Kantech WinPass KT- 300 User manual

DN1237-0003.2.1 © 1997-2000 KANTECH SYSTEMS INC.
SYSTEM REFERENCE MANUAL &
KT-300 CONTROLLERS
VV
VV
Verer
erer
ersion 2sion 2
sion 2sion 2
sion 2

Specifications may change at any time without prior notice
Copyright©1997-2000KantechSystemsInc.
Allrightsreserved
MARCH 2000
Partof the DSCgroup,Kantech Systems Inc.embracesthe group's corporatephilosophy ofproviding
competitive and innovative products. Established in 1986, Kantech Systems has been designing and
manufacturing integrated access control systems for industrial, government and military applications.
TheDSCGroupisrecognizedasaleadinginternationalmanufacturerofsecurityproducts. Asagroup,
we currently supply hundreds of different security products that are distributed in more than 100
countries. We strongly believe in cost effective manufacturing and product innovation. Over one
hundred engineers and technologists contribute to our on going R&D efforts with one goal in mind:
providinghighquality,costeffectiveandinnovativeproducts!
DSC group manufacturing facilities are spacious, efficient and equipped with the most advanced
electronicassemblyequipmentoperatingon24hourproductionscheduletomeetdemand,quicklyand
efficiently.
ISO-9001CertifiedQualitySystem
TheinternationalOrganizationforStandardization(ISO)isaworldwidefederationofnationalstandard
bodies. ISO has developed a series of standards relating to a Quality System known as the ISO family
standards.TheISO-9001standarddefinesthehighestlevel for this QualitySystemandisapplicableto
design,development,production,installationandservicing,finalinspectionandtesting.
Thesystemisauditedtwiceayearandcertifiedbyoutsideauditors/registrars.Kantech’squalitysystem
alsoextendstoitssuppliersandcustomers.Asuppliermustbeinitiallyapprovedandthereafter,regularly
appraised and rated. Customer feedback is documented and reviewed under formal procedures by
Kantech’s internal Continuing Improvement Committee composed of employees from every depart-
ment.
Kantech Systems Inc.
3650-A MatteBoulevard
Brossard, Quebec
Canada J4Y 2Z2
Customer Assistance
Tel: 1(450) 444-2040 ext.: 399
Fax:1(450) 444-2029
Web Site: http://www.kantech.com

END-USERLICENSEAGREEMENT
FORKantechSoftwareProvidedWithorWithoutProductsorComponents
IMPORTANT-READCAREFULLY:KantechSoftwarepurchasedwithorwithoutProductsandComponentsiscopyrightedand
ispurchasedunderthefollowinglicenseterms:
• ThisEnd-UserLicenseAgreement(“EULA”)isalegalagreementbetweenYou(thecompany,individualorentitywhoacquired
the Software and any related Hardware) and Kantech Systems Inc. (“Kantech”), the manufacturer of the integrated security
systems and the developer of the software and any related products or components (“HARDWARE”) which You acquired.
• IftheKantechsoftwareproduct(“SOFTWAREPRODUCT”or“SOFTWARE”)isintendedtobeaccompaniedbyHARDWARE,
andisNOTaccompaniedbynewHARDWARE,Youmaynotuse,copyorinstalltheSOFTWAREPRODUCT. TheSOFTWARE
PRODUCT includes computer software, and may include associated media, printed materials, and “on-line” or electronic
documentation.
• Anysoftwareprovidedalong with theSOFTWAREPRODUCTthat is associated withaseparateend-user license agreement
is licensed to You under the terms of that license agreement.
• Byinstalling,copying,downloading,storing,accessingorotherwiseusingtheSOFTWARE PRODUCT,Youagreeuncondi-
tionallyto bebound bythetermsofthisEULA,evenifthisEULAisdeemedtobea modificationofanypreviousarrangement
orcontract. IfYoudonotagreetothetermsofthisEULA,KantechisunwillingtolicensetheSOFTWAREPRODUCTtoYou,
and You have no right to use it.
SOFTWAREPRODUCTLICENSE
The SOFTWARE PRODUCT is protected by copyright laws and international copyright treaties, as well as other intellectual
property laws and treaties. The SOFTWARE PRODUCT is licensed, not sold.
1. GRANTOFLICENSE.THISEULAGRANTSYOUTHEFOLLOWINGRIGHTS:
(a) SoftwareInstallationand Use-Foreach licenseYouacquire, Youmayhaveonly onecopyof theSOFTWAREPRODUCT
installed.
(b) Storage/NetworkUse-TheSOFTWAREPRODUCTmaynotbeinstalled,accessed,displayed,run,sharedorusedconcurrently
onorfromdifferentcomputers,includingaworkstation,terminalorotherdigitalelectronicdevice(“Device”).Inotherwords,
ifYouhaveseveralworkstations,YouwillhavetoacquirealicenseforeachworkstationwheretheSOFTWAREwillbeused.
(c) Backup Copy - You may make backup copies of the SOFTWARE PRODUCT, but You may only have one copy per license
installed at any given time. You may use the back-up copy solely for archival purposes. Except as expressly provided in this
EULA,YoumaynototherwisemakecopiesoftheSOFTWAREPRODUCT,includingtheprintedmaterialsaccompanyingthe
SOFTWARE.
2. DESCRIPTIONOFOTHERRIGHTSANDLIMITATIONS.
(a) Limitations on Reverse Engineering, Decompilation and Disassembly - You may not reverse engineer, decompile, or
disassembletheSOFTWAREPRODUCT,exceptandonlytotheextentthatsuchactivityisexpresslypermittedbyapplicable
law notwithstanding this limitation. You may not make any changes or modifications to the Software, without the written
permissionofanofficer ofKantech.Youmay notremoveanyproprietary notices,marksorlabels from theSoftwareProduct.
You shall institute reasonable measures to ensure compliance with the terms and conditions of this EULA.
(b) Separation of Components - The SOFTWARE PRODUCT is licensed as a single product. Its component parts may not be
separated for use on more than one HARDWARE unit.
(c) SingleINTEGRATEDPRODUCT-IfYouacquiredthisSOFTWAREwithHARDWARE,thentheSOFTWAREPRODUCT
is licensed with the HARDWARE as a single integrated product. In this case, the SOFTWARE PRODUCT may only be used
with the HARDWARE as set forth in this EULA.
(d) Rental- You may not rent, lease or lend the SOFTWARE PRODUCT. You may not make it available to others or post it on a
server or web site.
(e) SoftwareProductTransfer-YoumaytransferallofYourrightsunderthisEULAonlyas partofapermanentsaleortransfer
oftheHARDWARE,providedYouretainnocopies,YoutransferalloftheSOFTWAREPRODUCT(includingallcomponent
parts,themediaandprintedmaterials,anyupgradesandthisEULA),andprovidedtherecipientagreestothetermsofthisEULA.
IftheSOFTWAREPRODUCTisanupgrade,anytransfermustalsoincludeallpriorversionsoftheSOFTWAREPRODUCT.
(f) Termination-Withoutprejudicetoanyotherrights,KantechmayterminatethisEULAifYoufailtocomplywiththetermsand
conditions of this EULA. In such event, You must destroy all copies of the SOFTWARE PRODUCT and all of its component
parts.
(g) Trademarks-ThisEULA doesnotgrantYouanyrightsinconnectionwithanytrademarksorservice marksofKantechorits
suppliers.
3.COPYRIGHT.
AlltitleandintellectualpropertyrightsinandtotheSOFTWAREPRODUCT(includingbutnotlimitedtoanyimages,photographs,
andtextincorporatedintotheSOFTWAREPRODUCT),theaccompanyingprintedmaterials,andanycopiesoftheSOFTWARE
PRODUCT, are owned by Kantech or its suppliers. You may not copy the printed materials accompanying the SOFTWARE
PRODUCT.Alltitle andintellectualproperty rightsinandto thecontentwhich maybeaccessed throughuseof theSOFTWARE

