Welcome to the WS4 Integrated Help

Before you start the configuration of your WS4, we suggest you to browse the items below to find out the characteristics and functioning of the system.

Introduction

The WS4 is a simple and powerful access control system with its own web server. There is no software to install, configuration is done simply via an internet browser. All pages are responsive, which means that you can use your tablet or Smartphone, the pages automatically adapt and use is very user friendly.

System Limits

The buttons on the title bar

To return to the previous page. If you have made changes to the page, you will be asked if you want to save them.

To save your changes and refresh the page.

To create a new item (a user, a category, a schedule, etc.).

To permanently delete the displayed or selected item.

To duplicate an element, ie create a new element with exactly the same characteristics.

To access the options.

The buttons below will appear only on tablets and smartphones:

Displays the menu to access the various pages of the WS4.

Quickly returns to the home page.

Rights of operators

You can configure up to 10 operators in your WS4. For each operator, you must choose his role: Full Control, Hardware Installation, Access Control Management, or System Monitoring.

When an operator logs on, the WS4 analyzes his rights and will only display pages that can be viewed and the functions it can perform. For example, the installer will be able to configure the system's doors but will not be able to see the users.

Refer to the operators chapter for more information.

Integrated Help:

To directly access the help that corresponds to the menu in which you are, simply click on the icon . The rest of this document explains in detail each screen of your WS4...

Master / Slave principle

Since version 2.00, the WS4 system can manage up to 10 WS4 boards in the same installation (with up to 20 doors, whether single or double). One card must be master, the others must be slaves. The master / slave selection is made with Dip-switch 2 of the board: Off for a master (factory setting), On for a Slave.

The master and slaves must be connected to the same local network (intranet). The master can either be in the Autonomous mode or Lan mode, but the slaves must be in Lan mode (DIP switch 1 to OFF - except during the configuration phase, see below).

Example of configuration:
All the configuration is done on the master of the installation, so it is always on this one that you must connect with your browser.

When there are slaves, the entire configuration is transferred as a background task to each of them, because each slave works in a completely autonomous way for access management. Only events and alarms are sent in real time to the master. With this principle, a slave can become master in case of necessity, simply by changing his Dip-switch 2.

Important restrictions:

Add a slave in the installation

Note: It is advisable to perfrom a complete re-initialization of the card before following one of the procedures below (see explanation of the Dip-switches).

a. Add a slave in DHCP mode
  1. The slave must be switched on, its Dip-switch 1 must be set to OFF (Lan) and Dip-switch 2 to ON (Slave). It must be connected to the same local network as the master.
  2. Log on to the master. Change the default password if it is not already done (required to add a slave).
  3. Go to the Doors menu, click Add a slave and follow the instructions on the screen.
b. Adding a slave requiring a fixed IP address
  1. Set dip-switch 1 of the slave to ON (Autonomous) and dip-switch 2 to ON (Slave).
  2. Connect a network cable directly on a laptop.
  3. Enter the address http://192.168.50.100 in a browser and log on to the slave.
  4. In the Network menu, configure the fixed IP address and other TCP/IP settings, and then save.
  5. Switch Dip-switch 1 to OFF (Lan), disconnect the network cable from the laptop and put it on the local network.
  6. Follow the instructions from point 2 of DHCP mode above.

Be careful, if one of the slaves is not in the same subnet as the master, the master must have a fixed IP address, since the slave will not be able to search for it in its subnet.


Home page

The home page lets you know the status of the system and run some important actions, such as unlock access, stop the current alarm or put the installation into maintenance.

Notifications:

The WS4 displays this notification icon when it wants to draw your attention to an important point. The icon appears on the left side of the top banner, and an orange box indicates the number of notifications. By clicking on it, the WS4 displays the various messages in detail.

Alarm icon:

This icon allows you to see if there is an alarm cycle in progress, or if alarms have occurred since the last reset. When an alarm is in progress, you can click the icon to stop it. It is also by clicking on this icon that you can reset the alarm memory, put the system into maintenance or view the history.

Indications under the icon:

Menu that appears by clicking on the icon:

Supply icon:

This area shows you the power status of the system. If your installation has more than one WS4, the most unfavorable state is displayed. By clicking on it, you will be directly redirected to the Technical Supervision window, which makes it possible to see the module(s) actually failing.

Indications under the icon:

Date and time icon:

This icon displays the time of your WS4. If the difference in time from your Internet browser exceeds 10 seconds, this difference will be displayed with a orange frame. If the deviation is more than 1 minute, the frame will be red. If you have sufficient rights, clicking on the icon will take you to the Date and time screen where you can synchronize your WS4. But make sure your browser is on time before doing so. The slaves are automatically synchronized with the master.

Events icon:

This icon allows you to see all the events of the installation. If you want to see only the events of a particular item, click the icon which corresponds to the desired element in the different pages of the WS4.
To view the latest events in real time in a separate window, press the Shift key and click this icon.

Door icons:

Each door of your installation is represented by an icon on the home page. The icon represents the real-time status of the access, and the text below provides additional information (refreshing about every 2 seconds). If a door is in alarm, a red frame includes the text and icon, and the LED on the door reader(s) is flashing red.

In the properties of the door, you can choose the type of obstacle physically installed, so that the icon best represents the actual configuration. The different types of obstacle are: door , barrier , garage , bollard , tripod and turnstile .

Here are, by way of example, the different possible icons for a door:
The door is closed and the lock is locked.
The lock is unlocked (following an authorized access or a free access period for example), but the door is not yet opened.
The door is open. In order for the WS4 to detect the opening of the door, the door contact must of course be connected and configured.
Forbidden period. All accesses will be denied except for those users belonging to a category whose option Allowed during forbidden periods is checked.
Note: For the accesses configured to manage an elevator, the door icon is replaced with this icon.

List of possible states (indications under the icon):

Menu that appears by clicking on the icon (depends on the rights):

Number of users present and option Everybody NEUTRAL:

If your system has Input / Output doors (see door properties), this zone allow you to see the number of users currently present. In order for this counter to reflect the reality, it is of course necessary for each user to identify himself at the input AND at the output. If it does not correspond to the reality, you can put Everybody NEUTRAL. This function can be configured so that it takes place automatically every day at a fixed time.
Note: Via the list of users, you can change the status of one person.

