AXIS A1210-B Network Door Controller

Solution overview

The network door controller can easily be connected to and powered by your existing IP network with no need for special cabling.

Each network door controller is an intelligent device that is easily mounted close to a door. It can power and control up to two readers.

Get started

Find the device on the network

To find Axis devices on the network and assign them IP addresses in Windows®, use AXIS IP Utility or AXIS Device Manager. Both applications are free and can be downloaded from axis.com/support.

For more information about how to find and assign IP addresses, go to How to assign an IP address and access your device.

Browser support

You can use the device with the following browsers:

ChromeTM

Firefox®

EdgeTM

Safari®

Windows®

recommended

recommended

macOS®

recommended

recommended

Linux®

recommended

recommended

Other operating systems

✓*

*To use AXIS OS web interface with iOS 15 or iPadOS 15, go to Settings > Safari > Advanced > Experimental Features and disable NSURLSession Websocket.

If you need more information about recommended browsers, go to AXIS OS Portal.

Open the device's webpage

  1. Open a browser and type the IP address or host name of the Axis device.

    If you do not know the IP address, use AXIS IP Utility or AXIS Device Manager to find the device on the network.

  2. Type the username and password. If you access the device for the first time, you must set the root password. See Set a new password for the root account.

Set a new password for the root account

The default administrator username is root. There’s no default password for the root account. You set a password the first time you log in to the device.

  1. Type a password. Follow the instructions about secure passwords. See Secure passwords.

  2. Retype the password to confirm the spelling.

  3. Click Add user.

Important

If you lose the password for the root account, go to Reset to factory default settings and follow the instructions.

Secure passwords

Important

Axis devices send the initially set password in clear text over the network. To protect your device after the first login, set up a secure and encrypted HTTPS connection and then change the password.

The device password is the primary protection for your data and services. Axis devices do not impose a password policy as they may be used in various types of installations.

To protect your data we strongly recommend that you:

  • Use a password with at least 8 characters, preferably created by a password generator.

  • Don’t expose the password.

  • Change the password at a recurring interval, at least once a year.

Verify that no one has tampered with the firmware

  1. To make sure that the device has its original Axis firmware, or to take full control of the device after a security attack:
  2. Reset to factory default settings. See Reset to factory default settings.

    After the reset, secure boot guarantees the state of the device.

  3. Configure and install the device.

Webpage overview

This video gives you an overview of the device interface.

Axis device web interface

Configure your device

For how to configure your device, see AXIS Camera Station user manual or third-party solutions.

The device interface

To reach the device interface, type the device’s IP address in a web browser.

Note

Support for the features and settings described in this section varies between devices.

Show or hide the main menu.

Access the product help.

Change the language.

Set light theme or dark theme.

The user menu contains:

  • Information about the user who is logged in.

  • Change user : Log out the current user and log in a new user.

  • Log out : Log out the current user.

The context menu contains:

  • Analytics data: Accept to share non-personal browser data.

  • Feedback: Share any feedback to help us improve your user experience.

  • Legal: View information about cookies and licenses.

  • About: View device information, including firmware version and serial number.

  • Legacy device interface: Change the device interface to the legacy device interface.

Status

NTP sync

Shows NTP synchronization information, including if the device is in sync with an NTP server and the time remaining until the next sync.

NTP settings: Click to go to the Date and time page where you can change the NTP settings.

Device info

Shows device information, including firmware version and serial number.

Upgrade firmware: Click to go to the Maintenance page where you can do a firmware upgrade.

Access control

Alarms

Device motion: It is enabled by default to trigger an alarm in your system when device motion of the door controller is detected.

Casing open: It is enabled by default to trigger an alarm in your system when casing open of the door controller is detected.

External tamper: It is not enabled by default. Turn on to trigger an alarm in your system when external tamper is detected. For example, when the external cabinet is opened or closed.

  • Supervised input: Turn on to monitor the input state and configure the end-of-line resistors.