PRODUCT are the property of the respective content owner and may be protected by applicable copyright or other intellectual
propertylawsandtreaties.This EULA grants Younorightstouse such content. Allrightsnotexpresslygranted under this EULA
are reserved by Kantech and its suppliers.
4. EXPORTRESTRICTIONS.
Youagreethat Youwillnot exportorre-export theSOFTWAREPRODUCT toanycountry, person,orentity subjecttoCanadian
exportrestrictions.
5. CHOICEOFLAW:THISSOFTWARELICENSEAGREEMENTISGOVERNEDBYTHELAWSOFTHEPROVINCE
OFONTARIO, CANADA.
6. ARBITRATION
Alldisputesarisingin connection with thisAgreementshallbe determined byfinalandbindingarbitration in accordancewiththe
InternationalCommercialArbitrationAct, R.S.O.1990,c.I.9, oranysuccessoror replacement legislationwhichmay be inforce,
and the parties agree to be bound by the arbitrator’s decision. The place of arbitration shall be Toronto, Canada.
7.LIMITEDWARRANTY
(a) NOWARRANTY
KANTECHPROVIDESTHESOFTWARE“ASIS”WITHOUTWARRANTY.KANTECHDOESNOTWARRANT
THATTHESOFTWAREWILLMEETYOURREQUIREMENTSORTHATOPERATIONOFTHESOFTWAREWILL
BEUNINTERRUPTEDORERROR-FREE.
(b) CHANGESINOPERATINGENVIRONMENT
Kantech shall not be responsible for problems caused by changes in the operating characteristics of the
HARDWARE,orforproblemsintheinteraction oftheSOFTWAREPRODUCTwithnon-Kantech-SOFTWAREor
HARDWAREPRODUCTS.
(c) LIMITATIONOFLIABILITY;WARRANTYREFLECTSALLOCATIONOFRISK
INANYEVENT,IFANYSTATUTEIMPLIESWARRANTIESORCONDITIONSNOTSTATEDINTHISLICENSE
AGREEMENT,KANTECH’SENTIRELIABILITYUNDERANYPROVISIONOFTHISLICENSEAGREEMENT
SHALL BE LIMITED TO THE GREATER OF THE AMOUNT ACTUALLY PAID BY YOU TO LICENSE THE
SOFTWAREPRODUCTANDFIVECANADIANDOLLARS(USD$5.00). BECAUSESOMEJURISDICTIONSDO
NOTALLOWTHEEXCLUSIONORLIMITATIONOF LIABILITYFORCONSEQUENTIALORINCIDENTAL
DAMAGES,THEABOVELIMITATIONMAYNOTAPPLYTOYOU.
(d) DISCLAIMEROFWARRANTIES
THISWARRANTYCONTAINSTHEENTIREWARRANTYANDSHALLBEINLIEUOFANYANDALLOTHER
WARRANTIES, WHETHER EXPRESSED OR IMPLIED (INCLUDING ALL IMPLIED WARRANTIES OF
MERCHANTABILITYORFITNESSFORAPARTICULARPURPOSE)ANDOFALLOTHEROBLIGATIONSOR
LIABILITIESONTHEPARTOFKANTECH. KANTECHMAKESNOOTHERWARRANTIES.KANTECHNEITHER
ASSUMESNORAUTHORIZESANYOTHERPERSONPURPORTINGTOACTONITSBEHALFTOMODIFYOR
TOCHANGETHISWARRANTY,NORTOASSUMEFORITANYOTHERWARRANTYORLIABILITYCONCERN-
INGTHISSOFTWAREPRODUCT.
(e) EXCLUSIVEREMEDYANDLIMITATIONOFWARRANTY
UNDERNOCIRCUMSTANCESSHALLKANTECHBELIABLEFORANYSPECIAL,INCIDENTAL,CONSEQUEN-
TIALORINDIRECTDAMAGESBASEDUPONBREACHOF WARRANTY,BREACHOFCONTRACT,NEGLI-
GENCE,STRICTLIABILITY,ORANYOTHERLEGALTHEORY.SUCHDAMAGESINCLUDE,BUTARENOT
LIMITEDTO,LOSSOFPROFITS,LOSSOFTHESOFTWAREPRODUCTORANYASSOCIATEDEQUIPMENT,
COSTOFCAPITAL,COSTOFSUBSTITUTEORREPLACEMENTEQUIPMENT,FACILITIESORSERVICES,
DOWN TIME, PURCHASER?S TIME, THE CLAIMS OF THIRD PARTIES, INCLUDING CUSTOMERS, AND
INJURYTOPROPERTY.
WARNING:Kantechrecommendsthattheentiresystembecompletelytestedonaregularbasis.However,despite
frequenttesting,anddueto,butnotlimitedto,criminaltamperingorelectricaldisruption,itispossibleforthis
SOFTWAREPRODUCTtofailtoperformasexpected.
Please click on the “I agree” button if You agree to terms of this End User License Agreement. If You do not agree
to the terms of this EULA, press the “I Do Not Agree” button as Kantech is unwilling to license the SOFTWARE
PRODUCT to You, and You have no right to use it.
Continuation from previous page...