Log out:

For security reasons, when you have finished your work, consider logging out. If you do not, your session will remain active for 30 minutes after your last action. During this time another person who accesses your system without your permission, will be able to use it fraudulently.

Choice of language:

The WS4 recognizes the language of your browser to display the pages. However, you can change the language by clicking on the flag in the upper right corner.

Slave home page

In the WS4 system, all configuration is done on the master. It is therefore not necessary to connect to the slave. However, it may be interesting to connect to the slave when installing the installation, or in case of a problem.

Caution: If the slave is not yet associated with an installation, you must use the default login and password (see Quick Start Guide) to access this page. But when it is associated with an installation, the master sends it a full copy of the database, and the slave then accepts only the logins configured on the master.

Description of the elements of the page

In the orange banner, the serial number of the slave is indicated on the first line, and the number of the master with which it is associated is indicated on the second.

The 4 icons below show the real-time status of the board. The first one indicates whether the master is on-line or off-line, the 3 others are identical to those of the home page of the master. Attention, by clicking on Events, you will see only the events of this slave, not those of the master or other slaves of the installation!

Installers and administrators have access to 3 other icons: Network, to choose between DHCP or fixed IP address mode, Upgrade (only for special upgrades, the upgrade of the firmware is done automatically by the master) and System log.

Via the menu on the left, the Technical Supervision option allows to control all the inputs and outputs of the card.


List of users

This list represents all the users recognized by the system in the form of a table. You can sort the table by clicking on the header of the column of your choice (▼ indicates the sorted column).

By default, the table has only 3 columns (but you can choose which columns to display by clicking ):

The edit box allows you to filter the list to quickly find a person. Type the first characters of the item you want to search for and the system instantly filters the list. Please note that the search is only carried out on the columns that are displayed, and only on the fields Name, Card 1, Card 2 and the 5 free fields.

Via the buttons in the title bar, you can:

Access the user options (depends on the rights of the operator).
Create a new user.
Switch to Multiple selection mode. It may be interesting to program several users at a time, for example to configure the access category. To select multiple users, click on this icon and then click on each user you want to select (you can also hold the Shift key to select all users between 2 clicks). Then you can either Edit the selected users or delete them by clicking on the trash.

Refresh:

This link allows you to refresh the list to see the presence of users, or see changes made by other operators on other workstations.

Enroll a batch of cards:

Click this link to Enroll a batch of cards on the fly.

Create secure cards:

Click this link to create secure DESFire cards(2) using one of the readers of the installation. This link is only displayed if the security options have been set in the configuration of the readers.

Export users

You can export the list of users to a CSV file.

Simply click the icon to download the file to your computer or tablet. The location where the file is saved depends on the Internet browser you are using.

Note: You can choose the field delimiter in the system options.

Enroll a batch of cards

You can enroll the new cards on any reader of the installation

There are 2 methods for encoding. In both cases, you can choose to encode the user's card 1 or the card 2. During encoding, the system indicates the ID, the name and the card number that have just been encoded. When all cards are encoded, click OK, return to the list.

Import users

Import users - step 1

To facilitate encoding, you have the option of importing users from a text file, type CSV.

Start with select the file containing the list of users you want to import. To be supported by the WS4, this file must either use the Unicode (UTF8) character set or the Western Europe (Latin1, ISO8859-1). Normally, you can leave the file encoding option on Automatic detection.

You must then choose from the drop-down list the Column delimiter that is used in the file. You can choose between tab, comma or semicolon.

To complete this first step, you must specify whether the first line of the file contains the column names. If the Column header option is checked, the WS4 will not import the first line.

By clicking on the Next button, the file is sent to the WS4 to analyze it. If the content of the file is correct and matches what you selected, you will then proceed to step 2 below. Otherwise, an error message will be displayed.

Import users - step 2

The WS4 has scanned the file and tells you how many records it contains. Attention, all records will be imported, it is not possible to make a selection at this stage (if necessary, you must make the selection in the original file).

You must now choose which columns you want to import. For each column of the file (left), select the corresponding field of the user profile of the WS4 (right drop-down menu). If the first line of the file contains the name of the columns, this name is displayed and the selection of the fields to be imported is easy to do, but if it is not, the column number is displayed. Be careful to assign the right one!
You do not need to import all the columns in the file, the only field that is required is the user name.

The last option, Import method, changes assistant's behavior: When all of your choices are made, click the Import button to start the import. If successful, a summary window shows you the number of users imported.

User form

This form includes all the information about a user: personal data, categories of access and identifiers (card / PIN code).

General section

Full name / Name & First name:

You can choose in the user options if you want a single field to enter the full name of the user, or if you prefer 2 separate fields (last name and first name). The full name and name fields are on max. 50 characters (1). The first name field is on max. 40 characters (1).
The name will be used in the list of users and in the events.

Free fields:

If free fields have been configured in the user options, they will be displayed in this section.
You can have up to 5 free fields, max. 40 characters each (1). These free fields can be displayed in the list of users, which then allows to sort the list on this basis.
Note: If you have configured the user name and first name to be in separate fields, you will only have 4 free fields.

Disabled option:

This option allows you to disabled the user without deleting it from the system. The name of the user appears in red strikethrough in the list of users, because it no longer has access to the system doors. If it uses one of his identifiers, the event User disabled is generated.

This user can acknowledge alarms option:

When this option is checked, the user can acknowledge the current alarm simply by identifying (with his card or his PIN) on any reader of the installation, even on those where he normally does not have access.

Validity:

You have 2 possibilities to define the validity of the user:
  1. By checking the Always valid option, the validity of the user will not be limited in time.
  2. By choosing the dates and times of beginning and end, the validity of the user will be limited to specified values.

Categories section

A category is used to define at what times and which doors a group of people are allowed.

Categories 1, 2 and 3:

You can assign up to 3 categories for each user. Attention, for a user to be active, he needs at least 1 category. For more information about categories, see Categories section.

Identifiers section

An identifier must make it possible to identify the user in a unique way. In the case of the WS4, it is either a card, a fingerprint or a PIN code.

Card 1 & 2:

You can encode up to 2 cards per user. The card must be unique and can include 1 to 20 characters.
To encode a card, click on the icon and present the card on one of the readers of the installation: the card will be automatically displayed in the field.

PIN code:

If your installation includes keypads, you can encode the user's pin code in this field. This pin code must be unique, and be between 1000 and 99999999 (from 4 to 8 digits).