    • To use parallel first connection, select Parallel first connection with a 22 KΩ parallel resistor and a 4.7 KΩ serial resistor.

    • To use serial first connection, select Serial first connection and select a resistor value from the Resistor values drop-down list.

Peripherals

Upgrade readers: Click to upgrade readers to a new firmware version. Only supported readers can be upgraded when they are online.

System

Date and time

The time format depends on the web browser’s language settings.

Note

We recommend you to synchronize the device’s date and time with an NTP server.

Synchronization: Select an option for synchronizing the device’s date and time.

  • Automatic date and time (manual NTS KE servers): Synchronize with the secure NTP key establishment servers connected to the DHCP server.

    • Manual NTS KE servers: Enter the IP address of one or two NTP servers. When you use two NTP servers, the device synchronizes and adapts its time based on input from both.

  • Automatic date and time (NTP servers using DHCP): Synchronize with the NTP servers connected to the DHCP server.

    • Fallback NTP servers: Enter the IP address of one or two fallback servers.

  • Automatic date and time (manual NTP servers): Synchronize with NTP servers of your choice.

    • Manual NTP servers: Enter the IP address of one or two NTP servers. When you use two NTP servers, the device synchronizes and adapts its time based on input from both.

  • Custom date and time: Manually set the date and time. Click Get from system to fetch the date and time settings once from your computer or mobile device.

  • Time zone: Select which time zone to use. Time will be automatically adjusted for daylight saving time and standard time.
Note

The system uses the date and time settings in all recordings, logs and system settings.

Network

IPv4

Assign IPv4 automatically: Select to let the network router assign an IP address to the device automatically. We recommend automatic IP (DHCP) for most networks.

IP address: Enter a unique IP address for the device. Static IP addresses can be assigned at random within isolated networks, provided that each address is unique. To avoid conflicts, we recommend you to contact your network administrator before you assign a static IP address.

Subnet mask: Enter the subnet mask to define what addresses are inside the local area network. Any address outside the local area network goes through the router.

Router: Enter the IP address of the default router (gateway) used to connect devices that are attached to different networks and network segments.

IPv6

Assign IPv6 automatically: Select to turn on IPv6 and to let the network router assign an IP address to the device automatically.

Hostname

Assign hostname automatically: Select to let the network router assign a hostname to the device automatically.

Hostname: Enter the hostname manually to use as an alternative way of accessing the device. The Hostname is used in the server report and in the system log. Allowed characters are A–Z, a–z, 0–9 and -.

DNS servers

Assign DNS automatically: Select to let the network router assign search domains and DNS server addresses to the device automatically. We recommend automatic DNS (DHCP) for most networks.

Search domains: When you use a hostname that is not fully qualified, click Add search domain and enter a domain in which to search for the hostname used by the device.

DNS servers: Click Add DNS server and enter the IP address of the DNS server. This provides the translation of hostnames to IP addresses on your network.

HTTP and HTTPS

Allow access through: Select if a user is allowed to connect to the device through the HTTP, HTTPS, or both HTTP and HTTPS protocols.

HTTPS is a protocol that provides encryption for page requests from users and for the pages returned by the web server. The encrypted exchange of information is governed by the use of an HTTPS certificate, which guarantees the authenticity of the server.

To use HTTPS on the device, you must install an HTTPS certificate. Go to System > Security to create and install certificates.

Note

If you view encrypted web pages through HTTPS, you might experience a drop in performance, especially when you request a page for the first time.

HTTP port: Enter the HTTP port to use. Port 80 or any port in the range 1024-65535 are allowed. If you are logged in as an administrator, you can also enter any port in the range 1-1023. If you use a port in this range, you get a warning.

HTTPS port: Enter the HTTPS port to use. Port 443 or any port in the range 1024-65535 are allowed. If you are logged in as an administrator, you can also enter any port in the range 1-1023. If you use a port in this range, you get a warning.

Certificate: Select a certificate to enable HTTPS for the device.

Network discovery protocols

Bonjour®: Turn on to allow automatic discovery on the network.