SECTION 1 - Introduction to WinPassSECTION 1 - Introduction to WinPass
SECTION 1 - Introduction to WinPassSECTION 1 - Introduction to WinPass
SECTION 1 - Introduction to WinPass 88
88
8
Important Information .............................................................................................. 9
Unique Features....................................................................................................... 9
WinPassArchitecture(RS-232)................................................................................ 9
System Specifications ............................................................................................ 10
Part Numbers and Contents ................................................................................... 11
SECTION 2 - WinPass UtilitiesSECTION 2 - WinPass Utilities
SECTION 2 - WinPass UtilitiesSECTION 2 - WinPass Utilities
SECTION 2 - WinPass Utilities 1212
1212
12
Computer Requirements ................................................................................................................................................. 13
Software Installation ....................................................................................................................................................... 13
Using ExpressSetUp ....................................................................................................................................................... 14
Login the System ............................................................................................................................................................ 15
Uninstalling WinPass ..................................................................................................................................................... 16
Backup Procedure........................................................................................................................................................... 16
Upgrade Procedure ......................................................................................................................................................... 16
SECTION 3 - WinPass BasicsSECTION 3 - WinPass Basics
SECTION 3 - WinPass BasicsSECTION 3 - WinPass Basics
SECTION 3 - WinPass Basics 1818
1818
18
Main Menu ..................................................................................................................................................................... 19
Toolbar Menus ............................................................................................................................................................... 20
File Tools (buttons) ........................................................................................................................................................ 20
Operator Acknowledgment............................................................................................................................................. 21
Customizing the System ................................................................................................................................................. 21
Defining Controllers ....................................................................................................................................................... 21
Defining Schedules......................................................................................................................................................... 21
Defining Doors ............................................................................................................................................................... 21
KT-300DoorProgramming Relays ................................................................................................................................. 21
Monitoring Inputs .......................................................................................................................................................... 21
Programming Outputs..................................................................................................................................................... 21
Access Levels ................................................................................................................................................................ 21
Defining Cards ................................................................................................................................................................ 22
Security Levels ............................................................................................................................................................... 22
Holidays ......................................................................................................................................................................... 22
Defining Events .............................................................................................................................................................. 22
SECTION 4 - De ining System UserSECTION 4 - De ining System User
SECTION 4 - De ining System UserSECTION 4 - De ining System User
SECTION 4 - De ining System Userss
ss
s2424
2424
24
CardDefinition ............................................................................................................................................................... 25
SECTION 5 - SECTION 5 -
SECTION 5 - SECTION 5 -
SECTION 5 - Physical Components Con igurationPhysical Components Con iguration
Physical Components Con igurationPhysical Components Con iguration
Physical Components Con iguration 2828
2828
28
Workstation Configuration ............................................................................................................................................. 29
ControllerDefinition ....................................................................................................................................................... 31
Door Definition ............................................................................................................................................................... 35
RelayDefinition .............................................................................................................................................................. 37
Input Definition .............................................................................................................................................................. 37
Output Definition............................................................................................................................................................ 38
SECTION 6 - SECTION 6 -
SECTION 6 - SECTION 6 -
SECTION 6 - Logical Components Con igurationLogical Components Con iguration
Logical Components Con igurationLogical Components Con iguration
Logical Components Con iguration 4040
4040
40
Schedule Definition ........................................................................................................................................................ 41
Access Level Definition ................................................................................................................................................. 41
HolidayDefinition .......................................................................................................................................................... 42
Event Definition.............................................................................................................................................................. 42
Operator Definition ......................................................................................................................................................... 43
SecurityLevelDefinition ................................................................................................................................................ 44
TT
TT
TABLE OF CONTENTSABLE OF CONTENTS
ABLE OF CONTENTSABLE OF CONTENTS
ABLE OF CONTENTS

