SRS Access Control Smart.Net-IP Help


For remote support please download a local copy of TeamViewer Support here.

Quick Links

About Access Control

Your installation is a computer administrated electronic access control system for up to 128 doors or entrances. The easy to use software application is installed on a single computer to control and manage the system for online or fully offline operation. All features are designed for ease-of-use, with the minimum requirement for training. Your access control system is a fully distributed intelligence system, enabling all changes and system configuration made centrally, to be stored locally at the door or entrance controllers, giving full door access control functionality on or offline.

Understanding the 'Windows Desktop Administration Console'

There are two distinct areas to the graphical view, the navigation panel on the left and the larger information panel on the right. The navigation panel is split in to two main groups, Administration and System functions. System functions allow you to install and modify doors and entrances and make system wide installation sensitive changes, additions and deletions. The Administration functions are limited to day-to-day use of card holder maintenance, report production and door override control.

The information panel contains all live information and information relating to the function and process being performed as selected on the navigation panel. The information panel will change its heading and icon as you select differing functions from the navigation panel.

Whenever you wish to use any functions of the program you are required to authenticate yourself with a Username and Password entered into the top banner panel. The default Username & Password are 'admin'. You later may, as you define people, create individual Usernames and Passwords and allow or deny programming permissions for Administration and System functions for one or many people if you wish. Once this has been done we recommend you delete the 'Default Record' from the People list rendering the default Username & Password inoperative.
Default Username & Password

The default Username and Password are ‘admin’ but the default record containing these credentials should be deleted when at least one further record has been created with full Administration and System permissions through the People screen option. If you inadvertently lock yourself out or forget any of the credentials you will need to contact technical support. Please also observe that Usernames & Passwords are case sensitive.
Creating & Configuring Doors

All doors and entrances for your system must first be declared and created as records in the Windows Desktop Administration Console database. To do this you must first Login with system privileges and select the doors option from the navigation panel. Displayed in the information panel is a summary of all your current defined door records. In this case the summary list is empty as no doors have been created. Select the NEW option by right-clicking the empty summary list. 

There are many field options across two property tabs but for initial testing and proof of operation we need only define three key parameters. The first is a fully descriptive name for our door or entrance which will be used by the system as a label for event activity from now on. Enter the text description in the Entrance Name field i.e. Front Entrance Door. The second field is required to declare how our door is connected to the system. This can be by USB Adapter, LAN IP Adapter or by a third party COM based adapter. The third field is the SERIAL ID # information which is the unique electronic serial number of the local door controller as displayed on a white label on the printed circuit board. This unique electronic ID consists of a 6 digit value i.e. ‘BBF4C6’ and enables the application to identify and communicate with this door or entrance. Enter this information in the ID field. 

We can modify or specify other parameters at this stage and an explanation of these are as below:

Entrance Name – choose a logical name that will be used to describe the door or entrance at the location.

USB Connection - under normal conditions the USB adapter that connects your doors and entrances back to your computer is detected by the Access Control Desktop Console Application automatically and the channel set to USB. In most circumstances you will never need to change this setting as this is the most efficient and popular communication method.

LAN IP Connection – you can also use our LAN IP to RS485 Interface Adapters for one, some or all of your door controller communications. Select the ‘LAN’ option from drop down list and specify the fixed IP address of the LAN Adapter that this door controller is connected too. You must be careful to enter the free text field in the following format, LAN etc. The IP address shown above is just an example and your exact addresses will be site specific and you may need to consult your IT expert for a list of compatible fixed IP addresses for the installation site. If you have not yet issued a fixed IP address for one or all your adapters then you can load the LAN Device Installer from the desktop shortcut and dynamically address them over your LAN. It may be better to set up each LAN Adapter individually before-hand away from site and marking the programmed fixed IP address on the device itself.

WEB IP Connection – you can also use our LAN IP to RS485 Interface Adapters for one, some or all of your door controller communications at remote geographical locations. Select the ‘WEB’ option from drop down list and specify the fixed public IP address of the remote location. You will need to know the fixed public IP address of the remote location and setup a port forward (10001) in that router to the LAN Adapter IP address. Please specify the IP address in the format WEB or WEB if you want to declare the LAN Adapter port number.  It is normal to have only one LAN Adapter in any single remote location but you can have many if you wish.  If more than one is used at any single remote location, then you will need to setup each LAN Adapter with unique port numbers i.e. 10001 - 10002 etc.  You will also need to set a fixed unique local IP address for each LAN Adapter and a port forward for each within the remote locations router. It may be easier to set up each LAN Adapter individually before-hand away from site and marking the programmed fixed IP address and port number change from the default, on the device itself to avoid errors and confusion on installation.