Fingerprints

The number of fingers currently enrolled is displayed. It is possible to enroll 4 fingers per user, with a maximum of 100 fingerprints in total in the installation.
To enroll a finger, click on Details and follow the instructions on screen. Please note, it is not possible to use a reader connected to a slave to enroll.
The fingers are numbered from left to right: little finger left hand = 1, little finger right hand = 10. This number is displayed in the events when a biometric reader is used.

Removal of his own fingerprints

A user can easily delete all his fingerprints from the system using any biometric reader of the installation, which makes it possible to comply with the directives of the General Data Protection Regulation (GDPR). To do this, he just has to pass the same finger 3 times over one of the readers. Please note, there can only be 4 seconds between each pass. The reader LED then flashes red and the buzzer sounds. To confirm his wish for deletion, he must then pass the same finger one last time over the reader, which will then turn solid red to indicate that the procedure has been successful.

Multiple User Programming

This screen allows you to modify several users in a single operation. For example, if you need to change the category of multiple users, simply select all the users concerned (see the explanation of multiple selection in the List of users), to check in this screen the category to modify and to choose the new category. Several fields can be modified at the same time.

The data of each selected user is scanned before displaying this screen. If one field is identical for all users, its value is displayed. If the fields are different, ??? is displayed.

Instuctions:

Categories list

The categories define the rights of users. You can create up to 250 categories in your installation.

The list has 5 columns:

To create a new category, click the button in the title bar.

Category form

General section

Name of the category:

Enter the name of the category, up to 50 characters (1). For your convenience, try to be as clear as possible when naming a category.

NOT subject to Anti-passback option:

When this option is checked, members of this category will not be blocked by the anti-passback (neither the access APB nor the timed APB of the readers).

Schedule section

Weekly schedule:

Choose the weekly schedule during which members of this category will have access to the doors that are checked in the section below.

Option Allowed during prohibited periods:

If this option is checked, members of this category will still have access during forbidden periods .

Doors section

List of authorized doors:

Select the doors that members of this category can use. If you select All doors, they will have access to all the doors of the installation, even those that will eventually be created later.

Elevators section

For each elevator of the installation, check the floors that the members of the category can access. During authorized access, only the relays corresponding to the checked floors will be activated. See elevator properties for details of operation.

List of weekly schedules

You can create up to 50 different schedules in the installation. Schedules are used in the configuration of the doors and categories of users.
Each schedule represents the 7 days of the week, plus a special case for holidays.

The list has only one column:

To create a new schedule, click the button in the title bar.
You can also duplicate a schedule using the button in its form.

Schedule form

Name of the schedule:

Name of this schedule, maximum 50 characters (1).

The 2 options below are only available if the working week is set to From Monday to Friday.

Mon. to Fri. identical option:

Check this option if the 5 days of the working week are the same.

Sat. to Hol. identical option:

Check this option if the schedules for Saturday, Sunday and holidays are the same.

Schedules:

Set here the active periods of the schedule for all days of the week. By default, a single period is displayed in order not to overload the screen, but you can view the 3 periods by clicking on . If several periods are configured and you click to view only one, the WS4 tells you that certain periods are no longer visible by displaying the button in red.

You can duplicate this schedule using the button in the title bar.


The holidays

You can configure your WS4 to behave differently on holidays. For example, do not allow access for some users, or do not unlock the front door if the company is closed.

It is on this screen that you must configure the holidays of your system. By holidays, we consider the closure of the company and not the individual holiday of the users.

During a day off, weekly schedules are changed: the WS4 uses the configured days for holidays instead of current day periods.

To set the days on the calendar, first select the type of holiday to change: Normal holidays or Fixed holidays (repetitive each year at the same date). Then click on the desired dates (one by one) to select them (or unselect them). The normal holidays will appear in green and the fixed holidays in red.

The system allows to program 105 holidays to come and 20 fixed holidays. The holidays whose date is exceeded are still displayed in the calendar (for maximum 1 year), but they can no longer be modified.

The number of future holidays is indicated below the calendar, which allows a quick control of the configuration.


List of doors

Each table displayed on this page represents one card (WS4-4D or WS4-2D). The first one is usually the master of the installation, ie the one to which you connect with your browser. In the header of each table there is a number (#0 to #9), the indication Master or Slave and the serial number of the card (which is on the label).

For the slaves, the icons below are displayed to the right of the serial number: The icon located just to the right of the table allows to view the system events that occurred on the concerned WS4, ie events that do not concern a door, a user or an operator.

In each table, there are 4 lines (for a WS4-4D) or 2 lines (for a WS4-2D) representing the doors with some of their characteristics. Doors with a single reader occupy only one row of the table, those with one reader on each side occupy 2 rows.

Description of columns:

Add (or replace) a slave

Click on this link to add a new slave in the installation. Enter the serial number of the WS4 to be added (it is on the card label) and click Search. If it finds it, the system directly adds this slave into the installation and you can configure its doors. In case of error, a message is displayed in red.

Note: If the slave is not in the same subnet, the WS4 will not be able to find the slave based on its serial number. In this case you must enter the current IP address of the slave, but it is also necessary that the master has a fixed IP address so that the slave can continue to dialogue with it later.

At the end of the Master / Slave Principle chapter, you will find the procedure for configuring a new slave and adding it to the installation.

Door properties

General section

Name of the access:

Access name, up to 40 characters (1). It is better to be as precise as possible for this name, because it is the one that will be used in the events.

Group

Allows you to display the doors in a particular order on the home page. The doors of group 0 will be displayed before those of group 1 and so on. If several doors are in the same group, they are displayed in alphabetical order.

Type of access:

Choose the type of obstacle corresponding to this access: door , barrier , garage , bollard , tripod ou turnstile . This information is only used for display on the home page.
Also choose if this door uses 1 or 2 readers. The choice 2 readers is only available for doors 1.0 and 2.0, provided that a single door is not already configured in 1.1 or 2.1 respectively.

Location:

The WS4 can manage the presence of users. To do this, you must define the readers that allow you to enter, those that allow you to exit, and those that do not change the area of the users. If you want to know which users are present, you must define whether this door is at the entrance (or exit) of the building, or whether it is inside (neutral). The exact location (output or input) will be defined in the reader section below.
Incompatible with Toggle mode.

Lock time:

This is the time of activation of the lock relay, between 1 and 60 seconds, in case of authorized access. You can choose, in the Door contact section below, at which moment the system must stop the lock relay when the door opens. This option is grayed in Toggle mode.