WW
WW
WinPass Reference ManualinPass Reference Manual
inPass Reference ManualinPass Reference Manual
inPass Reference Manual
DN1237-0003 © 1997-2000 Kantech Systems Inc.
66
66
6
SECTION 7 - SECTION 7 -
SECTION 7 - SECTION 7 -
SECTION 7 - PP
PP
Perer
erer
er oror
oror
orming Manming Man
ming Manming Man
ming Manual Operual Oper
ual Operual Oper
ual Operaa
aa
ationstions
tionstions
tions 4646
4646
46
Door Operation ............................................................................................................................................................... 47
Relay Operation .............................................................................................................................................................. 48
Input Operation .............................................................................................................................................................. 48
Output Operation............................................................................................................................................................ 49
Controller Status ............................................................................................................................................................. 49
CardList ......................................................................................................................................................................... 50
Reload Controller ............................................................................................................................................................ 50
Date&Time.................................................................................................................................................................... 51
Re-Index.......................................................................................................................................................................... 51
SECTION 8 - SECTION 8 -
SECTION 8 - SECTION 8 -
SECTION 8 - TT
TT
The Rhe R
he Rhe R
he Ree
ee
eporpor
porpor
portsts
tsts
ts 5252
5252
52
Events Report ................................................................................................................................................................. 53
Card Report..................................................................................................................................................................... 54
SECTION 9 - SECTION 9 -
SECTION 9 - SECTION 9 -
SECTION 9 - KTKT
KTKT
KT-300-300
-300-300
-300::::: Installa Installa
Installa Installa
Installation & Con igurtion & Con igur
tion & Con igurtion & Con igur
tion & Con iguraa
aa
ationtion
tiontion
tion 5656
5656
56
Step 1. Preparing to Install the KT-300 ........................................................................................................................... 58
Step 2. Physical Installation............................................................................................................................................ 58
Step 3. Power Requirements ........................................................................................................................................... 58
Step 4. Earth Grounding.................................................................................................................................................. 58
Step 5. Door Locking Devices ........................................................................................................................................ 59
Step 6. Hooking Up Inputs ............................................................................................................................................. 59
Step 7. Readers and Keypads ......................................................................................................................................... 59
Step 8. Relay Control Outputs ........................................................................................................................................ 60
Step 9. Auxiliary Outputs................................................................................................................................................ 60
Step 10. Tamper Protection ............................................................................................................................................. 60
Step 11. Connecting the KT-300 to the RS-485 Bus........................................................................................................ 60
Step 12. Connecting the Master Controller to the Host Computer ................................................................................. 60
Step13.Poweringthe KT-300......................................................................................................................................... 61
KT-300FCC& ICComplianceNotice ............................................................................................................................. 61
KT-300CEComplianceNotice........................................................................................................................................ 61
KT-300ULComplianceNotice ....................................................................................................................................... 61
ElectricalSpecifications .................................................................................................................................................. 61
Troubleshooting Communication Problems ................................................................................................................... 61
KT-300ControllerMaintenanceRecommendations ....................................................................................................... 62
Combus Specifications ................................................................................................................................................... 66
CombusRepower(ifrequired) ........................................................................................................................................ 66
KT-PC4108 - 8-Zone Input Expansion Module ............................................................................................................... 67
KT-PC4204 - 4-Relay and Additional Power Supply Module ......................................................................................... 68
KT-PC4216-16-ZoneOutputExpansion Module .......................................................................................................... 69
KT-LCD4501-LCD Time&Date DisplayModule ......................................................................................................... 70
SECTION 10 - SECTION 10 -
SECTION 10 - SECTION 10 -
SECTION 10 - KTKT
KTKT
KT-300 Compa-300 Compa
-300 Compa-300 Compa
-300 Compatibtib
tibtib
tible prle pr
le prle pr
le productsoducts
oductsoducts
oducts 7272
7272
72
SECTION 11 - CompaSECTION 11 - Compa
SECTION 11 - CompaSECTION 11 - Compa
SECTION 11 - Compatibility with KTtibility with KT
tibility with KTtibility with KT
tibility with KT-200-200
-200-200
-200 8080
8080
80
Introduction - Section 1 .................................................................................................................................................. 81
WinPassArchitecture(RS-232) ...................................................................................................................................... 81
WinPass Architecture with OptionalVC-485LineExtender ........................................................................................... 81
System Specifications..................................................................................................................................................... 81
Using ExpressSetUp - Section 2 ..................................................................................................................................... 81
Login the System - Section 2 .......................................................................................................................................... 82
Defining Controllers - Section 3...................................................................................................................................... 82
ProgrammingRelays-Section3 ..................................................................................................................................... 82
Monitoring Inputs - Section 3 ........................................................................................................................................ 82
Programming Outputs - Section 3 ................................................................................................................................... 82
ControllerDefinition-Section5 ..................................................................................................................................... 82
Door Definition - Section 5 ............................................................................................................................................. 82