Bonjour name: Enter a friendly name to be visible on the network. The default name is the device name and MAC address.

UPnP®: Turn on to allow automatic discovery on the network.

UPnP name: Enter a friendly name to be visible on the network. The default name is the device name and MAC address.

WS-Discovery: Turn on to allow automatic discovery on the network.

One-click cloud connection

One-click cloud connection (O3C) together with an O3C service provides easy and secure internet access to live and recorded video from any location. For more information, see axis.com/end-to-end-solutions/hosted-services.

Allow O3C:

  • One-click: The default setting. Press and hold the control button on the device to connect to an O3C service over the internet. You need to register the device with the O3C service within 24 hours after you press the control button. Otherwise, the device disconnects from the O3C service. Once you have registered the device, Always is enabled and the device stays connected to the O3C service.

  • Always: The device constantly attempts to connect to an O3C service over the internet. Once you have registered the device, it stays connected to the O3C service. Use this option if the control button on the device is out of reach.

  • No: Disables the O3C service.

Proxy settings: If needed, enter the proxy settings to connect to the proxy server.

Host: Enter the proxy server’s address.

Port: Enter the port number used for access.

Login and Password: If needed, enter username and password for the proxy server.

Authentication method:

  • Basic: This method is the most compatible authentication scheme for HTTP. It’s less secure than the Digest method because it sends the username and password unencrypted to the server.

  • Digest: This method is more secure because it always transfers the password encrypted across the network.

  • Auto: This option lets the device select the authentication method depending on the supported methods. It prioritizes the Digest method over the Basic method.

Owner authentication key (OAK): Click Get key to fetch the owner authentication key. This is only possible if the device is connected to the internet without a firewall or proxy.

SNMP

The Simple Network Management Protocol (SNMP) allows remote management of network devices.

SNMP: Select the version of SNMP to use.

  • v1 and v2c:

    • Read community: Enter the community name that has read-only access to all supported SNMP objects. The default value is public.

    • Write community: Enter the community name that has read/write access to all supported SNMP objects (except read-only objects). The default value is write.

    • Activate traps: Turn on to activate trap reporting. The device uses traps to send messages for important events or status changes to a management system. In the device interface, you can set up traps for SNMP v1 and v2c. Traps are automatically turned off if you change to SNMP v3 or turn off SNMP. If you use SNMP v3, you can set up traps through the SNMP v3 management application.

    • Trap address: Enter the IP address or host name of the management server.

    • Trap community: Enter the community to use when the device sends a trap message to the management system.

    • Traps:

      • Cold start: Sends a trap message when the device starts.

      • Warm start: Sends a trap message when you change an SNMP setting.

      • Link up: Sends a trap message when a link changes from down to up.

      • Authentication failed: Sends a trap message when an authentication attempt fails.

Note

All Axis Video MIB traps are enabled when you turn on SNMP v1 and v2c traps. For more information, see AXIS OS Portal > SNMP.

  • v3: SNMP v3 is a more secure version, which provides encryption and secure passwords. To use SNMP v3, we recommend you to activate HTTPS, as the password is then sent through HTTPS. This also prevents unauthorized parties to access unencrypted SNMP v1 and v2c traps. If you use SNMP v3, you can set up traps through the SNMP v3 management application.

    • Password for the account “initial”: Enter the SNMP password for the account named “initial”. Although the password can be sent without activating HTTPS, we don’t recommend it. The SNMP v3 password can only be set once, and preferably only when HTTPS is enabled. Once the password is set, the password field is no longer displayed. To set the password again, you must reset the device to factory default settings.

Connected clients

The list shows all clients that are connected to the device.

Update: Click to refresh the list.

Security

Certificates

Certificates are used to authenticate devices on a network. The device supports two types of certificates:

  • Client/server certificates

    A client/server certificate validates the device’s identity, and can be self-signed or issued by a Certificate Authority (CA). A self-signed certificate offers limited protection and can be used before a CA-issued certificate has been obtained.