Toggle mode:

In this mode, the state of the lock relay is reversed at each authorized access and the green LED of the reader represents the state of the relay.
Incompatible with Anti-passback, Interlock and Input/Output location.

Anti-passback (APB):

If this option is checked, the system will only allow access if the user is in the correct zone. For example, for a user to enter the building, his last access should be an exit, and vice versa. A user may also be in Neutral, meaning that the system does not know (yet) where he is and it will be updated during the next access to an entrance/exit doors.
Incompatible with the toggle mode and Neutral location.
Attention, the Anti-passback mode is not available on slaves, because only the master knows the situation of the users!

Interlock:

Each WS4 (master or slave) of your installation can manage only one Interlock, which may therefore contain 2 to 4 doors. In the Interlock, if one door is unlocked or open, all others are locked and access requests will be denied. Check this option if you want this door to be part of the Interlock.
To use the Interlock mode, you must use a door contact and the Mode toggle can not be activated.

Manages an elevator:

Check this option if this access has to handle an elevator. When this option is enabled, the icon appears to the right of the access in the list of doors. By clicking on it, you open the elevator properties.
Note: You can not uncheck this option. To remove elevator management, you must open the elevator properties and delete it.

Unlock if emergency:

Check this option if you want to unlock the access when the Emergency input is activated (see system options), in order to evacuate places for example.

Free output push button section

A free output push button can be installed on each door.

Active period:

Choose the schedule during which the use of the free output push button is allowed. Out of the periods of this schedule, the action on the push button will have no effect.

Record free output events:

When this option is active, each free output is archived (recorded) in the event history.

Door contact section

The door contact allows the system to know if the door is open or closed, and therefore to know if a user has actually entered after badging, or if the door has been stay open too long. It is therefore essential for access which require a minimum of security.

Type:

Select from the list the type of door contact that is connected.

The options below are only available if a door contact is selected.

Switch off the relay:

You can choose when the system should switch off the lock relay when the door opens: After 1.5 sec. (default) / Immediately / No. If you choose No, the relay will switch off at the end of the lock time defined.
Note: the lock relay is always switched off when the door closes.

Contact 4 states:

If you want to be able to detect short circuits or line breaks of the door contact, you must mount 2 resistors of 10K ohm in series, one of the resistors of which is in parallel with the door contact. Attention, the 2 resistors must be placed inside of the door contact !

Alarm on break-in:

If this option is activated, an alarm and an event will be generated if the door is being opened without authorization. If it is not checked, the door can be opened at any time, even without permission, without causing an alarm.

Alarm if door too long opened:

If this option is checked and the door remains open for longer than the maximum opening time configured below, an alarm and an event will be generated.

Max. opening time:

Set the maximum time the door can remain open. This time can be between 15 and 999 seconds. After this time, the buzzer of the readers will activate during the pre-alarm time (if configured), then an alarm will be generated.

Pre-alarm time:

This option allows to avoid triggering an alarm for each opening too long. When this option is checked, the buzzer on the reader will activate after the maximum opening time to warn that the door has been left open for too long. If it is closed before the end of the pre-alarm time, everything goes back OK.

Free & forbidden periods section

Free period:

You can configure the periods during which users do not have to identify themselves: These are the free access periods, abbreviated free periods. During these periods, the lock remains active - access is permanently unlocked - and reader's LED blinks green. In Toggle mode, the lock is cut off at the end of a free period. If the access manages an elevator, ALL relays are activated, so ALL floors are accessible.

Forbidden period:

Unlike free access periods, you can define periods during which even users who normally have authorized access will be denied. Only users belonging to a category with the option Allowed during forbidden periods will still have access. In Toggle mode, the lock is cut off at the beginning of a prohibited period.
Note: If a prohibited period overlaps a free period, the prohibited period has priority.
Note: To create or modify a weekly schedule, you need to go to the List of weekly schedules.

Reader A / Reader B section

Cabling:

The WS4 tells you on which terminal the reader must be connected (LB1 or LB2) and to which address it must be configured (0 or 1). On some readers, this address is configured via a jumper: open=address 0, closed=address 1.

Location:

If the door is configured as Input/Output, it is important to select whether this door is to enter or leave the building, so that the user's status is changed as a result of authorized access.
If the door is configured as Neutral, this field will only be visible if it is a door with 2 readers. In this case, the location will only be used in the events.

Card:

Select the type of card reader connected:

Keypad:

Check this option if a keypad is connected. A keypad allows users to enter their Personal Identification Number (PIN) code.

Fingerprint:

Check this option if a fingerprint reader is connected (B100-RS-EH or B100-RS-MF).

Card + PIN mandatory periods:

If you have configured a card reader and a keypad, you may decide to require users to use the two identification methods, in order to increase the security at that door. Choose from the list the schedule forcing this dual identification. Apart from the active periods of this schedule, the system will accept both the card or the PIN code, so users can choose what they prefer.

Detection required:

It is sometimes required to have a presence detection for authorization to access, for example in the case of a barrier with vehicle detection. If the system does not detect a vehicle, access will not be allowed. To use this mode, you must select from the list on which input the presence sensor is connected.

Access allowed even if out of hours:

For the output readers, it is often useful to check this option, in order to allow the users to leave the building even if they stayed later than what is configured in their schedule. This option is not available for input readers of Input/Output mode.

Timed Anti-passback:

If this option is checked, when a user is allowed, this user will then be refused on this same reader for a period configurable between 1 to 99 minutes. If the access is in Input / Output mode, this user will also be refused on all other readers of the same type (input or output) connected to the same management board (WS4-2D/WS4-4D), either until the end of the configured time, either until the use of a reader of the opposite type.
Example: a 10-minute timed Anti-passback can be useful in a car park, to avoid that a user who just entered could give his card to a colleague (since his card will be refused). But, if he leaves the parking lot, he can re-enter directly without having to wait for the end of the 10 minutes.
Incompatible with Toggle mode.

Properties of an elevator

The WS4 can handle up to 2 elevators in the installation, and each elevator can have from 2 to 24 floors. The elevator is managed by means of 12 relays modules (1 or 2 modules depending on the number of floors). These modules are connected to the same bus as the access reader (LB1 or LB2). The choice of the authorized floors is configured in the categories: for each elevator of the installation, it is necessary to check the floors authorized by the members of the category. Then, during authorized access to the reader that manages the elevator, the relays corresponding to the authorized floors are activated, during the activation time below, which allows the person to choose the floor where he wants to go.