DN1237-0003 © 1997-2000 Kantech Systems Inc. 77
77
7
TT
TT
Taa
aa
abb
bb
ble le
le le
le oo
oo
offfff Contents Contents
Contents Contents
Contents
Input Definition - Section 5............................................................................................................................................. 82
Output Definition - Section 5 .......................................................................................................................................... 82
RelayDefinition-Section5 ............................................................................................................................................ 82
Workstation Configuration - Section 5 ........................................................................................................................... 82
Step 1. Preparing Installation of the KT-200 ................................................................................................................... 83
Step 2. Physical Installation............................................................................................................................................ 83
Step 3. Power Requirements ........................................................................................................................................... 83
Step 4. Grounding ........................................................................................................................................................... 84
Step 5. Tamper Protection ............................................................................................................................................... 84
Step 6. Hooking Up Inputs ............................................................................................................................................. 84
Step 7. Relays & Auxiliary Outputs ................................................................................................................................ 84
Step 8. Door Locking Devices ........................................................................................................................................ 85
Step 9. Readers and Keypads ......................................................................................................................................... 85
Step 10. Dip Switch Settings ........................................................................................................................................... 86
Step 11. Jumper Settings ................................................................................................................................................. 86
Step 12. Connecting the KT-200 to the RS-485 Bus........................................................................................................ 87
KT-200Technical Specifications .................................................................................................................................... 87
KT-200ElectricalSpecifications ..................................................................................................................................... 87
Walk Through Testing.................................................................................................................................................... 88
Typical Component Connection to KT-200 .................................................................................................................... 88
KT-200FCCComplianceNotice ..................................................................................................................................... 88
KT-200 CECompliance Notice ........................................................................................................................................ 88
KT-200 CompatibleProducts .......................................................................................................................................... 89
AppendixAppendix
AppendixAppendix
Appendix 9292
9292
92
Frequently Asked QuestionsFrequently Asked Questions
Frequently Asked QuestionsFrequently Asked Questions
Frequently Asked Questions 9393
9393
93
Did Did
Did Did
Did YY
YY
You Knoou Kno
ou Knoou Kno
ou Know ?w ?
w ?w ?
w ? 9494
9494
94
INDEXINDEX
INDEXINDEX
INDEX 9696
9696
96

WW
WW
WinPass Reference ManualinPass Reference Manual
inPass Reference ManualinPass Reference Manual
inPass Reference Manual
DN1237-0003 © 1997-2000 Kantech Systems Inc.
88
88
8
Designedforinstallationsofupto64cardreaders,WinPassbundlesallthebasicfunctions
ofaccesscontrolinaneasytolearnandunderstandstructure.Learningtimeisreducedtoa
minimum.Familiar Windowsscreens areintuitive; on-linecontext sensitivehelp isalways
availablethroughoutthesystem.
Upto8,000carduserscanbedefinedinthesystem.Eachcarduserisassignedanaccess
levelthatwillallowentryatselecteddoors,onlyaccordingtopredefinedschedules.Allevents
arerecordedbythesystemforfuturereview.
Oncethesystemisconfigured,thecomputerisrequiredonlytomonitor/updatethesystem
ortoprintreports.Thereportgeneratorcanprovideinformationsortedandprintedaccording
toyourneedsordisplayedusingcleargraphics.
Introduction to WinPass
SECTION 1SECTION 1
SECTION 1SECTION 1
SECTION 1

DN1237-0003 © 1997-2000 Kantech Systems Inc. 99
99
9
SECTION 1SECTION 1
SECTION 1SECTION 1
SECTION 1 - -
- -
-
--
--
- Introduction to WinPass Introduction to WinPass
Introduction to WinPass Introduction to WinPass
Introduction to WinPass
Important Information
IfyouareusingKT-200controllersandmoreinformationappliestotheKT-200controlleronaspecificsubject,thephrase“SEE SECTION
11 IF YOU ARE USING KT-200 CONTROLLERS” will be displayed within the subject under the specific paragraph or picture.
TheparagraphwhichhasmoreinformationabouttheKT-200willbeidentifiedwithanasterisk(*).Forexample:ifasubjecthasseveral
paragraphs in which some specifications apply to the KT-200, then only the subject title and the specific section applying to the
KT-200willbeavailableinSection11.
Unique Features
Distributeddataandtruestand-alonecapability:
Memory and processing located at every door. No degraded mode. The computer never makes a decision and is necessary only for
maintaining the system's database or downloading buffered events in order to prepare reports.
Compatiblewithmultiplereadertechnologies:
IoProx,Polaris mag stripe,ShadowProxproximity, XSF,Wiegand,barcode, biometrics,keypadsand many others.
Automaticfunctions:
Unlock doors, activate relays and outputs, monitor inputs, according to schedules or system events.
Cards can be added or deleted in seconds ; all events are buffered and can be saved on disk or printed for future reference. WinPass
provides an easy-to-use report generator.
The report generator lets the user print or view the desired information from all the events saved to the computer’s hard disk.
Compatiblewith2typesofcontrollers:
For more flexibility and options, WinPass offers the possibility to use 2 types of controllers: KT-200 and KT-300, However both
types cannot be installed on the same system.
WinPass Architecture (RS-232)
“SEE SECTION 11IF YOU ARE USING KT-200CONTROLLERS”

WW
WW
WinPass Reference ManualinPass Reference Manual
inPass Reference ManualinPass Reference Manual
inPass Reference Manual
DN1237-0003 © 1997-2000 Kantech Systems Inc.
1010
1010
10
System Specifications
serutaeF snoitacificepS
k821/003-TKgnisu)stigid8(sdracforebmuN enil-ffo/enil-no000,8
k821/003-TKgnisu)stigid61(sdracforebmuN enil-ffo000,4dnaenil-no000,8
k215/003-TKgnisu)stigid61dna8(sdracforebmuN enil-ffo/enil-no000,8
sedocetisroseilimafdraC timiloN
003-TKsrellortnocrooD 23
sredaerdraC 46
sdapyeK 46
)8014CP-TKlanoitpohtiw(stupniderotinoM )215(652
stuptuokcolrooD 46
)4024CP-TKro6124CP-TKlanoitpohtiw(stuptuOdellortnoC )215(46
1054DCL-TKdapyeKDCL 46
smralarooddnasDELredaerrofstuptuoyrailixuA 821
slevelsseccaresudraC 052
hcaesenozemit4foseludehcS 001
syadiloH 663
snoitatskrowrotarepO 1
sdrowssaprotarepometsyS timiloN
slevelytirucesrotarepO .gorp8/dexif1
segaugnalrotarepotnerrucnoC 2
sretnirpforebmuN timilswodniW
)k215(k821/003-TKgnisu)reffub(stneveforebmuN )000,81-+(000,5-+
“SEE SECTION 11 IF YOU ARE USING KT-200 CONTROLLERS”

