User's Manual

Table Of Contents
Table of content
INTRODUCTION 6
INTERFACES PRESENTATION 7
MAN-MACHINE INTERFACE 7
ELECTRICAL INTERFACES 8
SETTING UP THE TERMINAL IP ADDRESS 9
ACCESS CONTROL PRESENTATION 10
IDENTIFICATION - AUTHENTICATION 10
“HIT OR NO HITRESULT COMMUNICATION 12
“PROXYMODE 13
CONFIGURING A “CONNECTED” MORPHOACCESS 14
INTRODUCTION 14
NETWORK FACTORY SETTINGS 15
CONFIGURING A STANDALONE MORPHOACCESS 16
“USB” KEY ADMINISTRATION 16
PRINCIPLE 17
CHANGING A PARAMETER 18
CONFIGURATION INTERFACE 18
CONFIGURATION ORGANIZATION 18
“CONFIGURATION TOOL 19
UPGRADING THE FIRMWARE 20
ACCESS CONTROL BY IDENTIFICATION 21
ACCESS CONTROL BY AUTHENTICATION (MA120 / MA110 ONLY) 22
CONTACTLESS AUTHENTICATION WITH TEMPLATES ON A CONTACTLESS CARD 23
SAGEM Défense Sécurité document. Reproduction and disclosure forbidden 3