General

Number of floors:

Choose the number of floors of this elevator, between 2 and 24.

Activation time:

During authorized access, the relays of the floors that the person can reach will be activated during this time (between 2 and 60s).

Relays modules

Wiring:

The WS4 shows you on which connector you should connect the modules 12 relays.

SN of module 1:

Enter the serial number of the first 12 relays module.

SN of module 2:

If the elevator has more than 12 stages, enter the serial number of the second 12 relays module.

Name of the floors

Rel 01 to Rel 24:

Enter a name for each floor (on max. 18 characters (1)) to simplify the configuration of the categories.

Operators list

An operator is a person authorized to connect to the WS4 (via a web browser), and can perform certain actions that depend on his rights. A maximum of 10 operators can be created in the WS4.
Note: The first operator is always an Administrator, his rights can not be modified.

The list has 2 columns:

Change password:

To ensure the security of your system and data from your users and operators, it is advisable to change the default password. Also change the password if you suspect it has been seen by a third party.
As an administrator, if you want to change the password of another operator, you must make this change in the operator form.

Operator form

Operator section

Name:

The full name of the operator, as it will appear in the events (maximum 40 characters (1)).

Login:

This is the login that the operator must use to log into the system (minimum 2 and maximum 15 characters (1)).

Password / Confirm password:

The initial password of the operator, on minimum 6 and maximum 15 characters (1). Once logged in, the operator can change his password from the Operators list.

Change password button:

This button allows you to change the password of an existing operator. To change your own password, you must do so from the Operators list.

Note: The password policy is shown at the bottom of the page.

Rights section

The system must know what this operator has the right to do. You can choose one of the following rights:

Detailed table of authorized actions for each type of operator:

Action
Stop the current alarm VVVV
Reset alarm memory / put in maintenance VVV-
Open / Unlock doors V V (*) V V (*)
Put everybody in neutral V-V-
View events and export them VVVV
See users list + choices of columns to display V-VV
Change the Status IN / OUT / Neutral V-V-
View the user properties V-V-
Create / modify / delete a user V-V-
Enroll a batch of card / Create secure cards V-V-
Import / export users V-V-
See the list of categories V-VV
View the category properties V-V-
Create / modify / delete a category V-V-
View the list of schedules V-VV
View the schedule properties V-V-
Create / modify / delete a schedule V-V-
View the holidays V-VV
Add / delete holidays V-V-
View the list of doors VVVV
View the properties of a door or an elevator VVV-
Modify / delete a door or an elevator VV--
Choose the doors that can be opened / unlocked by & V-V-
Add, modify or delete a slave VV--
View the network properties VVV-
Modify the network properties VV--
Modify the date and time + NTP VVV-
View the system options and the configuration of the readers VVV-
Modify the system options and the configuration of the readers VV--
View the users options V-V-
Modify the users options V---
View / modify the emails VVV-
Make a backup V-V-
Restore a backup V---
Update the firmware VV--
View the system log VVV-
View the list of operators VVVV
View the operators properties V---
Modify / delete an operator V---
View supervision VVVV
Reprogram the readers VV--
Restart the board VVV-
(*) Note: Operators with the rights Installation of the hardware or Monitoring of the installation can only open/unlock the doors if the Public option is checked in the list of doors.

Forgot password?

You forgot your login or password? If you have access to the box of the WS4, you can log in with the default login and password by following the procedure described in the DIP switches section below. As a reminder, the default login is admin and the default password is WS4-XXXXXX (replace the Xs with the serial number of the product. This number is indicated at the bottom of the login page).

Technical supervision window

This page allows you to quickly view the status of all inputs and outputs of your WS4. The status is displayed in real time, the refresh rate is about 1 second.

General section

Mains:

OK = The WS4 is connected to the mains and the battery is charging.
DEFAULT = No mains voltage, the WS4 operates on battery.

Voltage:

Indicates the voltage measured by the board. This voltage may come from the power supply or from the battery if there is a power failure. Below 11.5V, the system considers the battery to be low, and above 14.5V, too high.

Box:

Indicates if the box is open or closed. This indication comes from the tamper switch connected to the Tamper connector on the board.

DIP switches:

Indicates the status of the DIP Switches on the board:

For the WS4-4D For the WS4-1D and the WS4-2D

RAM usage:

Indicates the percentage of system RAM used.

Auxiliary Inputs & Outputs section

This screen allows you to see the status and functionality of the auxiliary inputs and outputs of the board. The functionality must be configured in the system options.

Input 1 & Input 2:

Indicates the function assigned to the input (in parentheses) as well as the status of the input, in real-time.
By default, input 1 is configured in Emergency mode, but input 2 is not used.

Output 1, Output 2 (and Output 3 for WS4-2D):

Indicates the function assigned to the output (in parentheses) as well as the state of the output, in real time.
By default, output 1 is configured in Alarm mode, and output 2 is in Attendance mode.

Door x.y section

Push Button:

Indicates the status of the Push button input of the board, either OFF or ON.

Door contact:

Indicates the status of the Door contact input of the board. The state is either ON / OFF if it is a simple door contact that is configured, or the resistance value in Ohm if it is a 4-state door contact (or if no door contact configured).

Lock relay:

Indicates whether the door lock relay is activated or not. On the board, the 3 contacts (C/NO/NC) are available, allowing to connect both types of lock (fail open or fail close).

Reader 1 & 2 :

Indicates the status of the connected reader(s). If a reader is online, the reference of the reader is displayed, followed by its version and serial number in parentheses. The area is red if the reader is offline, orange if the reader's tamper is open.
Depending on the type of reader and operator's rights, the icon allows to reprogram the reader with a new version of the firmware if necessary.
For fingerprints readers, the icon allows to send all the templates to the reader.

Reboot the WS4

The restart of the board takes about 20 seconds, and you will have to re-log afterwards.

State of the slaves

If the installation has slaves, their status is displayed in a summary table to quickly see if there is a fault.

The WS4 events

The WS4 displays events as a table with 5 columns :

System informations

Application started

The WS4 has started, after a power-up or a reboot of the board. The Details column indicates whether it is running in master or slave mode.

Application stopped

The WS4 has stopped following a power failure or an operator request (Rebooting the board, software upgrade etc.).