  • CA certificates

    You can use a CA certificate to authenticate a peer certificate, for example to validate the identity of an authentication server when the device connects to a network protected by IEEE 802.1X. The device has several pre-installed CA certificates.

These formats are supported:

  • Certificate formats: .PEM, .CER, and .PFX

  • Private key formats: PKCS#1 and PKCS#12

Important

If you reset the device to factory default, all certificates are deleted. Any pre-installed CA certificates are reinstalled.

Filter the certificates in the list.

Add certificate : Click to add a certificate.

The context menu contains:

  • Certificate information: View an installed certificate’s properties.

  • Delete certificate: Delete the certificate.

  • Create certificate signing request: Create a certificate signing request to send to a registration authority to apply for a digital identity certificate.

IEEE 802.1x

IEEE 802.1x is an IEEE standard for port-based network admission control providing secure authentication of wired and wireless network devices. IEEE 802.1x is based on EAP (Extensible Authentication Protocol).

To access a network protected by IEEE 802.1x, network devices must authenticate themselves. The authentication is performed by an authentication server, typically a RADIUS server (for example FreeRADIUS and Microsoft Internet Authentication Server).

Certificates

When configured without a CA certificate, server certificate validation is disabled and the device tries to authenticate itself regardless of what network it is connected to.

When using a certificate, in Axis' implementation, the device and the authentication server authenticate themselves with digital certificates using EAP-TLS (Extensible Authentication Protocol - Transport Layer Security).

To allow the device to access a network protected through certificates, a signed client certificate must be installed on the device.

Client certificate: Select a client certificate to use IEEE 802.1x. The authentication server uses the certificate to validate the client’s identity.

CA certificate: Select a CA certificate to validate the authentication server’s identity. When no certificate is selected, the device tries to authenticate itself regardless of what network it is connected to.

EAP identity: Enter the user identity associated with the client certificate.

EAPOL version: Select the EAPOL version that is used in the network switch.

Use IEEE 802.1x: Select to use the IEEE 802.1x protocol.

Prevent brute-force attacks

Blocking: Turn on to block brute-force attacks. A brute-force attack uses trial-and-error to guess login info or encryption keys.

Blocking period: Enter the number of seconds to block a brute-force attack.

Blocking conditions: Enter the number of authentication failures allowed per second before the block starts. You can set the number of failures allowed both on page level and device level.

IP address filter

Use filter: Select to filter which IP addresses that are allowed to access the device.

Policy: Choose whether to Allow access or Deny access for certain IP addresses.

Addresses: Enter the IP numbers that are either allowed or denied access to the device. You can also use the CIDR format.

Custom-signed firmware certificate

To install test firmware or other custom firmware from Axis on the device, you need a custom-signed firmware certificate. The certificate verifies that the firmware is approved by both the device owner and Axis. The firmware can only run on a specific device which is identified by its unique serial number and chip ID. Custom-signed firmware certificates can only be created by Axis, since Axis holds the key to sign them.

Click Install to install the certificate. You need to install the certificate before you install the firmware.

Users

Add user: Click to add a new user. You can add up to 100 users.

Username: Enter a unique username.

New password: Enter a password for the user. Passwords must be 1 to 64 characters long. Only ASCII printable characters (code 32 to 126) are allowed in the password, for example letters, numbers, punctuation, and some symbols.

Repeat password: Enter the same password again.

Role:

  • Administrator: Has full access to all settings. Administrators can also add, update, and remove other users.

  • Operator: Has access to all settings except:

    • All System settings.

    • Adding apps.

  • Viewer: Doesn’t have access to change any settings.

The context menu contains:

Update user: Edit the user’s properties.

Delete user: Delete the user. You can’t delete the root user.

MQTT

MQTT (Message Queuing Telemetry Transport) is a standard messaging protocol for the Internet of Things (IoT). It was designed for simplified IoT integration and is used in a wide variety of industries to connect remote devices with a small code footprint and minimal network bandwidth. The MQTT client in Axis device firmware can simplify integration of data and events produced in the device to systems which are not video management systems (VMS).

