EN-Product Brochures

7 things to consider when migrating to an IP access control system

Issue link: https://resources.genetec.com/i/1458579

Contents of this Issue

Navigation

Page 0 of 1

7 things to consider when migrating to an IP access control system Guide for migrating to an IP access control system What type of hardware do you have? Migrating to an IP-based access control system (ACS) is simplified if: • your existing system uses non-proprietary cards and readers • your existing intelligent controllers and downstream interface panels are built on an open architecture A full replacement of legacy readers is required if: • your existing readers support proprietary communication Ready to migrate to an IP-based access control system? A successful migration requires planning and careful consideration. Before you start, you should evaluate your existing system to determine how much time and money will be required to make the switch. Here are 7 things to keep in mind for a smooth migration. 1 What software do you need to port over? Before migrating, you will need to consider the native data in the legacy credentials, the tools used to export that information from the current database, and any third-party components integrated into the configuration through the Software Development Kit (SDK). 2 Can your network handle the migration? When migrating from a distributed system with both local and remote sites to a PoE access control solution, you'll need to think about potential latency and bandwidth issues regarding communication between sites. 3 How is your existing system wired? It may be possible to reuse some of your existing wiring in the new IP-based ACS. Before migration, compare the characteristics of the existing cabling against the requirements for the new equipment. If your organization is looking to expand its current ACS during migration, you'll need to keep in mind that extra wiring will be required. 4

Articles in this issue

view archives of EN-Product Brochures - 7 things to consider when migrating to an IP access control system