Time set by NTP

Indicates that the time of the WS4 has been synchronized with the NTP server. The value of the correction is given in the Details column.

Reset attendance

All the users who were inside were put back in neutral. The Details column shows the number of users affected.

Emergency ON / Emergency OFF

Start / end of the emergency mode. The doors that must unlock in case of emergency will create an Door unlocked event.

Action of operators

Log-in

The operator has logged in. The IP address of his computer is indicated in the Details column. If the same operator opens multiple sessions simultaneously, the WS4 indicates a session number behind his name in brackets, for example Guardian[1].

Log-out

The operator's session was closed either following a request from the operator, or after a timeout (30 minutes without action), or because the application has stopped. The reason for the closure is showed in the Details column.

Login ERROR #

A login attempt failed. The IP address of the computer is listed in the Details column.

Login DENIED (account disabled)

The operator who wanted to log in is denied because his rights are on Login FORBIDDEN.

Time set

Indicates that the WS4 time has been changed by the operator. The event is created before changing the time and the Details column contains the value of the correction.

Ask to REBOOT

Indicates that the operator has requested to restart the board.

Changing user status

Indicates that the operator has changed the status (inside / outside / neutral) of a user. This event is always followed by a second which specifies the name of the user and the name of the zones.

Everybody NEUTRAL

The operator has reset all users to the neutral state.

Door relocked

The door was unlocked and has been relocked by the operator.

Backup sent to browser / Backup on USB stick

The operator has made a backup of the system (on his computer or on a USB key). This event is always followed by a second with the name of the backup.

Backup RESTORED

The operator has restored a backup. This event is always followed by a second with the name of the backup.

System UPGRADED

The operator has installed a new version of the firmware. The version is specified in the Details column.

Creation / Modification / Deletion

Indicates that the operator has created / modified or deleted an element of the installation. If the text is underlined, it is possible to click on it to see the modified element.

ALL USERS DELETED

Indicates that, when importing users, the system has deleted all the users before importing.

# users imported

Indicates the number of users imported.

Events DELETED

Indicates that the operator has deleted ALL the events of the system.

The access allowed

Access allowed

The user had authorized access. If the access has a door contact, this event is saved only when the door opens.

Lock ON / Lock OFF

Corresponds to authorized access for a door in toggle mode. The User column indicates whether the action originates from a user, an operator or the free output push button.

Free output PB

Indicates a free output via the push button.

Allowed by operator

The access has been authorized by the operator.

Door unlocked

The door is unlocked either by the operator (the unlocking time is indicated in the Details column) or because the Emergency mode is activated.

The access denied

UNKNOWN PIN/CARD

The card or keypad code (PIN) does not belong to a user of the installation. The code of the card is displayed in the User column.

USER DISABLED

The access is denied because the user is (momentarily) disabled.

OUT OF VALIDITY PERIOD

The access is denied because the validity period of the user is exceeded or has not yet begun.

DENIED: DOOR

The access is denied because the user does not have access to this door.

DENIED: DAY

The access is denied because the user does not have access this day to this door.

DENIED: HOLIDAY

The access is denied because the system is on a day off.

DENIED: HOUR

The access is denied because the user has no access to this door at that hour.

DENIED: FORBIDDEN PERIOD

The access is denied because the door is in a Forbidden period.

DENIED: NO DETECTION

The access is denied because there is no detection of the corresponding input.

BAD COMBINATION

The access is denied because the combination of the card and the keypad code (PIN) does not match.

DENIED: TIMED APB

The access is denied because there has not been enough time since the last access.

DENIED: APB

The access is denied because the Input/Output cycle has not been respected.

DENIED: INTERLOCK

The access is denied because the door is part of an Interlock and it is locked by another door.

The alarms events

The events below relate to alarms. Some of them always cause an alarm, while others can be configured according to the needs of the installation. The events that signal the return to the normal state or the end of the alarm are also included in this list.

ALARM CYCLE STARTED

Indicates that an alarm cycle has been started, following the preceding event. The Details column shows the cycle number (see the explanation of the alarm cycles on the home page, section Reset alarm memory).

Alarm cycle STOPPED

The alarm cycle has been interrupted by the operator or by the user.

End of alarm cycle

Normal end of the alarm cycle.

ALARM MEMORY RESET

The operator resets the alarm memory.

TOO MANY ALARM CYCLES

The maximum number of successive alarms is exceeded, so the alarm cycle could not be started. The Details column shows the number of alarms.

BOX OPENED / Box closed

The box of the WS4 has been opened / closed.

BREAK-IN

The door was opened without authorization.

TOO LONG OPENED

The door remained open longer than the maximum allowed time.

Door OFFLINE / Door ONLINE

The Slave who manages this door is passed offline / online.

Module OFFLINE / Module ONLINE

The module whose serial number is in the Details column is passed offline / online. The 12-output modules are used for elevator management.

Master OFFLINE / Master ONLINE

The slave whose number is in the Location column has lost / restored its connection with the master.

Reader OFFLINE / Reader ONLINE

The reader whose name is in the Details column is passed offline / online.

Reader TAMPER

The tamper protection circuit of the reader has been opened.

DOOR CONTACT SABOTAGE

The door contact circuit - which is of the 4 states type - has been short-circuited or has been opened.

BATTERY LOW

The battery voltage is less than 11.5V.

Battery OK

The battery voltage is greater than 11,9V.

MAINS FAILURE

The mains voltage is absent and the system is running on battery.

Mains OK

The mains voltage is back (and the supply voltage is greater than 13.6V - the battery is charging).

VOLTAGE TOO HIGH

The supply voltage exceeded 14.5V.

End of overvoltage

The supply voltage returned below 14.4V.

Power PANIC

The system is stopped due to a power failure.

BREAK GLASS

Indicates that the Break glass input was activated.

PREVIOUS INSTANCE CRASHED

The WS4 has stopped unexpectedly. It will be restarted automatically by the system.

Other access events

Free period / End of free period

Specifies the start / end of a free period to this door.

Forbidden period / End of forbidden period

Specifies the start / end of a forbidden period to this door.

Door NOT opened

The user has been authorized access but did not open the door. The system therefore considers that he/she did not enter (or leave).

BAD format

The number of bits or the format of the card does not match what is configured in the configuration of the readers.


