2N Access Commander

User Manual

91379030

acom

Abstract

Firmware 3.0

Manuals for previous firmware versions can be found at https://wiki.2n.com/acc.

Table of Contents

Symbols and Terms Used
General Information
User Rights
Supported Devices and Applications
Supported Devices
Web Browsers
Virtualization Platforms
Used Ports
License Overview
Installation
Access Commander Box Distribution
Technical Parameters of  Access Commander Box
Virtual Machine Distribution
Recommended Hardware
License Activation
Getting License File
License Upload
License Suspension
Basic Access to Interface
Dashboard
Language Change
Profile Image Change
Logs
System Logs
Log Export
Log Lifetime
Access Logs
Log Export
Log Lifetime
Notifications
Notification Settings
Delivery Methods
Monitored Devices
Log Lifetime
Companies
Company Creation
Company Settings
Company Language
Zones
Mobile Key
Visitors
Working Time
Holidays
E-Mails Sent to Company Users
Company Synchronization (LDAP)
LDAP Synchronization Options
Users
User Creation
User Settings
User Name and Photo Change
Credentials
Account
Personal Information
Access
Phone Numbers
Access Log
Change Log
Fingerprint Enrollment
Bluetooth Authentication
User Attendance
Groups
Group Creation
Group Settings
Members
Access Rules
Zones
Zone Creation
Zone Settings
Multi-Factor Authentication
Access Settings
Devices
Companies
Access Rules
Devices
Device Adding
Emergency Lockdown
Device Configuration
Overview
State
Access Control
Configuration
Door Control
Backup
Calling
Touchscreen phonebook
Additional virtual numbers
Buttons
Lift
Lift Floors
Lift Control Modules
Monitoring
Firmware
Device Exclusion
Incompatible Firmware Versions
Security
Setting Device Access Points
Access Rules
Matrix Display
Example of Matrix Display
Rule List
Time Profiles
Time Profile Creation
Time Profile Settings
Attendance
Specific User Attendance
User Attendance Change
Attendance Settings
Setting Device Access Points
Visitors
Visitor Data Retention Settings
Visitor Creation
End of Visit
Visitor Settings
Access
Visitor
Personal Information
Credentials
Access Log
Cards
Presence
User Presence Expiration
Reports
Area Restrictions
Area Restriction Creation
Area Restriction Settings
Entry and Exit
Occupancy
Anti-Passback
Exception Settings
List of Blocked Users
Restriction Reset
The most common setup errors
Example of Restriction Setting
System Setup
Date and Time
Time Synchronization with Devices
Network Configuration
E-Mail (SMTP) Enable and Setting
System Update
Beta Testing
System Backup
User Synchronization
Enabled USB readers
PICard Keys
Encryption Keys for Mobile Key
CAM Logs
CAM Log Settings
Monitored Events
Monitored Devices
SSH Access Enable
Linux Settings
Troubleshooting
Diagnostic Logs
Usage Statistics
Supplementary Information
HTTP API
Third Party Licenses

Can we advise you on anything else?

Take advantage of our technical support and sales specialists.