User's Manual
Table Of Contents
- INTRODUCTION
- INTERFACES PRESENTATION
- SETTING UP THE TERMINAL IP ADDRESS
- ACCESS CONTROL PRESENTATION
- CONFIGURING A “CONNECTED” MORPHOACCESS
- CONFIGURING A STANDALONE MORPHOACCESS
- CHANGING A PARAMETER
- UPGRADING THE FIRMWARE
- ACCESS CONTROL BY IDENTIFICATION
- ACCESS CONTROL BY AUTHENTICATION (MA120 / MA110 ONLY)
- Contactless authentication with templates on card:
- Contactless authentication with templates on a contactless c
- Contactless authentication with templates on local database
- Contactless authentication based on card mode
- Bypassing the biometric control in authentication
- Merged mode
- MorphoAccess 220 320 compatibility
- PROXY MODE
- RECOGNITION MODE SYNTHESIS
- SETTING UP RECOGNITION MODE
- SETTING UP MATCHING PARAMETERS
- RELAY ACTIVATION
- LED IN ACTIVATION
- LOG FILE
- REMOTE MESSAGES
- TAMPER SWITCH MANAGEMENT
- MAN MACHINE INTERFACE
- NETWORK PARAMETERS
- TERMINAL INFORMATION
- ADMINISTRATION PARAMETERS
- ANNEX: CONTACTLESS MODES TABLE
- ANNEX: REQUIRED TAGS ON CONTACTLESS CARD
- FAQ
- BIBLIOGRAPHY
Table of content
INTRODUCTION 6
INTERFACES PRESENTATION 7
MAN-MACHINE INTERFACE 7
ELECTRICAL INTERFACES 8
SETTING UP THE TERMINAL IP ADDRESS 9
ACCESS CONTROL PRESENTATION 10
IDENTIFICATION - AUTHENTICATION 10
“HIT OR NO HIT” RESULT COMMUNICATION 12
“PROXY” MODE 13
CONFIGURING A “CONNECTED” MORPHOACCESS 14
INTRODUCTION 14
NETWORK FACTORY SETTINGS 15
CONFIGURING A STANDALONE MORPHOACCESS 16
“USB” KEY ADMINISTRATION 16
PRINCIPLE 17
CHANGING A PARAMETER 18
CONFIGURATION INTERFACE 18
CONFIGURATION ORGANIZATION 18
“CONFIGURATION TOOL” 19
UPGRADING THE FIRMWARE 20
ACCESS CONTROL BY IDENTIFICATION 21
ACCESS CONTROL BY AUTHENTICATION (MA120 / MA110 ONLY) 22
CONTACTLESS AUTHENTICATION WITH TEMPLATES ON A CONTACTLESS CARD 23
SAGEM Défense Sécurité document. Reproduction and disclosure forbidden 3