Set up the device as an MQTT client. MQTT communication is based on two entities, the clients and the broker. The clients can send and receive messages. The broker is responsible for routing messages between clients.

You can learn more about MQTT in AXIS OS Portal.

MQTT client

Connect: Turn on or off the MQTT client.

Status: Shows the current status of the MQTT client.

Broker

Host: Enter the hostname or IP address of the MQTT server.

Protocol: Select which protocol to use.

Port: Enter the port number.

  • 1883 is the default value for MQTT over TCP

  • 8883 is the default value for MQTT over SSL

  • 80 is the default value for MQTT over WebSocket

  • 443 is the default value for MQTT over WebSocket Secure

Username: Enter the username that the client will use to access the server.

Password: Enter a password for the username.

Client ID: Enter a client ID. The client identifier is sent to the server when the client connects to it.

Clean session: Controls the behavior at connection and disconnection time. When selected, the state information is discarded at connect and disconnect.

Keep alive interval: The keep alive interval enables the client to detect when the server is no longer available without having to wait for the long TCP/IP timeout.

Timeout: The time interval in seconds to allow a connect to complete. Default value: 60

Device topic prefix: Used in the default values for the topic in the connect message and LWT message on the MQTT client tab, and in the publication conditions on the MQTT publication tab.

Reconnect automatically: Specifies whether the client should reconnect automatically after a disconnect.

Connect message

Specifies if a message should be sent out when a connection is established.

Send message: Turn on to send messages.

Use default: Turn off to enter your own default message.

Topic: Enter the topic for the default message.

Payload: Enter the content for the default message.

Retain: Select to keep the state of client on this Topic

QoS: Change the QoS layer for the packet flow.

Last Will and Testament message

The Last Will Testament (LWT) lets a client provide a testament along with its credentials when connecting to the broker. If the client disconnects ungracefully at some point later (maybe because his power source died), it can let the broker deliver a message to other clients. This LWT message has the same form as an ordinary message and gets routed via the same mechanics.

Send message: Turn on to send messages.

Use default: Turn off to enter your own default message.

Topic: Enter the topic for the default message.

Payload: Enter the content for the default message.

Retain: Select to keep the state of client on this Topic

QoS: Change the QoS layer for the packet flow.

MQTT publication

Use default topic prefix: Select to use the default topic prefix, that is defined in the device topic prefix in the MQTT client tab.

Include topic name: Select to include the topic that describes the condition in the MQTT topic.

Include topic namespaces: Select to include ONVIF topic namespaces in the MQTT topic.

Include serial number: Select to include the device’s serial number in the MQTT payload.

Add condition: Click to add a condition.

Retain: Defines which MQTT messages are sent as retained.

  • None: Send all messages as non-retained.

  • Property: Send only stateful messages as retained.

  • All: Send both stateful and stateless messages as retained.

QoS: Select the desired level for the MQTT publication.

MQTT subscriptions

Add subscription: Click to add a new MQTT subscription.

Subscription filter: Enter the MQTT topic that you want to subscribe to.

Use device topic prefix: Add the subscription filter as prefix to the MQTT topic.

Subscription type:

  • Stateless: Select to convert MQTT messages into a stateless message.

  • Stateful: Select to convert MQTT messages into a condition. The payload is used as the state.

QoS: Select the desired level for the MQTT subscription.

Accessories

I/O ports

Use digital input to connect external devices that can toggle between an open and closed circuit, for example PIR sensors, door or window contacts, and glass break detectors.

Use digital output to connect external devices such as relays and LEDs. You can activate connected devices through the VAPIX® Application Programming Interface or in the device interface.

Port

Name: Edit the text to rename the port.

Direction: indicates that the port is an input port. indicates that it’s an output port. If the port is configurable, you can click the icons to change between input and output.

Normal state: Click open circuit, and for closed circuit.

