. Enroll (Add) User ............................................................................................ 2-75 2.7.2. Delete User ..................................................................................................... 2-80 2.7.3. Delete All Users .............................................................................................. 2-82 2.7.4. Delete Smart Card .......................................................................................... 2-83 2.7.5. Verify User ...................................................................................................... 2-85 2.7.6. Edit User ......................................................................................................... 2-86 2.7.7. Bypass Next Verification ................................................................................. 2-90 2.7.8. Template Type ................................................................................................ 2-91 2.8. Keypad Verification .......................................................................................................... 2-93 2.9. Keypad Identification........................................................................................................ 2-94 2.10. Keypad Identification on 50K Products.......................................................................... 2-94

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-3

Front Panel Operation

2. OPERATING THE V-STATION 4G FROM THE FRONT PANEL


The V-Station 4G device can be set up using the SecureAdmin software on a PC or by the using the controls on the front panel. Occasionally, there are situations when using a PC for system set up is not desired nor possible, such as when enrolling a new user in a remote location. Most of the common functions can be performed from the front panel of the reader by using the keypad. This chapter describes how to navigate the menu systems and enter data. The keypad duplicates much of the functionality found in SecureAdmin. A one-to-one mapping of options found in SecureAdmin and those found in the front panel menus on the V-Station 4G device has been maintained where practical. The V-Station 4G device's illuminated buttons are arranged in three groups; numeric keypad, navigation, and function keys, as shown in Figure 2-1.

Function Keys

Numeric Keypad

Navigation Keypad

Figure 2-1: V-Station 4G Device Keypad Numeric Keys This group of keys is used to enter numbers or letters. This group of keys also includes the Enter and Esc (Escape) keys, which are located in the bottom row. Function Keys This group of keys is used primarily in Time and Attendance mode, although there are a few instances of it being used to open an on-screen mini-keyboard when in Admin mode. Navigation Keypad This group of keys is used to move left, right, up, and down through the device's various menu systems. The central OK button is used to enter or confirm a selection or entered data.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-4

Front Panel Operation

2.1. ACCESSING ADMINISTRATOR MODE The menu systems of the V-Station 4G device are only accessible in Administrator mode. To access Admin mode: 1. Press the Enter and Left arrow keys simultaneously. The Enter Admin Password screen is displayed (see Figure 2-2).

Figure 2-2: Enter Admin Password 2. Key in "0000". This is the default Admin password of the device, as shipped from the factory. 3. Press OK. The main menu screen is displayed (see Figure 2-3). Note that the top left icon (System) is highlighted with a blue background; this is the currently selected icon.

System Information

System

Security

Communication

Template

Multimedia Figure 2-3: Admin Menu - Top Level

Using the navigation keys to select any of these six icons, you can access all of the menu systems available on the V-Station 4G device.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-5

Front Panel Operation

2.2. SYSTEM MENU To access the System menu: 1. Using the navigation keys, select the System icon (see Figure 2-4). 2. Press OK. The System Menu screen is displayed (see Figure 2-5).

Figure 2-4: System Menu Icon 2.2.1. LED SETTINGS To adjust LED settings of the device: 1. Select the LED Settings item in the System Menu screen (see Figure 2-5).

Figure 2-5: System Menu Screen 2. Press OK. The LED Settings screen is displayed (see Figure 2-6).

Figure 2-6: LED Settings Menu

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-6

Front Panel Operation

2.2.1.1. ILLUMINATION TYPE

Figure 2-7: Illumination Type To test or set the current illumination settings: 1. Select the Illumination Type item. 2. Use the Left or Right arrow keys to select Test or Set. Choose Test to test the current LED settings. Choose Set to apply the current LED settings. 3. Press OK. A confirmation message is displayed. 4. Click OK.

2.2.1.2. LOW INTENSITY VALUE

Figure 2-8: Low Intensity Value The Low Intensity Value determines how bright the keypad illumination is when the device is in the idle state. To adjust the Low Intensity Value: 1. Select the Low Intensity Value item. 2. Use the Left or Right arrow keys to increase or decrease the illumination level. 3. Press OK. A confirmation message is displayed. 4. Click OK.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-7

Front Panel Operation

2.2.1.3. HIGH INTENSITY VALUE

Figure 2-9: High Intensity Value The High Intensity Value determines how bright the keypad illumination is when the device is in use. To adjust the High Intensity Value: 1. Select the High Intensity Value item. 2. Use the Left or Right arrow keys to increase or decrease the illumination level. 3. Press OK. A confirmation message is displayed. 4. Click OK.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-8

Front Panel Operation

2.2.2. DATA TRANSFER MENU The Data Transfer menu allows you to transfer files to and from the device by means of a USB key connected to the Aux port. To access the Data Transfer Menu 1. Select the Data Transfer item in the System Menu (see Figure 2-10). 2. Press OK. The Data Transfer Menu screen is displayed.

Figure 2-10: Data Transfer Item 3. Press OK. The Data Transfer Menu screen is displayed (see Figure 2-11).

Figure 2-11: Data Transfer Menu 2.2.2.1. TRANSFERRING A FIRMWARE FILE To transfer a firmware file to the device from the USB key: 1. Select the Firmware File item in the Data Transfer Menu screen (see Figure 2-11 above). 2. Press OK. The device scans the USB key for a firmware file and if it finds one, displays a confirmation message (see Figure 2-12).

Figure 2-12: Firmware File


Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-9

Front Panel Operation

3. Press OK to copy the firmware file into device memory. A status message is displayed. 4. Click OK. Please note that this procedure is not the same as upgrading the device firmware.

2.2.2.2. TRANSFERRING A WIEGAND FILE The procedure for transferring a Wiegand file to the device from the USB key is identical to that of transferring a firmware file to the device, except for Step 1, where instead of selecting the Firmware File item, you select the Wiegand File item (see Figure 2-13).

Figure 2-13: Wiegand File 2.2.2.3. TRANSFERRING A LANGUAGE FILE The procedure for transferring a language file to the device from the USB key is identical to that of transferring a firmware file to the device, except for Step 1, where instead of selecting the Firmware File item, you select the Language File item (see Figure 2-14).

Figure 2-14: Language File Item

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-10

Front Panel Operation

2.2.2.4. TRANSFERRING A DEVICE PARAMETER FILE A device parameter file makes it easy to "clone" the settings of one device to another. To transfer a device parameter file to and from the USB key: 1. Select the Device Parameter File item in the Data Transfer Menu screen (see Figure 2-15).

Figure 2-15: Device Parameter File 2. Press OK. The Device Parameter File screen is displayed ( Figure 2-16).

Figure 2-16: Device Parameter File Screen 3. Select the action you want to perform. You can copy a device parameter to or from the USB key, or delete it from the USB key. 4. Press OK. The selected action is performed and a confirmation message is displayed. 5. Press OK. A status message is displayed. 6. Press OK.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-11

Front Panel Operation

2.2.2.5. TRANSFERRING AN ACCESS SCHEDULE FILE The procedure for transferring an access schedule file between the device and a USB key is identical to that of transferring a device parameter file to and from the device, except for Step 1, where instead of selecting the Device Parameter File item, you select the Access Schedule File item (see Figure 2-17).

Figure 2-17: Language File Item

2.2.2.6. TRANSFERRING LOG FILES To transfer a device log files to the USB key: 1. Select the Log Files item in the Data Transfer Menu screen (see Figure 218).

Figure 2-18: Log Files Item 2. Press OK. The Log Files screen is displayed (see Figure 2-19).

Figure 2-19: Log Files Screen

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-12

Front Panel Operation

3. Select the type of log file you want to copy to the USB key. 4. If your selection requires it, set the filter criteria according to your needs (see Figures 2-20 and 2-21 for examples). 5. Press OK. A confirmation message is displayed. 6. Press OK. The log file is copied to the USB key and a status message is displayed. 7. Press OK.

Figure 2-20: Event Log Filter Criteria

Figure 2-21: Filtered Transaction Log Filter Criteria

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-13

Front Panel Operation

2.2.3. DEVICE SETTINGS The controls provided by the Device Settings menu allow you to change the device name and password, perform a firmware upgrade, adjust the device date and time, set the device to default settings, adjust display settings, change the Custom Verification Entry (CVE) mode, and erase the verify queue. To access the Device Settings menu: 1. Select the Device Settings item in the System Menu screen (see Figure 2-22).

Figure 2-22: Device Settings Item 2. Press OK. The Device Settings menu is displayed (see Figure 2-23).

Figure 2-23: Device Settings Menu 2.2.3.1. SOFT REBOOT

Figure 2-24: Soft Reboot Item To perform a soft reboot of the device: 1. Select the Soft Reboot item in the Device Settings menu (see Figure 2-24 above). A confirmation message is displayed (see Figure 2-25 on the next page).
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-14

Front Panel Operation

Figure 2-25: Perform Soft Reboot 2. Press OK. The device reboots itself.

2.2.3.2. CHANGE DEVICE NAME To change the device name 1. Select the Device Name item in the Device Settings menu. 2. Press OK. The Device Name screen is displayed (see Figure 2-26).

Figure 2-26: Device Name 3. You can use the keypad or press the F2 function key. The mini keyboard is displayed (see Figure 2-27).

Figure 2-27: F2 Keyboard 4. Use the navigation and OK keys to type the new device name. 5. When you are finished, select OK on the mini keyboard (as it is in Figure 227 above )and press the OK key. The new device name is applied.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-15

Front Panel Operation

2.2.3.3. CHANGE DEVICE PASSWORD The device password is the password you enter to access Administrator mode. The default password is "0000". To change the device password: 1. Select the Device Password item in the Device Settings menu. 2. Press OK. The Device Password screen is displayed (see Figure 2-28).

Figure 2-28: Old Device Password 3. Enter the old password, then press the Down arrow key.

Figure 2-29: New Device Password 4. Enter the new password (see Figure 2-29), then press the Down arrow key.

Figure 2-30: Confirm New Device Password 5. Enter the new password again to confirm it (see Figure 2-30). 6. Press the OK key. The device password is set.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-16

Front Panel Operation

2.2.3.4. FIRMWARE UPGRADE

NOTICE
Please contact L-1 EAS Technical Support before attempting to upgrade the firmware of a device. Device firmware should only be upgraded upon recommendation by L-1 EAS.

WARNING
Do not touch the device, press any keys, disconnect the power source, or remove the USB key during the firmware upgrade process.

Figure 2-31: Firmware Upgrade To perform a firmware upgrade: 1. Transfer a firmware file to the device from the USB key (see Section 2.2.2.1. on page 2-9 for details) 2. Select the Firmware Upgrade item in the Device Settings menu. 3. Press OK. A confirmation message is displayed. 4. Click OK. Wait for the firmware upgrade process to complete. This might take up to 30 seconds. A status message is displayed when the upgrade is complete. 5. Press OK.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-17

Front Panel Operation

2.2.3.5. DATE/TIME SETTINGS To adjust date and time settings on the device: 1. Select the Date/Time Settings item in the Device Settings menu. 2. Press OK. The Date/Time Settings menu is displayed (see Figure 2-32).

Figure 2-32: Date/Time Settings Menu

3. Select the Daylight Savings item in the Date/Time Settings menu. 4. Press OK. The Daylight Savings menu is displayed (see Figure 2-33).

Figure 2-33: Daylight Savings Time Menu 5. Configure the daylight savings time settings as needed. Start Time End Time Local or UT Select Start/End Date

6. Press OK. 7. Select the Clock Settings item in the Date/Time Settings menu. 8. Press OK. The Clock Settings menu is displayed (see Figure 2-34 on the next page).

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-18

Front Panel Operation

Figure 2-34: Clock Settings Menu 9. Configure the clock settings as needed. Current time Current date Date display format - DD/MM/YYYY, MM/DD/YYYY, etc. Clock type - digital, analog, or none Hour format - 12 or 24 hour Clock display format - HH:MM:SS

10. Press OK. A confirmation message is displayed. 11. Press OK.

2.2.3.6. SET FACTORY DEFAULT To restore the device back to factory-default settings: 1. Select the Set Factory Default item in the Device Settings menu (see Figure 2-35).

Figure 2-35: Set Factory Default Item

2. Press OK. The Factory Default reset menu is displayed (see Figure 2-36 on the next page).

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-19

Front Panel Operation

Figure 2-36: Factory Default Reset Menu 3. Select the reset action you want to perform: Reset Parameters - resets all device parameters to default Reset Serial Parameters - resets only serial parameters to default Reset LCD Configuration - resets only LCD parameters to default.

4. Press OK. A confirmation message is displayed. 5. Press OK. The selected device parameters are rest to factory defaults.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-20

Front Panel Operation

2.2.3.7. SDC/TAMPER SETTINGS To access the Single Door Controller (SDC) options: 1. Select the SDC/Tamper Settings item in the Device Settings menu. 2. Press OK. The SDC/Tamper Settings menu is displayed (see Figure 2-37). 3. Select the SDC Options item in the SDC/Tamper Settings menu.

Figure 2-37: SDC/Tamper Settings Menu To set the device to use GPIO mode: 1. Use the Left or Right arrow keys to select the GPIO General Mode item (see Figure 2-38). 2. Press OK. GPIO mode is enabled.

Figure 2-38: GPIO General Mode

To set the device to use SDC mode: 1. Use the Left or Right arrow keys to select the SDC Mode item (see Figure 2-39 on the next page). 2. Press OK.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-21

Front Panel Operation

Figure 2-39: SDC Mode 3. Configure these SDC options: Door Unlock Time - (seconds) Max Door Held Open Duration - (seconds) Exit Mode - (none, push button, or motion detector) Egress Timeout - arrow keys select seconds Alarm Type - (audio feedback, LED, or LED + Audio feedback)

4. Press OK. A confirmation message is displayed. 5. Press OK. To set the device to use threat levels: 1. Use the Left or Right arrow keys to select the Threat Levels item in the SDC Options menu. 2. Press OK. Threat levels are enabled.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-22

Front Panel Operation

Time Override Mode (TOM) allows an Administrator to temporarily suspend the need for verifications for a specified time period on a device. This feature is only available on V-Station 4G devices. To access the Time Override Mode (TOM) options: 1. Select the SDC/Tamper Settings item in the Device Settings menu. 2. Press OK. The SDC/Tamper Settings menu is displayed. 3. Select the TOM Options item in the SDC/Tamper Settings menu (see Figure 2-40).

Figure 2-40: TOM Options Item 4. Press OK. The TOM State menu is displayed (see Figure 2-41).

Figure 2-41: TOM State Menu 5. Use the Left or Right arrow keys to enable or disable TOM. 6. Use the Left or Right arrow keys to select the number of minutes of TOM duration. 7. Press OK.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-23

Front Panel Operation

To configure the tamper-protection settings: 1. Select the SDC/Tamper Settings item in the Device Settings menu. 2. Press OK. The SDC/Tamper Settings menu is displayed. 3. Select the Tamper Settings item in the SDC/Tamper Settings menu (see Figure 2-42).

Figure 2-42: Tamper Settings Item 4. Press OK. The Tamper Settings menu is displayed (see Figure 2-43).

Figure 2-43: Tamper Settings Menu 5. Use the Left or Right arrow keys to enable or disable tamper protection. 6. Use the Left or Right arrow keys to enable or disable sending a Wiegand string when the tamper protection is triggered. 7. Use the Left or Right arrow keys to enable or disable biometric functions on the device when the tamper protection is triggered. 8. Press OK. A confirmation message is displayed. 9. Press OK.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-24

Front Panel Operation

2.2.4. TRANSACTION LOG The controls provided by the Transaction Log menu allow you to view and erase the device log files. To access the Transaction Log menu: 1. Select the Transaction Log item in the System Menu screen (see Figure 2-44).

Figure 2-44: Transaction Log Menu 2. Press OK. The Transaction Log menu is displayed (see Figure 2-45).

Figure 2-45: Transaction Log Menu 2.2.4.1. VIEW LOG To view the transaction log: 1. Select the View Log item in the Transaction Log menu (see Figure 2-45 above). 2. Press OK. The Filtered Transaction Log screen is displayed (see Figure 246 on the next page).

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-25

Front Panel Operation

Figure 2-46: Filter Criteria 3. Set the filter criteria according to your needs. 4. Press OK. The Log Display Filter screen is displayed (see Figure 2-47).

Figure 2-47: Log Display Filter

5. Use the Up and Down arrow keys to scroll through the items. 6. Press the F1 key to select or de-select an item. 7. Press OK. The filtered transaction log is displayed (see Figure 2-48).

Figure 2-48: Transaction Log 8. Press OK to exit the log viewer.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-26

Front Panel Operation

2.2.4.2. ERASE LOG To erase the transaction log: 1. Select the Erase Log (All) item in the Transaction Log menu (see Figure 249).

Figure 2-49: Erase Log 2. Press OK. A confirmation message is displayed (see Figure 2-50).

Figure 2-50: Confirm Erase

3. Press OK. The transaction log is erased.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-27

Front Panel Operation

2.2.5. DISPLAY SETTINGS The controls provided by the Display Settings menu allow you to adjust the properties of the device LCD. To adjust the display settings: 1. Select the Display Settings item in the System Menu screen (see Figure 2-51).

Figure 2-51: Display Settings Item

2. Press OK. The Display Options menu is displayed (see Figure 2-52).

Figure 2-52: Display Options Menu 3. Use the navigation keys to select and adjust these settings: Contrast Brightness Slideshow Status Slideshow Timeout.

4. Press OK. A confirmation message is displayed. 5. Press OK.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-28

Front Panel Operation

2.2.6. CHANGE CVE MODE MENU When Custom Verification Entry (CVE) mode is enabled, users must key in a custom entry code after verifying. To change the CVE mode: 1. Select the Change CVE Mode item in the System Menu screen (see Figure 2-53). Selecting this item changes the current CVE mode state to the opposite state.

Figure 2-53: Change CVE Mode Menu 2. Press OK. A confirmation message is displayed (see Figure 2-54). 3. Press OK.

Figure 2-54: Enable CVE Mode

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-29

Front Panel Operation

2.2.7. ERASE VERIFY QUEUE To erase the verify queue: 1. Select the Erase Verify Queue item in the System Menu screen (see Figure 2-55).

Figure 2-55: Erase Verify Queue Item 2. Press OK. A confirmation message is displayed (see Figure 2-56). 3. Press OK. The Verify queue is erased.

Figure 2-56: Erase Verify Queue

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-30

Front Panel Operation

2.3. SYSTEM INFORMATION MENU The System Information menu allows you to view detailed information about the device settings. To access the System Information menu: 1. Using the navigation keys, select the System Information icon (see Figure 2-57).

Figure 2-57: System Information Icon 2. Press OK. The System Info menu is displayed (see Figure 2-58).

Figure 2-58: System Info Menu 2.3.1. DEVICE INFORMATION To view basic device information: 1. Select the Device Information item in the Device Info menu. 2. Press OK. The Device Info menu is displayed (see Figure 2-59). The Device ID information is shown in the top line.

Figure 2-59: Device Info Menu - Device ID


Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-31

Front Panel Operation

3. Use the Up and Down arrow keys to scroll through the menu. As each line is selected, it shows the pertinent device information (refer to Figures 2-60 through 262 for examples of device information). 4. Press OK to return to the System Info menu.

Figure 2-60: Device Info Menu - Device Name

Figure 2-61: Device Info Menu - Device Type

Figure 2-62: Device Info Menu - Serial Number

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-32

Front Panel Operation

2.3.2. FIRMWARE INFORMATION To view information about the device firmware: 1. Select the Firmware Information item in the Device Info menu.

Figure 2-63: Firmware Information Item 2. Press OK. The Firmware Info screen is displayed (see Figure 2-64). This screen shows the device firmware version number.

Figure 2-64: Firmware Info 2.3.3. TEMPLATE INFORMATION To view template-related information: 1. Select the Template Information item in the Device Info menu.

Figure 2-65: Template Info - Template Type 2. Press OK. The Template Info screen is displayed (see Figure 2-65). This screen shows the current template type.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-33

Front Panel Operation

3. Use the Up and Down arrow keys to scroll through the menu. As each line is selected, it shows the pertinent template-related information (refer to Figures 2-66 and 2-67 for more examples). 4. Press OK to return to the System Info menu.

Figure 2-66: Number of Enrolled Templates

Figure 2-67: Maximum Number of Templates

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-34

Front Panel Operation

2.3.4. COMMUNICATION INFORMATION To view information about the device communication settings: 1. Select the Communication Information item in the Device Info menu.

Figure 2-68: Communication Information Item 2. Press OK. The Communication Info menu is displayed (see Figure 2-69). This menu shows the device communication settings information, starting with the Ethernet IP address. The setting displayed is shown at the bottom of the screen. 3. Use the Up and Down arrow keys to scroll through the menu. As each line is selected, it shows the pertinent communication setting information (refer to Figures 2-70 through 2-74 for more examples). 4. Press OK to return to the System Info menu.

Figure 2-69: Communication Info - Ethernet IP Address

Figure 2-70: Communication Info - Ethernet MAC Address

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-35

Front Panel Operation

Figure 2-71: Communication Info - WLAN IP Address

Figure 2-72: Communication Info - WLAN MAC Address

Figure 2-73: Communication Info - Host Protocol

Figure 2-74: Communication Info - Baud Rate

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-36

Front Panel Operation

2.4. SECURITY MENU The Security menu allows you to view device security-related information. To access the Security menu: 1. Using the navigation keys, select the Security icon (see Figure 2-75).

Figure 2-75: Security Menu Icon 2. Press OK. The Security Menu is displayed (see Figure 2-76).

Figure 2-76: Security Menu 2.4.1. DURESS MODE To enable duress mode on the device: 1. Select the Duress Mode item in the Security Menu screen (see Figure 2-76 above). 2. Press OK. A confirmation message is displayed (see Figure 2-77).

Figure 2-77: Enable Duress Mode 3. Press OK. Duress mode is enabled on the device.
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-37

Front Panel Operation

2.4.2. PASSWORD MODE To enable password mode on the device: 1. Select the Password Mode item in the Security Menu screen (see Figure 2-78).

Figure 2-78: Password Mode Item 2. Press OK. A confirmation message is displayed (see Figure 2-79).

Figure 2-79: Enable Password Mode

3. Press OK. Password mode is enabled on the device.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-38

Front Panel Operation

2.4.3. BIOMETRIC MODE To enable or disable mode on the device: 1. Select the Biometric Mode item in the Security Menu screen (see Figure 2-80).

Figure 2-80: Biometric Mode 2. Press OK. A confirmation message is displayed (see Figure 2-81).

Figure 2-81: Disable Biometric Mode 3. Press OK. The Biometric mode state is changed on the device. Biometric mode is enabled by default.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-39

Front Panel Operation

2.4.4. AUX PORT STATE To enable or disable the Aux port on the device: 1. Select the Aux Port State item in the Security Menu screen (see Figure 2-82).

Figure 2-82: Aux Port State Item 2. Press OK. A confirmation message is displayed (see Figure 2-83).

Figure 2-83: Disable Aux Port 3. Press OK. The Aux port state is changed on the device. The Aux port is enabled by default.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-40

Front Panel Operation

2.4.5. ACCESS SCHEDULE To enable access schedules on the device: 1. Select the Access Schedule item in the Security Menu screen (see Figure 2-84).

Figure 2-84: Access Schedule Item 2. Press OK. A confirmation message is displayed (see Figure 2-85).

Figure 2-85: Enable Access Schedule 3. Press OK. Access schedules are enabled on the device.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-41

Front Panel Operation

2.4.6. GLOBAL SECURITY To adjust global security settings on the device: 1. Select the Global Security item in the Security Menu screen (see Figure 2-86).

Figure 2-86: Global Security Item 2. Press OK. The Global Security menu is displayed (see Figure 2-87).

2.4.6.1. VERIFY SECURITY To adjust the Verify security settings on the device: 1. Select the Verify Security item in the Global Security menu (see Figure 287).

Figure 2-87: Global Security Menu - Verify Security Item

2. Use the Left or Right arrow keys to select the desired Verify Security level. 3. Press OK. A confirmation message is displayed. 4. Press OK. The Verify security setting is enabled.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-42

Front Panel Operation

2.4.6.2. IDENTIFY SECURITY To adjust the Identify security settings on the device: 1. Select the Identify Security item in the Global Security menu (see Figure 2-88).

Figure 2-88: Global Security Menu - Identify Security Item

2. Use the Left or Right arrow keys to select the desired Identify Security level. 3. Press OK. A confirmation message is displayed. 4. Press OK. The Identify security setting is enabled.

2.4.7. MULTI USER VERIFY To configure the Multi-User Verify settings on the device: 1. Select the Multi-User Verify item in the Global Security menu (see Figure 2-89).

Figure 2-89: Multi User Verify Item 2. Press OK. The Multi User Options menu is displayed (see Figure 2-90 on the next page).

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-43

Front Panel Operation

Figure 2-90: Multi User Options Menu 2.4.7.1. MULTI USER VERIFY FINGERS To adjust the Multi User Verify Fingers setting: 1. Select the Multi User Verify Fingers item in the Multi User Options menu (see Figure 2-90 above). 2. Use the Left or Right arrow keys to select the desired number of users (1 or 2). 3. Press OK. A confirmation message is displayed. 4. Press OK. The Multi User Verify Fingers setting is enabled.

