Handbuch Datafox EVO 3.5 Pure Seite 92 Datum: 06.08.2018 Version: 04.03.07.XX
5.9.7. Function extention for access control II
5.9.7.1. General description
The access control has been extended to some functionality. To the table "Action 2" was introduced.
This table replaces the previously known “Action“. On the end of this chapter you find a description
for the table „Action2“. Due to a lot of additional references many scenarios are now possible.
The following example gives an overview:
5.9.7.2. Examples
Example - Garage:
Construct of Reader-, Location- , Action2- and Identification-table looks maybe at follows
Tabele Reader
Door-module on RS485 wire (TM1) only relays include
Need not a listing in the table „action“
RFID-reader on RS232 wire (L1) only reader
All readings of RFID on this reader make all actions in the
table “action“, with the ID 1000.ID 1000.
Door-module on RS485 wire (TM2) only relays include
Need not a listing in the table „action“
RFID-reader on RS232 wire (L2) only reader
All readings of RFID on this reader make all actions in the
table “action“, with the ID 2000.
Door-module on RS485 wire (TM3) only relays include
Need not a listing in the table „action“
RFID-reader on RS232 wire (L3) only reader
All readings of RFID on this reader make all actions in the
table “action“, with the ID 3000.
24houers opening possible
The facility manager comes in the morning at 7.00 o´ clock and
uses the Entry 1.
- with his RFID-chip he opens the door 1 for 5 seconds.
- with the same action he gives the door 3 free, the opening is
now possible with a switch, until 4 o´ clock pm.
- entry 2 is now open until 4 o´ clock pm for the other person.
the closing is possible with:
- 1 – one RFID-chip registry on group 40
- 2 – double read of a normal RFID-chip
- 3 - Automatic at 4 o´ clock pm (define in the time table, see in
row 2 „RefTime“)