COM Connection - if you wish to use a legacy virtual communication port number (COM) instead, then you can select it here. To ascertain the correct communications port number, load the Device Manager from Windows Control Panel. In the list of devices displayed look for an entry described as Ports (Com & LPT) and there should be an entry for ‘USB Serial Port’ or similar. Next to this entry you will see the communications port number associated with the interface. Please transpose this setting in to the Connection option selection.

ID – this field is populated with the unique 6 digit hexadecimal door identification code. This ID code is found on a label of the door control electronics installed locally at the relevant door or entrance. Your installer should have provided you with this information but if not, careful inspection inside the door controller will reveal this code. This 6 digit ID code is unique to that door or entrance control electronics and must be interpreted and entered into the ID field correctly.

Unlock Time – this setting defines the amount of time in seconds the door or entrance is unlocked after an exit button or valid card activation. The range is 1 to 30 seconds. In the case of automated gates, turnstiles or barriers that have separate control electronics a general setting of 1 second (trigger) is recommended and for a normal access controlled door about 7-10 seconds is normal.

Alarm Time – if after a door or entrance is held open too long or is forced or defeated by malicious means a local alarm can be triggered and a host event message relayed after a certain period of time. This time in seconds can be defined here. Please note that if this functionality is required please check with your installer that a magnetic door contact sensor has been fitted to all doors requiring this alarm detection function.

Access Level – the security access level value defines the normal level of security for this particular door or entrance. The higher this number then the greater the level of security will be as only people with there personal access level equal to or greater than this setting will gain access. The normal access level setting may be overridden by defined System Schedules which are discussed later.

Notes – the notes field allows free entry of text for your own use relating to the door or entrance and can be altered at will.

Reader Type – your installer will provide information on the type of reader that is installed at the associated door or entrance. This information does not alter the operation of your system so if you are not sure leave this setting in its default state. One exception to this rule is when you have a Card & PIN high security reader connected at any entry point. In this case you must select the MPROX+PIN option to invoke this mode.

Exit Function – your installer will provide this information if required as to the exact functionality required from this door or entrance input. If you are not sure or you are aware that at Exit Request Button is fitted at the associated door or entrance leave this setting in its default state.

Clocking Function – doors and entrances when used generate access control messages that are stored in the historical database for later report analysis. If we only require this standard function then we keep this setting in its default state of ‘None’. It is also possible when individuals access through a door to update their personal record displayed on screen with the last door or entrance used with the time and date attached. If this functionality is required for this door or entrance then select the option ‘Logging’. Additional to the logging function, we may at strategic doors and entrances want to clock an individual on or off-site for the purposes of Roll Call. If this functionality is required please select the option ‘Clocking’.  

An explanation of all the available Clocking modes are below:

None - access control & event reporting only.

Logging - access control & event & locations update.

Clocking - access control, event & locations update and roll call.

Mono Clocking - as above but with just one reader (in-out-in-out...).

Patrol Point - no access control but logging for guard tour.

Access + Patrol Point - as above but with access control & event reporting.

Administration Functions

The Administration Functions are protected by a Username & Password based Login that should have been provided by your System Operator. Administrative functions are defined as processes that will be carried out on a regular basis such as people addition, editing, suspension, removal, historical audit report production and manual door override control. The administration processes do not include the addition or modification of the existing site installation definitions or core predefined installation operating parameters.

Event Views - the Events View which is selected by default initially displays a list of the most recent events that have occurred. The Events View allows you to view real time system & host activity as it happens and provides a snap-shot of the latest audit history. The Event View is visible and updating even when logged out. Additionally you can display images of people that have recently transacted successfully through your doors and entrances. Simply select the appropriate door or entrance name from the drop-down list box to display real time images associated with activity at the chosen door or entrance. The Events View list can be sorted in a pre-defined manner which is defined only by the System Manager. Possible sort criteria are - by the last 500 events with the most recent at the top of the list, all events for the current day and the last 500 events recorded in the history database with the most recent at the top of the list. As with all the list based tables you may size the columns manually by grabbing and moving them with your mouse.