2.4.7.2. MULTI USER VERIFY TIMEOUT To adjust the Multi User Verify Timeout setting: 1. Select the Multi User Verify Timeout item in the Multi User Options menu (see Figure 2-91).

Figure 2-91: Multi User Verify Timeout 2. Use the Left or Right arrow keys to select the number of timeout seconds. 3. Press OK. A confirmation message is displayed. 4. Press OK. The Multi User Verify Timeout setting is enabled.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-44

Front Panel Operation

2.5. COMMUNICATION MENU The Communication menu allows you to configure communication and network settings of the device. To access the Communication menu: 1. Using the navigation keys, select the Communication icon (see Figure 2-92).

Figure 2-92: Communication Menu Icon 2. Press OK. The Communication Menu is displayed (see Figure 2-93).

Figure 2-93: Wiegand Admin

2.5.1. WIEGAND ADMIN MENU The Wiegand Admin Menu allows you to configure and view the Wiegand settings of the device. To access the Wiegand Admin menu: 1. Select the Wiegand Admin item in the Communication Menu screen. (see Figure 2-93 above). The Wiegand Menu screen is displayed (see Figure 2-94 on the next page).

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-45

Front Panel Operation

Figure 2-94: Wiegand Settings

2.5.1.1. WIEGAND SETTINGS Wiegand Formats To set the Wiegand formats: 1. Select the Wiegand Formats item in the Wiegand Settings menu (see Figure 2-95). 2. Use the Left or Right arrow keys to select the desired Wiegand format. 3. Press OK. A status message is displayed. 4. Press OK.

Figure 2-95: Wiegand Formats

Wiegand Input Port To enable or disable the Wiegand Input Port: 1. Select the Wiegand Input Port item in the Wiegand Settings menu (see Figure 2-96 on the next page). 2. Use the Left or Right arrow keys to enable or disable the Wiegand Input Port. 3. Press OK. A status message is displayed. 4. Press OK.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-46

Front Panel Operation

Figure 2-96: Wiegand Input Port

Wiegand Output Port To enable or disable the Wiegand Output Port: 1. Select the Wiegand Output Port item in the Wiegand Settings menu (see Figure 2-97). 2. Use the Left or Right arrow keys to enable or disable the Wiegand Output Port. 3. Press OK. A status message is displayed. 4. Press OK.

Figure 2-97: Wiegand Output Port

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-47

Front Panel Operation

2.5.1.2. DISPLAY WIEGAND FORMAT To see what the current Wiegand format is: 1. Select the Display Wiegand Format item in the Wiegand Menu screen (see Figure 2-98).

Figure 2-98: Display Wiegand Format 2. Press OK. The current Wiegand format is displayed (see Figure 2-99).

Figure 2-99: Current Wiegand Format - Standard 26 Wiegand Format

3. Press OK.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-48

Front Panel Operation

2.5.2. VERIFY ACTIONS To access the Verify Actions menu: 1. Select the Verify Actions item in the Communication Menu (see Figure 2-100). 2. Press OK. The Verify Actions menu is displayed.

Figure 2-100: Verify Actions Item 2.5.2.1. HOST PORT To enable or disable the Host port: 1. Select the Host Port item in the Verify Actions menu (see Figure 2-101).

Figure 2-101: Host Port 2. Use the Left or Right arrow keys to enable or disable the Host port. 3. Press OK. A status message is displayed. 4. Press OK.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-49

Front Panel Operation

2.5.2.2. AUXILIARY PORT To enable or disable the Host port: 1. Select the Auxiliary Port item in the Verify Actions menu (Figure 2-102).

Figure 2-102: Auxiliary Port 2. Use the Left or Right arrow keys to enable or disable the Auxiliary port. 3. Press OK. A status message is displayed. 4. Press OK.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-50

Front Panel Operation

2.5.3. NETWORK INTERFACE To access the Network Interface menu: 1. Select the Network Interface item in the Communication Menu (see Figure 2-103). 2. Press OK. The Network Interface menu is displayed.

Figure 2-103: Network Interface Item 2.5.3.1. ETHERNET To access the Ethernet settings menu: 1. Select the Ethernet item in the Network Interface menu (see Figure 2-104). 2. Press OK. The Ethernet menu is displayed.

Figure 2-104: Ethernet Item IP Configuration To configure the device IP: 1. Select the IP Configuration item in the Ethernet Options menu (see Figure 2-105 on the next page). The IP Mode screen is displayed.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-51

Front Panel Operation

Figure 2-105: IP Configuration 2. Use the Left or Right arrow keys to select either DHCP or Static IP (see Figures 2-106 and 2-107). 3. If you selected DHCP, press OK. The device reboots. Afterwards, it is set to use DHCP mode.

Figure 2-106: DHCP

Figure 2-107: Static IP 4. If you selected Static IP, enter a address in the IP Address field (see Figure 2-108) using the numeric keypad. The Left arrow key clears characters (like a Backspace key) and the Right arrow key places periods.

Figure 2-108: Static IP


Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-52

Front Panel Operation

5. Enter a subnet mask in the Subnet Mask field (see Figure 2-109) using the numeric keypad. The Left arrow key clears characters (like a Backspace key) and the Right arrow key places periods.

Figure 2-109: Subnet Mask 6. Enter a gateway address in the Gateway Address field (see Figure 2-110) using the numeric keypad. The Left arrow key clears characters (like a Backspace key) and the Right arrow key places periods.

Figure 2-110: Gateway Address 7. Press OK. A status message is displayed. 8. Press OK.

Display IP To see the current IP of the device: 1. Select the Display IP item in the Ethernet Options menu. The Show IP Information screen is displayed (see Figure 2-111).

Figure 2-111: Show IP Information


Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-53

Front Panel Operation

2.5.3.2. WLAN To access the WLAN settings menu: 1. Select the WLAN item in the Network Interface menu (see Figure 2-112). 2. Press OK. The WLAN Options menu is displayed.

Figure 2-112: WLAN To set up a wireless connection, you must first configure the WLAN settings, then the IP settings. WLAN Configuration To configure the device WLAN settings: 1. Select the WLAN Configuration item in the WLAN Options menu (see Figure 2-113). The WLAN Network Type screen is displayed (Figure 2-114).

Figure 2-113: WLAN Configuration Item 2. Use the Left or Right arrow keys to select the type of network you want to connect to in the WLAN Network Type screen.

Figure 2-114: WLAN Network Type


Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-54

Front Panel Operation

For a "managed" network: 1. Select Managed on the WLAN Network Type screen. 2. Press OK. The device scans for nearby wireless networks. The WLAN Scanning screen (see Figure 2-115) displays detected wireless networks.

Figure 2-115: WLAN Scanning 3. Use the Left or Right arrow keys to select a Service Set Identifier (SSID). 4. Press OK. The WLAN Parameters menu is displayed (see Figure 2-116).

Figure 2-116: WLAN Parameters 5. Use the Left or Right arrow keys to select Enable. 6. Press OK. 7. Use the Left or Right arrow keys to select the Encryption Mode. 8. Use the Left or Right arrow keys to select the Encryption Option. 9. Enter the Encryption Key (a 10 or 26-character string). 10. Press OK.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-55

Front Panel Operation

For an "ad-hoc" network: 1. Select Ad-hoc on the WLAN Network Type screen (see Figure 2-117).

Figure 2-117: Ad-hoc WLAN Network Type 2. Press OK. The Enter ESSID screen is displayed (see Figure 2-118).

Figure 2-118: Enter ESSID 3. Press the F2 function key to bring up the mini keyboard. 4. Use the navigation and OK keys to select and enter an Extended Service Set Identifier (ESSID). 5. When you are finished entering the ESSID, select OK as shown in Figure 2118 above. 6. Press the OK key. The WLAN Parameters menu is displayed (see Figure 2116 on the previous page). 7. Use the Left or Right arrow keys to select Enable. 8. Press OK. 9. Use the Left or Right arrow keys to select the Encryption Mode. 10. Use the Left or Right arrow keys to select the Encryption Option. 11. Enter the Encryption Key (a 10 or 26-character string). 12. Press OK.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-56

Front Panel Operation

Figure 2-119: WLAN Options Menu IP Configuration To configure the device IP for a wireless connection, please refer to Section 2.5.3.1 on page 2-51. The procedure for configuring the IP for a wireless connection is identical to that of configuring it for a wired network.

Display IP To see the current IP of the device: 1. Select the Display IP item in the WLAN Options menu. The Show IP Information screen is displayed (see Figure 2-120).

Figure 2-120: Show IP Information

Figure 2-121 Operating Wirelessly If the wireless setup has been configured successfully, a "wireless" icon is displayed in the upper-left corner of the screen, as shown in Figure 2-121.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-57

Front Panel Operation

2.5.3.3. ETHERNET SECURITY Ethernet Security is a feature that allows you to specify which IP addresses are allowed to communicate with the device. To activate Ethernet Security, you first need to enable it (see below). You can then enter up to 100 individual IP addresses and 100 IP ranges. During a device registration via server, the IP of the server machine is logged as an allowed IP into the device. To enable or disable Ethernet security: 1. Select the Ethernet Security item in the Network Interface menu (see Figure 2-122).

Figure 2-122: Ethernet Security Item 2. Press OK. A confirmation message is displayed (see Figure 2-123).

Figure 2-123: Confirm Ethernet Security 3. Press OK.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-58

Front Panel Operation

2.5.4. SERIAL COMMUNICATION To access the Serial Communication settings menu: 1. Select the Serial Communication item in the Communication menu (see Figure 2124). 2. Press OK. The Serial Options menu is displayed.

Figure 2-124: Serial Communication Item

2.5.4.1. HOST BAUD RATE 1. Use the Left or Right arrow keys to select the desired Host Baud Rate. (see Figure 2-125) 2. Press OK. A status message is displayed. 3. Press OK.

Figure 2-125: Host Baud Rate

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-59

Front Panel Operation

2.5.4.2. HOST PROTOCOL 1. Use the Left or Right arrow keys to select the desired Host Protocol. (see Figure 2-126) 2. Press OK. A status message is displayed. 3. Press OK.

Figure 2-126: Host Protocol 2.5.4.3. NET ID 1. Use the Left or Right arrow keys to select the desired Net ID. (see Figure 2-127) 2. Press OK. A status message is displayed. 3. Press OK.

Figure 2-127: Net ID

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-60

Front Panel Operation

2.6. MULTIMEDIA MENU The Multimedia menu allows you to configure the multimedia capabilities of the device. To access the Multimedia menu: 1. Using the navigation keys, select the Multimedia icon (see Figure 2-128).

Figure 2-128: Multimedia Icon 2. Press OK. The Multimedia Menu screen is displayed (see Figure 2-129). From this menu, you can adjust the multimedia settings of the device and perform USB-related actions.

Figure 2-129: Multimedia Menu 2.6.1. AUDIO FILES Custom audio files can be specified for various device events. Supported formats are mp3 and wav. To access the audio files menu: 1. Select the Audio Files item in the Multimedia Menu (see Figure 2-130). 2. Press OK. The Audio Files menu is displayed (see Figure 2-131 on the next page).

Figure 2-130: Audio Files Item


Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-61

Front Panel Operation

Figure 2-131: Audio Files -Tamper Audio files can be set for these device events: Tamper Message Attention Successful Verification Failed Verification.

From this point forward, the submenus for each of these device events are identical. The procedure for assigning a custom audio file for the Tamper device will be described in detail as an example. An identical procedure should be followed for the other three device events on the Audio Files menu.

2.6.1.1. COPYING A DEVICE EVENT AUDIO FILE FROM A USB KEY TO THE DEVICE To copy a device audio file on the USB key to the device: 1. Select a device event in the Audio Files menu. 2. Select the On USB item (see Figure 2-132).

Figure 2-132: On USB Item 3. Press OK. The device scans the USB key for audio files and displays the first file (see Figure 2-133 on the next page).

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-62

Front Panel Operation

Figure 2-133: Audio Files On USB 4. Use the Left or Right arrow keys to select an audio file. 5. Select Copy. You can also play and delete the file from the USB key. 6. Press OK. A confirmation message is displayed. 7. Press OK. The file is copied to the device memory from the USB key. Note that this procedure does not change the audio file on the device, it simply copies the file to device memory. How to change the file that plays when the device event occurs is explained in the next section. 2.6.1.2. CHANGING A DEVICE EVENT AUDIO FILE ON THE DEVICE To change a device event audio file to an audio file stored in device memory: 1. Select a device event in the Audio Files menu. 2. Select the On Device item (see Figure 2-134).

Figure 2-134: On Device Item 3. Press OK. The device scans the device memory for audio files and displays the first file (see Figure 2-135).

Figure 2-135: Audio Files On Device


Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-63

Front Panel Operation

4. Use the Left or Right arrow keys to select an audio file. 5. Select Default. You can also play and delete the file from the device, or copy it to the USB key. 6. Press OK. A confirmation message is displayed (see Figure 2-136).

Figure 2-136: Confirm As Default 7. Press OK. The file is set as the default for that device event and a status message is displayed (see Figure 2-137).

Figure 2-137: File Set As Default 8. Press OK.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-64

Front Panel Operation

2.6.1.3. DELETING DEVICE EVENT AUDIO FILES FROM THE USB KEY To delete all audio files associated with a device event from the USB key: 1. Select a device event in the Audio Files menu. 2. Select the Delete All from USB item (see Figure 2-138).

Figure 2-138: Delete All from USB Item 3. Press OK. A confirmation message is displayed (see Figure 2-139).

Figure 2-139: Confirm Delete All From USB 4. Press OK. All audio files associated with that device event are deleted from the USB key.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-65

Front Panel Operation

2.6.1.4. DELETING DEVICE EVENT AUDIO FILES FROM THE DEVICE To delete all audio files associated with a device event from the device memory: 1. Select a device event in the Audio Files menu. 2. Select the Delete All from Device item (see Figure 2-140).

Figure 2-140: Delete All from Device Item 3. Press OK. A confirmation message is displayed (see Figure 2-141).

Figure 2-141: Confirm Delete All From Device 4. Press OK. All audio files associated with that device event are deleted from the device.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-66

Front Panel Operation

2.6.1.5. COPYING ALL DEVICE EVENT AUDIO FILES TO THE USB KEY To copy all audio files associated with a device event to the USB key: 1. Select a device event in the Audio Files menu. 2. Select the Copy All From Device To USB item (see Figure 2-142).

Figure 2-142: Copy All From Device to USB Item 3. Press OK. A confirmation message is displayed (see Figure 2-143).

Figure 2-143: Confirm Copy All to USB 4. Press OK. All audio files associated with that device event are copied to the USB key. Any files on the USB key with identical names are overwritten.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-67

Front Panel Operation

2.6.1.6. COPYING ALL DEVICE EVENT AUDIO FILES FROM THE USB KEY TO THE DEVICE To copy all audio files associated with a device event from the USB key to the device memory: 1. Select a device event in the Audio Files menu. 2. Select the Copy All From USB To Device item (see Figure 2-144).

Figure 2-144: Copy All from USB to Device Item 3. Press OK. A confirmation message is displayed (see Figure 2-145).

Figure 2-145: Confirm Copy All from USB to Device 4. Press OK. All audio files associated with that device event are copied from the USB key to the device memory. Any files on the device with identical names are overwritten.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-68

Front Panel Operation

2.6.2. DISPLAY FILES Custom image files can be specified for device display functions. The maximum supported image resolution is 1024 x 768 pixels. To access the display files menu: 1. Select the Display Files item in the Multimedia Menu (see Figure 2-146).

Figure 2-146: Display Files Item 2. Press OK. The Display Files menu is displayed (see Figure 2-147). Custom image files can be specified for these device display functions.

Figure 2-147: Display Files 3. Select a display function. All submenus for Logo, Slideshow, Wallpaper, and Dynamic Message display files are identical. 4. Press OK. The Display Files menu is displayed (see Figure 2-148).

Figure 2-148: Logo Menu The procedures for all actions shown above in the Logo Menu are identical to those performed for audio files, except that thumbnails of images are shown. See Sections 2.6.1.1 through 2.6.1.6 on pages 2-62 through 2-68 for explanation of how these submenus work.
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-69

Front Panel Operation

2.6.3. AUDIO STATE The Audio State menu allows to enable or disable the playing of audio files for various device events. To change the state of a device audio event: 1. Select the Audio State item in the Multimedia Menu (see Figure 2-149).

Figure 2-149: Audio State Item 2. Press OK. The Audio State menu is displayed (see Figure 2-150). This menu lists three device events for which the audio state can be enabled or disabled. 3. Use the navigation keys to select a device event and either enable or disable its audio state. 4. Press OK. A status message is displayed. 5. Press OK.

Figure 2-150: Message Attention Audio State

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-70

Front Panel Operation

2.6.4. DEVICE AUDIO SETTINGS This menu allows you to adjust the overall device volume and enable or disable the "key press" sound emitted by the device. To access the Device Audio Settings menu: 1. Select the Device Audio Settings item in the Multimedia menu (see Figure 2-151).

Figure 2-151: Device Audio Settings Item 2. Press OK. The Device Audio Settings menu is displayed (see Figure 2-152).

2.6.4.1. DEVICE AUDIO VOLUME AND KEY PRESS SOUND To adjust the overall device volume or enable/disable the "key press" sound: 1. Select the Device Audio Volume item in the Device Audio Settings menu.

Figure 2-152: Device Audio Volume Item 2. Use the Left or Right arrow keys to adjust the device volume level. 3. Select the Key Press Sound item. 4. Use the Left or Right arrow keys to enable or disable the key press sound. 5. Press OK. A status message is displayed. 6. Press OK.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-71

Front Panel Operation

2.6.4.2. KEY PRESS SOUND To enable or disable the "key press" sound: 1. Select the Key Press Sound item in the Device Audio Settings menu (see Figure 2-153).

Figure 2-153: Key Press Sound Item 2. Use the Left or Right arrow keys to enable or disable the key press sound. 3. Press OK. A status message is displayed. 4. Press OK.

2.6.5. INITIALIZE USB The V-Station 4G device can "initialize" a USB key. Initializing a USB key prepares it for use by the device by writing an empty folder structure to the USB key. The folders are arranged in the hierarchy expected by the device. The folders are used to store various files such as firmware, images, audio, log files, etc. Do not rename the folders. All existing data on the USB key is left undisturbed. To initialize a USB key: 1. Select the Initialize USB item in the Multimedia Menu screen. (see Figure 2-154).

Figure 2-154: Initialize USB 2. Press OK. A confirmation message is displayed (see Figure 2-155 on the next page).

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-72

Front Panel Operation

Figure 2-155: Confirm Initialize USB 3. Press OK. The USB key is initialized and a status message is displayed (see Figure 2-156).

Figure 2-156: Initialize USB Status 4. Press OK. Figure 2-157 shows the folder structure that is written to the USB key.

Figure 2-157: Folder Structure

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-73

Front Panel Operation

2.6.6. FORMAT USB The V-Station 4G device can "format" a USB key. Formatting a USB key is similar to initializing a USB key, except that any existing data on the USB key is deleted. To format a USB key: 1. Select the Format USB item in the Multimedia Menu screen. (see Figure 2-158).

Figure 2-158: Format USB Item 2. Press OK. A confirmation message is displayed (see Figure 2-159).

Figure 2-159: Confirm Format USB Device 3. Press OK. The USB key is formatted and a status message is displayed (see Figure 2-160).

Figure 2-160: Format USB Device Status 4. Press OK.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-74

Front Panel Operation

2.7. TEMPLATE MENU The Template menu allows you to enroll, delete, verify, and edit user templates on the device. You can also set the template type and command the device to bypass the next verification. To access the Template menu: 1. Using the navigation keys, select the Template icon (see Figure 2-161).

Figure 2-161: Template Icon 2. Press OK. The Template Menu screen is displayed.

2.7.1. ENROLL (ADD) USER To enroll (or add) a new user: 1. Select the Enroll item in the Template Menu screen. (see Figure 2-162).

Figure 2-162: Enroll Item 2. Press OK. The Enroll Menu screen is displayed (see Figure 2-163).

Figure 2-163: Enroll Menu - Enroll (Add) User


Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-75

Front Panel Operation

3. Select the Enroll (Add) User item in the Enroll Menu. 4. Press OK. The Enter Enroll ID screen is displayed (see Figure 2-164).

Figure 2-164: Enter Enroll ID 5. Enter an Enroll ID for the new user. 6. Press OK. The new user is prompted to place a finger on the sensor, hold it, and remove (see Figure 2-165).

Figure 2-165: Place Finger Prompt 7. The enrollment quality is displayed (see Figure 2-166). If the quality is good, select Accept and press OK. The Select Finger menu is displayed (see Figure 2-167 on the next page).

Figure 2-166: Enroll Quality If the enrollment quality is unacceptable, select Reject to return to the Enroll Menu or select Retry to attempt another finger scan.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-76

Front Panel Operation

Figure 2-167: Select Finger Menu

8. Enter a number corresponding to the scanned finger or use the Left or Right arrow keys to select it (see Figure 2-167). 9. Press OK. The User Name screen is displayed (see Figure 2-168).

Figure 2-168: User Name 10. Press the F2 function key to bring up the mini keyboard. 11. Enter a user name. 12. Press the OK key. The Security Level screen is displayed (see Figure 2-169).

Figure 2-169: Security Level 13. Use the Left or Right keys to set the security level of the user. 14. Press the OK key. The Enroll User menu is displayed (see Figure 2-170 on the next page).

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-77

Front Panel Operation

15. If the finger is to be designated as a Duress Finger, use the Left or Right keys to set it as such (see Figure 2-170).

Figure 2-170: Enroll User Menu - Duress Finger 16. Use the Left or Right keys to select an Access Schedule (see Figure 2-171).

Figure 2-171: Access Schedule 17. Use the Left or Right keys to select a User Type (see Figure 2-172).

Figure 2-172: User Type 18. Use the Left or Right keys to select a Template Index (see Figure 2-173).

Figure 2-173: Template Index


Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-78

Front Panel Operation

18. Enter a Password (see Figure 2-174).

Figure 2-174: Password 19. Select a Save To location (see Figure 2-175).

Figure 2-175: Save To 20. Press OK. A status message is displayed (see Figure 2-176).

Figure 2-176: Template Saved

21. Press Esc to finish or OK to enroll another finger. Note: On 50K products, a BIN number must also be entered.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-79

Front Panel Operation

2.7.2. DELETE USER To delete a user: 1. Select the Delete item in the Template Menu screen (see Figure 2-177).

Figure 2-177: Delete Item 2. Press OK. The Delete User Menu screen is displayed (see Figure 2-178).

Figure 2-178: Delete User Menu 3. Select the Delete User item in the Delete User Menu. 4. Press OK. The Enter Delete ID screen is displayed (see Figure 2-179).

Figure 2-179: Enter Delete ID 5. Enter the Delete User ID of the user. 6. Press OK. The Enter Template Index screen is displayed (see Figure 2-180 on the next page).
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-80

Front Panel Operation

Figure 2-180: Enter Template Index 7. Enter the Template Index of the user. 8. Press OK. The confirmation message is displayed (see Figure 2-181).

Figure 2-181: Confirm User Deletion

9. Press OK. The user template is deleted and a status message is displayed (see Figure 2-182)

Figure 2-182: Template Erased

10. Press OK.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-81

Front Panel Operation

2.7.3. DELETE ALL USERS To delete all user templates from the device: 1. Select the Delete All Users item in the Template Menu screen (see Figure 2-183).

Figure 2-183: Delete All Users Item

2. Press OK. A confirmation message is displayed (see Figure 2-184).

Figure 2-184: Confirm Delete All Users

3. Press OK. All user templates are deleted from the device and a status message is displayed (see Figure 2-185).

Figure 2-185: All Users Deleted 4. Press OK.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-82

Front Panel Operation

2.7.4. DELETE SMART CARD To delete all user templates from a smart card: 1. Select the Delete Smartcard item in the Template Menu screen (see Figure 2-186).

Figure 2-186: Delete Smart Card Item 2. Press OK. 3. Follow the prompts to place the smart card, hold, and remove the smart card (see Figure 2-187).

Figure 2-187: Place Smart Card

4. Use the Left or Right arrow keys to select which template slot or slots to delete (see Figure 2-188).

Figure 2-188: Select Delete Slot 5. Press OK. You are prompted to enter the site key (see Figure 2-189 on the next page).

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-83

Front Panel Operation

Figure 2-189: Enter Site Key 6. Enter the site key. 7. Press OK. A confirmation message is displayed (see Figure 2-190).

Figure 2-190: Confirm Delete Template 8. Press OK. 9. Follow the prompts to place, hold, and remove a smart card to the device. The template is deleted and a status message is displayed (see Figure 2-191).

Figure 2-191: Delete Success

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-84

Front Panel Operation

2.7.5. VERIFY USER To verify a user: 1. Select the Verify User item in the Template Menu screen (see Figure 2-192).

Figure 2-192: Verify 2. Press OK. The Enter Verify ID screen is displayed. 3. Enter the Verify ID. 4. Press OK. The Enter Template Index screen is displayed. 5. Enter the Template Index. 6. Press OK. 7. Follow the prompts to place, hold, and remove a finger. 8. A status message is displayed, either granting or denying access.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-85

Front Panel Operation

2.7.6. EDIT USER To edit an existing user template: 1. Select the Edit User item in the Template Menu screen. (see Figure 2-193).