Settings menu


Network

TCP/IP configuration

The WS4 can manage its network connection in 3 different ways:

WEB server

Secured connection (HTTPS)

Check this option if you want to encrypt the data transmitted between your browser and the WS4. Attention, the WS4 uses a security certificate auto-certified. With this certificate, the data is encrypted, so it is not possible that someone else intercepts these data during transit across the network. However, since the WS4 is not registered with an official organization, your browser will probably ask for confirmation when you log in. Depending the browser used, you may need to Add exception... or open the Advanced Settings before Continue to the site....

Web Service API

This option is available only if you checked the Secured Connection (HTTPS) option. When checked, the WS4 runs a web service that allows an external system (a supervisor for example) to know the state of the WS4 and also to configure it. For further information, please contact your distributor.

Password :

A password of minimum 6 characters is required to ensure the security of the web service.

DynDNS

This option is available only if you checked the Secured Connection (HTTPS) option. It is only useful if you have a dynamic IP address and want to connect to your WS4 from the Internet. If the option is checked, the WS4 communicates regularly with a DynDNS server, so that it knows, at any time, the IP address of your WS4. Then, to connect to your WS4 from anywhere in the world, first connect to http://www.xprgroup.com/my-ws4 and enter the serial number of your WS4: you will be automatically redirected to the login page of your WS4.
Attention : The router that manages the Internet connection on your network must also be configured so that it redirects requests to the WS4. You must either ask the network administrator to configure the router, or use the UPnP mode below to have the WS4 configure the router itself. In both cases, you must choose a unique port number below. This port number allows the router to know which incoming messages it must redirect toward the port 443 of the WS4.

Status :

Indicates the status of the connection between the WS4 and the DynDNS server.
Warning The WS4 must be on time (maximum an offset of 2 minutes) to communicate with the DynDNS server.

External IP address (WAN) :

It is the current IP address of your Internet connexion. Attention : Some IP addresses are shared among multiple subscribers, because to reduce the number of IPv4 addresses, Internet service providers (ISP) use Carrier Grade Nat (CGN) or NAT444. In this case, it will not be possible to connect, you will need to request a public IP address from the ISP. Unfortunately, the WS4 can not know if it is a shared IP address unless both options (DynDNS and UPnP) are checked and working.

Configure the router to access the WS4 from the Internet (UPnP)

This option is available only if you checked the Secured Connection (HTTPS) option. If you enable it, the WS4 will attempt to configure the router that bridges your local network and the Internet so that you can connect to your WS4 from anywhere in the world. For this automatic configuration to be possible, your router must support UPnP mode, and it must be enabled.
Attention: If you have a dynamic IP address (which is the most common case), don't forget to activate the option DynDNS above.

Status :

Indicates the status of the UPnP communication between the WS4 and the Internet Gateway Device.

Port:

If you checked one of the 2 options above (DynDNS or UPnP), you must choose a port number between 1 and 65535.

Date & time

Date & time

Time zone:

Choose from the list the time zone that the WS4 should use. It is with the time zone that the WS4 determines on which dates it must execute the switch to summer time and winter time.

Working week :

Choose from the list the option that corresponds to your working week. The display of calendars and schedules will be adapted accordingly.

Date & time of the WS4:

Shows the Local date and time of the WS4 in real time.

Date & time of your browser:

Shows the local date and time of your browser in real time.

GMT time difference:

Indicates the difference between the GMT time of the WS4 and the GMT time of your browser, in real time. Comparing the GMT time allows you to set the system time even if you are connected remotely and are not in the same time zone.
Click Synchronize to set the WS4 to the same time as your browser (while maintaining the time difference between time zones).

Clock adjustment:

This option is displayed by clicking Show advanced options. It allows to change the calibration of the WS4 clock to make it more precise.

NTP server

Synchronize with a time server (NTP):

Check this option to have the WS4 synchronize periodically on a NTP server (Network Time Protocol). Enter the URL or the IP address of the NTP server and click on the Test button to verify that it is accessible.

User options

User form

Separate fields for Name & First name:

You can choose if you want to have only one field to encode the full name of the users, or if you prefer 2 separate fields (name and first name). In the latter case, the first free field will automatically be used for the first name and will therefore no longer be available.

Field 1 to 5:

Encode the names of the free fields that you want to use, for example Phone and Registration, up to 25 characters. These fields will then be available in the User form, and you can also view them in the list of users.

Attendance

Reset time:

You can choose the time at which you want to reset all users to Neutral. The attendance relay - if configured - will be switched off, even if some users have forgotten to clock out at the output.

Reset code:

This code is used to reset to neutral state all the users still inside. It can be used from any access having a keypad.

Buzzer when the last person leaves:

If this function is activated, all readers of the installation will emit an intermittent sound when the last person leaves the building or when all present users are reseted in neutral. If the relay attendance is used to control a burglar alarm system, this signal warns users that could possibly still be inside that the alarm will soon be armed. They must then quickly identify themselves on one of the readers of the installation. At the end of the selected time, if no one has manifested, the presence relay is switched off.

Emails

Your WS4 must have access to the Internet to send e-mails. This is an in-system service that can send up to 100 emails per month. When this quota is reached, a last e-mail alert is sent to the first recipient of group no. 1, then no more e-mail will be sent during the month. The number of e-mails sent during the current month is indicated in the blue area in the center of the page (the zone turns orange at 80%, then red when the quota is reached).

If it can not send an email, the WS4 will continue for 24 hours. Then the message is deleted and an error event is created.

Attention, in an installation with slaves, it is always the master who sends the e-mails. If a slave is offline, its alarms will no longer be sent, but the master will send an e-mail to indicate that the doors of this slave are offline.

Note: During installation maintenance (see home page), emails are not sent.

Name of the site (sender)

Enter a name that characterizes the installation (on max. 50 characters (1)). This name will be displayed in the sender area when the email is received. This field is also displayed in the home page, which makes it possible to control that one is on the good installation (very useful if one manages several installations remotely).

Group of recipients No.1, 2 and 3

The system has 3 groups of recipients, and each group can contain up to 3 recipients and up to 120 characters. The same recipient may be in more than one group. Email addresses must be separated by a semicolon.

Language

Messages will be formatted in the selected language.

Type of event

For each type of event, you can choose whether to send an e-mail, and choose to which group. The list of events concerned is indicated in parentheses. Attention, some alarms can be deactivated in the system options: it is necessary that the option is checked so that the e-mail is sent.
If the same alarm is repeated in a period of less than 2 hours (15 minutes for identification alarms), the system sends an e-mail only for the first alarm.