Current state: Shows the current state of the port. The input or output is activated when the current state is different from the normal state. An input on the device has an open circuit when it’s disconnected or when there is a voltage above 1 V DC.

Note

During restart the output circuit is open. When the restart is complete, the circuit goes back to the normal position. If you change any settings on this page, the output circuits go back to their normal positions regardless of any active triggers.

Supervised: Turn on to make it possible to detect and trigger actions if someone tampers with the connection to digital I/O devices. In addition to detecting if an input is open or closed, you can also detect if someone has tampered with it (that is, cut or shorted). To supervise the connection requires additional hardware (end-of-line resistors) in the external I/O loop.

Logs

Reports and logs

Reports

  • View the device server report: Click to show information about the product status in a pop-up window. The Access Log is automatically included in the Server Report.

  • Download the device server report: Click to download the server report. It creates a .zip file that contains a complete server report text file in UTF–8 format, as well as a snapshot of the current live view image. Always include the server report .zip file when you contact support.

  • Download the crash report: Click to download an archive with detailed information about the server's status. The crash report contains information that is in the server report as well as detailed debug information. This report might contain sensitive information such as network traces. It can take several minutes to generate the report.

Logs

  • View the system log: Click to show information about system events such as device startup, warnings and critical messages.

  • View the access log: Click to show all failed attempts to access the device, for example when a wrong login password is used.

Network trace

Important

A network trace file might contain sensitive information, for example certificates or passwords.

A network trace file can help you troubleshoot problems by recording activity on the network. Select the duration of the trace in seconds or minutes, and click Download.

Remote system log

Syslog is a standard for message logging. It allows separation of the software that generates messages, the system that stores them, and the software that reports and analyzes them. Each message is labeled with a facility code, which indicates the software type generating the message, and assigned a severity level.

Server: Click to add a new server.

Host: Enter the hostname or IP address of the server.

Format: Select which syslog message format to use.

    • RFC 3164

    • RFC 5424

    Protocol: Select the protocol and port to use:

    • UDP (Default port is 514)

    • TCP (Default port is 601)

    • TLS (Default port is 6514)

    Severity: Select which messages to send when triggered.

    CA certificate set: See the current settings or add a certificate.

    Maintenance

    Restart: Restart the device. This does not affect any of the current settings. Running applications restart automatically.

    Restore: Return most settings to the factory default values. Afterwards you must reconfigure the device and apps, reinstall any apps that didn’t come preinstalled, and recreate any events and PTZ presets.

    Important

    The only settings saved after restore are:

    • Boot protocol (DHCP or static)
    • Static IP address
    • Default router
    • Subnet mask
    • 802.1X settings
    • O3C settings

    Factory default: Return all settings to the factory default values. Afterwards you must reset the IP address to make the device accessible.

    Note

    All Axis device firmware is digitally signed to ensure that you only install verified firmware on your device. This further increases the overall minimum cybersecurity level of Axis devices. For more information, see the white paper “Signed firmware, secure boot, and security of private keys” at axis.com.

    Firmware upgrade: Upgrade to a new firmware version. New firmware releases can contain improved functionality, bug fixes, and completely new features. We recommend you to always use the latest release. To download the latest release, go to axis.com/support.

    • When you upgrade, you can choose between three options:
    • Standard upgrade: Upgrade to the new firmware version.

    • Factory default: Upgrade and return all settings to the factory default values. When you choose this option, you can’t revert to the previous firmware version after the upgrade.

    • Autorollback: Upgrade and confirm the upgrade within the set time. If you don’t confirm, the device reverts to the previous firmware version.

    Firmware rollback: Revert to the previously installed firmware version.

    Learn more

    Security

    Signed firmware

    Signed firmware is implemented by the software vendor signing the firmware image with a private key. When a firmware has this signature attached to it, a device will validate the firmware before accepting to install it. If the device detects that the firmware integrity is compromised, the firmware upgrade will be rejected.