Figure 2-193: Edit User 2. Press OK. The Enter Edit ID screen is displayed (see Figure 2-194).

Figure 2-194: Enter Edit ID 3. Enter the Edit ID of the user. 4. Press OK. The Enter Template Index screen is displayed (see Figure 2-195).

Figure 2-195: Enter Template Index

5. Enter the Template Index of the user. 6. Press OK. The Select Finger screen is displayed (see Figure 2-196 on the next page).

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-86

Front Panel Operation

Figure 2-196: Select Finger 7. Edit the number corresponding to the scanned finger or use the Left or Right arrow keys to select it (see Figure 2-196). 8. Press OK. The User Name screen is displayed.

Figure 2-197: F2 User Name Keyboard

9. Press the F2 function key to bring up the mini keyboard (see Figure 2-197). 10. Edit the user name. 11. Press the OK key. The Security Level screen is displayed (see Figure 2-198).

Figure 2-198: Security Level 12. Use the Left or Right keys to edit the security level of the user. 13. Press the OK key. The Enroll User menu is displayed.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-87

Front Panel Operation

14. If the finger is to be designated as a Duress Finger, use the Left or Right keys to set it as such (see Figure 2-199).

Figure 2-199: Duress Finger 15. Use the Left or Right keys to select an Access Schedule (see Figure 2-200).

Figure 2-200: Access Schedule 16. Use the Left or Right keys to select a User Type (see Figure 2-201).

Figure 2-201: User Type 17. Use the Left or Right keys to select a Template Index (see Figure 2-202).

Figure 2-202: Template Index


Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-88

Front Panel Operation

18. Enter a Password (see Figure 2-203).

Figure 2-203: Password

19. Select a Save To location (see Figure 2-204).

Figure 2-204: Save To

20. Press OK. A status message is displayed (see Figure 2-205).

Figure 2-205: Save Successful

21. Press Esc to finish or OK to enroll another finger.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-89

Front Panel Operation

2.7.7. BYPASS NEXT VERIFICATION To command the device to bypass the next verification: 1. Select the Bypass Next Verification item in the Template Menu screen (see Figure 2-206).

Figure 2-206: Bypass Next Verification Item

2. Press OK. A Status message is displayed (see Figure 2-207).

Figure 2-207: Next Verification Bypassed The very next verification will be bypassed, regardless of how it is initiated.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-90

Front Panel Operation

2.7.8. TEMPLATE TYPE To change the template type: 1. Select the Template Type item in the Template Menu (see Figure 2-208).

Figure 2-208: Template Type

2. Select a the type of template (see Figure 2-209). For a list of template support for the various V-Series products, refer to Table 1-1 on page 1-7.

Figure 2-209: Select Template Type 3. Press OK. A confirmation message is displayed (see Figure 2-210).

Figure 2-210: Confirm Template Type Change 4. Press OK. A status message is displayed (see Figure 2-211 on the next page).

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-91

Front Panel Operation

Figure 2-211: Template Type Set 5. Press OK. The device reboots.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-92

Front Panel Operation

2.8. KEYPAD VERIFICATION Verifications can be performed on the V-Station 4G device by users without entering the Admin menu.

To perform a keypad-initiated verification: 1. With the V-Station 4G device in Idle state, enter the first number of the Template ID on the V-Station keypad. The device displays a Verify ID message (see Figure 2-212).

Figure 2-212: Enter Verify ID 2. Enter the remainder of the Template ID 3. Press OK. 4. Follow the prompts to place a finger, hold, and remove it (see Figure 2-213). The device verifies the finger.

Figure 2-213: Place Finger 5. The device displays either an Accepted or a Rejected message. 6. The device returns to the Idle state.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-93

Front Panel Operation

2.9. KEYPAD IDENTIFICATION Identifications can be performed on the V-Station 4G device by users without entering the Admin menu. To perform a finger-initiated identification: 1. With the V-Station 4G device in Idle state, place a finger on the V-Station 4G device sensor. Once the finger is detected, the device displays a "Remove Finger" message. 2. The device performs the identification process. 3. An Accepted or a Rejected message is displayed. 4. The device returns to the Idle state.

2.10. KEYPAD IDENTIFICATION ON 50K PRODUCTS Identifications can be performed on the V-Station 4G device by users without entering the Admin menu. To perform a finger-initiated identification: 1. With the V-Station 4G device in Idle state, place a finger on the V-Station 4G device sensor. Once the finger is detected, the device displays a "Remove Finger and Enter BIN" message. 2. Enter the BIN using the keypad. 3. Press OK. 4. The device performs the identification process. 5. An Accepted or a Rejected message is displayed. 6. The device returns to the Idle state.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

2-94

Managing Users

CHAPTER 3 - MANAGING USERS


Chapter Overview
From this point on in the document, the focus is on using SecureAdmin. This chapter explains how to manage users, user groups, sites, and departments using the Users tab in SecureAdmin.

Chapter Index
3. Managing Users.................................................................................................................................. 3-2 3.1. Users Tab ........................................................................................................................... 3-2 3.2. User Groups Tab ................................................................................................................ 3-4 3.3. Companies Tab .................................................................................................................. 3-6 3.4. Sites Tab............................................................................................................................. 3-8 3.5. Departments Tab .............................................................................................................. 3-10

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

3-1

Managing Users

3. MANAGING USERS
To manage users, user groups, sites, and departments, click the Users sidebar tab along the left side of SecureAdmin. The Users tab is displayed in Figure 3-1 below.

Figure 3-1: Users Tab

3.1. USERS TAB The Users tab displays the users in the currently selected database. Use the various controls at the bottom of the tab to navigate quickly through pages of results. If you are searching for a specific user, you can use the filter function to find them quickly. To filter by user: 1. Enter the user's details into the appropriate name fields. 2. Click the Filter button. Any results matching your filter terms are displayed.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

3-2

Managing Users

To add a user: 1. Click the Add User button. The Add User dialog box is displayed. 2. Provide the new user's details in the various fields and drop-down lists, as shown in Figure 3-2. The button to the right of any drop-down list allows you to add a new category to that drop-down list without having to close the dialog box and switch to a different tab.

Figure 3-2: Add User Dialog Box 3. Click Save & Close. The new users details are saved, the dialog box closes, and the new user is displayed in the Users list. To close the dialog box without saving the user, click the Close button.

NOTICE
It is recommended that users are added before enrollment.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

3-3

Managing Users

3.2. USERS GROUPS TAB The User Groups tab (see Figure 3-3) displays the user groups in the currently selected database. Use the various controls at the bottom of the tab to navigate quickly through pages of results. If you are searching for a specific user group, you can use the filter function to find it quickly. To filter by user group: 1. Enter the user group's name into the User Group Name field. 2. Click the Filter button. Any results matching your filter terms are displayed.

Figure 3-3: User Groups Tab To add a user group: 1. Click the Add User Group button. The Add User Group dialog box is displayed (see Figure 3-4 on next page).

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

3-4

Managing Users

Figure 3-4: Add User Group Dialog Box 2. Enter a description of the user group into the Description text box. 3. In the left-hand side of the Available Roles and Privileges area, click the wand next to the action or permission you wish to assign to the new user group. The selected permissions move to the right-hand pane of the Available Roles and Privileges area (see Figure 3-5 below). You can also drag and drop entire groups of privileges or individual privileges.

Figure 3-5: Assigning Roles and Permissions

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

3-5

Managing Users

4. Click Save & Close. The new user group details and privileges are saved, the dialog box closes, and the new user group is displayed in the User Groups list. To close the dialog box without saving the user group, click the Close button.

3.3. COMPANIES TAB The Companies tab displays the companies in the currently selected database. Use the various controls at the bottom of the tab to navigate quickly through pages of results.

Figure 3-6: Companies Tab If you are searching for a specific company, you can use the filter function to find them more easily. To filter by company: 1. Enter the company name into the Company Name field. 2. Click the Filter button. Any results matching your filter terms are displayed.
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

3-6

Managing Users

To add a company: 1. Click the Add Company button. The Add Company dialog box is displayed. 2. Provide the new company's details in the various fields and text boxes, as shown in Figure 3-7 below.

Figure 3-7: Add Company Dialog Box 3. Click Save & Close. The new company's details are saved, the dialog box closes, and the new company is displayed in the Companies list. To close the dialog box without saving the company, click the Close button.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

3-7

Managing Users

3.4. SITES TAB The Sites tab displays the sites in the currently selected database. Use the various controls at the bottom of the tab to navigate quickly through pages of results.

Figure 3-8: Sites Tab If you are searching for a specific site, you can use the filter function to find it more easily. To filter by site: 1. Enter a name into the Site Name field. 2. Click the Filter button. Any results matching your filter terms are displayed.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

3-8

Managing Users

To add a site: 1. Click the Add Site button. The Add Site dialog box is displayed. 2. Provide the new site's details in the various fields and text boxes, as shown in Figure 3-9 below.

Figure 3-9: Add Site Dialog Box 3. Click Save & Close. The new site's details are saved, the dialog box closes, and the new site is displayed in the Sites list. To close the dialog box without saving the site, click the Close button.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

3-9

Managing Users

3.5. DEPARTMENTS TAB The Departments tab displays the department names in the currently selected database. Use the various controls at the bottom of the tab to navigate quickly through pages of results.

Figure 3-10: Departments Tab If you are searching for a specific department, you can use the filter function to find it more easily. To filter by department: 1. Enter a name into the Department Name field. 2. Click the Filter button. Any results matching your filter terms are displayed.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

3-10

Managing Users

To add a department: 1. Click the Add Department button. The Add Department dialog box is displayed. 2. Provide the new department's details in the various fields, text boxes, and drop-down lists, as shown in Figure 3-11 below. The button to the right of any drop-down list allows you to add a new category to that drop-down list without having to close the dialog box and switch to a different tab.

Figure 3-11: Add Department Dialog Box 3. Click Save & Close. The new department's details are saved, the dialog box closes, and the new department is displayed in the Departments list. To close the dialog box without saving the department, click the Close button.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

3-11

Managing Users

This page left blank intentionally

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

3-12

Enrolling Users

CHAPTER 4 - ENROLLING USERS


Chapter Overview
This chapter details how to enroll new users using the Quick Enroll and Advanced Enrollment functions.

Chapter Index
4. Enrollment Tab.................................................................................................................................... 4-2 4.1. Quick Enrollment................................................................................................................. 4-3 4.2. Advanced Enrollment.......................................................................................................... 4-6 4.3. 50K Enrollment................................................................................................................. 4-11

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

4-1

Enrolling Users

4. ENROLLING USERS
When first opened, the Enrollment Tab displays two buttons -- Quick Enrollment and Advanced Enrollment. New users are entered into the system through the process of "enrollment". During this procedure, the users finger is scanned and a finger-scan template is generated. A quality enrollment ensures peak performance from the V-Station 4G or V-Flex 4G device. The Quick Enrollment and Advanced Enrollment buttons are used to start the enrollment process. The Quick Enrollment method is useful when you need to add a new user quickly without having to go through multiple enrollments. The Advanced Enrollment is the recommended method for enrolling templates. It allows multiple templates to be sampled and the corresponding template to be created. Users can sample different fingers or multiple enrollments of the same finger. Each time an enrollment is sampled, the "best" template is identified among the current three samples. Users then have the option of accepting the enrollment of their choice.

Figure 4-1: Enrollment Tab

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

4-2

Enrolling Users

4.1. QUICK ENROLLMENT To perform a quick Enrollment: 1. Click the Quick Enrollment button. The Quick Enrollment dialog box is displayed (see Figure 4-2 below). 2. Select a device in the Current Device drop-down list. 3. Provide enrollment details by either: entering a Template ID, or selecting the From Wiegand String check box and entering a Wiegand string, or selecting the From Smart Card SN check box. For 50K products, also enter a BIN number (from 0 to 9).

Figure 4-2: Quick Enrollment Dialog Box 4. Click Enroll. 5. Place, hold, and release the enrollee's finger on the sensor as directed by the prompts. The scan results are displayed in the Finger Image and Enrollment Feedback areas (see Figure 4-4 on the next page). Note that if the FPF was enabled during the installation process, only red and green crosshairs would be displayed (see Figure 4-3 below) in the Finger Image area, instead of the actual fingerprint data. See Chapter 13 for more information on the FPF feature.

Figure 4-3: FPF Crosshairs


Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

4-3

............................................................ 4-2

Figure 4-1: Enrollment Tab .........................................................................................

Enrolling Users

Figure 4-4: Quick Enrollment Dialog Box - Scan Results 6. If the enrollment is not recommended because of poor quality, you can either choose to accept it, reject the enrollment, or retry the finger scan process. If the enrollment is recommended, click Next. The Quick Enrollment dialog box displays the next screen (see Figure 4-5).

Figure 4-5: Quick Enrollment Dialog Box - User Data 7. Enter a the enrollee's First Name, Middle Name, and Last Name into the appropriate fields in the User area. 8. Select the User Group, Site, and Department the enrollee belongs to from the drop-down lists. 9. Click Save. 10. Enter a Template ID, Index, and Employee ID into the appropriate fields in the Template User Data area.
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

4-4

Enrolling Users

11. If the enrollee is going to observe holidays, selecting the Observe Holidays check box. 12. If using a password, enter it into the Password field. 13. In the Finger Data area, click the appropriate finger that was scanned. 14. Select the desired 1:1 Security and 1:N Security levels from the drop-down lists. 15. Click Next. The Quick Enrollment dialog box displays the next screen (see Figure 4-5).

Figure 4-5: Quick Enrollment - Select Destination 16. Select whether to Save to Device or to Broadcast Templates to Devices by selecting the appropriate check box. 17. Select the device in the network tree. 18. Click Finish. A Store Template to Device dialog box is displayed. The dialog box states whether the template was stored or broadcasted to the device(s) successfully.

Figure 4-6: Store Template to Device Dialog Box 19. Click OK to finish. Note: If you cancel a template transfer to a device, it is executed after a short delay.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

4-5

Enrolling Users

4.2. ADVANCED ENROLLMENT To perform an advanced enrollment: 1. Click the Advanced Enrollment button. The Advanced Enrollment dialog box is displayed (see Figure 4-7 below). 2. Select a device in the Current Device drop-down list. 3. Provide enrollment details by either: entering a Template ID, or selecting the From Wiegand String check box and entering a Wiegand string, or selecting the From Smart Card SN check box.

Figure 4-7: Advanced Enrollment Dialog Box 4. Click the Enrollment 1 button.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

4-6

Enrolling Users

5. Place, hold, and release the enrollee's finger on the sensor as directed by the prompts. The first scan's results are displayed in the Enrollment 1 feedback areas (see Figure 4-8 below). Note that if the FPF was enabled during the installation process, only red and green crosshairs would be displayed in the Finger Image area, instead of the actual fingerprint data. 6. Repeat Steps 4 and 5 twice more for Enrollments 2 and 3.

Figure 4-8: Advanced Enrollment Dialog Box - Scan Results

7. To let SecureAdmin decide which enrollment scan provides the highest quality, click the Recommended Selection button. To make this choice manually, click the Manual Selection button. Accept buttons are displayed on the Advanced Enrollment dialog box (see Figure 4-9 on the next page); click the Accept button next to the enrollment you want to use. The Advanced Enrollment dialog box displays the next screen (see Figure 4-10 on page 4-9).

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

4-7

Enrolling Users

Figure 4-9: Advanced Enrollment Dialog Box - Manual Selection Accept Buttons

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

4-8

Enrolling Users

Figure 4-10: Advanced Enrollment Dialog Box - User Data 8. Enter the enrollee's First Name, Middle Name, and Last Name into the appropriate fields in the User area. 9. Select the User Group, Site, and Department the enrollee belongs to from the drop-down lists. 10. Click Save. 11. Enter a Template ID, Index, and Employee ID into the appropriate fields in the Template User Data area. 12. If the enrollee is going to observe holidays, selecting the Observe Holidays check box. 13. If using a password, enter it into the Password field. 14. In the Finger Data area, click the appropriate finger that was scanned. 15. If the finger is to be designated a "duress" finger, select the Activate Duress Finger Mode check box. 16. Select the desired 1:1 Security and 1:N Security levels from the drop-down lists. 17. Click Next. The Advanced Enrollment dialog box displays the next screen (see Figure 4-11 on the next page).
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

4-9

Enrolling Users

Figure 4-11: Advanced Enrollment - Select Destination

18. Select whether to Save to Device, Save to Smart Card, or to Broadcast Templates to Devices by selecting the appropriate radio button. If you choose to broadcast the templates to devices, the check boxes in the right-hand pane are activated, allowing you to select the broadcast recipients -- either the entire device network, a group, or individual devices. 19. Select the device in the network tree. 20. Click Finish. A Store Template to Device dialog box is displayed. The dialog box states whether the template was stored or broadcasted to the device(s) successfully. Note: The Database check box is selected by default -- all templates are saved to the database. No status dialog box is displayed after a template is saved in the database. A status dialog box is displayed if the enrolled template is saved to the device or a smart card.

Figure 4-12: Store Template to Device Dialog Box 21. Click OK to finish.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

4-10

Enrolling Users

4.3. 50K ENROLLMENT NOTES 1:50K Identification is a unique feature of the V-Station 4G device. It is available on the VStation 4G and V-Station 4G Prox product models. The only difference in the process of enrollment on 1:50K products is that the user is asked to enter a Bin number (see Figure 4-13 below and 4-14 on the next page). The Bin number must be a number between 0 and 9. The user must remember this number, because it will be asked during the identification process. It is recommended that enroller does not assign the same bin number to the first 5000 templates but rather distribute them evenly among all of the bins.

Figure 4-13: Quick Enrollment - Enter Bin Number

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

4-11

Enrolling Users

Figure 4-14: Advanced Enrollment - Enter Bin Number

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

4-12

Managing Templates

CHAPTER 5 - MANAGING TEMPLATES


Chapter Overview
This chapter explains how to manage user templates on devices and in a database, and how to convert a template from one type to another.

Chapter Index
5. Managing Templates........................................................................................................................... 5-2 5.1. Viewing Templates on a Device.......................................................................................... 5-2 5.2. Exporting Templates from a Device ................................................................................... 5-3 5.3. Exporting Templates from a Database .............................................................................. 5-4 5.4. Viewing Templates in a Database ..................................................................................... 5-5 5.5. Editing Templates .............................................................................................................. 5-6 5.6. Applying Dynamic Messages to Templates ....................................................................... 5-7 5.7. Verifying Templates ........................................................................................................... 5-7 5.8. Importing Templates into the Database ............................................................................. 5-8 5.9. Converting Templates ..................................................................................................... 5-12 5.10. Comparing Templates ................................................................................................... 5-13 5.11. Managing Templates on 1:50K Devices ....................................................................... 5-14 5.12. Managing Dynamic Messages ...................................................................................... 5-15

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

5-1

Managing Templates

5. MANAGING TEMPLATES
The Templates tab allows you to manage templates on a device and in a database. The controls on this tab allow you to filter displayed templates, delete and export templates from the device and database, and convert templates from one type to another.

Figure 5-1: Templates on Device 5.1. VIEWING TEMPLATES ON A DEVICE To view the templates on a device: 1. Double-click the Device Network item in the network tree. The network tree expands and shows all user groups in the device network. 2. Double-click the user group item you are interested in (in Figure 5-1, the group item is named "DefaultGroup"). Devices in the group are shown in the network tree. 3. Double-click the device you want to see the templates of (in Figure 5-1, the device item is named "Device0"). The templates on that device are displayed in the list.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

5-2

Managing Templates

Use the various controls at the bottom of the tab to navigate quickly through multiple pages of results. If you are searching for a specific template, you can use the filter function to find it quickly. To filter by template details: 1. Enter the search terms into the appropriate fields. 2. Click the Filter button. Any results matching your filter terms are displayed.

5.2. EXPORTING TEMPLATES FROM A DEVICE You can export templates from a device using the Export feature. To export templates: 1. Select the template(s) you want to export in the list. 2. Click Export. An Export Templates dialog box is displayed (see Figure 5-2). 3. Select the fields in the left-hand Fields area that you want included in the exported template and click the >> arrow button to send them to the Selected Fields area.

Figure 5-2: Export Templates Dialog Box 4. Click the Browse button. A Browse for Folder dialog box is displayed (see Figure 5-3). Note: Templates can be exported from the database in the form of individual template files or in the form of a list (template name, index, and other template info). You can export only the template list from a device. Individual templates cannot be extracted from the device.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

5-3

Managing Templates

Figure 5-3: Browse for Folder Dialog Box 5. Select the folder you want to export the template to and click the OK. Button. 6. Click Export. The template is exported to the specified folder and the Export Templates dialog box displays an export successful message (see Figure 5-4). The templates are exported to a *.CSV file.

Figure 5-4: Template Export Successful 5.3. EXPORTING TEMPLATES FROM A DATABASE The steps for exporting templates from a database are the same as for exporting templates from a device. The only difference is that you can select the file format the list will be saved to. Instead of only being able to export to comma separated value files (*.CSV), you can now also save to a template file.
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

5-4

Managing Templates

5.4. VIEWING TEMPLATES IN A DATABASE To view the templates in a database, double-click the Database item in the network tree. The templates on the database are displayed in the list (see Figure 5-5). If you are searching for a specific template in the database, you can use the filter function to help you find it. To filter by template details: 1. Enter the search terms into the appropriate fields. 2. Click the Filter button. Any templates matching your filter terms are displayed.

Figure 5-5: Templates in Database Use the various controls at the bottom of the tab to navigate quickly through multiple pages of results.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

5-5

Managing Templates

5.5. EDITING TEMPLATES To edit templates in a database: 8. Click the template you want to edit. The template is highlighted and the check box in the leftmost column is populated. 5. For the selected template, click the pencil icon to the right of the check box. An Edit Template dialog box is displayed (see Figure 5-6).

Figure 5-6: Edit Template Dialog Box

8. Select a device in the Current Device drop-down list. 5. Click Edit. An Edit Enrollment dialog box is displayed (see Figure 5-7).

Figure 5-7: Edit Enrollment Dialog Box

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

5-6

Managing Templates

8. Perform the necessary edits to the template. 5. Click Finish.

5.6. APPLYING DYNAMIC MESSAGES TO TEMPLATES To attach, detach, or edit dynamic messages of templates: 1. In the Device tab, select templates. The templates are highlighted. 2. Select either Attach, Detach, or Edit in the Dynamic Message drop-down list. The selected action is performed on the templates and a message box is displayed. 3. Click the OK button.

5.7. VERIFYING TEMPLATES To verify a templates on a device: 1. Click the template you want to verify. The template is highlighted and the check box in the left-most column is populated. 2. For the selected template, click the yellow check mark icon to the left of the Template ID column. 3. Place a finger on the device sensor, hold, and remove as directed by the prompts. 4. Enter the Verify ID. 5. Press OK. 6. Place a finger on the device sensor, hold, and remove as directed by the prompts. SecureAdmin displays a Verification Pass or a Verification Fail message.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

5-7

Managing Templates

5.8. IMPORTING TEMPLATES INTO THE DATABASE To import template files into the database: 1. Click the Import button. An Import Templates dialog box is displayed (see Figure 5-8). 2. Click File or Folder. Depending on which you click, either an Import Files or a Browse for Folder dialog box is displayed. 3. Navigate to the template file or to the folder containing the template files. 4. Select the file or folder. 5. Click Open or OK, depending on which dialog box is displayed. The file(s) are displayed in the left-hand Templates area.

Figure 5-8: Import Templates Dialog Box

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

5-8

Managing Templates

6. Select a template or templates to import in the left-hand Templates area. 7. Select a template or templates to in the right-hand Users area (see Figure 5-9).

Figure 5-9: Import Templates - Templates Selected 8. Click the Add without Link button to import the selected template but not link it to a user in the database (the User Name that is added is fictitious and can be edited later). See Figure 5-10 on the next page. 9. Click the Link Record button to import the selected template and link it to an existing user in the database. See Figure 5-11 on the next page.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

5-9

Managing Templates

Figure 5-10: Import Templates - Added Without Link

Figure 5-11: Import Templates - Linked Record


Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

5-10

Managing Templates

10. In the Import Templates area, select the template you want to import into the database. The template is highlighted and the check box to the left of the Template ID column is populated. 11. Click the Import to Database button. A SecureAdmin notice is displayed (see Figure 5-12). 12. Click OK to finish.

Figure 5-12: Import Successful

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

5-11

Managing Templates

5.9. CONVERTING TEMPLATES The template conversion feature allows conversion of the larger 1:N searching template formats to the smaller 1:1 verification templates.

Figure 5-13: Template Conversion To convert templates from one type to another: 1. Click Template Conversion. 2. Select the template(s) you want to convert in the list. 3. Select the type of template you are converting in the Template Type drop-down list. 4. Select the type of template you want to convert to in the Conversion Type drop-down list. 5. Click Convert. The template(s) are converted to the specified template type.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

5-12

Managing Templates

5.10. COMPARING TEMPLATES To compare a template on a device to a template in the database: 1. Double-click a device in the network tree. 2. On the device tab, select the template you want to compare. 3. For the selected template, click the "eye" icon. A Compare Templates dialog box is displayed (see Figure 5-14).

