computech-xp.com

Access Control Integration with Network Infrastructure

Gone are the days of standalone lock systems. Modern access control lives on the network, integrating with HR databases, AD, and video surveillance.

Controller Placement

Access controllers should be in a secured IT closet, not above the door in the insecure hallway. Run composite cable from the door hardware (reader, strike, REX) back to the central controller. This prevents tampering.

Network Integration

IP-based controllers allow you to instantly add/remove users from a web interface. Integrate with Active Directory: when an employee is terminated in HR, their badge is automatically disabled at the door. Link with cameras: “Door Forced Open” alarm triggers the camera to pop up on the guard’s screen.

Power Considerations

Locks fail in two ways: Fail Safe (unlocks on power loss) or Fail Secure (stays locked). Fire code dictates which to use (usually Fail Safe for exits). Always have battery backup for the access control system so the building remains secure during power outages.

Security of the System

The access control network should be isolated. You don’t want a hacker unlocking doors via the guest WiFi. Use strong encryption (OSDP instead of Wiegand) between the card reader and the controller to prevent card cloning devices from working.

Frequently Asked Questions

Can I Use a Smartphone Instead of a Badge?

Yes, many modern readers support NFC/Bluetooth credentials (mobile access). This is convenient but requires compatible readers and typically a subscription fee per user.

What is a “Request to Exit” (REX)?

It’s a sensor inside the door that detects someone approaching to leave. It unlocks the door or shunts the alarm so the door can be opened without triggering a “forced entry” alert.