Connection test

The system can send an email to report that it is still alive and connected to the Internet. Select the days and time you want it to send the Connection Test email.

System options

Alarms

Time of an alarm cycle:

When an alarm occurs, the WS4 switch the dedicated alarm relay (see below) for a time between 5 and 180 seconds.

Maximum number of successive cycles:

The WS4 can not trigger alarms at infinity: If the configured maximum number (which must be between 3 and 9) is exceeded over a period of 2 hours, the relay will not be activated. It will be necessary to wait until the end of the 2 hours, or to make a Reset alarm memory on the home page to reactivate the process.

Auxiliary Inputs & Outputs

The WS4 board has 2 auxiliary inputs and 2 auxiliary outputs. On the master, they can each be configured via this page. On slaves, they are not usable, except for the field detection required (in the properties of a door).

Aux IN 1 & 2:

Note: The contact connected to these inputs can be either Normally open (NO) or Normally closed (NC).

Aux OUT:

Other options

Number of events to keep in memory

The WS4 can hold up to 50,000 events in its internal memory. But since the events are saved in the backups, if you do not need to retain so many, you can choose a smaller number here, to reduce the size of the backups.
Note: Slaves also keep their events in memory, but they keep 5 times less than what is configured for the master.

Delete ALL

This button allows you to delete all events from the system. This function is useful if you have restored a backup from another installation, or after putting into service.

In the events, delete the name of the users

In the context of respect for private life, it is sometimes obligatory to no longer be able to identify the movements of users after a certain period of time. This option allows you to delete the name of the users for all the events which are older than X days (configurable between 1 and 3650).

Field separator (CSV files)

You can choose the field separator that will be used when exporting users or events to CSV format. You must choose the separator that is supported by your spreadsheet software. For example, for Excel, the supported separator depends on the language of the product: semi-colon in French version, comma in English version.

Check for updates weekly

When this option is checked, the system checks - in the night from Sunday to Monday - if a new version of the software is available. If this is the case, a notification will be displayed on the home page when an operator logs on.

Log debug messages

Check this option only if requested by the technical service.

Configuration of the readers

Wiegand / HID formats

If you use HID readers or readers with a Wiegand output, you must configure the number of bits that these readers generate to be accepted by the WS4. You can configure up to 4 different formats. If the number of bits of the card does not match any of the configured formats, an event BAD format will be created with the number of bits in the Details column.

Format 1 to 4:

Choose the format(s) that match the cards/readers used in your installation.
Note that the WS4 can read the bits of Wiegand readers in 2 different ways, depending on the type of card configured in the door properties:

Mifare/DESFire security

If there are Mifare readers(3) in the installation, you can set a security level that suits your needs. The higher the level, the more difficult it will be to defraud by copying a card. Securing cards is usually a complex operation, but to simplify it as much as possible, the system allows you to create very secure DESFire cards(2) using one of the readers of the installation. To do this, you simply need to choose an application number and an authentication key. This key must be kept secret and archived in a safe place, because it guarantees the confidentiality of the data written on the card. When these parameters are defined, you can create secure cards from the list of users, and directly use these cards on all Mifare readers(3) of the installation.

Security level

Application ID (AID)

As the DESFire cards(2) can be used by several different systems, this number identifies the area of the card reserved for your WS4. You can choose any value between 1 and 16777215.

Authentication key

Key on 32 hexadecimal characters (0 à 9 et A à F). You can enter the key of your choice or have the system generate one. This key is used to authenticate at the card level, and also to encrypt the data between the card and the reader.
Warning, without this key, it would not be possible to read cards already created! Remember to archive it (for example by making a backup and saving it in a safe place).

Note: To ensure a maximum level of security, the key is diversified: it is used in a complex algorithm to create another key, different for each card.

Other options

Keypad code of fixed length

If the installation has keypads, you can choose whether users should end their code by pressing B, or if all codes must be of fixed length (4 to 8 digits).
Caution, if the length of a user's code is smaller than the one chosen here, it should precede his code with 0. On the other hand, if the length of his code is greater, it will not be able to identify!

Backlight

This function only applies to certain types of readers. In Default mode, the backlight flashes green once per seconde, which indicates that the reader is in communication with the WS4.

Create secure cards

This screen allows you to create secure DESFire cards(2) using one of the Mifare readers(3) of the installation. You can create a batch of cards on the fly. Then, these cards will have to be attributed to the users of the installation via the user form or the enroll a batch of cards.

Once created, a secure card contains a zone (called Application), itself containing an encrypted file protected by an AES key. The file contains a unique identifier which corresponds to the unique ID of the card (UID) preceded by '10'. For example, if the card has the unique ID 36070309779090948, the secure zone will contain the identifier 1036070309779090948, and it is this identifier that will be read by the Mifare readers(3) and which must therefore be attributed to the card holder.


Backup & upgrade

This screen allows you to make a backup of the installation, to restore a backup or to update the WS4 software.

Create a backup

You have 2 possibilities to create a backup of the installation:

Note : Since version 2.00, the events are included in the backup. By default, the name of a backup consists of the name WS4 followed by the serial number, followed by the date and time. For example: WS4-SN100006-20161124-1716.bak
The extension of a backup file is .bak

Restore a backup

You can either restore a backup that you previously saved on your computer or restore a backup that the WS4 made automatically (internally). In both cases, choose the backup to restore, click the Restore button and confirm your choice. The WS4 restarts with the backup data and then asks you to re-login.

Upgrade firmware

If you have obtained a new version of the WS4 (for example, from www.xprgroup.com), you can update the system via this screen. Select the file containing the update then click Upgrade and confirm your choice. The WS4 restarts and asks you to re-login: the system is updated.
Note 1 - Field Size: For text fields, the system reserves a certain amount of memory. In general, a character corresponds to one memory location, but some characters - such as accents and special symbols - take up to 2 or 3 memory locations. The encoding used is UTF-8 encoding, and the full list of characters is available online at http://www.utf8-chartable.de.
Note 2 - DESFire card: Card or Tag Mifare DESFire, preferably in version EV2 which improves the reading distance.
Note 3 - Mifare reader: This Mifare reader is currently under development.

© XPR Group
The manufacturer reserves the right to modify, at any time, the characteristics of this document. This document is not contractual.