Manual Datafox Evo 4.3 Page 105 Date: 27.12.2017 V 04.03.09.XX
5.7.10. Function extention for access control II
5.7.10.1. General description
The access control has been extended to some functionality. To the table "Action 2" was introduced.
This table replaces the previously known “Action“. On the end of this chapter you find a description
for the table „Action2“. Because of a lot of additional references are now possible many scenarios.
The follows edfxample gives overview:
5.7.10.2. Examples
Example Garage:
Construct of Reader-, Location- , Action2- and Identification-table looks maybe at follows
Tabele Reader
Door-module on RS485 wire (TM1) only relays include
Need not a listing in the table „action“
RFID-reader on RS232 wire (L1) only reader
All readings of RFID on this reader make all actions in the
table “action“, with the ID 1000.ID 1000.
Door-module on RS485 wire (TM2) only relays include
Need not a listing in the table „action“
RFID-reader on RS232 wire (L2) only reader
All readings of RFID on this reader make all actions in the
table “action“, with the ID 2000.
Door-module on RS485 wire (TM3) only relays include
Need not a listing in the table „action“
RFID-reader on RS232 wire (L3) only reader
All readings of RFID on this reader make all actions in the
table “action“, with the ID 3000.
24houers opening possible
The facility manager come in the morning 7.00 a clock and
uses the Entry 1.
- with his RFID-chip open the door 1 for 5 seconds.
- with the same action gives the door 3 free, the opening is
now possible with a switch, until 16.00 a clock.
- entry 2 is now open until 16.00 a clock for the other person.
the clothing is possible with:
- 1 – one RFID-chip registry on group 40
- 2 – double read of on normal RFID-chip
- 3 - Automatic at 16.00 a clock (define in the time table, see
in row 2 „RefTime“)