We know the time and effort involved in installing commercial access control systems can be a huge undertaking. In this series, we’ll walk through some of the best practices and helpful tips and tricks we’ve gathered to help make your next installation a success. Let’s get started!
Don’t Forget, Every System is Different
Come prepared. Whether you’re installing a Linear® telephone entry system or browser-based access control system with readers, it is important to remember that every system and installation has different requirements. Assess what tools are needed and ensure you have everything necessary to complete the installation.
Wiring, Voltage, Connection… Oh My!
One essential step in a pristine installation is to measure the voltage needed for the system since power and voltage requirements vary. For example, our telephone entry systems require a minimum of nine volts and a maximum of 16 volts to be powered. If the voltage gets too low, then the system won’t function properly. This is determined by the length of the wire used – use a longer wire and the voltage becomes lower; maybe too low.
Be Sure to Test the Network
All Linear access control systems rely on a strong and secure network. Since our systems are browser-based, it is crucial to test if the network you’ll be using can support the system. If possible, have a separate network dedicated to the system or limit the number of devices used on the designated network.
It also helps to check IP addresses. Having duplicate IP addresses can wreak havoc and create bottlenecks within the system by making it unclear where to send the data, causing the network to slow down.
Keep It Segmented, Not Flat
Don’t have a flat network. In a flat network, every single access control and surveillance system is easily accessible to cyber threats where an attacker could easily gain access to every entry way and camera.
Segment your networks! By having a limited number of systems or devices on a network, it reduces the severity of a potential cyberattack. A majority of cybersecurity attacks are made internally – this threat can be reduced with network segmentation.
VPNs Are Your Friends
Port forwarding is an application of network address translation (NAT). It works by redirecting a communication request from one address and port number combination to another while the packets are traversing a router or firewall. This is a common practice that companies use thinking it is safe. In reality, any machine in the world can connect to the forwarded port at will, making the network the system is running on insecure.
This is where virtual private networks (VPNs) come into play! Using a VPN protects against hackers and plays a vital role in the overall digital defense design you give your customers.
For more reasons why you should recommend Linear commercial access control solutions for your next installation, we invite you to read our recent blog post. We want to help make all your commercial access control installs a success so please contact your local Sales Representative today!