Figure 5-14: Compare Templates Dialog Box 4. Compare the templates' information. 5. Click Close when you are finished.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

5-13

Managing Templates

5.11. MANAGING TEMPLATES ON 1:50K DEVICES The bin number can be viewed, sorted, or modified in the Template Manager by changing the number via editing the template or by a much simpler drag-and-drop action from the Bin column to the desired Bin icon along the bottom of the screen (see Figure 5-15).

Figure 5-15: Template Manager - Bin Icons If you upgrade 1:10K devices to 1:50K devices, no re-enrollment is needed. The same 1:10K template can be used for 1:50K identification. The bin number is assigned randomly during 1:10K enrollment. On 1:50K devices, the user can use the previously assigned bin number, or the number can be changed to a number between 0 and 9.

NOTICE
Time and Attendance mode is not supported by 1:50K V-Station 4G devices. GPIO enrollment or identification is not supported by 1:50K V-Station 4G devices. Enrolling with a Prox Enroll card is not supported by 1:50K V-Station 4G devices. 5-14

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

Managing Templates

5.12. MANAGING DYNAMIC MESSAGES The Dynamic Message feature lets an administrator communicate with users by sending them a message. User authentication is required to receive a message at the door. The Dynamic Message feature is available on V-Station 4G devices only.

Figure 5-16: Dynamic Message on Device

A Dynamic Message can be presented in the form of an image, text, and/or an audio file. Examples of text messages include Production Meeting is in Meeting Room 5, Please see John Green, or Happy Birthday!.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

5-15

Managing Templates

To set how long a dynamic message is displayed: 1. Open the Device Settings sidebar tab. 1. Select a device. 1. Click the Dynamic Message tab (see Figure 5-17 on the next page). 1. Enter a value into the Message Display Timeout field. This setting determines for how long the message or image is displayed in the LCD after a successful verification or identification.

Figure 5-17: Dynamic Message Tab

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

5-16

Managing Templates

You can use an audio alert to attract a user's attention to the LCD when a Dynamic Message is attached to their template To upload an audio file for Dynamic Message attention: 1. In the Device Settings sidebar tab, click the Audio tab . 2. Choose Dynamic Message Attention in the Audio Directory drop-down list (see Figure 518). 3. Click the Dynamic Message tab. 4. Select the Activate Audio For Event Dynamic Message Attention check box. 5. Upload a file of your choice.

Figure 5-18: Audio Tab - Selecting Dynamic Message Attention Item

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

5-17

Managing Templates

6. Set the Device Volume using the slider control (see Figure 5-19). 7. Set the File Volume using the slider control. 8. Click Apply to apply the changes to the device.

Figure 5-19: Audio Tab - Set Volume

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

5-18

Managing Templates

To create a text message for use as a dynamic message: 1. Open the Templates sidebar tab. 2. Select a device. 3. Select a template. The Dynamic Message button is enabled (see Figure 5-20). 4. Click the Dynamic Message button. The Message Options dialog box is displayed (see Figure 5-21 on the next page).

Figure 5-20: Templates Tab - Template Selected

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

5-19

Managing Templates

Figure 5-21: Message Options Dialog Box 5. Select Message in the Message Display Options drop-down list. 6. In the Message field, enter the text to be displayed after a successful verification or identification of the user on the selected device (see Figure 5-22).

Figure 5-22: Text Message 7. Click the Calendar buttons and modify the start and end dates for the Dynamic Message (see Figure 5-23). After the end date, the message is not displayed, but it does remain on the device (to delete the message, please see page 5-25). 8. Click Apply.

Figure 5-23: Setting Start and End Date

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

5-20

Managing Templates

To test how the text looks on the LCD, click the Test button in the Template Manager (see Figure 5-24). You might have to scroll to the right to see this button.

Figure 5-24: Dynamic Message Test Button

With Dynamic Messaging enabled, the sequence of events for verifications or identifications is: Successful verification/identification > Accept message on the LCD > Dynamic Message Attention audio file plays > Dynamic Message or Image is displayed on the LCD. Note: If audio files are selected for "Successful Authentication" and "Dynamic Message Attention", only the dynamic message attention audio file is played.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

5-21

Managing Templates

To use upload an image to a device for use as a dynamic message: 1. Open the Device Settings sidebar tab. 2. Select a device. 3. Click the Dynamic Message tab. 4. Click Upload. A SecureAdmin File Selection dialog box is displayed (see Figure 5-25).

Figure 5-25: SecureAdmin File Selection Dialog Box 5. Navigate to and select an image file. 6. Click Open. The Preview button is enabled (see Figure 5-26 on the next page).

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

5-22

Managing Templates

Figure 5-26: Preview Button Enabled 7. Click the Preview button. The image you are about to upload to the device is displayed (see Figure 5-27).

Figure 5-27: Image Viewer


Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

5-23

Managing Templates

8. Click the Close button. 9. Click the Upload button. The image is uploaded to the device. You can now use it as a dynamic message.

To set an image as a dynamic message: 1. Open the Templates sidebar tab. 2. Select a device. 3. Select a template. The Dynamic Message button is enabled. 4. Click the Dynamic Message button. The Message Options dialog box is displayed. 5. Select Image in the Message Display Options drop-down list (see Figure 5-28). 6. Select the image you want to display as the Dynamic Message in the Image File drop-down list.

Figure 5-28: Message Options Dialog Box - Image Selected 7. Click Apply. With Dynamic Messaging enabled, the sequence of events for verifications or identifications is: Successful Verification or Identification > Accept message on the LCD > Dynamic Message Attention audio file is played > Image is displayed on the LCD.

NOTICE
The dynamic message text or image is not a part of the template. If you transfer the template to another device, this dynamic text or image will not be shown to the user. Therefore, you can assign a DM only to a templates stored on a device, not to a template stored in the database. If the template is edited via the Database, the dynamic message needs to be re-attached if it is an image, or re-entered if it is text.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

5-24

Managing Templates

To detach a dynamic message from a template: 1. Open the Template Manager. 2. Select a device. 3. Select a template. 4. Click the down arrow to the right of the Dynamic Message button and select Detach in the drop-down list (see Figure 5-29). The dynamic message is detached from the template.

Figure 5-29: Detaching Dynamic Message from Template After detaching an image, the image does not get deleted automatically; it needs to be removed from the dynamic message dialog box manually. Select the image and click Delete. If the template is deleted from the device, the dynamic message image does not get deleted automatically; it needs to be removed from the dynamic message dialog box manually. Select the image and click Delete.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

5-25

Managing Templates

This page left blank intentionally

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

5-26

Managing Device Settings

CHAPTER 6 - MANAGING DEVICE SETTINGS


Chapter Overview
This chapter details how manage and configure the various device settings accessible by means of the Device Settings tab.

Chapter Index
6. Managing Device Settings ................................................................................................................. 6-2 6.1. General Tab ........................................................................................................................ 6-2 6.2. Time and Attendance Tab................................................................................................... 6-3 6.3. Communication Tab............................................................................................................ 6-4 6.4. LED Table Tab .................................................................................................................... 6-6 6.5. Tamper Tab......................................................................................................................... 6-7 6.6. Single Door Access Control Tab......................................................................................... 6-8 6.6.1 Configuring Single Door Access Control ..............................................................6-8 6.6.2 Activating Time Override Mode ............................................................................6-9 6.7. Access Schedules Tab .................................................................................................... 6-10 6.8. Holiday Schedules Tab .................................................................................................... 6-12 6.9. Miscellaneous Tab ........................................................................................................... 6-14 6.10. Audio Tab....................................................................................................................... 6-16 6.11. Dynamic Message Tab .................................................................................................. 6-18 6.12. LCD Tab......................................................................................................................... 6-20 6.13. General Purpose I/O Tab............................................................................................... 6-22 6.14. Wiegand Tab.................................................................................................................. 6-25 6.15. Biometrics Tab ............................................................................................................... 6-31 6.16. Clock Tab ....................................................................................................................... 6-34 6.17. Biometric Schedules Tab ............................................................................................... 6-35 6.18. Database - Managing Wiegand Formats ....................................................................... 6-37

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-1

Managing Device Settings

6. MANAGING DEVICE SETTINGS


To view device settings: 1. Double-click the Device Network item in the network tree. The network tree expands to show all Group Items in the network. 2. Double-click a group item in the network tree. In Figure 6-1, below, the example group item is named "DefaultGroup". Any devices in the group are shown in the network tree under the group they belong to. 3. Double-click the device for which you want to adjust the settings. Various tabs are displayed for the device (see Figure 6-1). 6.1. GENERALTAB This tab displays basic information about the currently selected device. No settings can actually be changed on this tab.

Figure 6-1: General Tab

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-2

Managing Device Settings

6.2. TIME AND ATTENDANCE TAB This tab contains controls to activate and configure Time and Attendance (T&A) mode. Time and Attendance (T&A) mode is a mode that requires users to, in addition to verifying themselves with a finger scan, press a Function key on the device that corresponds to a time or attendance action, such as "sign in", "sign out", etc.

Figure 6-2: Time and Attendance Tab To use T&A mode: 1. Select the Activate Time and Attendance Mode check box. 2. If you want function key use to be mandatory, select the Mandatory use of Function Keys check box. 3. Enter appropriate messages for the function keys into the fields. 4. Enter the number of seconds you want the messages to display. 5. Click the Apply button.
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-3

Managing Device Settings

6.3. COMMUNICATION TAB The Communication tab allows you to adjust various communication settings of the selected device.

Figure 6-3: Communication Tab Using the various fields and drop-down lists in the Serial area, adjust these settings: Device ID Host port protocol Host port baud rate Aux port baud rate Aux port password (optional).

Using the various fields and drop-down lists in the TCP/IP area, adjust these settings: Ethernet DHCP or Static IP IP address of current device (if using Static IP) Subnet mask (if using Static IP) Gateway (if using Static IP).

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-4

Managing Device Settings

If you are using a wireless connection, configure these settings: WLAN DHCP or Static IP IP address of current device (if using Static IP) Subnet mask (if using Static IP) Gateway (if using Static IP)

Encryption Encryption type Encryption key Current mode

Using the various controls in the Ethernet Security area, adjust these settings: Ethernet Security (enable or disable) Allowed IP Addresses Allowed IP Address Ranges

Click the Apply button after making any changes on this tab. Click Refresh to see the most-recent settings.

Ethernet Security Ethernet Security is a feature that allows you to specify which IP addresses are allowed to communicate with the device. To activate Ethernet Security, you need to select the Ethernet Security check box. You can then enter up to 100 individual IP addresses and 100 IP ranges. During a device registration via server, the IP of the server machine is logged as an allowed IP into the device. Aux Port Security The Aux port can be disabled with a password to disable unauthorized use. The Aux port once disabled cannot be accessed unless the password is supplied to re-enable it. To disable it, enter a numeric password, and then click Apply. Once the Aux port is disabled, it accepts no communications until it is re-enabled by one of these methods: If communicating over the Host or Ethernet ports: The Enable Port command enables Aux port communications and a password is not required. This allows the device to be reset over the Host and Ethernet ports if the Aux password is forgotten. SecureAdmin allows this since the network is considered secure. If communicating over the Aux port: The Enable Port command enables Aux port communications only if the correct password is supplied. All other commands return an error indicating a locked port until the port is enabled properly. Many fields in SecureAdmin are blank when the port is locked.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-5

Managing Device Settings

6.4. LED TABLE TAB The LED Table tab provides controls that allow you to modify the LED behavior of the selected device.

Figure 6-4: LED Table Tab To modify LED behavior: 1. Select an action from the LED Action Selection drop-down list. 2. Click the appropriate icons under the Red or Green columns corresponding to the LED colors you want to illuminate for the selected action. To display an amber LED, select both green and red. 3. If you want the buzzer to sound for the selected action, select the appropriate check box under the Sound column. 4. Enter the number of milliseconds in the Duration and Interval fields. 5. Click Apply.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-6

Managing Device Settings

6.5. TAMPER TAB The Tamper tab provides controls that allow you to enable, disable, modify, and reset the tamper detection feature on the selected device.

Figure 6-5: Tamper Tab To enable tamper protection: 1. Select the Activate Tamper Detection check box. 2. Select any desired options. 3. Adjust the volume of the audio feedback using the Volume slider. 4. Click Apply. To stop (disarm) the tamper detection buzzer and audio feedback, click the Reset button. To re-arm the tamper detection, click the Clear & ReEnable button.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-7

Managing Device Settings

6.6. SINGLE DOOR ACCESS CONTROL TAB The Single Door Access Control (SDAC) tab provides controls that allow you to configure the selected V-Station 4G device's built-in door controller settings.

Figure 6-6: Single Door Access Control Tab 6.6.1. CONFIGURING SINGLE DOOR ACCESS CONTROL Before the door controller can be configured and used, it must first be activated. To activate the single door access controller feature, select the Activate Single Door Access Control check box. To configure single door access control: 1. Select how many seconds the door will be unlocked in the Door Unlock Duration drop-down list. 2. Select how many seconds the door will be held open in the Door Held Open dropdown list.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-8

Managing Device Settings

3. Select how exit requests will be made using the Request to Exit Mode drop-down list. 4. If you are using a motion detector as the Request to Exit Mode, enter the number of timeout seconds in the Motion Detector Egress Timeout field. 5. Select the desired alarm condition (buzzer and/or blinking LED combinations) using the Alarm Condition drop-down list. 6. Click the Apply button to save the configuration settings to the device.

6.6.2. ACTIVATING TIME OVERRIDE MODE Time Override Mode (TOM) allows an Administrator to temporarily suspend the need for verifications for a specified time period on a device. This feature is only available on VStation 4G devices. To enable and configure TOM for the selected device: 1. Select the Enable Time Override Mode check box. 2. Enter how many minutes TOM will be active into the Time Override Duration field. 3. Click the Apply button to activate TOM on the device. Thirty seconds before TOM is set to expire, the device beeps. After TOM expires, the device returns to using the existing SDAC settings.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-9

Managing Device Settings

6.7. ACCESS SCHEDULES TAB This tab provides controls that allow you manage access schedules on the selected device.

Figure 6-7: Access Schedules Tab

To view an existing access schedule, select the check box next to the access schedule you want to review. The item is highlighted in the list and the vertical bars show the schedule. The area in green represents the time period when access is allowed. In Figure 6-7 above, the selected access schedule is "All Access" and as the name suggests, access is allowed at all times, signified by the full-height green bars. To enable the use of access schedules, select the Activate User Access Scheduling check box. Note: There are 64 total Access Schedules available on V-Series 4G devices. Of these, 58 are available for modification by the user.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-10

Managing Device Settings

Figure 6-8: Access Schedules Tab - New Access Schedule To add an access schedule: 1. Click the Add button. A new entry is displayed in the list. 2. In the Allowed Access Time area, click inside one of the bars on the desired day of the week and drag up or down to define a time interval (see Figure 6-8 above). Move the time interval by clicking on it and dragging it to where you want it. Remember that the area in green represents when access is allowed. 3. Apply the new access schedule, as desired, to all days of the week or just to Monday through Friday by selecting the appropriate radio button and clicking the Apply Schedule button. 4. Set any options. 5. Click Apply to apply the schedule. 6. Click Upload to upload the new schedule to the currently selected device.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-11

Managing Device Settings

6.8. HOLIDAY SCHEDULES TAB This tab provides controls that allow you to manage holiday schedules on the selected device.

Figure 6-9: Holiday Schedules Tab

To view an existing holiday schedule, select the check box next to the access schedule you want to review. The item is highlighted in the list and the vertical bars show the schedule. The area in red represents the time period when access is not permitted. In Figure 6-9 above, the selected holiday schedule is set to not allow any access on January 1, 2009. To add a holiday access schedule: 1. Click the Add button. A new entry is displayed in the list.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-12

Managing Device Settings

Figure 6-10: Holiday Schedules Tab - New Holiday Schedule

2. In the Holiday Information area, select the month using the arrow controls and select the day of the holiday schedule by clicking on it. 3. Click inside the bar next to the calendar control and drag up or down to define a time interval (see Figure 6-10 above). Move the time interval by clicking on it and dragging it to where you want it. Remember that the area in red represents when access is not allowed. 4. Click Save to save the holiday schedule. 5. Click Apply to apply the holiday schedule. 6. Click Upload to upload the new holiday schedule to the currently selected device. To remove holiday schedules that have already occurred, click the Remove Expired button.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-13

Managing Device Settings

6.9. MISCELLANEOUS TAB The controls on this tab allow you to activate and modify Verification results, Verification Polling Mode, and Custom Verification Entry Mode settings for the currently selected device.

Figure 6-11: Miscellaneous Tab

Send Verification Result The Send Verification Result feature allows other verification responses to be sent in addition to the normal response. Under normal operation, the V-Station 4G device responds based on how a Verification Action was initiated. When a Wiegand input initiates the action, a Wiegand output responds to it. When a Verification Action is initiated over a communications port, then the response packet is returned on the same communication port (either Host or Aux). To enable and configure the Send Verification Result feature: 1. Decide which channel the response is to be sent on. 2. Select the Always or Always (with ID) check box next to the appropriate channel. If you

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-14

Managing Device Settings

select Always, a response is sent every time. If you select Always (with ID), a response is also sent out every time, but the first data word returned is the Template ID. 3. Click Apply.

NOTICE
L-1 EAS recommends that only advanced users who are working with the SDK and writing their own custom software attempt to enable the Host or Aux Always operations.

Verification Polling Mode Verification Polling Mode drastically changes the behavior of the reader for verifications initiated either by the keypad (V-Station 4G devices) or by a Wiegand source. When enabled, these actions do not initiate a verification (the default behavior of the device). Instead, the ID number is placed into a queue that is available for polling from an outside device such as a door controller. This outside device determines if the ID is valid and takes appropriate steps such as sending the device the appropriate template (perhaps from a central database) and independently initiating the Verification process on the device. Customers wishing to implement this behavior should consult the DLL Manual document provided with the SecureSDK and contact L-1 EAS Technical Support for further assistance. To activate Verification Polling Mode: 1. Select the Activate Verification Polling Mode check box. A warning dialog box is displayed. 2. Click Yes. 3. Select by what method the verification will be initiated using the Initiate Verification by drop-down list. 4. Click Apply. Custom Verification Entry Mode When Custom Verification Entry Mode is enabled, users must key in a custom entry code after verifying. The code is logged in the device transaction log. To enable Custom Verification Entry Mode: 1. Select the Activate Custom Verification Entry Mode check box. 2. Click Apply.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-15

Managing Device Settings

6.10. AUDIO TAB The controls on this tab allow you to manage the audio feedback settings of various actions for the currently selected device.

Figure 6-12: Audio Tab To change the audio feedback of an action: 1. Select an action from the Audio Directory drop-down list. 2. Click the Upload button. An Open File dialog box is displayed. 3. Navigate to and select the audio file you want to play when the selected action occurs. 4. Click OK. The file is uploaded to the device and is displayed in the list of available audio files. 5. Preview the audio file by selecting it and clicking Play.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-16

Managing Device Settings

Figure 6-13: Audio Tab - New Audio File 6. Set the volume of the selected audio feedback file using the Set File Volume slider. 7. Click Apply to save your changes to the device. Set the master volume of the selected device using the Device Volume slider. Remove unwanted audio files by selecting them in the list and clicking the Remove button.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-17

Managing Device Settings

6.11. DYNAMIC MESSAGE TAB The controls on this tab allow you to activate and configure dynamic messaging. Dynamic messaging allows you to display an image and play a sound file when the device is idle.

Figure 6-14: Dynamic Message Tab To activate dynamic messaging: 1. Select the Activate Dynamic Message check box. 2. Set the desired number of seconds in the Message Delay Timeout drop-down list. 3. Click Upload. A File Open dialog box is displayed. 4. Navigate to the folder containing the image file you want to display and select it. 5. Click OK. The file is uploaded and is displayed in the Image(s) on the Device list (see Figure 6-15 on the next page). 6. Select the Activate Dynamic Message audio attention check box if you want audio to accompany the image file.
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-18

Managing Device Settings

Figure 6-15: Dynamic Message Tab - New File 7. Ensure that the image you want displayed is selected in the list and then click Apply. To preview a message file, select it in the list and click Preview. The SecureAdmin Image Viewer dialog box displays the image (see Figure 6-16).

Figure 6-16: Dynamic Message Preview

NOTICE
When dynamic messaging is enabled and an audio file is assigned, only the dynamic messaging audio file plays during a successful verification..

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-19

Managing Device Settings

6.12. LCD TAB The controls on this tab allow you to manage the device logo, wallpaper, slideshow, and language file of the selected device. These features are only available on V-Station 4G devices.

Figure 6-17: LCD Tab

To set the device logo: 1. Click the Upload button. A File Open dialog box is displayed. 2. Navigate to the folder containing the image file (*.jpg) you want to display as the logo and select it. 3. Click OK. The file is uploaded and displayed in the Device Logo Name list (see Figure 617) 4. Select the new logo file in the list. A thumbnail of the image is displayed. 5. Click Apply to set the image as the device logo.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-20

Managing Device Settings

To set the device wallpaper: 1. Click the Upload button. A File Open dialog box is displayed. 2. Navigate to the folder containing the image file (*.jpg) you want to display as wallpaper and select it. 3. Click OK. The file is uploaded and displayed in the Device Wallpaper Name list. 4. Select the new wallpaper file in the list. A thumbnail of the image is displayed. 5. Click Apply to set the image as the device wallpaper.

To set the device slideshow: 1. Click the Upload button. A File Open dialog box is displayed. 2. Navigate to the folder containing an image file (*.jpg) you want to display in the slideshow and select it. 3. Click OK. The file is uploaded and displayed in the Slideshow list. 4. Repeat Steps 1 through 3 for every image you want included in the slideshow. 5. Preview an image by selecting it and then clicking Preview. A thumbnail of the image is displayed. 6. Click Apply to set the images in the list as the device slideshow.

To change the device language: 1. Click the Browse button. A File Open dialog box is displayed. 2. Navigate to the folder containing the language file (*.qm) and select it. 3. Click OK. The file is uploaded and its name is displayed in the Language File list. 4. Click Apply to apply the language file to the selected device.

Note: The maximum length of image and audio file names is 50 characters.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-21

Managing Device Settings

6.13. GENERAL PURPOSE I/O TAB The General Purpose I/O Tab allows the user to set what actions are triggered when the General Purpose Input/Output TTL lines (commonly referred to as GPIO) are activated. In the top section, a V-Station 4G device can be configured to perform certain actions automatically when a GPI line is activated. The bottom section controls which actions cause the device to set various GPO (output) lines) active and for how long. General Purpose Input (GPI) and General Purpose Output (GPO) each have three TTL lines available.

INSET

Figure 6-18: General Purpose I/O Tab

General Purpose Input The GPI lines are available on V-Station 4G and V-Flex 4G devices. Each GPI line can be configured to trigger an action when set active (low in some cases and high in others), as well as when both lines are simultaneously set active. The available actions are: Verify The device looks for a finger to begin a verification Search The device looks for a finger to begin a search (Identify) Enroll The device looks for a finger to enroll, automatically using the specified ID: Index

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-22

Managing Device Settings

Delete Templates The device deletes any templates that have the specified ID (verification devices) or all templates (searching devices) Reboot Device The device reboots immediately. Alarm The alarm buzzer sounds and the LED blinks red for 5 seconds. This alarm sounds for Tamper and Single Door Access Control. The line must go active for the specified Minimum Duration, by default 200ms. For actions that trigger off multiple GPI lines simultaneously, each line must go active within the Multi-Signal Tolerance period (default 50 ms). A line can be considered active either on the "Signal Rising Edge" or the "Signal Falling Edge", which will vary depending on whether the active state is low or high. Finally, to facilitate automatic verification, enrollment, and deletion, a template ID number and a Max Enroll must be specified. For verifications, the maximum index limits the number of users that can be enrolled automatically through GPI. This number should remain relatively low, because during GPI verifies, the device has to try each index as a 1:1 verification, which is time consuming. To reset all GPI values to default, click the Reset GPI Parameters button. To configure GPI settings: 1. Select a GPI action using the desired TTL line drop-down list. 2. Enter a Minimum Duration value. 3. Enter a Multi-Signal Tolerance value. 4. Select which signal edge the GPI will be triggered on, using the Trigger On drop-down list. 5. Set the Enroll, Verify, and Delete actions by entering values into the Template ID and Max Enroll fields. 6. Click Apply. General Purpose Output All V-Station 4G and V-Flex 4G devices have General Purpose Output GPO TTL capability. When configured, certain GPO actions can activate GPO lines 0, 1, 2, or multiple GPO lines. The possible actions are: Enroll Completed When a user has completed an enrollment Enroll Initiated When a user has initiated an enrollment Verify Passed After a successful verification, initiated from any source Verify Failed After a failed verification, initiated from any source Finger not Detected Whenever a finger is expected by the device but not detected V-Station Admin Mode When a user enters admin mode from the keypad on a VStation 4G device (with full administrative privileges) Delete Attempted When a template delete is initiated, from any source (this applies to templates stored on the device only) Reader Boot-up When a device is booted up, either from a power cycle or from a soft reboot. File Transfer Complete When a large file transfer is complete. Used when transferring audio and firmware files. Any of these actions, if configured, can trigger the line active for the Duration that is specified (default 600 ms). All GPO parameters can be reset to defaults be clicking on the Reset GPO
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-23

Managing Device Settings

Parameters button. By default, the readers ship with both GPI and GPO actions set to "No Action". To configure GPO settings: 1. Select a GPO triggering action using the desired TTL line drop-down list. 2. Enter a value into the Duration field. 3. Click Apply. For devices in 1:1 template mode (TEM, 1:1 BUR, VUR), enrollment via GPI increments the index number for the same ID (e.g., 5_0, 5_1, 5_3, .). For devices in 1:N template mode (MTM, TMS, 1:N BUR), enrollment via GPI increments the ID number with the same index (e.g. 5_0, 6_0, 7_3, ). GPIO-Based Threat Levels If the Activate GPIO-based Threat Levels check box is selected, the General Purpose Input area shows a different set of controls (see inset area in Figure 6-18). This feature allows you to set threat levels using the two solid-state driven TTL input lines. When enabled, the TTL signals can define the level of security and amount of actions required for a successful verification. The available choices are "Card Only" and "Card + Biometrics". For example, if GPI 0 is set to "Card + Biometrics" and the TTL input for GPI 0 is triggered, a successful verification requires presenting a smart card and a finger to the unit. If TTL is not active (both lines are 0), the verification follows the Biometric tab settings. If GPIObased Threat Levels are enabled, the Biometric tab settings are disabled. Once TTL is activated, verifications follow the TTL settings. This applies for all types of verifications, regardless how they are initiated (by a smart card, from SecureAdmin, or from the front panel of the device).