DN1237-0003 © 1997-2000 Kantech Systems Inc. 1111
1111
11
SECTION 1SECTION 1
SECTION 1SECTION 1
SECTION 1 - -
- -
-
--
--
- Introduction to WinPass Introduction to WinPass
Introduction to WinPass Introduction to WinPass
Introduction to WinPass
Part Num ers and Contents
srebmuNtraPnoitpircseD
46-SSAPW )'001(sretem03elbac01-KLBChtiwlaunamresudnaerawtfosssaPniW
01-KLBC otCPtsohmorflocotorp232-SRnignitacinummocrotcennoc/elbaC)'001(sretem03 rellortnocretsam
VER/46-SSAP-W edargpuerawtfosssaPniW
584-CV rednetxeenilnoitacinummocasadesuebotecafretninoitacinummocnoitcnuf-itluM )rellortnocretsamdnaCPtsohneewtebecnatsiddnetxeot(

WW
WW
WinPass Reference ManualinPass Reference Manual
inPass Reference ManualinPass Reference Manual
inPass Reference Manual
DN1237-0003 © 1997-2000 Kantech Systems Inc.
1212
1212
12
Withinthissection,you’llfind:
1) Computerrequirementsforinstallation:indicatestheminimumsystemrequirementsforthe
installationoftheWinPasssoftware.
2) TheWinPassinstallationprocedure:explainsthesoftwareinstallationprocedure.
3) HowtouseExpressSetUpprogram:explainstheproceduretousetheExpressSetUp
programtodefinesystemcomponents.
4) Theloginprocedure:explainshowtologintotheWinPasssoftware.
5) Howto performabackup:explainshowtoperformabackupofthesystemtables.
6) HowtouninstallWinPass:explainstheproceduretouninstalltheWinPasssoftwarefromyour
computer.
WinPass Utilities
SECTION 2SECTION 2
SECTION 2SECTION 2
SECTION 2

DN1237-0003 © 1997-2000 Kantech Systems Inc. 1313
1313
13
SECTION 2SECTION 2
SECTION 2SECTION 2
SECTION 2 -- WinPass Utilities -- WinPass Utilities
-- WinPass Utilities -- WinPass Utilities
-- WinPass Utilities
Computer Requirements
· Pentium 90 MHz processor or faster
· 32MBRAMrecommended
· Harddrivewith20MBfreediskspaceforsoftwareinstallation
· 900,000 events archived per 30 MB of disk space
· Windows 98 operating system
· VGAMonitor
· Dedicatedcomputer not necessary(computernecessary only
for configuration and reporting, computer not required for
operation).
Software Installation
1) Insert diskette #1 in drive A:,
2) FromtheWindowsTaskbar,clickonStartandthenselectRun.
Thesystemwill display:
3) From the Run window, type A:\setup and click on OK. The
systemwilldisplaytheend-userlicenseagreement.Readthis
licensecompletely,
4) Toactivatethe“Iagree”button,scrolltotheendofthedisplay.
Click on “I agree” to continue the installation or “I do not
agree” to cancel the installation,
5) The WinPass installation procedure will start and ask to
provide registration information such as the site name, the
company name and the product serial number (can be found
on diskette #1),
Note: To stop or cancel the installation, click on Cancel at any
time during installation.
6) You will be asked to confirm the registration information
entered in Step 5,
7) Click on Yes to continue or No to modify the information,
8) You will be asked to confirm the installation path,
9) ClickonNexttoinstallWinPassinthedisplayedfolderorclick
on Browse to select another folder,
10) Thesetupwill checkyourcomputerfor theminimumsystem
requirementsandawarningmessagewillbedisplayedifyour
computer does not meet these requirements,

WW
WW
WinPass Reference ManualinPass Reference Manual
inPass Reference ManualinPass Reference Manual
inPass Reference Manual
DN1237-0003 © 1997-2000 Kantech Systems Inc.
1414
1414
14
11) Youwill beasked toconfirm theprogramfolder,
12) ClickonNext tocontinue,ortypeanew foldernameorselect
one from the displayed list,
13) Once the setup is complete, you will be prompted to view the
ReadMefileandrunExpressSetUp. Make your selections (it
isrecommendedtoviewtheReadMefileandrunExpressSetUp
before starting the program), click on Finish to complete the
installation.
WinPass is now installed on your computer. To save instal-
lation and configuration time, westrongly recommendthat
you use ExpressSetUp so that the system is fully functional
and ready to test the hardware and wiring.
Using ExpressSetUp
ExpressSetUp configures the system. Usually, if you do not
require special options, the system will be ready to be used after
you define the schedules, user access levels and cards.
1) WhenyouuseExpressSetUp,thesystemwilldisplaythelogin
window. Enter your login name and password (default:
WINPASS (not case sensitive) and click on OK to continue,
2) Enterthenumberofreadersrequiredandspecifythecontroller
type and click on OK to continue,
3) You canmodifythedoornames.Select (checkbox)thedoors
(readers)on whichAnti-Passbackisrequired (seeController
Definition Section for more on Anti-Passback). Specify the
typeof Anti-Passback(soft orhard).ClickonOKtocontinue
the installation, *
“SEE SECTION 11 IF YOU ARE USING KT-200 CONTROLLERS”