    Secure boot

    Secure boot is a boot process that consists of an unbroken chain of cryptographically validated software, starting in immutable memory (boot ROM). Being based on the use of signed firmware, secure boot ensures that a device can boot only with authorized firmware.

    Axis Edge Vault

    Axis Edge Vault is a secure cryptographic compute module which can be used for cryptographic operations on securely stored certificates. Edge Vault provides tamper protected storage, enabling each device to protect its secrets. It sets a foundation for safe implementation of more advanced security features.

    Axis device ID

    Axis device ID works like a digital passport, unique for each device unit. It is securely and permanently stored in Edge Vault as a certificate signed by Axis root certificate. Axis device ID is designed to prove the origin of the device, enabling a new level of device trust through the life cycle of the product.

    To learn more about cybersecurity features in Axis devices, go to axis.com/learning/white-papers and search for cybersecurity.

    Specifications

    Product overview

    1. Network connector
    2. Grounding position
    3. Relay jumper
    4. Power connector
    5. Relay connector
    6. Door connector
    7. Reader connector
    8. Auxiliary connector
    9. External connectors
    10. Control button

    Text marked with UL is only valid for UL 294 installations.

    Requirements for compliance with UL 294

    This section contains information and instructions required for UL compliance. To make sure the installation is UL compliant, follow the instructions below in addition to the general information and instructions provided throughout this document. In cases where pieces of information contradict each other, the requirements for UL compliance always replace general information and instructions.

    Performance levels for access control

    This section contains performance level information required for UL 294 compliance.

    FeatureLevel
    Destructive attack testI
    SecurityI
    EnduranceIV
    Standby powerI
      • Supported readers
      • For UL 294, compatibility with the following readers has been verified by UL: AXIS A4020-E, AXIS A4120–E and HID Signo 20.

      • Safety instructions
      • Shall be installed in accordance with Article 725.121 of the National Electrical Code, ANSI/NFPA 70.

      • The Axis product shall be installed and serviced by a factory trained professional.

      • The Axis product shall be installed within the protected premises (secured area).

      • The Axis product shall be mounted indoors. Outdoor use has not been evaluated or approved by UL.

      • All interconnecting devices shall be UL listed and Class 2 low-voltage power limited.

      • All power outputs are Class 2 outputs.

      • All wiring methods shall be performed in accordance with ANSI/NFPA70, local codes and authorities having jurisdiction.

      • Recommend to use UL recognized grounding wire, a size of 14-16 AWG, yellow/green color. Crimp the cable on the non-insulated wire pressure ring terminal which is being delivered as a spare part of the product. Important to use proper crimping tool and techniques to ensure the safety of product and user.

      • When the Axis product has reached the end of its useful life, dispose of it according to local laws and regulations. The product should not be disposed of together with household or commercial waste.

      • Do not connect the Axis product to a receptacle controlled by a switch.

      • Battery

        • The 3.0 V lithium battery used by the Axis product is a UL recognized component. (Type: BR2032, diameter: 20 mm (0.78 in), manufacturers: Power Glory (Omnergy)). The following battery type is also a UL recognized component: Type CR2032.

        • Users shall not replace the battery. If the battery needs replacing, it must be done by a trained technician only.

        • Used batteries shall be disposed of according to local laws and regulations, which may vary from state to state. Waste BR/CR lithium cells are neither listed nor exempted from the USEPA hazardous waste regulations. Waste lithium batteries can be considered reactive hazardous waste if there is a significant amount of unreacted, or unconsumed lithium remaining. For information about how to dispose of used lithium batteries, contact your local authority for waste disposal.

      • Specifications
      • Operating conditions

      • Normal use (not evaluated by UL)

        -40 °C to 55 °C (-40 °F to 131 °F)

        Humidity 20–85% RH (non-condensing)

        UL 294 0 °C to 55 °C (32 °F to 131 °F), maximum humidity 85%.

        Intended for use in UL listed enclosure with tamper switch.

      • Wiring requirements

        • UL listed or R/C AWM wires that have a conductor gauge range of AWG 22–14 shall be used.