Roll Call - the Roll Call view displays a real-time list of all people currently on-site or on and off-site depending on the optional selection. People are classified on-site when they have accessed through any door or entrance that is designated as a clocking point. In order to be clocked off-site then they must exit by card through similarly classified doors or entrance points. If a door or entrance is defined as a clocking point then the Roll Call view will automatically update the last known door or entrance used with time and date information attached for all people. Your System Operator should have defined the clocking points for your site installation and can not be modified at administrative level. You can switch the view to display in only or in and out information.

People - the People view provides you with a list of all people (cardholders) for the current site installation. You can add, modify, suspend or remove them as you wish. To add a new person you must select the ‘New’ link. If you select an item or entry on the list and click the right mouse button we can see a range of other options available. Please not that after a person is created or modified the information is automatically updated to the relevant doors or entrances for full offline operation. To add a new person or cardholder, select the link ‘New’ by right-clicking on the list and a record entry form is displayed. There are many fields available for completion including the ability to place a small (200px by 300px) image of the individual in to their record. Essential fields include Forename, Surname and the unique token number which may be printed on the access control card or key-tag.  You may have unnumbered cards or key-tags, in which case you can use the appropriate USB Desktop Validation Reader. 

To understand the printed serial numbering, observe on the proximity card that there are two number sequences. Please use the 10 digit continuous quantity, entering only the last 8 digits of the sequence for validation. For numbered proximity key-tags locate the 8 digit continuous numbering, entering all 8 digits for validation. For access control cards & key-tags without a printed serial number, then an appropriate USB Desktop Validation Reader is available.

If you require this person to also have administrative access rights to the Access Control Site Manager software you can enter a unique Username and Password and select their programming rights type. Once all essential fields have been entered and any additionally optional fields you may select ‘Ok’ to commit the record to the site database. The record entry form will always check that your date entry is complete and valid so if the record form does not close please check all fields for correct data validity.

To open or modify an existing person (cardholder) you can either right click on the relevant list record and select ‘Open Record’ or double mouse click on the list record. After this is done the record form is displayed and you may alter certain fields, change access level rights or add additional information. If you wish to cancel or suspend a persons access control privileges you can simply set their access level value to 0. To restore their access control privileges then you can open the record once again and establish a new appropriate access level value at a later time.

Access Level – the desired security access level that this individual will have compared with the door security access level. The Access Level logic is as below:

Person Access Level >= Door Access Level = Access Granted

Person Access Level < Door Access level = Access Denied

Access Schedule – the Access Schedule number defines an additional active time window that only cardholders with the corresponding access schedule number gain access when it is activated by a Door Schedule. If the card holder does not have an Access Schedule number applied then they will gain access as normal regardless of the doors Access Schedule status. The Access Schedule logic is as below:

Person Access Schedule = Access Schedule + Access Level Valid = Access Granted

Person Access Schedule Not Set + Access Schedule Set or Unset = Access Granted

Person Access Schedule Set <> Access Schedule = Access Denied

Door Group – under normal conditions a persons access control permissions are set by their current Access Level setting and the current door or entrance Access Level setting, which may be fixed or changed dynamically through the use of Door Schedules. While this method is a fast and efficient way of issuing access control permissions for the site, it may on occasion be desirable to inhibit a persons access permissions for a given door or collection of doors. For this reason we have the mechanism Door Groups. With Door Groups you can define a collection of doors that can later be applied to a person’s record that will supersede their normal access level permission and will only permit access at this group of doors. Door Groups are an ideal method for tenanting your system for area access permissions e.g. blocks of flats or apartments.

Reports - the Reports view allows you to run a detailed audit report on historical information contained in the current site history database. There is a selection of audit report types available as follows:

All Events - Generates an audit report for all system activity. 

Access Control - Generates an audit for all door access control activity.

Host Operations - Generates an audit for all operator & system activity.

Alarms & Warnings - Generates an audit of door alarms and system warnings.

Guard Patrol Events - Generates an audit of all guard tour location clockings.

Time Clock Report - Generates an audit of On-site and Off-site clockings with time calculation.

Clockings Manager - Manually remove or create On or Off-site clockings.

