Up to 199 Users for Door Access

Door/Gate Entry Control

The M1 Cross Platform Control can be used as a limited or small access control system. The control can accommodate up to 199 users (requires firmware version 4.4.2 or later and ElkRP version 1.6.8 or later) and 16 keypads. 
One 26 bit Wiegand proximity reader or keypad can be installed for each M1 keypad on the system. The ELK-M1PR is an internal proximity reader that permits touchless reading of M1PRC proximity cards and M1PRF proximity fobs. These cards and fobs are designed for use with the M1PR. If an external proximity reader is used, use the cards and fobs designed for that particular device. 

Application Note:  When using an external proximity reader with proximity cards, considering the placement of the reader can offer the user added convenience.  The ideal height for the reader is approximately 36 inches.  At this height, the user can keep the card in a wallet or outside pocket of a purse, and the card can be read without the need to remove it from the purse or wallet.

Proximity cards and fobs are enrolled into a User Code location using the same procedures used to add/change User Code PINs. 

   1. Access User Menu 6-Change User Codes.  A master user code will be required to access this menu.

   2. Enter the three digit number of the desired User Code location (001 – 099) or use the UP or Down arrows to scroll through the codes. Then select CHG by pressing the RIGHT arrow key. The keypad will display any existing 4 or 6 digit code that is programmed for that user, along with any programmed name. 

   3. Place a new (not previously enrolled) prox card or fob near the proximity reader.  If the code is accepted the Keypad will beep 3 times and display the 12 digit ID for that card/fob. 

If a card/fob is rejected, the keypad will emit a low error tone and display “Code Not Authorized, Redo.”  Ensure that the card/fob has not already been enrolled in a different User Code location and that the card/fob is designed for use with the proximity reader. 

Each user can be given user authorizations that determine what that user is allowed to do.  This is done in RP under each user, or can be setup through the keypad using Menu 2 under Installation Programming Menu 9.  These authorizations include Arm, Disarm, Bypass, Access, Temporary Code, Master, User Menu 1-5 Allowed, and Duress.  The Access authorization allows the code to activate the Access Keypad Events 1313-1328 for the keypad where the code was entered.  The Whenever/And/Then Rules engine is used to program what occurs when the event is activated. 
The diagram below shows how an ELK-924 can be connected to Output 7 to switch 24V to a door strike.

The rule below will activate Output 7 for 10 seconds when access is activated on Keypad 1.  This will cause the door strike to be tripped, allowing the user to open the door and enter the premises
          THEN TURN Door Strike (Out 7) ON FOR 10 SECS

By adding the AND statements shown in bold, the user will only be able to gain access between 7:30 am and 6:30 pm .

          THEN TURN Door Strike (Out 7) ON FOR 10 SECS

To give the user audible notification that the code was accepted, a miscellaneous voice message can be used.  In this example, Miscellaneous 4 (vm242) is programmed with the phrase “Access Authorized.”  By adding the THEN statement shown in bold, the system will announce this message each time a valid access code is entered.

          THEN TURN Door Strike (Out 7) ON FOR 10 SECS
        THEN ANNOUNCE Miscellaneous 4 (vm242)

The History Log stores the most recent system activity. This can be used as a means of tracking when a user code is used for access.  This log includes the user name or number, the date and time the code was used, and the area and keypad where the code was entered.  To view the log in ElkRP, click the log button in the toolbar.  You can choose to view 20 events at a time or receive the entire log.  The log can be printed from this screen or by choosing print from the file menu, and then selecting ElkRP log.  To view the log from the keypad, access user menu 4. The newest event will appear first.  Use the up or down arrow keys to scroll through the log.

Welcome to our blog, the Security & Automation Connection!

Learn more about security, home automation, business solutions, energy management, access control, and many other solutions available though ELK's M1 Cross Platform Controls. Our goal is to make this blog a great resource for getting new ideas on how to take advantage of the powerful integration and programming capabilities of the M1. We will also provide tech tips and how-to's on a variety of applications to get you well on your way to securing and simplifying life!

Explore Topics