DN1237-0003 © 1997-2000 Kantech Systems Inc. 1515
1515
15
SECTION 2SECTION 2
SECTION 2SECTION 2
SECTION 2 -- WinPass Utilities -- WinPass Utilities
-- WinPass Utilities -- WinPass Utilities
-- WinPass Utilities
4) By default, the reader type is Polaris 2 with Polaris cards, to
selectadifferentreader,clickontherequestedreadertypeand
clickonOKtocontinuetheinstallation.Somereadersofferthe
possibilitythe16-digit carddriverformat,
5) SelecttheCOMportandbaudrateandclickonOKtocontinue
theinstallation. ThedefaultsettingsareCOMPort2and9600
baud rate.
Note:TheKT-300controllerselectsitscommunicationspeed
automatically. It can go up to 115,200 baud.
6) Once you have entered the baud rate, the system will display
the following question:
ExpressSetUpmaybeusedattheinitialinstallationoryoumayrun
ExpressSetUplater. Whetheritisthefirsttimeornot,thefollowing
warning message will appear: This operation will modify all
controllers’ data. Do you want to continue?
ClickonYESifthisisafirstinstallation.
Warning: If you are running ExpressSetUp once the system is
configured, the controller configurations including the Anti-
Passback option, REB-8, number of readers, reader types and
communication ports will be set to default. Other information
containedinthedatabase(eventtables)anduser(cards)informa-
tionwillnotbemodified.
ExpressSetUp associates the door contact for the first door of a
controller to input 1 and the second door contact to input 3. The
request-to-exit button or detector (REX) is associated to input 2
for door 1 and to input 4 for door 2. *
“SEE SECTION 11 IF YOU ARE USING KT-200 CONTROLLERS”
Afteransweringthequestion,thesystemwilldefinethenecessary
door controllers, the readers, the door contacts, the request-to-
exit detectors, etc. so you have a working system.
7) Once the system has finished the installation, the following
screen will be displayed:
8) Clickon“serialnumber”buttonandentertheserialnumberof
the KT-300 controller (8 digits). The serial number allows
communication between controllers and the computer. Click
on OK to continue the installation.
Login the System
This section describes the login procedure.
1) Click on the login button , the system will display:
2) Enter “WINPASS” asloginname,
3) Enter “WINPASS” as password,
4) Click on the OK button.
Note:Remembertochangethisdefaultpasswordoncethesystem

WW
WW
WinPass Reference ManualinPass Reference Manual
inPass Reference ManualinPass Reference Manual
inPass Reference Manual
DN1237-0003 © 1997-2000 Kantech Systems Inc.
1616
1616
16
is functional.
Onceregistered,youwillbepromptedtoconfirmthedateandtime
inorderto synchronize thedateand time betweenthecontrollers
and the computer.
The system should now be functional. Should communication
problemsbepresent,clickonConfigureWorkstation(seeWork-
station Configuration in section 5) to verify the COM port and
baud rate settings *.
“SEE SECTION 11 IF YOU ARE USING KT-200 CONTROLLERS”
Uninstalling WinPassUninstalling WinPass
Uninstalling WinPassUninstalling WinPass
Uninstalling WinPass
This section describes the procedure to remove the WinPass
software from your computer.
From the Control Panel, select Add/Remove Programs, select
WinPass and click on Add/Remove. Once the procedure is com-
pleted,ascreenwillbe displayedinformingyouthatthe removal
iscompletedbutsomefilesmustberemovedmanuallyfromyour
hard drive. To remove these files, you must:
1) ClickonMyComputer,
2) SelectC\:driveortheotherdrivewhereWinPasswasinstalled,
3) Select the WinPass directory,
4) Click onfileand selectDelete,
5) Winpass folder and directory will now be removed.
Warning: This option will delete all events and data.
1) ClickonMyComputer,
2) SelectC\:drive,
3) Select Windows folder,
4) Delete thefilenamed“winpass.ini”.
Note: If you are having trouble locating the file, you may find it
quickly by using Windows Explorer’s find feature.
Backup Procedure
Performing a regular file backup safeguards them against loss if
your hard disk fails or you accidentally overwrite or delete data.
Dependingonwhatandhowyouwanttobackup yourfiles, there
areseveraloptionsofferedwithWindows. Some oftheavailable
options are as follows:
1) Backing up selected files and folders,
2) Defining a set of files to be backed up,
3) Backing up a predefined set of files,
4) Backing up only files that have changed,
5) Backing up files quickly using drag and drop.
Belowaretheinstructionsforbackingupselectedfilesandfolders
(option1).The instructionsfor theotheroptions maybe foundin
the Windows Help menu.
From the Taskbar, click on Start and select Programs. Point to
Accessories and then from System Tools, click on Backup.
1) ClicktheBackuptab,
2) Clicktheplussign(+)nexttothedrivethatcontainsthefolders
or files you want to backup,
3) To select all the files in the folder, click the box next to it. To
select only certain files, click the icon for the folder that
contains the files, and then click the box next to each file on
the right side of the window,
4) Click Next Step, click the destination where you want the
backed up files to be stored, and then click Start Backup,
5) Enter a name for the backup set.
Upgrade Procedure
To upgrade your system, follow the installation procedure.