Once the desired audit report type has been selected then the administrator may enter further report criteria to narrow the search results. The report will be viewed on screen and can be printed after completion. All reports can be exported for further processing in Excel or Open Office format.

Site Status - the Site Status view permits a valid administrator to monitor the current door parameters and states. Additionally, if you right click on the doors list you will be offered a range of override control functions for each door or entrance as follows:

Unlock - Manually unlock the door or entrance until restored.

Restore - Restores normal security levels for a door or entrance.

Reset Alarms - Resets the alarm state of a door after an alarm based event.

If you wish to continually monitor all your door and entrance states you can have the view automatically update by selecting the ‘Refresh’ option once or periodically by selecting the ‘Monitor Door States’ option check box.

System Functions

The system functions are grouped for those that are changed infrequently. The system functions are protected by a System Manager Level Username & Password that should have been provided by your installer.

Doors - selecting the Doors menu items displays a list of all defined doors or entrances for your Access Control installation. Also displayed is a summary for each door or entrance of the associated settings. It is possible as a System Operator to add, edit, override or remove system door or entrance definitions. If this is a new installation then there will be no doors or entrances defined and thus no information in the list. To create a new door or entrance definition select ‘New’ where you will see the New Door form displayed.

Door Groups - under normal conditions a persons access control permissions are set by their current Access Level setting and the current door or entrance Access Level setting, which may be fixed or changed dynamically through the use of Door Schedules. While this method is a fast and efficient way of issuing access control permissions for the site, it may on occasion be desirable to inhibit a persons access permissions for a given door or collection of doors. For this reason we have the mechanism Door Groups.

With Door Groups you can define a collection of doors that can later be applied to a person’s record that will supersede their normal access level permission and will only permit access at this group of doors. Door Groups are an ideal method for tenanting your system for area access permissions e.g. blocks of flats or apartments.

You must enter a descriptive name for the group and you may assign as many system doors per group as you wish. You can create 128 exclusion groups but only one can be applied to a person’s record at any one time. In order to do this you must create a new record or edit the person’s record from the People function. The system will automatically update any changes made to your doors and entrances if you are currently connected and online.

Door Schedules - are automated tasks that are performed on or off line by the system doors and entrances at predefined times on a specific day of the week. For example, we may want to define a schedule to unlock the Front Entrance Door at 08:00 on a Monday to give free-access to all people and then secure it again to at 10:00. Another use for schedules is when we wish to automatically raise or lower the security access level of a door or entrance throughout the day and week.

You can define up to 40 schedules per door or entrance but it is recommended to keep to as few as possible to avoid over complicating the security structure. When we select the Door Schedules option a list of all current schedules is displayed with their use and properties attached. To define a new one, select the ‘New’ option. Enter a descriptive name for the schedule of your own choice and then complete the remaining fields as explained below:

Description - select a descriptive name for this schedule.

Door or Entrance - select the door or entrance where the schedule will apply.

Entry Security - select the type of entry security for the schedule.

Start Time - the active schedule start time (00:00 - 23:59).

End Time - the active schedule ending time (00:00 - 23:59).

Day of Week - the day of the week the schedule will apply.

Access Level - the desired access security level for the schedule period.

Access Schedule - the optional access schedule number defines an additional active time window that only cardholders with the corresponding access schedule number gain access. 

The System Operator can define new and delete existing Door Schedules. If you also right click on the schedules list a small menu appears that allows you to delete or refresh any individual schedule. Please note, when a new schedule has been defined it is normally automatically issued to the appropriate door or entrance directly and is stored there for full online or offline operation. Please define your schedules carefully and always try to avoid overlapping schedule times and creating contradictions in access level state.

Private Cloud - to manually start the Private Cloud Service to allow local and remote Web Browser connections for administrative and monitoring purposes.

Door Wizard - the Door Wizard is a tool that allows a system level operator to correct any host and system disparities caused by extensive off-line operation and administration. The Wizard can be used to synchronise one or a number of doors automatically. The Wizard may take a few minutes to complete so you may need to wait for these updates to fully take effect at the doors or entrances.

Show Updates - this function allows you to clearly see any pending data waiting to go to offline doors or in the process of transmission to online ones. The view can modified to show pending data to all, or an individual door and is useful when doors are placed online after long offline periods.  The view and progress will update as pending data is sent to your doors.