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-24

Managing Device Settings

6.14. WIEGAND TAB The controls on the Wiegand tab allow you to set the Wiegand Input format, set Wiegand output for events, and upload custom Wiegand formats to a device.

Figure 6-19: Wiegand Tab Pre-defined Wiegand Formats Several Wiegand formats are pre-loaded on V-Station 4G devices and are designated as a Standard Type in Table 6-1 on the next page. They contain an ID of 32 bits or less. All V-Station 4G devices support these formats. This tab allows you to select the desired Wiegand format for both input and output. "Standard 26-bit" is the default format. The format for both input and output is the same. To set the Wiegand format to a pre-defined format: 1. Select the Predefined radio button. 2. Select a Wiegand format in the drop-down list. 3. Click Apply.
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-25

Managing Device Settings

Format Standard 26-bit Apollo 44-bit Northern 34-bit Northern 34-bit [no parity] HID Corporate [35-bit] Ademco 34-bit HID 37-bit

Type Standard Standard Standard Standard Standard Standard Standard

Alt Site Code and Fail Site Code Range 0 - 255 0 - 16383 0 - 65535 0 - 65535 0 - 4095 0 - 4095 0 - 2047

Template ID Number Range 1 - 65535 1 - 65535 1 - 65535 1 - 65535 1 - 1048575 1 - 1048575 1 - 16777215

Extended ID Number Range N/A N/A N/A N/A N/A N/A N/A

Table 6-1: Wiegand Formats and Associated Valid Values Note: Wiegand 64 - 512 formats are supported by BUR templates only.

Pass-Thru Wiegand Formats SecureAdmin provides expanded Wiegand compatibility by allowing you to define a Pass-Thru format. To use this ability, this information is required: Total bits - the number of Wiegand bits in the Wiegand string (maximum = 64 bits) ID start bit - the start bit of the ID Field (where the first bit is Bit 0) Total ID bits - the number of bits in the ID Field (must be contiguous bits).

Using these three pieces of information, when a card is presented to the device, it attempts to decode the ID Field and uses that information as the Template ID number. All Site codes, Parity, and any other data are ignored. Using this ID, the device attempts to verify the template corresponding to the decoded ID. If the ID is not found or if the verification attempt fails, no Wiegand output is sent. To the controller, it appears as if nothing was presented. If the ID is valid and a successful verification is performed, the original Wiegand input string (with Site code, Parity, etc.) will "Pass-Thru" to the Wiegand output unchanged. Although the Pass-Thru option does not allow Fail Strings, changing the Site Code, or checking parity, it does provide a mechanism for using a wide variety of Wiegand formats. To set the Wiegand format to a pass-thru format: 1. Select the Passthru radio button. 2. Enter a value in the Total bits field. 3. Enter a value in the ID start bit field. 4. Enter a value in the Total ID bits field. 5. Click Apply.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-26

Managing Device Settings

Pulse Width The Set pulse width to option allows you to enter a custom pulse width duration (in microseconds) for the Wiegand output. This is not recommended unless you are very familiar with the equipment connected to the V-Series 4G device. To set the pulse width: 1. Enter a value into the Set pulse width to field. 2. Click Apply.

Pulse Interval The Set pulse interval to option allows you to enter a custom pulse interval duration for the Wiegand output. This is not recommended unless you are very familiar with the equipment connected to the V-Series 4G device. To set the pulse interval: 1. Enter a value into the Set pulse interval to field. 2. Click Apply. Activate Wiegand Input The Activate Wiegand Input option enables Wiegand input when selected. This allows all Wiegand input communication to the device. If this option is deselected, all Wiegand input data that the device receives is ignored. To activate Wiegand input, select the Activate Wiegand input check box then click Apply. Activate Wiegand Output The Activate Wiegand Output enables Wiegand output when selected. If this option is deselected, all Wiegand output data is output in the same format as the Wiegand Input data. There are two options when enabling output, which are selected from the drop-down list to the right of the check box: Always Output: This enables Wiegand output on all Verifications regardless of whether they were initiated by a Wiegand input, a PC, or any other device. This is the default setting. Selective Output: This causes the Wiegand output string to be sent whenever a Wiegand input is received.

To activate Wiegand output: 1. Select the Activate Wiegand output check box. 2. Select the desired option in the drop-down list. 3. Click Apply.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-27

Managing Device Settings

Wiegand Output Settings The Wiegand Output Settings option allows you to associate Wiegand formats with device events. If you want to use a custom Wiegand format, you must create the custom Wiegand format first. To set Wiegand Output Settings: 1. Click the Wiegand Output Settings button. The Wiegand Output Settings dialog box is displayed (see Figure 6-20).

Figure 6-20: Wiegand Output Settings Dialog Box 2. Select a Wiegand format from the drop-down list next to a device event. Repeat for other desired events. 3. Click Apply. The dialog box closes. 4. Click Apply. Custom Wiegand Output Settings The Wiegand Output Settings option allows you to manage Wiegand formats. You can upload, edit, and delete Wiegand formats with this option. To upload custom Wiegand output settings: 1. Click the Custom Wiegand Settings button. The Custom Wiegand Settings dialog box is displayed (see Figure 6-21 on the next page). 2. Click on a slot. 3. Select where you want to upload from in the Upload drop-down menu. A dialog box is displayed. 4. Provide the appropriate details in the dialog box for the upload origin you selected. 5. Click Close. The Custom Wiegand Settings dialog box closes. 6. Click Apply.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-28

Managing Device Settings

Figure 6-21: Custom Wiegand Settings Dialog Box To create a custom Wiegand format: 1. Click the Custom Wiegand Settings button. The Custom Wiegand Settings dialog box is displayed (see Figure 6-21 above). 2. Click on a slot. 3. Select "New" in the Upload drop-down menu. A Wiegand Format dialog box is displayed (see Figure 6-22).

Figure 6-22: New Wiegand Format Dialog Box

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-29

Managing Device Settings

4. Enter a name into the Name field. 5. Enter a Length value. 6. Enter the Wiegand ID Start Position, Length, and Heart Beat Value. 7. Click the Add User Field button (the top-most red arrow that's pointing left) in the User Fields area. A slot is displayed in the User fields area (see Figure 6-23).

Figure 6-23: New Wiegand Format Dialog Box- Add User 8. For the new User Field entry, enter Name, Start Position, Length, Success Value, and Failure values. 9. Click the Add Parity Field button (the top-most red arrow that's pointing left) in the Parity bits area. A slot is displayed in the Parity bits area (see Figure 6-23). 10. Select a Parity Type from the drop-down list. 11. Click the Parity Mask button. In the dialog box that appears, calculate and apply a parity value. 12. A parity bit can be calculated for the whole Wiegand string or for part of it. To set which bit to calculate for parity, click the "..." button and use the controls in the Parity Calculation dialog box. 12. Click Apply. To edit a Wiegand format, select a Wiegand format in the Custom Wiegand Settings dialog box (see Figure 6-21 on the previous page) and click the Edit button. The dialog box shown in Figure 6-23 is displayed, where you can edit the Wiegand format's details. To delete a Wiegand format, select a Wiegand format in the Custom Wiegand Settings dialog box (see Figure 6-21 on the previous page) and click the Delete button.
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-30

Managing Device Settings

6.15. BIOMETRICS TAB The Biometrics tab allows various biometrics parameters to be configured for the selected device. Use caution when making any changes in this tab because they will affect the operation of the devices biometric functions, and thus affect over-all security.

Figure 6-24: Biometrics Tab Global Security Threshold There are two types of security settings: the Verify security level (available on all V-Series devices) associated with the individual template, and the Identify (available only if the device is set to 1:N BUR mode) security level associated with the individual V-Station 4G device. For verification, the system always authorizes using the lower of the two. For identification with 1:N BUR templates, the system always authorizes using the higher of the two. To change the global security threshold: 1. Adjust the Verify and Identify sliders to the desired security levels. 2. Click Apply.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-31

Managing Device Settings

Device Mode The Device Mode area contains controls to set the mode of the device and the type of templates the device uses. The Verify and Identify radio buttons are used to specify the mode of reader (1:1 mode or 1:N mode respectively). The Authentication Type drop-down list allows you select the type of templates that can be used depending on the devices mode. To switch the reader to Verify mode, select the Verify radio button, select "1:1 templates" from the Authentication Type drop-down list, and then click Apply.

Finger Required for Templates with security NONE This option dictates how the device should behave when the template security threshold is set to a value of "None" (numerically mapped to 0). In this case, the user always passes the verification (biometrics are ignored); however, the user must still place a finger on the sensor and have it detected to proceed. Because some fingers have difficulty being detected by the sensor, an administrator can opt to turn off the requirement that a finger be placed. If this setting is not selected, the authorized ID is passed immediately without requiring a finger.

Require biometric for Templates with security Password Only This option dictates how the device should behave when the template security threshold is set to a value of "Password Only" (numerically mapped to 6). If this option is selected, templates with this security level are asked for a biometric comparison. The threshold used for deciding whether a comparison matches or not is then determined by the Global Security Threshold. If this setting is not selected, templates with a "Password Only" security threshold are not required to pass a biometric comparison. On V-Station 4G devices, a password is required to pass. On other products, a pass is indicated immediately without a biometric comparison. This setting is disabled in Searching mode.

Duress Finger Mode The Activate Duress Finger Mode check box, when selected, offers users a way to indicate an "under duress" situation (such as being forced to open a door) by verifying with a specially designated duress finger. When a successful verification occurs with such a template, the device performs the special action specified, reversing the Wiegand output to alert the door controller of the duress situation. The controller can then respond by alerting security personnel, sounding alarms, etc. Of course, the controller must support such an option.

NOTICE
A template that is specified as a duress template is still subject to access scheduling, holidays, multi-user mode, and any other biometric option specified. For this reason, L-1 EAS recommends setting any duress template to use Access Schedule #63 (All Access) and not observe holidays.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-32

Managing Device Settings

Multi-User Verification V-Station 4G devices can be set to a higher security mode by requiring multiple fingers for all verifications (except to enter Admin mode). The fingers can be either from the same individual or one finger each from different individuals, as long as different template IDs are used. This option can be set to use either one finger (the default) or two. The Inter-Finger Timeout setting specifies the time allowed between separate finger verifications, and may be any value between 1 and 30 seconds. To set Multi-User Verification settings: 1. Select a value in the Number of Users drop-down list. 2. Enter a value in the Inter-Finger Timeout field. 3. Click Apply.

Biometric Verification The Activate Biometric Verification check box allows biometric verification to be turned on and off. Select or deselect the check box and click the Apply button. Deselecting the check box causes the device to bypass the finger-scan authentication (i.e., no finger is required) and allows for Wiegand pass-thru authentication alone. Turning off biometrics results in a less secure system and is not recommended. The user assumes all risk associated with disabling biometrics.

Auto-Finger Detection The Activate Auto-Finger Detection check box shows the current setting of the function for searching-type readers. Select or deselect the option and click the Apply button to modify the setting on the current device. This section is disabled if the current device does not have the searching ability.

Password Verification The Activate Password Verification check box, when selected, causes a user to be prompted to enter a numeric password on the keypad after finger verification, if that particular template contains a password. This offers an additional level of security. Passwords are set within the template and must be a value between 1 and 4294967295.

NOTICE
A password of zero entered for a template means the template has no valid password and the user will not be asked to enter it, even if this feature is enabled. The password option is disabled when using Extended Wiegand. The password option does not affect non-V-Station 4G devices.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-33

Managing Device Settings

6.16. CLOCK TAB The controls on this tab allow you to adjust the time, date, and time zone of the selected device.

Figure 6-25: Clock Tab To set the time on the device: 1. Ensure that the time and date are correct on the PC. 2. Click Synchronize. 3. Click Apply. To set the time zone, clock type, and display format on the device: 1. Select the appropriate time zone for your location in the drop-down list. The highlighted time zone in the world map changes to the zone you selected. 2. Set the Clock Type and Display Format settings using the drop-down lists. 3. Click Apply.
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-34

Managing Device Settings

6.17. BIOMETRIC SCHEDULES TAB The Biometric Schedules tab allows you to configure scheduling for biometric verification (i.e., when a finger is required). For example, if a site only requires security at night; the administrator might want biometric verification enabled only between the hours of 6 p.m. and 6 a.m. By default, biometric verification is enabled on all V-Station 4G devices.

Figure 6-26: Biometric Schedules Tab Schedules can be set on any 15-minute interval and can be configured differently for each day of the week. The red bars represent periods when biometrics are not required. The current day is labelled in blue (in Figure 6-26, "Thursday" is the current day).

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-35

Managing Device Settings

To add a biometric schedule for the selected device: 1. Click the Add button. A new entry is displayed in the list. 2. In the Recurring Weekly Schedule area, click inside one of the bars on the desired day of the week and drag up or down to define a time interval. Move the time interval by clicking on it and dragging it to where you want it. Remember that the area in green represents when biometric verifications are not required. 3. If desired, apply the new biometric schedule to all days of the week or just to Monday through Friday by selecting the appropriate radio button and clicking the Apply Schedule button. 4. Click Apply to apply the schedule.

NOTICE
To finalize a schedule, you must click the Apply button in the Biometric Schedules dialog box. Resetting a schedule, however, does not require clicking the Apply button.

To reset the entire weeks schedule (remove all Off periods), click the Clear All button.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-36

Managing Device Settings

6.18. DATABASE - MANAGING WIEGAND FORMATS The Database item in the network tree allows you to manage the Wiegand formats in the database.

Figure 6-27: Database - Wiegand To see which predefined Wiegand formats are in the database, select Predefined Wiegand Formats in the Select Wiegand Format Type drop-down list. To see which custom Wiegand formats are in the database, select Custom Wiegand Formats in the Select Wiegand Format Type drop-down list. To import a predefined or custom Wiegand format into the database: 1. Click the Import button. A File Open dialog box is displayed. 2. Navigate to the folder containing the Wiegand format file (*.wgf for predefined or *.cwf for custom) and select it. 3. Click OK. The file is imported and its name is displayed in the list of Wiegand formats.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-37

Managing Device Settings

To export a custom Wiegand format: 1. Select the Wiegand format you want to export in the list. 2. Click the Export button. A Browse for Folder dialog box is displayed (see Figure 6-28).

Figure 6-28: Browse for Folder Dialog Box 3. Navigate to and select a destination folder. 4. Click OK. The Wiegand format file (*.wgf for predefined or *.cwf for custom) is exported to the specified location.

To add a custom Wiegand format: 1. Select Custom Wiegand Formats in the Select Wiegand Format Type drop-down list. 2. Click the Add button (see Figure 6-29). Note that this button is not available on the Predefined Wiegand Format screen. The Wiegand Format dialog box is displayed (see Figure 630 on the next page).

Figure 6-29: Add Button

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-38

Managing Device Settings

Figure 6-30: New Wiegand Format Dialog Box 3. Enter a name into the Name field. 4. Enter a Length value. 5. Enter the Wiegand ID Start Position, Length, and Heart Beat Value. 6. Click the Add User Field button (the top-most red arrow that's pointing left) in the User Fields area. A slot is displayed in the User fields area (see Figure 6-31).

Figure 6-31: New Wiegand Format Dialog Box-Add User


Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-39

Managing Device Settings

7. For the new User Field entry, enter Name, Start Position, Length, Success Value, and Failure values. 8. Click the Add Parity Field button (the top-most red arrow that's pointing left) in the Parity bits area. A slot is displayed in the Parity bits area. 9. Select a Parity Type from the drop-down list. 10. Click the Parity Mask button. In the dialog box that appears, calculate and apply a parity value. 11. Click Apply. The new Wiegand format is displayed in the list.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

6-40

Managing Network Settings

CHAPTER 7 - MANAGING NETWORK SETTINGS


Chapter Overview
This chapter details how to view devices in the network and how to register devices connected to a server or connected to the computer.

Chapter Index
7. Managing Network Settings ................................................................................................................ 7-2 7.1. View Devices in Network .................................................................................................... 7-3 7.2. Register Device via Server ................................................................................................. 7-4 7.3. Register Device via Client................................................................................................... 7-6

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

7-1

Managing Network Settings

7. MANAGING NETWORK SETTINGS


The Network tab allows you to see what devices are connected to the network and allows you to register new devices on the network.

Figure 7-1: Network Tab On the Network tab, three buttons are displayed: Network Tree - This button allows you to see what devices are connected to the network Register via server - This button allows you to register devices that are connected through a server (this is the recommended method). Register via client - This button allows you to register a device that is connected directly to the computer.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

7-2

Managing Network Settings

7.1. VIEW DEVICES IN NETWORK To view devices in the network: 1. Click the Network Tree button. 2. Double-click the Device Network item in the network tree. The network tree expands to show all groups in the network. 3. Double-click a group in the network tree. In Figure 7-2 below, the group item is named "DefaultGroup". Any devices in the group are displayed in the network tree under the group they belong to. In Figure 7-2, there is one device item, named "Device0", in the group.

Figure 7-2: Network Tree

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

7-3

Managing Network Settings

7.2. REGISTER DEVICE VIA SERVER To register a device via the server: 1. Click the Register via Server button. A Register via Server dialog box is displayed.

Figure 7-3: Register Via Server Dialog Box 2. Select the Search Automatically check box. 3. Click the Scan button. SecureAdmin scans the network for connected devices and lists the results. 4. In the list, click the Registration Status icon of the device you want to register. A plus sign icon means that the device is available to be added. A check mark icon means the device has already been added. A Register Device dialog box is displayed (see Figure 7-4).

Figure 7-4: Register Device Dialog Box

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

7-4

Managing Network Settings

5. Enter a name for the device in the Device Name field. 6. Select the group the device will belong to in the Group drop-down list. 7. Click Register. A Device Summary dialog box is displayed. the dialog box lists information about the registered device.

Figure 7-5: Device Summary Dialog Box 8. Click OK. 9. Click Close. The device is now registered.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

7-5

Managing Network Settings

7.3. REGISTER DEVICE VIA CLIENT To register a device via a client: 1. Click the Register via client button. The Step 1 Find Device dialog box is displayed (see Figure 7-6).

Figure 7-6: Step 1 Find Device Dialog Box 2. Select either Serial Port - this machine or Ethernet radio button. 3. Enter the appropriate connection details. If you are connecting via USB/RS-232: Enter the appropriate Port Number (to determine the correct port number, look in the Windows Device Manager for a "Gadget Serial" entry under the "Ports (COM & LPT)" heading), Baud Rate, and Device ID. If you are connecting via RS-485: Enter the appropriate Port Number (to determine the correct port number, look in the Windows Device Manager for your RS-485 entry under the "Ports (COM & LPT)" heading), Baud Rate, and Device ID. If you are connecting via Ethernet: Enter the network IP Address of the device you want to connect to.

NOTICE
The first time a V-Station 4G or V-Flex 4G device is connected to the computer via the USB/RS-232 interface, the Windows Found New Hardware Wizard might start. As all required device drivers are installed when SecureAdmin is installed, simply follow the prompts, accepting the default choices when possible, to install the device.

4. Click Next. The Step 2 Device Information dialog box is displayed.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

7-6

Managing Network Settings

Figure 7-7: Step 2 Device Information Dialog Box 5. Click Next. The Step 3 Server Communication Parameter dialog box is displayed.

Figure 7-8: Step 3 Server Communication Parameter Dialog Box 6. Select the radio button that corresponds how the server will connect to the device, either by Serial Port or Ethernet. 7. If connecting via RS-232 or RS-485, enter the appropriate Port, Baud Rate, and Device ID (if using RS-485, also select the RS-485 check box). If connecting via Ethernet, enter the network IP Address of the device (select the DHCP check box if dynamic IP addressing is used). 8. Click Next. The Step 4 Register Device dialog box is displayed (see Figure 7-9 on the next page).

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

7-7

Managing Network Settings

Figure 7-9: Step 4 Register Device Dialog Box 9. Enter a Device Name. 10. Select the Group the device will belong to from the drop-down menu. 11. Click Register. The Device Summary dialog box is displayed.

Figure 7-10: Device Summary Dialog Box 12. Click OK. 13. Click Close. The device is now registered.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

7-8

Managing Smart Cards

CHAPTER 8 - MANAGING SMART CARDS


V-Station 4G devices can work with iCLASS, MiFARE, or DESFire smart cards. This chapter presents procedures for managing the smart cards used at your facility and the smart card-related settings of devices in your network. The Smart Card Device Manager, covered in Section 8.1, allows you to configure smart card security settings and smart card layout. The Smart Card Manager, covered in Section 8.2, allows you to modify data on the cards and to secure or reset cards.

Chapter Index
8. Managing Smart Cards ....................................................................................................................... 8-2 8.1. Smart Card Device Manager .............................................................................................. 8-3 8.1.1. Smart Card Security Settings ............................................................................ 8-6 8.1.1.1. Changing the Site Key.......................................................................... 8-7 8.1.2. Configure Card Layout........................................................................................ 8-9 8.1.2.1. iCLASS Cards ...................................................................................... 8-9 8.1.2.2. MiFARE Cards................................................................................... 8-11 8.1.2.3. DESFire Cards .................................................................................. 8-17 8.2. Smart Card Manager ....................................................................................................... 8-17 8.2.1. Deleting Templates ......................................................................................... 8-18 8.2.2. Deleting Wiegand Strings ................................................................................ 8-18 8.2.3. Securing Cards ................................................................................................ 8-18 8.2.4. Resetting Cards ............................................................................................... 8-18

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

8-1

Managing Smart Cards

8. MANAGING SMART CARDS


The Smart Card sidebar tab contains controls that allow you to manage the smart cards used at your facility and the smart card-related settings of devices in your network. The two dialog boxes available in the Smart Card sidebar tab are the Smart Card Device Manager and the Smart Card Manager.

Figure 8-1: Smart Card Sidebar Tab Dialog Box The Smart Card Device Manager configures a device so that it knows which areas of the smart card to read from and write to. This is done by configuring the card layout. The Smart Card Manager sets up the smart card so that it works with the settings that were configured in the Smart Card Device Manager. V-Station 4G devices, depending on the model (see Table 1-1 on page 1-7), can work with iCLASS, MiFARE, or DESFire smart cards.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

8-2

Managing Smart Cards

8.1. SMART CARD DEVICE MANAGER Click the Card Device Manager link in the Smart Card sidebar tab to launch the Smart Card Device Manager, shown in Figure 8-2.

Figure 8-2: Smart Card Device Manager Select the device for which you want to configure the smart card settings in the Current Device drop-down list. Information about the selected device is displayed. Reader Type This area displays the type of reader: iCLASS, MiFARE, or DESFire, depending on which type of V-Station 4G device was selected. Write Status This area displays the read and write privileges of the selected device. Max Templates Per Card At the top of the Smart Card Manager dialog box, the Max Templates per Card drop-down list allows you to specify how many templates can be stored on a card. Currently, this can be set to either one or two templates, although future cards with more memory might support additional templates. If the maximum is set to two templates, the smart card layout must have two templates defined (this applies only to MiFARE-compatible cards).

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

8-3

Managing Smart Cards

Otherwise, when attempting to save a second template to the card, an Invalid Smart Card Layout error message is displayed. If the maximum is set to only one template, attempting to save a second template to a card results in an ESI Storage Space is FULL error message.

NOTICE
The verification process differs between Template mode and User Record mode when a smart card is presented that contains both a primary and a secondary template. In Template mode, a smart card verification is performed at the primary template's security level, then at the secondary template's security level. In User Record mode, a smart card verification is performed at the lesser of the two template's security levels.