DN1237-0003 © 1997-2000 Kantech Systems Inc. 1717
1717
17
SECTION 2SECTION 2
SECTION 2SECTION 2
SECTION 2 -- WinPass Utilities -- WinPass Utilities
-- WinPass Utilities -- WinPass Utilities
-- WinPass Utilities

WW
WW
WinPass Reference ManualinPass Reference Manual
inPass Reference ManualinPass Reference Manual
inPass Reference Manual
DN1237-0003 © 1997-2000 Kantech Systems Inc.
1818
1818
18
Withinthissection,youwillfind:
1) ThecompletedescriptionofallthefeaturescontainedinthemainmenuoftheWinPass
software,
2) Acompletedescriptionofallthetoolbarsincludedin the WinPasssoftware,
3) Acompletedescriptionofallthecommonbuttons(filetools)usedthroughoutthesystem,
4) Apreviewof the system’sfeaturesand capacities
WinPass Basics
SECTION 3SECTION 3
SECTION 3SECTION 3
SECTION 3

DN1237-0003 © 1997-2000 Kantech Systems Inc. 1919
1919
19
SECTION 3SECTION 3
SECTION 3SECTION 3
SECTION 3 -- WinPass asics -- WinPass asics
-- WinPass asics -- WinPass asics
-- WinPass asics
Main Menu
1) ActivemenuorSub-menu:
The description in brackets [Main,]indicates the active menu.
2) WinPass:
The first caption is the program name.
3) AlleventsTAB:
This tab lists all the system events as defined in each of the
event’s display schedule.
4) AcknowledgedeventsTAB:
This tab contains all the events which have been acknowledged
bytheoperator. Forexample: “Doorforcedopen”eventhasbeen
defined to be acknowledged by the operator. This option is set
under the event definition menu.
5) DeviceseventsTAB:
This tab contains all events related to components such as:
controllers, doors, relays, inputs and outputs.
6) OperatoreventsTAB:
This tab contains events generated by the operator’s activities
suchas:programmation,manualmodifications,relayactivation,
reader disable, etc.
7) Operator:
Displays the name of the operator currently logged on.
8) Version:
Displays the version of the software.
9) Lastevent:
Displays the last recorded event.
10) Lastalarm:
Displays the last acknowledged alarm event.
11) On-linehelp:
TheHELPbuttonprovidescontext-sensitivehelp. Forexample,
byclickingonHELPinDoorDefinition,thehelptopicsprovided
willberelatedtothe Door Definition menu.
12) FilteredeventsTAB:
Thistabcontainsalltheeventswhichmatchthecharacterstring
found at the top of that table.
13) AccesseventsTAB
This tab contains all the events generated during door access
by users.

WW
WW
WinPass Reference ManualinPass Reference Manual
inPass Reference ManualinPass Reference Manual
inPass Reference Manual
DN1237-0003 © 1997-2000 Kantech Systems Inc.
2020
2020
20
14) Gotolast:
Thisoptionrepositionsthe cursor on themostrecentevent in the
current table (tab). It also activates the automatic positioning.
Since this requires use of a background task, the tables are
momentarily locked during this operation and cannot be
accessed.
It is possible to view the search progress on the taskbar
and in the progress window.
15) Findnext:
This option allows you to search using the Find option from the
actual cursor position (see Find option).
16) Find:
This option allows you to search events tables using one or more
keywords. Thesystemsearchesfromthemostrecenttotheoldest
event.Thetables willbe locked duringasearch andcannotbe
accessed during this period, because the system is using a
background task to complete the search.
It is possible to view the search progress on the taskbar or
in the progress window.
17) Moreinfo:
By double-clicking on an event, you can view additional details
concerning that event. For instance, in an access event, an
additional screen displaying the cardholder’s picture (if pictures
are assigned in User Definition) is displayed. The “More Info”
button is refreshed each time a new event is generated.
18) Dateandtime:
This section displays the system’s date and time.
Tool ar Menus
Toolbarmenusareusedthroughoutthesystemtoperformvarious
actions or operations in the system.
TheMain toolbar:
After operator login, the main menu bar provides access to the
sub-menusandenablestheoperator toaccess help,logoutorexit
the system.
TheConfiguration toolbar
Letsyoudefinehowthecomponentsworkandrelatetoeachother.
You can define workstations, controllers, doors, relays, inputs
and auxiliary outputs.
TheDefinitiontoolbar
Lets you define schedules, access levels, holidays, event display
andcolor,systemoperatorpasswordandoperatorsecuritylevels.
Operationtoolbar
Lets you perform manual operations on doors, relays, inputs and
outputs.Youcanalsoviewthevariouscomponentsstatus,create
a card list, reload controllers, change the date and time of your
system and re-index the tables.
File Tools ( uttons)
12 3 4 5
6 7 8
1) TheLINKbutton:
This option is used to display the relationships between the
component being edited and other components of the system.
When used, it will display a screen containing two windows, the
firstonerepresentingthecategory and the second one represent-
ing a component. By clicking on a category, you can view all
components which are linked and may be affected by editing the
selected record.
2) TheNEWbutton:
This option is used to add a record to file. It will clear the actual
screenand leaveablanknewpageforthenew information.Once
saved, the system controllers will be updated with the new
information.
3) TheDELETEbutton:
This option is used to remove a record from the database. Once
this option is activated, WinPass verifies the links between the
components,willwarntheoperatoroftheselinksandwillrequire
aconfirmation.Oncethedeletionisconfirmed,thesystemcontrol-
lers will be updated as necessary.
4) TheSAVEbutton:
This option is used after a new record has been created or after a
record has been modified. Once pressed, the system controllers
This manual suits for next models
1
Table of contents