Options - the Options screen allows you to adjust certain settings that may be relevant to your installation. In most cases the default options set at software installation are adequate but below are an explanation for all the settings that you may change:


Site Name - include a name that best describes your site installation.

Synchronise System Time Period - during online sessions your host computer time & date can be automatically synchronised to your doors & entrances.

Real Time Events Sort - select your preferred list sorting criteria for the main events window.

Events View Mode - an option to display the Events & Roll Call Views in a single window by default.

Sounds - control what type and when you here sounds at the Desktop Administration Console.

Banner Colour - an optional selection that allows you to change the default top banner colour.

Web Link - as standard the www link on the top banner acts as a hyperlink to a predetermined URL location but this can be changed here. The link can be of the http:// or mailto: type.

Auto Expire - if you have set date expiry in peoples cardholder records then setting this global value will perform the function when online as dates become invalid.

Display Passback Notifications - if a door is classed as a Clocking Point you can create an event when back-to-back in or out activations occur.


Network Polling Rate - this option defines the period the system software and its databases are updated with new information generated at the doors and entrances.

Auto Start Private Cloud Service - if you wish to start the Private Cloud Service automatically when the Desktop Console is launched then select this option.

Send Email Notifications - certain alarm and notification events that are generated can be emailed to an interested party such as a Security Guard, you enable that here.

Control Panel - displays the Windows Control Panel.

LAN Device Installer - launches the application for discovery and configuration of the LAN-IP Door Networking Adapters. This utility is also available from a desktop shortcut from version 5.04.

SMTP Email Settings - a link to establish your email notification settings if enabled earlier.

Update Time - use this function if you need to synchronise the host system time & date (computer) with your access control doors. This function is performed automatically (option dependant) during online activity.

Support - the support view details information on the size and capacities of the underlying database tables. From here we can also backup and manage (purge) the two important database tables which are unique for your site.

[Database Management]

The system creates two independent SQL database files in the SOLO directory that can be found in the root of your hard disk drive. The two files are mySoloSite.db and mySoloHistory.db. The first of these files contains all the unique setup information for your site installation including all people information, door parameters, access permissions, Usernames and Passwords.

The second database file contains all of the historical events generated by access control activity and host programming activity. It is important to make regular backup copies of these database files and store them on another computer as this information if lost, can not be recovered. When you attempt to copy these files it is recommended that you close the program and reboot your PC prior to the file copy.

[Database Backup]

An alternative or in addition to a manual database copy described in the previous section, is to use the system backup and replication solution from the support menu. Also you can purge your events database mySoloHistory.db of records from a selectable entry back in time to shrink its size and make it more manageable and for audits to complete more quickly.

To create a copy of either the Site or History databases please select this option from the support menu. A file dialog box will be visible asking you for a location and name for the file. You can accept the default name and location or change them as you wish. This function creates an exact copy of the database file. In the case of the mySoloHistory.db database table, this can grow quite large over time as it contains all events that have occurred. The exact size and growth rate depends on your system size and the number of door and entrance activations. When this database becomes very large then it may be prudent to create a backup of this database file prior to performing the purge function. Once the backup has been created select the Purge History Database function.

Please note, if the history database is particularly large then this view could take some time to build so please be patient. The view will display all events in the current history database sorted with the most recent at the top travelling back in time as you scroll down the list. In the first column is a unique reference number for each historical event record. 

[Historical Events Purge]
To perform the events purge scroll down the list until you come to the date and time where you wish to purge from. Enter the event number in the top data entry field or double mouse click on the event row and then select the Purge button. The system will prompt you for confirmation so please confirm if you wish to indeed perform the purge. Once the purge is complete then the view will be updated. If you have done a backup prior to the purge then the process is completely reversible.

Email Notifications & Alarms

You can choose the types of events that will be sent by email when you configure the settings for Email in the Options menu. To enable Email sending you must select this option in the Option / Communications menu. To configure your SMTP Settings for Email you must select the SMTP Email Settings link in the Options menu:

SMTP Server - select the SMTP server name of your email service.

Username - select the Username for logging on to your email service.

Password - select the Password for logging on to your email service.

Port - the SMTP port number e.g. 25 etc.

SSL - enable or disable Secure Socket Layer email.

Email From - the sender email address e.g.

Notification Types - select the categories of events you wish to email.

Email Recipient - the email address to receive the email notifications.

