User guide

Table Of Contents
Introduction
AxTraxNG™ Software Installation and User Manual 11
1. Introduction
The AxTraxNG™ Access Control System is a complete Server-Client software
management system for use with the AC-215, AC-225, AC-425, and AC-525
Access control panels.
The AxTraxNG™ Access Control System is user-friendly, intuitive, and rich in
functionality. Using AxTraxNG™, you can configure door functionalities based
on areas and time frame for different types of personnel and for varying alarm
situations.
The AxTraxNG™ Access Control System can integrate with ViTrax, Video
Surveillance software application. The main purpose of the integration is to
enable video recording based on access control events and convenient
playback.
This manual is compatible with AxTraxNG™ software Version 00.12.00 and
above.
1.1 System Features
AxTraxNG™ makes it possible to control and monitor every aspect of access
control on a site. The system includes a built-in software security system that
controls access to the system database, and logs all performed operations. In
addition, the system boasts the following Professional Grade features:
User-friendly PC software with intuitive layout reduces the complexity of
access control
Manages user data, photo and information fields, access rights, alarms,
strike time, and door mode, all from one central location
Produces reports from acquired data, such as entry and exit times, as well
as alarm types initiated by user, location, and time events
Available in multiple languages and date formats
Compatible with additional video management software modules from
Rosslare ViTrax
Backward compatibility with VeriTrax AS-225 and AxTrax AS-525
1.1.1 Access Control
Access groups define access rights for every part of the site. Access rights are
time dependent; for example, users in the "Mornings Only" access group can
have access to certain areas of the site between 9 am and 12 pm only. Assign
each individual user to an access group.
The system also stores an identification photograph and personal details for
each user, as well as user specific access settings, such as antipassback
immunity, requirements for an extended open door period, configurable
special privileges, and triggered outputs.