Rx Template Timeout This setting controls for how long the device will wait in milliseconds (ms) to receive smart card data before timing out. The minimum value is 500 ms and the maximum value is 5000 ms. Auto-Update Site Keys This check box enables or disables automatic site key updating of smart cards. If a site key is compromised, or if your installation's security requirements demand the site key to be changed regularly, an administrator can designate a new site key to which all smart cards will be updated. The V-Station 4G device has two site keys: a primary and a secondary. The primary site key matches all smart cards that are allowed to use the device. The secondary site key is only assigned when the primary site key needs to be updated. If the primary site key needs to be changed, the administrator creates a new site key. The next time a card is presented, the device performs the extra step of updating the smart card with the new site key. In time, an entire population of smart cards are migrated to the new site key. By deselecting the Auto-Update Site Keys check box, smart cards with the old site key are rejected.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

8-4

Managing Smart Cards

Use Wiegand String This setting controls whether the V-Station 4G device attempts to read a Wiegand string from the smart card during verification and if successful, whether it sends the Wiegand string through the Wiegand Out lines. If this check box is selected, SecureAdmin attempts to save the Wiegand string onto the smart card when enrolling. Saving a Wiegand string onto a smart card requires a Wiegand string to be read from an external Wiegand input device (select the From Wiegand String check box during a Quick or Advanced Enroll). Once the Wiegand string has been read, the Use Wiegand String check box will become selected. Read Only Mode This setting allows the device to be put into read-only mode, where it will not be allowed to write any data to a smart card. This mode should not be used under normal circumstances because it does not allow the V-Station 4G device to function normally with respect to enrollment, key management, etc. It is intended only for use with a pre-enrolled population of users who are only accessing the V-Station 4G device for verification. Although the likelihood of corruption is extremely low, this mode ensures that smart cards will not be corrupted by presenting the card at the edge of the devices detection field.

NOTICE
When Read Only Mode is enabled, it has a side effect of setting the secondary site key to a value of "-1". You must re-enter the secondary site key when setting the unit back to read/write mode if you want to use the autoupdate feature.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

8-5

Managing Smart Cards

8.1.1. SMART CARD SECURITY SETTINGS Clicking the Security Settings button opens the Smart Card Security Settings dialog box (see Figure 8-3).

Figure 8-3: Smart Card Security Settings Dialog Box The Smart Card Security Settings dialog box contains controls that adjust how often the site key verification is performed. The default is Enter Everytime (SecureAdmin resets to this default setting every time the application is started). Use ESI Site Key Encryption The Use ESI Site Key Encryption check box is used in conjunction with the drop-down list directly below it (not shown in Figure 8-3) to manage site keys on the smart card itself. Three settings are available. The default setting uses site key encryption. The other two options do not use site key encryption, and are provided for compatibility with other applications that want to read and/or write data to the smart card. The check box must be deselected to enable these options. For MiFARE-based V-Station 4G devices, Key A and Key B do not correspond to primary and secondary site keys; please read the manufacturers documentation for more information. For iCLASS-based V-Station 4G devices (such as is shown in Figure 8-3 above), this option can only be enabled or disabled.

NOTICE
Only advanced users should change this setting. When configuring a V-Station 4G device and performing enrollments directly from the keypad, the chosen site key must be numeric. The software hash function must be turned off, as the site key entered via the keypad is not hashed.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

8-6

Managing Smart Cards

8.1.1.1. CHANGING THE SITE KEY To change the site key on a previously created smart card: 1. Ensure that the Auto Update Site Keys check box is selected in the Smart Card Device Manager dialog box. 2. Click the Change Site key button in the Smart Card Security Settings dialog box. A Change Site Key dialog box is displayed (see Figure 8-4).

Figure 8-4: Change Site Key Dialog Box 3. Click the button to the right of the Site Key File field. An Open dialog box is displayed. 4. Navigate to and select the site key file (*.bin). 5. Click Open. 6. Click OK. A Warning message is displayed (see Figure 8-5).

Figure 8-5: Change Site Key Warning 7. Click Yes. The site key is changed and a confirmation is displayed. 8. Click OK.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

8-7

Managing Smart Cards

Consider this scenario: During an installation, the site key was set to "####" and the secondary site key was set to "-1", because there were no previous site keys to update. The site key on the smart cards would be "####". If the site key on a previously created smart card is changed (using the above scenario as an example): All previously created smart cards still contain the previous key of "####". When a smart card is presented to a V-Station 4G device, it follows these steps: The smart card is presented. The device reads the data from the card and checks the current key. The key on the card is "####" and the device's primary key is now "New ####", so the card fails. The device checks the secondary site key for a match with the smart card. If they match, the key on the smart card is changed (updated) to the devices primary site key. If neither the primary nor the secondary site key matches, the card fails. When the entire user base of cards has been updated, perform the process of changing the site key again. This time keep the primary site key the same, but enter a "-1" for the secondary site key. This disables the "Auto Update" feature and any remaining smart cards with "####" on them will no longer work. This can also be done by deselecting the Auto-Update Site Keys check box. For instructions how to create a site key, refer to Chapter 9.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

8-8

Managing Smart Cards

8.1.2 CONFIGURE CARD LAYOUT

CAUTION
L-1 EAS recommends that only advanced users attempt to configure the smart card layout. Improper changes made to the layout may render the reader unusable with some smart cards. This section should be read completely before attempting to change the default layout provided by L-1 EAS (as shown in the left-most panel).

8.1.2.1. ICLASS CARDS To configure an iCLASS smart card layout: 1. Select the type of smart card in the Card Type drop-down list. The drop-down list contains these items: 16K iCLASS 32K masked as 16K iCLASS 32K iCLASS. 2. Click the Configure Card Layout button. The Layout Manager dialog for that type of card is displayed. See Figures 8-6 below and 8-7 on the next page for examples.

Figure 8-6: 16k iCLASS Smart Card Layout Manager For the 32K iCLASS Smart Card (see Figure 8-7 on the next page), note the addition of an iCLASS Active Book drop-down list at the top of the dialog box. This drop-down list allows you to select which of the two books available on 32K cards you want to change the layout of.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

8-9

Managing Smart Cards

Figure 8-7: 32K iCLASS Smart Card Layout Manager 1. Select Book 0 or Book 1 from the iCLASS Active Book drop-down list. 2. Click the Card Discovery button. A confirmation message box is displayed. 3. Click Yes. 4. Place the smart card against the device, hold, and remove as directed by the onscreen prompts. Depending on the type of smart card, the controls in either the HID iCLASS 2 Application Area or the HID iCLASS 16 Application Area become available. 5. Select a value in the Bioscrypt Data Starting Offset drop-down list if it is available (2-application cards only). 6. Click Reset. A confirmation message is displayed. 7. Click Yes. A status message is displayed. 8. Click OK. 9. Click Set Layout.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

8-10

Managing Smart Cards

8.1.2.2 MIFARE CARDS Before attempting to configure a MiFARE card layout, it is strongly recommended that the user read the detailed information presented on pages 8-13 through 8-15. 1. Select the type of smart card in the Card Type drop-down list: 1 kilobyte MiFARE 4 kilobyte MiFARE 2. Click the Configure Card Layout button. Depending on the type of device, the Smart Card Type dialog box (see Figure 8-8) may be displayed. 3. Select the MiFARE Smart Card radio button.

Figure 8-8: Smart Card Type Dialog Box 4. Click OK. The Layout Manager for the card type is displayed. See Figures 8-9 below and 8-10 on the next page for examples.

Figure 8-9: 1 kilobyte MiFARE Smart Card Layout Manager

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

8-11

Managing Smart Cards

For the 4 kilobyte MiFARE smart card (see Figure 8-10 below), note the addition of an Active Kilobyte Selection drop-down list at the top of the dialog box. This dropdown list allows you to select which of the four kilobytes available you want to use for template storage (the default setting is the first kilobyte). The layout for each kilobyte is configurable.

Figure 8-10: 4 kilobyte MiFARE Smart Card Layout Manager 5. If you are using a 4 kilobyte card, select which kilobyte is to be active with the Active Kilobyte Selection drop-down list. The smart card layout used by the V-Station 4G device consists of these components: A Layout block (brown), an Admin block (red), a Primary template (blue), a Secondary template (purple, optional), and User Data (green, optional). The Smart Card Layout Manager does not allow a user to configure a layout that is missing the Admin block, the Layout block, or a Primary template. These are the minimum layout components required to enable normal operation. 6. Click the blue Template 1 button. 7. Click on the block in the New Layout pane where you want the Template 1 data to start. 8. Click the purple Template 2 button. 9. Click on the block in the New Layout pane where you want the Template 2 data to start. 10. Click the green User Data button.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

8-12

Managing Smart Cards

11. Click the block in the New Layout pane where you want to User data to be stored. 12. Click the brown Layout Block button. 13. Click the block in the New Layout pane where you want to Layout data to be stored. 14. Click the Set Layout button.

8.1.2.2.1. MIFARE BLOCK MEMORY STRUCTURE The memory structure for MiFARE-compatible smart cards differs between the 1K and 4K card types. The similarities and differences are outlined below. For the 1K MiFARE card, the memory structure consists of 16 sectors (numbered 0 through 15) of four blocks each (numbered 0 through 3). Each block contains 16 bytes. The first block, at Sector 0, Block 0, contains manufacturer information and is not available. The last block of each sector contains site key and access information, which secures that sector and makes it unavailable for application data. Unavailable blocks are shown in SecureAdmin in black. Layout components cannot be placed on unavailable blocks. This leaves 47 available blocks of 16 bytes each, for a total of 752 available bytes. The default L-1 EAS layout contains space for two templates and Wiegand information (stored in the green User Block) and uses all available space. If space for non-L-1 EAS data is desired, include only the Primary template (Template (1) or do not include a User Block. For the 4K MiFARE card, the memory structure also differs between the 1st/2nd kilobyte versus the 3rd/4th kilobyte. The 1st and 2nd kilobyte of the 4K MiFARE card follows the memory structure of the 1K card as described above, however, the memory structure of the 3rd and 4th kilobyte is different and consists of 4 sectors (numbered 0 through 3) of 16 blocks each (numbered 0 through 15). Each block contains 16 bytes. The first block at Sector 0, Block 0 of the 1st kilobyte contains manufacturer information and is not available. In addition, the last block of each sector for every kilobyte of the 4K MiFARE card contains Site key and access information, which secures that sector and is thus unavailable for application data. Unavailable blocks are shown in SecureAdmin in black and grey, they do not allow layout components to be placed there. This leaves 47 available blocks of 16 bytes each, for a total of 752 available bytes per kilobyte of the 4K MiFARE card. The default L-1 EAS layout for each kilobyte (1st, 2nd, 3rd, or 4th) contains space for two templates and Wiegand information (stored in the green User Block) and will use all available space. Please note that templates can only be written to a single active kilobyte of the 4K MiFARE card (i.e., templates can only be stored contiguously in either the 1st, 2nd, 3rd or 4th kilobyte). If space for non-L-1 EAS data is desired, include only the Primary template (Template 1) or do not include a User Block.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

8-13

Managing Smart Cards

8.1.2.2.2. MIFARE NEW LAYOUT Place components on the layout on the right (under the New Layout section) by clicking one of the buttons under the Set Starting Block section. Flashing text instructs you to select one of the white, unused blocks above. Since the one-to-one templates used by the V-Station 4G device are 348 bytes, they require 22 blocks of space (348 bytes / 16 bytes-per-block = 22 blocks). All other layout components require a single block of space. When placing a template on the layout, note that the blocks wrap around whatever blocks are in the way, consuming blocks from top to bottom. Templates do not wrap around from bottom to top, and if there is insufficient space for a template, a warning is displayed and you will not be able to place the template. If you want to move a layout component or take if off of the layout, you must remove it by first clicking the Remove Item button and then selecting the item that is to be removed.

8.1.2.2.3. MOVING THE ADMIN BLOCK Note that when the Smart Card Layout Manager is opened, the Admin Block has already been placed for you in Sector 8, Block 1. It can be removed and placed elsewhere, but L-1 EAS recommends leaving the Admin Block in this sector. The reason for this is that the reader will be able to read cards with a different layout than the one that is defined here, provided that the Admin Block is in this location. This allows for flexibility with different card layouts. L-1 EAS recommends that each site or facility use the same layout for each card. L-1 EAS also recommends first placing the Layout Block, then the Primary template, and finally a User Data block to hold the Wiegand strings associated with each template.

NOTICE
If you do not place at least one User Data block, SecureAdmin cannot read or write Wiegand string data, and you will receive an error during enrollment. Only two User Data blocks can be placed on the layout. If two are placed, the first is used for Wiegand data (if used) and the second is available for user data. These two blocks can be written to or read using the L-1 EAS SDK, but not using SecureAdmin. When all other blocks have been placed and if there is sufficient space, place the Secondary template. You will not be able to place Template (2) if you have placed two User Blocks because there will be insufficient space. There is a convenient way to make the layout wrap around sectors where non-L-1 EAS data is located (or is planned to go). Click the Unavailable Block button, then hold down the SHIFT key to place multiple blocks. Do this before placing the other layout items so that when they are placed, they wrap around those blocks automatically. Click Set Layout to finalize the layout. You will need to provide the current Site Key. After setting the layout successfully, the Smart Card Layout Manager closes, returning you to the Smart Card Manager. If at any time you want to reset the layout back to L-1 EAS defaults, click the Reset Layout button and provide the current site key.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

8-14

Managing Smart Cards

8.1.2.2.4. SAVING MIFARE LAYOUTS TO THE PC SecureAdmin has the ability to load and save MiFARE-based smart card layouts to and from the PC. Files are saved by default with a .sl1 extension. This can be used to backup the V-Station 4G card layout should a non-default layout be used and it can also facilitate programming multiple V-Station 4G devices.

8.1.2.2.5. PRECAUTIONS ON CHANGING MIFARE SMART CARD LAYOUTS When changing the smart card layout, be aware that the number of templates defined on the layout should be greater than or equal to the Max Templates per Card option. In other words, you should not define only one template and set the maximum templates per card to two. This will result in an "ESI Storage Full" error upon enrollment of a second template. If the layout is changed, smart cards that were created with a different layout might not work properly with the V-Station 4G device. If this occurs, you will see a flashing or steady red LED on the device when trying to verify, or you will receive an error in SecureAdmin. Although you can write both L-1 EAS data and non-L-1 EAS data to a smart card, each sector has its own site key, which unlocks data in that sector. Data may only be read from or written to a particular block if the proper site key for that sector is provided. The ESI will use the same Site Key for all sectors being used by the V-Station 4G device, including sectors where only one or two blocks are actually being used. It is recommended that any non-L-1 EAS data be placed on different sectors so that different keys may be used for that data. If a third-party application is used to read or write any of the V-Station 4G data or the same site key is to be used for the entire card, the ESI Site Key Encryption must use one of the un-hashed modes for compatibility. Please refer to the documentation from the smart card manufacturer for more information.

8.1.2.2.6. MIFARE SERIAL NUMBER The serial number that is stored on the card is 32 bits in length, therefore, to use this as an ID, it is recommended that a Wiegand format be chosen that allows 32 bits of ID data. This can be selected under the Wiegand tab in the Unit Parameters dialog box. The uploadable Generic 34-bit format is a format that contains 32 ID bits. This format contains an odd parity bit and an even parity bit, both of which are calculated in the same manner as the standard 26 bit format. Alternatively, a custom Wiegand format can be created by selecting the Pass-thru radio button and selecting Custom from the drop-down list. These numbers can be used for custom formats: Total bits: 32 ID Start bit: 0 No. of ID bits: 32.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

8-15

Managing Smart Cards

When the user is at the enrollment window in Quick or Advanced mode, the Extended ID field is greyed out. Selecting a Wiegand format that contains less than 32 ID bits, such as the Standard 26-bit format, results in a truncated Wiegand ID. If the Standard 26-bit format is selected, upon clicking the Smart Card SN button, a warning message is displayed that suggests selecting a Wiegand format that contains 32 ID bits. In this case, when the template is saved to the smart card, it remains as a 32-bit number. However, when it is sent out as a Wiegand string, it is truncated to the least significant 16 bits, because the 26-bit format only allocates 16 bits to ID data.

8.1.2.3. DESFIRE CARDS To configure a DESFire smart card layout: 1. Select "DESFire" in the in the Card Type drop-down list. 2. Click the Configure Card Layout button. The Smart Card Type dialog box is displayed. 3. Select the DESFire Smart Card radio button. 4. Click OK. The DESFire Card Layout dialog box is displayed (see Figure 8-11 below).

Figure 8-11: DESFire Card Layout Dialog Box

5. Enter a value in the Application ID drop-down list. 6. Select a value in the File ID drop-down list. 7. Enter a value in the File Size field. 8. Click OK.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

8-16

Managing Smart Cards

8.2. SMART CARD MANAGER Click the Card Manager link in the Smart Card sidebar tab to launch the Smart Card Manager. The Smart Card Manager sets up the smart card so that it works with the settings that were configured in the Smart Card Device Manager.

Figure 8-12: Smart Card Manager This dialog box initially shows the smart card settings and a blank card. Clicking the Read Smart Card button commands the V-Station 4G device to read the template list from the card and to display a list of the stored templates. A padlock symbol is displayed in the upper right-hand corner of the card if it is secured. SecureAdmin indicates which type of smart card was read (MiFARE or iCLASS, 2- or 16application area). The cards serial number is provided for reference. Clicking either template button (primary or secondary) commands the V-Station 4G device to read the full finger-scan data from the smart card. SecureAdmin prompts the user for the site key (depending on security settings), and if the site key entered matches the site key stored on both the V-Station 4G device and the smart card, the template is read and the Template Editor dialog box is displayed.

NOTICE
It is not possible to edit a template on a smart card.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

8-17

Managing Smart Cards

8.2.1. DELETING TEMPLATES To delete a template on the smart card, select the check box in the Template column next to the primary template or secondary template and click the Delete button. The VStation 4G device erases the selected template stored on the smart card. SecureAdmin performs a site key verification before allowing the erase to take place.

8.2.2. DELETING WIEGAND STRINGS To delete a Wiegand string on the smart card, select the check box in the Wiegand column next to the primary template or secondary template and click the Delete button. The V-Station 4G device erases the selected Wiegand string stored on the smart card. SecureAdmin performs a site key verification before allowing the erase to take place. It is possible to use this function even if a Wiegand string has not been associated with a template, as long as a User Data block has been placed in the smart card layout.

8.2.3. SECURING CARDS SecureAdmin can secure and un-secure (reset) smart cards. The Secure Smart Card button secures a new smart card that has not been updated with the proper site key (i.e., it still has the manufacturers default keys). You do not need to enter the current site key to perform this function. Simply click the Secure Smart Card button and present the card to the device.

NOTICE
Only the sectors of the smart card being used by the V-Station 4G device are secured; all other sectors remain untouched. Performing this function on a smart card that has already been secured has no effect.

8.2.4. RESETTING CARDS The Reset Smart Card button allows the user to un-secure (reset) a smart card after providing the proper site key. This erases all data on the card, including templates, Wiegand strings, and other user data, as defined in the smart card layout, and sets the site key back to the manufacturers default. This essentially transforms the card back into a fresh, unused card, with the exception of the sectors not defined in the layout (sectors used by another application, for example). Currently, three manufacturer settings are supported for MiFARE-compatible cards: Gem+ Flow A, Gem+ Flow B, and HID Flow B. Please refer to the documentation provided by the smart card manufacturer for more information.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

8-18

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

Layout 1:1 TEM 1:1 VUR Template support YES YES NO YES YES YES YES YES YES YES NO YES YES YES YES YES

8.3. SMART CARD TEMPLATE SUPPORT

1:1 Small VUR YES YES NO YES YES YES YES YES

1:1 BUR

MiFARE 1K

NO NO YES YES NO NO YES YES

MiFARE 4K (1K)

V-Station 4G (U,G), V-Flex 4G (U,G), V-Station 4G (S,G), V-Flex 4G (S,G)

MiFARE 4K (Full)

DESFire

iCLASS 2 APP Use with 16K and 32K masked as 16K "1*XXXX" iCLASS cards

iCLASS 16 APP Use with 16K and 32K masked as 16K "2*XXXX" iCLASS cards

V-Station 4G (U,H), V-Flex 4G (U,H), V-Station 4G (S,H), V-Flex 4G (S,H)

iCLASS 32 Kb (2app/1app) Use with 32K "3*XXXX" iCLASS cards

iCLASS 32 Kb (16app/1app) Use with 32K "4*XXXX" iCLASS cards

Please refer to Table 8-1 for a chart of template support for different smart cards.

Table 8-1: Smart Card Template Support

Managing Smart Cards

8-19

Managing Smart Cards

This page left blank intentionally

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

8-20

Managing Site Keys

CHAPTER 9 - MANAGING SITE KEYS


Chapter Overview
This chapter explains how to create and reset site key files. It also presents useful advice on forgotten and compromised site keys.

Chapter Index
9. Managing Site Keys ............................................................................................................................ 9-2 9.1. Site Keys ............................................................................................................................. 9-2 9.2. Site Key Files ...................................................................................................................... 9-2 9.3. Site Key Sidebar Tab .......................................................................................................... 9-3 9.4. Creating a Site Key File ...................................................................................................... 9-3 9.5. Resetting a Site Key ........................................................................................................... 9-6 9.6. Forgotten Site Keys ............................................................................................................ 9-6 9.7. Compromised Site Keys ..................................................................................................... 9-6

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

9-1

Managing Site Keys

9. MANAGING SITE KEYS


The Site Key sidebar tab allows you to manage site key files. The controls on this tab allow you to create new site key files, as well as reset site keys. 9.1. SITE KEYS A "site key" is a security mechanism used by V-Station 4G smart card devices, SecureAdmin, and smart cards to ensure that only authorized smart cards are used at a facility. The "site key" protects the read and write access of the data on the smart card. V-Station 4G smart card devices and smart cards in use at a facility must have the same site key to be able to communicate and transfer information. Every time a smart card is presented to a v-Station 4G device, it checks whether the site key it is storing matches the site key on the smart card. Only if the two site keys match will the reader be able to read information from the card. If the site key stored in the V-Station 4G device does not match the site key used on the card, the device will not be able to read or write to the card. Each facility must have its own site key to distinguish its smart cards from those of other facilities. Using a unique site key at each facility ensures that smart card devices at that facility accept only smart cards created for that particular facility. All V-Station 4G devices are shipped from with the site key set to an empty string (120 bits, or 15 characters, of all zeros). This allows administrators to use the V-Station 4G in a non-secure mode until they are ready to set their personal site key and secure the system. The V-Station 4G device can store two site keys. The primary site key is used in normal operations and is the site key the administrator uses when performing a site key verification operation within SecureAdmin. The secondary site key is used only to update older cards when a new primary site key has been set. 9.2. SITE KEY FILES A site key file provides an administrator with a means of changing the site keys of a unit securely, without having to share sensitive site key information with enrollers. This is done by encrypting the site keys into a site key file (*.bin). An administrator can then distribute the encrypted site key file to the enroller. The site key file cannot be decrypted. The enroller changes the site keys of the readers by using SecureAdmin and the encrypted site key file. Thus, the site keys are known only by the Administrator, and not by the enroller. A site key file can be used to update the site keys of multiple units from a single computer, but it cannot be used on different computers, as it is MAC address-dependent. 9.3. SITE KEYS ON INDIVIDUAL SMART CARDS The V-Station 4G device attempts to set the site key on the smart card during the enrollment process. The device checks the key currently used by the smart card. If the device primary site key matches the key on the smart card, the template is written. If the device primary site key does not match the key on the smart card, the device checks if its secondary site key matches the key on the smart card. If the secondary site key matches, the key on the smart card is updated to the devices primary site key and the template is written (this adds about half a second to the process).
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

9-2

Managing Site Keys

If both primary and secondary site keys fail, the device compares the smart card key with the standard default smart card key. If they match, the key on the smart card is updated to the devices primary site key and the template is written. If all of the above checks fail, the device does not read or write to the smart card. 9.4. SITE KEY SIDEBAR TAB Two buttons are displayed when the Site Key sidebar tab is selected (see Figure 9-1): Create Site Key Reset Site Key.

Figure 9-1: Site Key Dialog Box 9.5. CREATING A SITE KEY FILE To create a site key file: 1. Click the Create Site Key button. The Create Site Key dialog box is displayed (see Figure 9-2 on the next page). 2. Enter the MAC address of a computer that will be used to perform enrollments into the MAC Address field (see Chapter 13 for more details on how to obtain a computer's MAC address).
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

9-3

Managing Site Keys

Figure 9-2: Create Site Key Dialog Box

3. Click the Browse button. A Save As dialog box is displayed. 4. Select the folder where you want the site key file (.bin) to be created. 5. Enter a name for the site key file in the File name field. The file name that is entered is appended with a ".bin" extension automatically. 6. Click the Save button. The file name and output file's save path are displayed in the Output File field. 7. In the Primary Site Key area, select the appropriate Input Mode for Primary Site Key radio button.