You can use the Test Email button to check that you have entered your SMTP Email credentials correctly before enabling the Email Notification feature. A test email will be sent to your target Inbox if your settings are correct.

Web Browser Working & Remote Management

Your single installation of Access Control Desktop Console includes built-in capability for operating and managing your site installation remotely. You can manage your site from any PC in your building through its Web Browser or on portable devices such as Tablets and Smart Phones.

Activating the Private Cloud Service

In order to enable remote web browser access and the built-in Private Cloud Service, you must turn this on from the Desktop Console Software. From the System menu select the option Private Cloud. After a moment your default web browser window will appear that allows you to administrate and monitor your system through this interface.

After activating the Private Cloud Service the address bar in your favoured browser displays the local intranet address that can be used on any workstation or connecteddevicetoyourLAN or local network. You must enter the full address including port number as http://theipaddress:4001. This view can be used for all large screened devices such as Desktop PC, MAC, Android and Tablets. All facilities are available through your operator credentials apart from functions that relate to the hardware installation.



Working Over The Internet

The above method is relevant when remote working inside a building or as part of a local network. It is also possible with the correct infrastructure, to open up the ability to access the Private Cloud service from any external Internet enabled device, anywhere in the world. In order to achieve this, the host computer that is actively running the Access Control Desktop Console Application must be connected to the Internet and be able to accept incoming remote connections through the open port '4001'.

In reality, this is done by your router switch device that is connected to your ISP and setting up a port-forward for port 4001 to the access control machine IP address. Remote users would then navigate remotely using your ISP generated IP address (external IP address) and the port number 4001. This can be a complicated topic and it is recommended that you contact technical support if you require further guidance.

Starting the Private Cloud Service at Boot Time

In order to implement a reliable and permanently reachable Private Cloud Service you may want to observe and implement the following modifications to the main PC running the Desktop Administration Console: 

Enable Auto Start - make sure that in the System / Options / Communications screen you enable the Auto Start Private Cloud Service. 

Windows Startup Group - navigate to the Solo folder in the root of your HDD and find the application SoloServer.exe.  Create a shortcut for this and add to your Windows Start-up Group.

Internal IP Address - make sure that the main PC running the Desktop Administration Console has a fixed internal IP address so it does not change when rebooted.

External IP Address - if you wish to connect to the Web Service from an external source, ensure that you have a fixed external IP address from your ISP.

Create a Port Forward - you will also need to create a Port Forward for Port Number 4001 to the fixed IP address of the main PC running the Desktop Administration Console.


In these sections we aim to provide a growing wealth of information and examples, which will assist in the successful configuration and operation of your access control system.

Door Control Unit Firmware

You can view your door control unit firmware editions directly from the software. Select the administration function and observe the column 'Firmware' in the resulting list. Below is a table that explains the technical differences to specification for differing firmware revisions at a single door.

Firmware Version  Users  Offline Event Buffer Access Groups  Door Schedules  Concurrent Access Schedules   Release Date
9.3 4020 1140 Unlimited 40 15 December 2017
9.2 4000 1000 Unlimited 40 1 December 2016

Private Security Key Coded Access Credentials

In door access control its is important to maintain the security and integrity of validated cards and key-tags in issue. For this end, we have our range of low frequency PSK coded credentials. These specially coded credentials are recommended as they help combat uncontrolled credentials from being introduced to your system. Additionally, they feature no visible serial numbering markings to avoid remote duplication.

Standard PSK Coding

As standard the default PSK code is supplied from the factory. This code is appended to the unique serial numbering of the card or key-tag and must be present in order to validate and use them with your access control system. Using PSK coded credentials increases the security and integrity of your access control system.

Customer Specific PSK Coding

It is also possible to have your own reserved PSK code for use on your access control site or sites. Please contact sales or support for more information on this.

Using MTECC Smart Access Control Credentials

Our range of high frequency smart credentials and smart readers are recommended as they improve the security of your system greatly. Smart credentials have no visible serial numbering on them and are nearly impossible to clone or duplicate. In order to validate these smart credentials, you will need our dedicated 13-56MHZ USB Desktop Reader Enrolment Reader.

You can also use our unique dual technology smart credentials for common use across many popular intruder alarm systems as well as your access control doors. Complete with a 13.56Mhz 1K memory read & write ISO14443A smart chip and a low frequency chip for compatibility with a wide selection of popular intruder alarm panels.