NOTICE
ASCII mode is the default mode. In this mode, the maximum length of a site key is 15 characters. All alphabetical characters can be used but the symbols "*, -, @, &,etc" are not allowed. In Hexadecimal mode, the maximum length of a site key is 30 characters and only the characters 0 through 9 and A through F are allowed. The value "0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF" (30 "F" characters) cannot be used.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

9-4

Managing Site Keys

8. Enter a site key value in the Primary Site Key field. 9. Re-enter the site key value in the Confirm Primary Site Key field. 10. Select the Use software HASH for Primary Site Key check box if you want SecureAdmin to enable one-way software hashing on the Primary site key. One-way software hashing adds additional security to entered site keys. This function takes the user-entered password and creates an encrypted 120-bit site key from the password. This encrypted version is then used as the site key for the V-Station 4G device and smart cards in place of the userdefined password. In extreme cases, this can make it more difficult for criminals to "sniff" internal networks and capture passwords during serial communications. 11. Repeat Steps 7 through 10 for the Secondary Site Key and the Current Site Key. 12. Enter 6-byte (12-character) hexadecimal values into the Key A and Key B fields for Sectors 0 through 15. These values should correspond to the custom MIFARE keys in use at your facility. 13. Click the Create Site Key File button. The site key file is created and saved in the folder you selected in Step 4.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

9-5

Managing Site Keys

9.6. RESETTING A SITE KEY To reset a device's site key: 1. Click the Reset Site Key button. The Reset Site Key dialog box is displayed (see Figure 94).

Figure 9-3: Reset Site Key Dialog Box 2. Select the device you want to reset the site key of in the Current Device drop-down list. 3. Click the Reset Site Key button. The selected device's site keys are reset to default values.

9.7. FORGOTTEN SITE KEYS Do not forget site keys. If the primary site key is forgotten, all previously created smart cards will continue to work, but the following will happen: They can no longer create new smart cards They will not be able to read templates from current smart cards They will not be able to change the site key on V-Station 4G devices The V-Station 4G devices will have to be returned to L-1 EAS for reprogramming and once reprogrammed, any previously enrolled smart cards will no longer be usable.

9.8. COMPROMISED SITE KEYS Site keys need to be protected just like computer passwords and should not be divulged to unauthorized personnel. In the event that a site key is compromised, change the site key and automatically update all smart cards in the user base.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

9-6

Broadcasting Settings

CHAPTER 10 - BROADCASTING SETTINGS


Chapter Overview
This chapter details how to broadcast device settings, image and audio files, device firmware, and smart card layout files to devices in the network.

Chapter Index
10. Broadcasting Settings ................................................................................................................... 10-2 10.1. Broadcast Device Settings............................................................................................. 10-3 10.1.1. LED Table Tab ................................................................................... 10-5 10.1.2. Tamper Tab ........................................................................................ 10-6 10.1.3. Wiegand Tab ...................................................................................... 10-7 10.1.4. Single Door Access Control Tab ...................................................... 10-13 10.1.5. Miscellaneous Tab............................................................................ 10-14 10.1.6. General Purpose I/O Tab ................................................................. 10-16 10.1.7. Access Schedule Tab....................................................................... 10-19 10.1.8. Holiday Schedule Tab ....................................................................... 10-21 10.1.9. Biometric Schedules Tab.................................................................. 10-23 10.1.10. Clock Tab ....................................................................................... 10-25 10.1.11. Time and Attendance Tab .............................................................. 10-26 10.2. Broadcast Firmware Package...................................................................................... 10-27 10.3. Broadcast Image File ................................................................................................... 10-29 10.4. Broadcast Audio File.................................................................................................... 10-30 10.5. Broadcast Smart Card Layout File............................................................................... 10-31

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-1

Broadcasting Settings

10. BROADCASTING SETTINGS


The Broadcast sidebar tab allows you to modify settings on multiple devices in the network at the same time. The Broadcast screen (see Figure 10-1) contains five buttons. Their usage is explained in subsequent sections in this chapter.

Figure 10-1: Broadcast Screen Device Parameter - this button is used to broadcast device settings to devices in the network Firmware Package - this button is used to broadcast a firmware file to devices in the network Image File - this button is used to broadcast an image (logo, wallpaper, etc.) to devices in the network Audio File - this button is used to broadcast an audio file (device feedback) to devices in the network Smart Card Layout - this button is used to broadcast a smart card layout file to devices in the network

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-2

Broadcasting Settings

10.1. BROADCAST DEVICE SETTINGS Before you can broadcast settings, you need to select the device. To select a device in the network: 1. Double-click the Device Network item in the network tree. The network tree expands and shows all user groups in the device network (see Figure 10-2).

Figure 10-2: Device Settings - General Tab 2. Double-click the user group item you are interested in (in Figure 10-2, the group item is named "DefaultGroup"). Devices in the group are shown in the network tree. 3. Double-click the device you want to broadcast settings to (in Figure 10-2, the device item is named "Device0"). The Device Settings area displays the General tab for that device. The General tab displays information about the selected device. No settings are changeable on this tab. 4. Other Device Settings tabs are available; click the Selection button. A drop-down menu is displayed (see Figure 10-3 on the next page).

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-3

Broadcasting Settings

Figure 10-3: Device Settings - Tab Selection Menu 5. Select the check boxes next to the tabs you want displayed. The Device Settings area displays the selected tabs (in Figure 10-4, all available tabs were selected).

Figure 10-4: Device Settings - All Tabs Displayed

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-4

Broadcasting Settings

10.1.1. LED TABLE TAB The LED tab provides controls that allow you to modify the LED behavior of the selected device.

Figure 10-5: LED Table Tab To modify and broadcast LED behavior settings: 1. Select an action from the LED Action Selection drop-down list. 2. Click the appropriate icons under the Red or Green columns corresponding to the LED colors you want to illuminate for the selected action. To display an amber LED, select both green and red. 3. If you want the buzzer to sound for the selected action, select the appropriate check box under the Sound column. 4. Enter the desired number of milliseconds in the Duration and Interval fields. 5. Click Apply. 6. Click Broadcast.
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-5

Broadcasting Settings

10.1.2. TAMPER TAB The Tamper tab provides controls that allow you to enable. disable, modify, and reset the tamper detection feature on the selected device.

Figure 10-6: Tamper Tab To enable tamper protection: 1. Select the Activate Tamper Detection check box. 2. Select any desired options. 3. Adjust the volume of the audio feedback using the Volume slider. 4. Click Apply. 5. Click Broadcast. To stop (disarm) tamper detection buzzer and audio feedback, click the Reset button. To re-arm the tamper detection, click the Clear & ReEnable button.
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-6

Broadcasting Settings

10.1.3. WIEGAND TAB The controls on the Wiegand tab allow you to set the Wiegand Input format, set Wiegand output for events, and upload custom Wiegand formats to a device.

Figure 10-7: Wiegand Tab Pre-defined Wiegand Formats Several Wiegand formats are pre-loaded on V-Station 4G devices and are designated as a Standard Type in Table 10-1 on the next page. They contain an ID of 32 bits or less. All V-Station 4G devices support these formats. This tab allows you to select the desired Wiegand format for both input and output. "Standard 26-bit" is the default format. The format for both input and output is the same. To set the Wiegand format to a pre-defined format: 1. Select the Predefined radio button. 2. Select a Wiegand format in the drop-down list. 3. Click Apply.
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-7

Broadcasting Settings

Format Standard 26-bit Apollo 44-bit Northern 34-bit Northern 34-bit [no parity] HID Corporate [35-bit] Ademco 34-bit HID 37-bit

Type Standard Standard Standard Standard Standard Standard Standard

Alt Site Code and Fail Site Code Range 0 - 255 0 - 16383 0 - 65535 0 - 65535 0 - 4095 0 - 4095 0 - 2047

Template ID Number Range 1 - 65535 1 - 65535 1 - 65535 1 - 65535 1 - 1048575 1 - 1048575 1 - 16777215

Extended ID Number Range N/A N/A N/A N/A N/A N/A N/A

Table 10-1: Wiegand Formats and Associated Valid Values Pass-Thru Wiegand Formats SecureAdmin provides expanded Wiegand compatibility by allowing you to define a Pass-Thru format. To use this ability, this information is required: Total bits - the number of Wiegand bits in the Wiegand string (maximum = 64 bits) ID start bit - the start bit of the ID Field (where the first bit is Bit 0) Total ID bits - the number of bits in the ID Field (must be contiguous bits).

Using these three pieces of information, when a card is presented to the device, it attempts to decode the ID Field and uses that information as the Template ID number. All Site codes, Parity, and any other data are ignored. Using this ID, the device attempts to verify the template corresponding to the decoded ID. If the ID is not found or if the verification attempt fails, no Wiegand output is sent. To the controller, it appears as if nothing was presented. If the ID is valid and a successful verification is performed, the original Wiegand input string (with Site code, Parity, etc.) will "Pass-Thru" to the Wiegand output unchanged. Although the Pass-Thru option does not allow Fail Strings, changing the Site Code, or checking parity, it does provide a mechanism for using a wide variety of Wiegand formats. To set the Wiegand format to a pass-thru format: 1. Select the Passthru radio button. 2. Enter a value in the Total bits field. 3. Enter a value in the ID start bit field. 4. Enter a value in the Total ID bits field. 5. Click Apply. 6. Click Broadcast. Pulse Width The Set pulse width to option allows you to enter a custom pulse width duration (in microseconds) for the Wiegand output. This is not recommended unless you are very familiar with the equipment connected to the V-Series device.
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-8

Broadcasting Settings

To set the pulse width: 1. Enter a value into the Set pulse width to field. 2. Click Apply. 3. Click Broadcast. Pulse Interval The Set pulse interval to option allows you to enter a custom pulse interval duration for the Wiegand output. This is not recommended unless you are very familiar with the equipment connected to the V-Series 4G device. To set the pulse interval: 1. Enter a value into the Set pulse interval to field. 2. Click Apply. 3. Click Broadcast. Activate Wiegand Input The Activate Wiegand Input option enables Wiegand input when selected. This allows all Wiegand input communication to the device. If this option is deselected, all Wiegand input data that the device receives is ignored. To activate Wiegand input, select the Activate Wiegand input check box, then click Apply. Activate Wiegand Output The Activate Wiegand Output enables Wiegand output when selected. If this option is deselected, all Wiegand output data is output in the same format as the Wiegand Input data. There are two options when enabling output, which are selected from the dropdown list to the right of the check box: Always Output: This enables Wiegand output on all Verifications regardless of whether they were initiated by a Wiegand input, a PC, or any other device. This is the default setting. Selective Output: This causes the Wiegand output string to be sent whenever a Wiegand input is received.

To activate Wiegand output: 1. Select the Activate Wiegand output check box. 2. Select the desired option in the drop-down list. 3. Click Apply. 4. Click Broadcast.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-9

Broadcasting Settings

Wiegand Output Settings The Wiegand Output Settings option allows you to associate Wiegand formats with device events. If you want to use a custom Wiegand format, you must create the custom Wiegand format first To set Wiegand Output Settings: 1. Click the Wiegand Output Settings button. The Wiegand Output Settings dialog box is displayed (see Figure 10-8).

Figure 10-8: Wiegand Output Settings Dialog Box 2. Select a Wiegand format from the drop-down list next to a device event. Repeat for other desired events. 3. Click Apply. The dialog box closes. 4. Click Apply and then Broadcast. Custom Wiegand Output Settings The Wiegand Output Settings option allows you to manage Wiegand formats. You can upload, edit, and delete Wiegand formats with this option. To upload custom Wiegand output settings: 1. Click the Custom Wiegand Settings button. The Custom Wiegand Settings dialog box is displayed (see Figure 10-9 on the next page). 2. Click on a slot. 3. Select where you want to upload from in the Upload drop-down menu. A dialog box is displayed. 4. Provide the appropriate details in the dialog box for the upload origin you selected. 5. Click Close. The Custom Wiegand Settings dialog box closes. 6. Click Apply and then Broadcast.
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-10

Broadcasting Settings

Figure 10-9: Custom Wiegand Settings Dialog Box To create a custom Wiegand format: 1. Click the Custom Wiegand Settings button. The Custom Wiegand Settings dialog box is displayed (see Figure 10-9 above). 2. Click on a slot. 3. Select "New" in the Upload drop-down menu. A Wiegand Format dialog box is displayed (see Figure 10-10).

Figure 10-10: New Wiegand Format Dialog Box

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-11

Broadcasting Settings

4. Enter a name into the Name field. 5. Enter a Length value. 6. Enter the Wiegand ID Start Position, Length, and Heart Beat Value. 7. Click the Add User Field button (the top-most red arrow that's pointing left) in the User Fields area. A slot is displayed in the User fields area (see Figure 10-11).

Figure 10-11: New Wiegand Format Dialog Box - Add User 8. For the new User Field entry, enter Name, Start Position, Length, Success Value, and Failure values. 9. Click the Add Parity Field button (the top-most red arrow that's pointing left) in the Parity bits area. A slot is displayed in the Parity bits area (see Figure 10-11). 10. Select a Parity Type from the drop-down list. 11. Click the Parity Mask button. In the dialog box that appears, calculate and apply a parity value. A parity bit can be calculated for the whole Wiegand string or for part of it. To set which bit to calculate for parity, click the "..." button and use controls in the Parity Calculation dialog box. 12. Click Apply. To edit a Wiegand format, select a Wiegand format in the Custom Wiegand Settings dialog box (see Figure 10-9 on the previous page) and click the Edit button. The dialog box shown in Figure 10-11 is displayed, where you can edit the Wiegand format's details. To delete a Wiegand format, select a Wiegand format in the Custom Wiegand Settings dialog box (see Figure 10-9 on the previous page) and click the Delete button. Click Broadcast after making your changes.
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-12

Broadcasting Settings

10.1.4. SINGLE DOOR ACCESS CONTROL TAB The Single Door Access Control tab allows you to enable, disable, configure, and broadcast single door access control settings for the selected device.

Figure 10-12: Single Door Access Control Tab To activate and broadcast single door access control settings: 1. Select the Activate Single Door Access Control check box. 2. Enter the number of seconds in the Door Unlock Duration and the Door Held Open fields. 3. Select a mode in the Request to Exit Mode drop-down list. 4. Select an alarm condition in the Alarm Condition drop-down list. 5. If needed, select the Enable Time Override Mode check box and enter the number of minutes into the field. 6. Click Apply. 7. Click Broadcast.
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-13

Broadcasting Settings

10.1.5. MISCELLANEOUS TAB The controls on this tab allow you to activate and modify Verification results, Verification Polling Mode, and Custom Verification Entry Mode settings for the currently selected device.

Figure 10-13: Miscellaneous Tab Send Verification Result The Send Verification Result feature allows other verification responses to be sent in addition to the normal response. Under normal operation, the V-Station 4G device responds based on how a Verification Action was initiated. When a Wiegand input initiates the action, a Wiegand output responds to it. When a Verification Action is initiated over a communications port, then the response packet is returned on the same communication port (either Host or Aux). To enable and configure the Send Verification Result feature: 1. Decide which channel the response is to be sent on. 2. Select the Always or Always (with ID) check box next to the appropriate channel.
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-14

Broadcasting Settings

If you select Always, a response is sent every time. If you select Always (with ID), a response is also sent out every time, but the first data word returned is the Template ID. 3. Click Apply and then Broadcast.

NOTICE
L-1 EAS recommends that only advanced users who are working with the SDK and writing their own custom software attempt to enable the Host or Aux Always operations.

Verification Polling Mode Verification Polling Mode drastically changes the behavior of the reader for verifications initiated either by the keypad (V-Station 4G devices) or by a Wiegand source. When enabled, these actions do not initiate a verification (the default behavior of the device). Instead, the ID number is placed into a queue that is available for polling from an outside device such as a door controller. This outside device determines if the ID is valid and takes appropriate steps such as sending the device the appropriate template (perhaps from a central database) and independently initiating the Verification process on the device. Customers wishing to implement this behavior should consult the DLL Manual document provided with the SecureSDK and contact L-1 EAS Technical Support for further assistance. To activate Verification Polling Mode: 1. Select the Activate Verification Polling Mode check box. A warning dialog box is displayed. 2. Click Yes. 3. Select by what method the verification will be initiated using the Initiate Verification by drop-down list. 4. Click Apply and then Broadcast. Custom Verification Entry Mode When Custom Verification Entry Mode is enabled, users must key in a custom entry code after verifying. The code is logged in the device transaction log. To enable Custom Verification Entry Mode: 1. Select the Activate Custom Verification Entry Mode check box. 2. Click Apply and then Broadcast.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-15

Broadcasting Settings

10.1.6. GENERAL PURPOSE I/O TAB The General Purpose I/O Tab allows the user to set what actions are triggered when the General Purpose Input/Output TTL lines (commonly referred to as GPIO) are activated. In the top section, a V-Station 4G device can be configured to perform certain actions automatically when a GPI line is activated. The bottom section controls which actions cause the device to set various GPO (output) lines) active and for how long. General Purpose Input (GPI) and General Purpose Output (GPO) each have three TTL lines available.

Figure 10-14: General Purpose I/O Tab General Purpose Input The GPI lines are available on V-Station 4G and V-Smart 4G devices. Each GPI line can be configured to trigger an action when set active (low in some cases and high in others), as well as when both lines are simultaneously set active. The available actions are: Verify The device looks for a finger to begin a verification Search The device looks for a finger to begin a search (Identify) Enroll The device looks for a finger to enroll, automatically using the specified ID: Index
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-16

Broadcasting Settings

Delete Templates The device deletes any templates that have the specified ID (verification devices) or all templates (searching devices) Reboot Device The device reboots immediately. Alarm The alarm buzzer sounds and the LED blinks red for 5 seconds. This alarm sounds for Tamper and Single Door Access Control. The line must go active for the specified Minimum Duration, by default 200ms. For actions that trigger off multiple GPI lines simultaneously, each line must go active within the Multi-Signal Tolerance period (default 50 ms). A line can be considered active either on the "Signal Rising Edge" or the "Signal Falling Edge", which will vary depending on whether the active state is low or high. Finally, to facilitate automatic verification, enrollment, and deletion, a template ID number and a Max Enroll must be specified. For verifications, the maximum index limits the number of users that can be automatically enrolled through GPI. This number should remain relatively low, because during GPI verifies, the device has to try each index as a 1:1 verification, which is time consuming. To reset all GPI values to default, click the Reset GPI Parameters button. To configure GPI settings: 1. Select a GPI action using the desired TTL line drop-down list. 2. Enter a Minimum Duration value. 3. Enter a Multi-Signal Tolerance value. 4. Select which signal edge the GPI will be triggered on using the Trigger On dropdown list. 5. Set the Enroll, Verify, and Delete actions by entering values into the Template ID and Max Enroll fields. 6. Click Apply and then Broadcast. General Purpose Output All V-Station 4G and V-Smart 4G devices have General Purpose Output GPO TTL capability. When configured, certain GPO actions can activate GPO lines 0, 1, 2, or multiple GPO lines. The possible actions are: Enroll Completed When a user has completed an enrollment Enroll Initiated When a user has initiated an enrollment Verify Passed After a successful verification, initiated from any source Verify Failed After a failed verification, initiated from any source Finger not Detected Whenever a finger is expected by the device but not detected V-Station Admin Mode When a user enters admin mode from the keypad on a V-Station 4G device (with full administrative privileges) Delete Attempted When a template delete is initiated, from any source (this applies to templates stored on the device only) Reader Boot-up When a device is booted up, either from a power cycle or from a soft reboot. File Transfer Complete When a large file transfer is complete. Used when transferring audio and firmware files.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-17

Broadcasting Settings

Any of these actions, if configured, can trigger the line active for the Duration that is specified (default 600 ms). All GPO parameters can be reset to defaults be clicking on the Reset GPO Parameters button. By default, the readers ship with both GPI and GPO actions set to "No Action". To configure GPO settings: 1. Select a GPO triggering action using the desired TTL line drop-down list. 2. Enter a value into the Duration field. 3. Click Apply and then Broadcast. GPIO-Based Threat Levels If the Activate GPIO-based Threat Levels check box is selected, the General Purpose Input area shows a different set of controls (see inset area in Figure 10-14). This feature allows you to set threat levels using the two solid-state driven TTL input lines. When enabled, the TTL signals can define the level of security and amount of actions required for a successful verification. The available choices are "Card Only" and "Card + Biometrics". For example, if GPI 0 is set to "Card + Biometrics" and the TTL input for GPI 0 is triggered, a successful verification requires presenting a smart card and a finger to the unit. If TTL is not active (both lines are 0), the verification follows the Biometric tab settings. If GPIO-based Threat Levels are enabled, the Biometric tab settings are disabled. Once TTL is activated, verifications follow the TTL settings. This applies for all types of verifications, regardless how they are initiated (by a smart card, from SecureAdmin, or from the front panel of the device).

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-18

Broadcasting Settings

10.1.7. ACCESS SCHEDULE TAB This tab provides controls that allow you manage and broadcast access schedules to the selected device.

Figure 10-15: Access Schedules Tab To view an existing access schedule, select the check box next to the access schedule you want to review. The item is highlighted in the list and the vertical bars show the schedule. The area in green represents the time period when access is allowed. To enable access schedules, select the Activate User Access Scheduling check box. Note: There are 64 total Access Schedules available on V-Series 4G devices. Of these, 58 are available for modification by the user.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-19

Broadcasting Settings

To add an access schedule: 1. Click the Add button. A new entry is displayed in the list. 2. In the Allowed Access Time area, click inside one of the bars on the desired day of the week and drag up or down to define a time interval (see Figure 10-15). Move the time interval by clicking on it and dragging it to where you want it. Remember that the area in green represents when access is allowed. 3. If desired, apply the new access schedule to all days of the week or just to Monday through Friday by selecting the appropriate radio button and clicking the Apply Schedule button. 4. Set any options. 5. Click Apply to apply the schedule. 6. Click Broadcast.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-20

Broadcasting Settings

10.1.8. HOLIDAY SCHEDULE TAB This tab provides controls that allow you to manage and broadcast holiday schedules on the selected device.

Figure 10-16: Holiday Schedules Tab To view an existing holiday schedule, select the check box next to the access schedule you want to review. The item is highlighted in the list and the vertical bars show the schedule. The area in red represents the time period when access is not permitted. In Figure 10-16 above, the selected holiday schedule is set not to allow any access on February 19, 2009. To add a holiday access schedule: 1. Click the Add button. A new entry is displayed in the list.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-21

Broadcasting Settings

2. In the Holiday Information area, select the month using the arrow controls and select the day of the holiday schedule by clicking on it. 3. Click inside the bar next to the calendar control and drag up or down to define a time interval. Move the time interval by clicking on it and dragging it to where you want it. Remember that the area in red represents when access is not allowed. 4. Click Apply to apply the holiday schedule. 5. Click Upload to upload the new holiday schedule to the currently selected device. 6. Click Broadcast. To remove holiday schedules that have already occurred, click the Remove Expired button.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-22

Broadcasting Settings

10.1.9. BIOMETRIC SCHEDULES TAB The Biometric Schedules tab allows you to configure and broadcast scheduling for biometric verification (i.e., when a finger is required). For example, if a site only requires security at night, the administrator might want biometric verification enabled only between the hours of 6 p.m. and 6 a.m. By default, biometric verification is enabled on all V-Station 4G devices.

Figure 10-17: Biometric Schedules Tab

Schedules can be set on any 15-minute interval and can be configured differently for each day of the week. The red bars represent periods when biometrics are not required. The current day is labelled in blue (in Figure 10-17, "Thursday" is the current day).

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-23

Broadcasting Settings

To add a biometric schedule for the selected device: 1. Click the Add button. A new entry is displayed in the list. 2. In the Recurring Weekly Schedule area, click inside one of the bars on the desired day of the week and drag up or down to define a time interval. Move the time interval by clicking on it and dragging it to where you want it. Remember that the area in green represents when biometric verifications are not required. 3. If desired, apply the new biometric schedule to all days of the week or just to Monday through Friday by selecting the appropriate radio button and clicking the Apply Schedule button. 4. Click Apply to apply the schedule. 5. Click Broadcast.

NOTICE
To finalize a schedule, you must click the Apply button in the Biometric Schedules dialog box. Resetting a schedule, however, does not require clicking the Apply button.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-24

Broadcasting Settings

10.1.10. CLOCK TAB The controls on this tab allow you to adjust and broadcast time, date, and time zone settings to the selected device.

Figure 10-18: Clock Tab To set the time on the device: 1. Ensure that the time and date are correct on the PC. 2. Click Synchronize. 3. Click Apply To set the time zone on the device: 1. Select the appropriate time zone for your location in the drop-down list. The highlighted time zone in the world map changes to the selected zone. 2. Click Apply. After making any changes, click Broadcast.
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-25

Broadcasting Settings

10.1.11. TIME AND ATTENDANCE TAB This tab contains controls to activate and configure Time and Attendance (T&A) mode. Time and Attendance (T&A) mode is a mode that requires users to, in addition to verifying themselves with a finger scan, press a Function key on the device that corresponds to a time or attendance action, such as "sign in", "sign out", etc.

Figure 10-19: Time and Attendance Tab To adjust and broadcast T&A mode settings: 1. Select the Activate Time and Attendance Mode check box. 2. If you want function key use to be mandatory, select the Mandatory use of Function Keys check box. 3. Enter appropriate messages for the function keys into the fields. 4. Enter the number of seconds you want the messages to display 5. Click the Apply button. 6. Click Broadcast.
Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-26

Broadcasting Settings

10.2. BROADCAST FIRMWARE PACKAGE The Firmware Package button is used to broadcast a firmware file to devices in the network. To broadcast a firmware file: 1. Click the Firmware Package button. A Select File dialog box is displayed (Figure 10-20).

Figure 10-20: Select File Dialog Box - Firmware File 2. Click the button to the right of the Select File field. A SecureAdmin File Selection dialog box is displayed (see Figure 10-21).

this fig is referred to multiple times later on in this chapter!

Figure 10-21: SecureAdmin File Selection Dialog Box 3. Navigate to the folder where the firmware file is located and select it. 4. Click Open. 5. Click Next. The Broadcast dialog box is displayed (see Figure 10-22 on the next page). 6. Select the device, group, or entire network check boxes as broadcast recipients.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-27

Broadcasting Settings

Figure 10-22: Select File Dialog Box - Firmware File 7. Click Broadcast. The firmware file is broadcast to the selected devices and the Broadcast dialog box displays a broadcast status message (see Figure 10-23).

Figure 10-23: Broadcast Status - Success 8. Click Close.


Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-28

Broadcasting Settings

10.3. BROADCAST IMAGE FILE The Image File button is used to broadcast an image file to devices in the network. To broadcast an image file: 1. Click the Image File button. A Select File dialog box is displayed (see Figure 10-24).

Figure 10-24: Select File Dialog Box - Image File 2. Click the button to the right of the Select File field. A SecureAdmin File Selection dialog box is displayed (see Figure 10-21 on page 10-27). 3. Navigate to the folder where the image file (*.jpg) is located and select it. 4. Click Open. 5. Select the intended application for the image in the Image Directory drop-down list (see Figure 10-25).

Figure 10-25: Select File Dialog Box - Image Directory Drop-down List 6. Click Next. The Broadcast dialog box is displayed (see Figure 10-22 on page 10-28) 7. Select the device, group, or entire network check boxes as broadcast recipients. 8. Click Broadcast. The image file is broadcast to the selected devices and the Broadcast dialog box displays a broadcast status message (see Figure 10-23 on the previous page). 9. Click Close.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-29

Broadcasting Settings

10.4. BROADCAST AUDIO FILE The Audio File button is used to broadcast an audio file to devices in the network. To broadcast an audio file: 1. Click the Audio File button. A Select File dialog box is displayed (see Figure 10-26).

Figure 10-26: Select File Dialog Box - Audio File 2. Click the button to the right of the Select File field. A SecureAdmin File Selection dialog box is displayed (see Figure 10-21 on page 10-27). 3. Navigate to the folder where the audio file (*.mp3) is located and select it. 4. Click Open. 5. Select the intended application for the audio file in the Audio Directory drop-down list (see Figure 10-27).

Figure 10-27: Select File Dialog Box - Audio Directory Drop-down List 6. Click Next. The Broadcast dialog box is displayed (see Figure 10-22 on page 10-28) 7. Select the device, group, or entire network check boxes as broadcast recipients. 8. Click Broadcast. The audio file is broadcast to the selected devices and the Broadcast dialog box displays a broadcast status message (see Figure 10-23 on page 10-28). 9. Click Close.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-30

Broadcasting Settings

10.5. BROADCAST SMART CARD LAYOUT FILE The Smart Card Layout button is used to broadcast a smart card layout file (*.sl1) to devices in the network. To broadcast a firmware file: 1. Click the Smart Card Layout button. A Select File dialog box is displayed (Figure 10-28).

Figure 10-28: Select File Dialog Box - Smart Card Layout File

2. Click the button to the right of the Select File field. A SecureAdmin File Selection dialog box is displayed (see Figure 10-21 on page 10-27). 3. Navigate to the folder where the smart card layout card file (*.sl1) is located and select it. 4. Click Open. 5. Click Next. The Broadcast dialog box is displayed (see Figure 10-22 on page 10-28) 6. Select the device, group, or entire network check boxes as broadcast recipients. 7. Click Broadcast. The smart card layout file is broadcast to the selected devices and the Broadcast dialog box displays a broadcast status message (see Figure 10-23 on page 1028). 8. Click Close.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-31

Broadcasting Settings

This page left blank intentionally

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

10-32

Managing Logs

CHAPTER 11 - MANAGING LOGS


Chapter Overview
This chapter details how manage the SecureAdmin event log, transaction log, and device event log.

Chapter Index
11. Managing Logs............................................................................................................................... 11-2 11.1. SecureAdmin Event Log ................................................................................................ 11-3 11.2. Transaction Log ............................................................................................................. 11-5 11.3. Device Event Log........................................................................................................... 11-7

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

11-1

Managing Logs

11. MANAGING LOGS


The Log sidebar tab allows you to manage log files settings in the database and on devices in the network. The Log screen (see Figure 11-1) contains three buttons: SecureAdmin Event Log Transaction Log Device Event Log.

Figure 11-1: Log Tab

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

11-2

Managing Logs

11.1. SECUREADMIN EVENT LOG The SecureAdmin Event Log viewer allows you to view and filter the SecureAdmin event log.

Figure 11-2: SecureAdmin Event Log

Use the various controls at the bottom of the tab to navigate quickly through pages of results. If you are searching for a specific log file entry, you can use the filter function to find it quickly. To filter the event log: 1. Enter or select the filter criteria by means of the various fields and drop-down lists. 2. Click the Filter button. Any log file entries matching your filter criteria are displayed.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

11-3

Managing Logs

The event log or items in the event log can be exported. To export event log entries: 1. Select the check boxes next to the event log entries you want to export (to the left of the Description column). 2. Click the Export button. A File Save As dialog box is displayed. 3. Navigate to the save folder and enter a file name. 4. Click Save. The selected log file entries are exported and saved to the specified file and location.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

11-4

Managing Logs

11.2. TRANSACTION LOG The Transaction Log viewer allows you to view and filter the device transaction log. The transaction log records all transactions that occur on the device.

Figure 11-3: Transaction Log To view the transaction log, click the View Log button. Use the various controls at the bottom of the tab to navigate quickly through pages of results. If you are searching for a specific transaction entry, you can use the filter function to find it quickly. To filter the event log: 1. Enter or select the filter criteria by means of the various fields and drop-down lists. 2. Click the Filter button. Any transaction entries matching your filter criteria are displayed.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

11-5

Managing Logs

To download the transaction log from the device, click the Download button. The transaction log is downloaded and marked as "Read". The transaction log or items in the transaction log can be exported. To export transaction log entries: 1. Select the check boxes next to the transaction log entries you want to export (to the left of the Description column). 2. Click the Export button. A File Save As dialog box is displayed. 3. Navigate to the save folder and enter a file name. 4. Click Save. The selected log file entries are exported and saved to the specified file and location.

To delete transaction log entries: 1. Select the check boxes next to the transaction log entries you want to delete (to the left of the Description column). 2. Click the Delete button. The selected entries are deleted.

Note: The Identification score is logged as 0 for both success as well as failure. No score is logged in the Transaction log fir Identification.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

11-6

Managing Logs

11.3. DEVICE EVENT LOG The Device Event Log viewer allows you to view and filter the device event log. The device event log records every event that happens to the device. This feature is only needed for troubleshooting purposes and should not be enabled during normal everyday usage because it records a large amount of data and can grow to a large file size very quickly. Use the device event log only when directed to do so by L-1 EAS Technical Support.

Figure 11-4: Device Event Log Before the device log can start collecting device data, it must be activated. To activate the device event log, select the Activate Device Event Log check box. To export device event log entries: 1. Select the check boxes next to the device event log entries you want to export. 2. Click the Export button. A File Save As dialog box is displayed.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

11-7

Managing Logs

3. Navigate to the save folder and enter a file name. 4. Click Save. The selected log file entries are exported and saved to the specified file and location. To delete device event log entries, select the check boxes next to the entries you want to delete and then click the Delete button.

NOTICE
Deactivate the device transaction log when you are finished troubleshooting.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

11-8

Menu Bar Commands

CHAPTER 12 - MENU BAR COMMANDS


Chapter Overview
This chapter explains the commands that are available in the SecureAdmin menu bar.

Chapter Index
12. Menu Bar ....................................................................................................................................... 12-2 12.1. File Menu ....................................................................................................................... 12-2 12.1.1. Sign In As ...................................................................................................... 12-2 12.1.2. Change Password.......................................................................................... 12-3 12.1.3. Exit ................................................................................................................ 12-3 12.2. Manage Menu ................................................................................................................ 12-3 12.3. Tools Menu .................................................................................................................... 12-4 12.3.1. Firmware Upgrade ........................................................................................ 12-4 12.3.2. Sensor Test.................................................................................................... 12-7 12.3.3. Sensor Calibration ........................................................................................ 12-8 12.3.4. Synchronization ........................................................................................... 12-10 12.3.5. Reset to Factory Default ............................................................................. 12-11 12.3.6. Get MAC Address ........................................................................................ 12-12 12.4. Help Menu.................................................................................................................... 12-13 12.4.1. Help Content ............................................................................................... 12-13 12.4.2. About SecureAdmin ..................................................................................... 12-13

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

12-1

Menu Bar Commands

12. MENU BAR


The menu bar provides an assortment of controls. Many controls in SecureAdmin are accessible from both the menu bar and the tabs along the left side of the SecureAdmin main interface; the use and function of these controls are explained in other chapters of this document. Other controls in the menu bar, however, are unique to this location; this chapter explains those commands. 12.1. FILE MENU

Figure 12-1: File Menu The File menu provides controls that allow you to sign in as another user and to change your login password. 12.1.1. SIGN IN AS To sign in as another user: 1. Click the Sign In As item in the File drop-down menu. SecureAdmin closes and the Login dialog box is displayed (see Figure 12-2).

Figure 12-2: Login Dialog Box 2. Enter the appropriate information into the SecureAdmin ID, Password, and SecureAdmin Server fields. 3. Click Login. SecureAdmin re-launches as the new user.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

12-2

Menu Bar Commands

12.1.2. CHANGE PASSWORD To change your password: 1. Click the Change Password item in the File drop-down menu. The Change Password dialog box is displayed (see Figure 12-3).

Figure 12-3: Change Password Dialog Box 2. Enter the appropriate password information into the Current Password, New Password, and Confirm Password fields. 3. Click Save. The new password is set and the dialog box closes. 12.1.3. EXIT Clicking the Exit item in the File drop-down menu closes the SecureAdmin application.

12.2. MANAGE MENU

Figure 12-4: Manage Menu Clicking any item in the Manage drop-down menu simply duplicates the action produced by clicking the like-named tabs along the left side of the SecureAdmin main screen. For details on these commands, please refer to the appropriate chapter in this document.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

12-3

Menu Bar Commands

12.3. TOOLS MENU The Site Key, Broadcast, and Log menu items duplicate the action produced by clicking the like-named tabs along the left side of the SecureAdmin main screen. For details on these commands, please refer to the appropriate chapter in this document. The remaining menu items are unique to the Tools menu and are explained below.

Figure 12-5: Tools Menu

12.3.1. FIRMWARE UPGRADE The firmware of V-Station 4G and V-Flex 4G devices can be field-updated. L-1 EAS recommends that only advanced users attempt to perform this operation. Please contact L-1 EAS Technical Support with any questions before attempting to update device firmware.

NOTICE
Verification Polling Mode must be disabled prior to attempting a firmware upgrade due to the potential for the polling mechanism to cause errors during the upgrade process. To disable this mode, click the Miscellaneous tab in the Device Settings sidebar tab and deselect the Activate Verification Polling Mode check box. Before attempting to upgrade device firmware, ensure that the current communication settings are correct and that the PC and device are communicating properly. If you are using a custom language, upload the corresponding language file after the firmware update to avoid menus displaying incorrectly on the LCD.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

12-4

Menu Bar Commands

To upgrade device firmware: 1. Click the Firmware Upgrade item in the Tools drop-down menu. The Firmware Upgrade Step 1 dialog box is displayed (see Figure 12-6).

Figure 12-6: Firmware Upgrade - Step 1 2. Select the device you are upgrading in the Current Device drop-down list. The device's information is displayed. 3. Click Next. The Firmware Upgrade Step 2 dialog box is displayed (see Figure 12-7).

Figure 12-7: Firmware Upgrade - Step 2 4. Click Browse. A SecureAdmin File Selection dialog box is displayed (see Figure 12-8 on next page). 5. Navigate to the folder containing the device firmware file and select it. 6. Click Open. The firmware file is uploaded to the device.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

12-5

Menu Bar Commands

Figure 12-8: Firmware Upgrade - File Selection

7. Navigate to the folder containing the device firmware file and select it. 8. Click Open. The Firmware Upgrade Step 3 dialog box is displayed (see Figure 129).

Figure 12-9: Firmware Upgrade - Step 3 9. Click Upgrade. A final confirmation box is displayed (see Figure 12-10).

Figure 12-10: Final Confirmation

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

12-6

Menu Bar Commands

10. Click Yes. The upgrade process starts and a progress meter is displayed. Do not touch the device. 11. Click Close.

WARNING
Touching the device keypad, attempting to access any of the administrative menus, or trying to perform a verification whilst performing a firmware upgrade can damage the device!

12.3.2. SENSOR TEST To test a device sensor: 1. Click the Sensor Test item in the Tools drop-down menu. The Sensor Test dialog box is displayed (see Figure 12-11).

Figure 12-11: Sensor Test Dialog Box

2. Select the device you want to test in the Current Device drop-down list. Properties of the device's sensor are displayed in the Sensor Information area. 3. Click Test Sensor. 4. Place a finger on the sensor, hold it, and remove, as directed by the prompts. The test scan results are displayed. 5. Click Close.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

12-7

Menu Bar Commands

12.3.3. SENSOR CALIBRATION After a device is registered, its sensor must be calibrated before it can be used. To calibrate a device: 1. Select Sensor Calibration in the Tools drop-down menu. The Calibration Wizard dialog box is displayed.

Figure 12-12: Calibration Wizard Step 1 2. Select the device you want to calibrate in the Current Device drop-down list. 3. Click Calibrate. Wait as the device sensor is calibrated. 4. Click Next. The Calibration Wizard Step 2 dialog box is displayed.

Figure 12-13: Calibration Wizard Step 2


Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

12-8

Menu Bar Commands

5. Click Capture. 6. Place a finger on the sensor, hold it, and remove it as directed by the on-screen prompts. The capture results are displayed (see Figure 12-14 below).

Figure 12-14: Calibration Wizard Step 3 7. Click Close. The device sensor is now fully calibrated and ready to use.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

12-9

Menu Bar Commands

12.3.4. SYNCHRONIZATION This feature synchronizes the template data that is on the device with that which is in the database. Any templates that were added to the device through its front panel are added to the database. To synchronize device and database template data: 1. Select Synchronization in the Tools drop-down menu. The Synchronize Templates dialog box is displayed (see Figure 12-15).

Figure 12-15: Synchronize Templates Dialog Box 2. Select the check boxes next to the groups and devices you want to synchronize. 3. Click the Synchronize button. A Synchronization Result dialog box is displayed (see Figure 12-16).

Figure 12-16: Synchronization Result Dialog Box 2. Click OK.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

12-10

Menu Bar Commands

Note: If all templates were deleted from the device by means of the device front panel, it is not synchronized with the database during synchronization. If more than one template of the same ID is deleted through a GPI line, synchronization removes only one template from the database. For example, if 1_0 and 1_1 were removed, only 1_0 would be deleted through the synchronization. If all templates are deleted via GPI using the Delete All command, this action is not synchronized during the synchronization. Synchronization does not work at the smart card level. If a synchronization is done after smart card operations (i.e., storing template to a smart card, removing templates from a smart card, etc.) have been performed through the device front panel, the smart card listing is not updated correctly.

12.3.5. RESET TO FACTORY DEFAULTS The Reset to Factory Default item in the Tools drop-down menu allows you to reset a device back to default factory settings. To reset a device to factory default: 1. Select Reset to Factory Default in the Tools drop-down menu. The Reset to Factory Default dialog box is displayed (see Figure 12-17).

Figure 12-17: Reset To Factory Defaults Dialog Box


Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

12-11

Menu Bar Commands

2. Select the device you want to reset to factory defaults in the Current Device dropdown list. 3. Select the check boxes next to the specific parameters you want to reset. 4. Click Reset. The selected settings are reset to factory default on the current device.

NOTICE
L-1 EAS recommends that only advanced users use this feature. Please call L-1 EAS Technical Support for assistance before attempting to use this feature.

CAUTION
During a Reset to Factory Default, the DHCP setting (if it was enabled) is disabled and communication to the device is lost because a new IP address is assigned.

12.3.6. GET MAC ADDRESS A MAC address, which is a 12-character string composed of the characters 0 through 9 and A through F, is assigned to your computer's Ethernet network interface card and uniquely identifies its place on the network. If your computer is going to be used to perform enrollments, its MAC address must be obtainable to allow an Administrator to generate a site key for the computer. To determine the MAC address of the computer: 1. Select the Get MAC Address item in the Tools drop-down menu. The Get MAC Address dialog box is displayed (see Figure 12-18).

Figure 12-18: Get MAC Address Dialog Box 2. Select the computer's Ethernet network interface card in the drop-down list. 3. Click Copy to Clipboard. 4. Submit the MAC address to your Administrator for site key generation.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

12-12

Menu Bar Commands

12.4. HELP MENU

Figure 12-19: Help Menu 12.4.1. HELP CONTENT Click the Help Content item in the Help drop-down menu to launch the SecureAdmin Help file. 12.4.2. PRODUCT REGISTRATION Click the Product Registration item in the Help drop-down menu to display the Product Registration dialog box. This dialog box shows registration information for the software. Click OK to close the dialog box.

Figure 12-20: Product Registration Dialog Box 12.4.3. ABOUT SECUREADMIN Click the Help Content item in the Help drop-down menu to display the About SecureAdmin dialog box. This dialog box shows the version of the software. Click OK to close the dialog box.

Figure 12-21: About SecureAdmin Dialog Box


Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

12-13

Menu Bar Commands

This page left blank intentionally

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

12-14

Enrollment Best Practices

CHAPTER 13 - ENROLLMENT BEST PRACTICES


Chapter Overview
This chapter presents guidance on the recommended procedures to follow when enrolling users to assure trouble-free finger-scan recognition. It also presents information on troubleshooting enrollment problems using the Finger Placement Feedback (FPF) feature.

Chapter Index
13. Enrollment Best Practices ............................................................................................................. 13-2 13.1. Enrollment Basics ......................................................................................................... 13-2 13.1.1. Suggested Fingers ........................................................................................ 13-2 13.1.2. Consistent Finger Placement ........................................................................ 13-2 13.1.3. Proper Finger Orientation ............................................................................. 13-5 13.1.4. Centering the Core ........................................................................................ 13-6 13.2. Finger Placement Feedback ......................................................................................... 13-6 13.2.1. Troubleshooting Enrollment Problems Using FPF ....................................... 13-7

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

13-1

Enrollment Best Practices

13. ENROLLMENT BEST PRACTICES


L-1 EAS devices can perform enrollments from the front panel or through SecureAdmin. This section details specifics on enrollments in general, using the quick enrollment as a guide.

NOTICE
L-1 EAS recommends wiping the sensor surface with a dry soft cloth between enrollments to avoid dirt build-up and to ensure the best possible image quality. For devices with feature optical sensors, L-1 EAS recommends performing enrollments under normal indoor lighting conditions and not in the vicinity of strong light sources such as direct sunshine or high-power lamps.

13.1. ENROLLMENT BASICS Operating L-1 EAS devices is simple if a few basic guidelines are followed consistently. Use the following procedures to ensure trouble-free finger-scan recognitions. 13.1.1. SUGGESTED FINGERS Use the index, middle, or ring fingers as first preference (see Figure 13-1). Avoid using thumb and pinky fingers since they are typically awkward to position on the sensor consistently.

Figure 13-1: Suggested Fingers 13.1.2. CONSISTENT FINGER PLACEMENT Consistent finger placement contributes heavily to trouble-free finger-scan recognition. The L-1 EAS Ridge-Lock system help promote consistent finger positioning. The following sequence of pictures shows the recommended finger placement procedure: 1. Wait for the amber LED to illuminate.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

13-2

Enrollment Best Practices

Figure 13-2: Amber LED 2. With the fingertip raised, rest the fingertip on the Ridge-Lock.

Figure 13-3: Fingertip on Ridge-Lock 3. Slide the finger forwards across the Ridge-Lock, while keeping the fingertip raised so as to not touch the sensor.

Figure 13-4: Slide Finger Across Ridge-Lock 4. Position the finger so that the Ridge-Lock sits in the indentation between the first and second segments (distal and middle phalanges).

Figure 13-5: Position Joint on Ridge-Lock


Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

13-3

Enrollment Best Practices

5. Lower the finger onto the sensor and apply moderate pressure, as if pressing a computer key. Too much pressure might cause the fingerprint to smudge. If too little pressure is applied, the sensor might not recognize the presence of a finger.

Figure 13-6: Apply Correct Pressure 6. Keep the finger on the sensor until the top LED turns green.

Figure 13-7: Wait for Green LED 7. Lift the finger up and off the sensor.

Figure 13-8: Lift Finger Up and Off 8. Have users practise this procedure a few times before enrollment so that they can have a feel for how they should use the device on a daily basis. The goal is to have consistent placement so the device sees approximately the same information each time.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

13-4

Enrollment Best Practices

13.1.3. PROPER FINGER ORIENTATION Always try to cover the entire area of the sensor with the fingertip so as to provide the most information (refer to Figures 13-9 through 13-12).

Figure 13-9: Correct Placement

Figure 13-10: Incorrect Placement Place the finger as close to the center position of the sensor as possible to increase the acceptance rate.

Figure 13-11: Place Finger Close to Center

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

13-5

Enrollment Best Practices

Finger rotation should always be kept to a minimum during enrollment, verification, and identification.

Figure 13-12: Do Not Rotate Finger 13.1.4. CENTERING THE CORE A finger core is the area located within the innermost re-curving ridge. Normally, it is located in the middle of the finger. When enrolling, place the finger on the sensor so that the entire core can clearly be seen by the sensor. In Figure 13-13, the red dots represent the centers of the cores. Every attempt should be made to ensure that the core is positioned in the center of the captured image.

Arches (plain and tented)

Loops (singular and twinned)

Whorls and Central Pocket Loops

Figure 13-13: Finger Cores

13.2. FINGER PLACEMENT FEEDBACK The Finger Placement Feedback (FPF) feature allows the administrator to direct users in correct finger placement during enrollment and helps the user to learn the correct placement for everyday use. The FPF feature helps an administrator know when an enrolling user has positioned the core on the scanning surface optimally. Without this feature, an administrator has to try to recognize the core visually and then make a judgement call as to whether the placement was optimal. FPF also allows the fingerprint image to remain hidden to add to personal biometric privacy. Users are provided the opportunity to enable FPF only at the time of installation. Users can revert back to the conventional finger image display aspect only by re-installing SecureAdmin and deselecting the FPF option. When FPF is enabled, anywhere a scan result is displayed in SecureAdmin, a cross-hair is displayed instead of actual fingerprint data. The cross-hair represents the core of the fingerprint scan.

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

13-6

Enrollment Best Practices

13.2.1. TROUBLESHOOTING ENROLLMENT PROBLEMS USING FPF The FPF function is shown as a square within a square as shown in Figure 13-14. The outer red square represents the boundaries of the scanning device. The inner green square represents the optimal region in which the core should appear. The coordinates of the core are shown as two intersecting lines drawn on the FPF screen. If the lines are displayed in green, the intersection lies within the optimal area. If one or both lines are displayed in red, the optimal point has not been found. The administrator can use the FPF to determine if the finger needs to be repositioned to improve the scan. If the Quality and Content scores indicate a passable finger scan but with FPF, the administrator has the information to try to improve (in this case, the Quality score) without depending on trial and error. The administrator should consider the Quality and Content scores and the FPF when deciding whether to accept a finger scan for enrollment. If either the Quality or the Content scores are low, FPF lines are displayed in red, to show that there is an issue, even if one or both are within the target inner square. How can the FPF help to improve the Quality and Content scores? It is possible that poor Quality or Content might be a result of insufficient information to make an accurate determination of core location. Using all three scores, the administrator can decide how best to improve the finger scan. Here are several things an administrator can check: Is the finger is centered on the scanning surface (and the FPF is accurate)? Is the user is pressing down firmly enough to make good contact? Does the finger meet the guidelines for correct placement? Is the finger positioned on the Ridge-Lock correctly? Is the finger rotated? Is the finger placed flat? Is the finger centered? Does the finger have dry skin? Is the sensor window clean? Should an alternative finger be used?

Figure 13-14: FPF Function

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

13-7

Enrollment Best Practices

This page left blank intentionally

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

13-8

Contact Information

CHAPTER 14 - CONTACT INFORMATION


The L-1 Enterprise Access team endeavors to resolve all inquiries from clients with supported products in a timely fashion. Please visit our webpage for the most up to date information, hours, contacts, and resources available for resolving your technical needs. Please note that some services are provided under a support contract or warranty only. Website: http://www.l1id.com/enterpriseaccess/support

North America: Support-EnterpriseAccess@L1ID.com International: Support-Intl-EnterpriseAccess@L1ID.com

14.1. REGISTERING YOUR PRODUCT Registering your L-1 products is quick and easy and entitles you to a wide range of benefits such as notifications of product updates, newsletters, special offers, and invitations to L-1 Enterprise Access Division events and training seminars. Please use the following address to register: http://www.L1ID.com/register4G

Part No. 430-4G-300-00-000 2009, L-1 Identity Solutions Inc.

14-1

You might also like