        • The minimum conductor gauge for connection between the power sourcing equipment (PSE) or power injector and the powered device (PD) is 26 AWG.

        • Minimum PoE category 5e, shielded cable, required for PoE.

        • This product is not intended for outside wiring as covered by Article 800 in the National Electrical Code, NFPA 70.

      • Connectors

        • Power Connector – For UL security applications, the product shall be powered by a UL 294 or UL 603 listed Class 2 low-voltage power SELV and limited power supply with appropriate ratings.

        • External power to relays - If the relays are connected to an external power source this must be UL 294 listed Class 2 low-voltage power SELV and limited power supply.

        • Network Connector –  Standard Ethernet wiring. Evaluated by UL when powered from AXIS T8133 Midspan 30 W 1-port in PoE Mode B (alternative A).

        • Battery input is for connection to a listed UPS and has not been evaluated by UL to UL 294.

        • Supervised inputs were not evaluated by UL for burglar use.

      • System considerations

        • Monitoring software was not evaluated by UL, and is for supplemental use.

      • Maintenance instructions

        • For maintenance instructions and for information about how to configure the Axis product, see the User Manual.

      • Further information

        • Card formats verified by UL: ISO Cards Mifare 1K, 32 bits.

      • Power

        • Power in: 10.5–28 V DC, max 36 W, max 2.4 A at 10.5 V, max 0.9 A at 28 V. Power over Ethernet (PoE)IEEE 802.3atType 2Class 4, max 340 mA. 12 V battery as backup.

        • Relay: 2x relay NO/NC, max 2 A DC

        • Power out lock: 2x 12/24 V DC,
          With PoE+: at 12 V, 11 W, at 24 V, 10 W
          With DC in: at 12 V, 22.5 W, at 24 V, 18 W

        • Power out reader: 12 V DC, max 6 W

        • Auxiliary DC output: 1x 12 V DC output, max 200 mA

        • Total power budget for peripheral devices (locks, readers etc.): 2100 mA at 12 V if powered by DC, 1300 mA at 12 V if powered by PoE Class 4

      • I/O interface – I/O functionality

        • Reader I/O: DC output: 2x 12 V DC output, max 486 mA; 2x2 configurable supervised inputs/outputs (digital input: 0 to max 30 V DC; digital output: 0 to max 30 V DC, open drain max 100 mA)

        • Reader data: OSDP/RS485 half duplex, Wiegand

        • Auxiliary: DC output: 1x 12 V DC output, max 200 mA, 4x configurable inputs/outputs (digital input: 0 to max 30 V DC; digital output: 0 to max 30 V DC, open drain max 100 mA)

        • Door connections: 2x2 supervised inputs for door monitors and REX (digital input: 0 to max 30 V DC)

        • External: 2x configurable inputs/outputs for auxiliary equipment (digital input: 0 to max 30 V DC; digital output: 0 to max 30 V DC, open drain max 100 mA)

      • Cable requirements

        • Wire size for connectors: CSA: AWG 28–16, CUL/UL: AWG 30–14

        • DC power and relay: AWG 18-16

        • Ethernet and PoE: STP CAT 5e or higher

        • Reader data (RS485): 1 twisted pair with shield, qualified for up to 1000 m(3281 ft)

        • Reader data (Wiegand): Qualified for up to 150 m(500 ft)

        • Reader powered by controller (RS485): AWG 20-16, qualified for up to 200 m(656 ft)(Depending on the reader’s voltage and current input range. Evaluated with A4020-E and A4120-E.)

        • Reader powered by controller (Wiegand): AWG 20-16, qualified for up to 150 m(500 ft)(Depending on the reader’s voltage and current input range.)

        • I/Os as inputs: Qualified for up to 200 m(656 ft)

      LED indicators

      LEDColorIndication
      NetworkGreenSteady for connection to a 100 MBit/s network. Flashes for network activity.
      AmberSteady for connection to a 10 MBit/s network. Flashes for network activity.
      UnlitNo network connection.
      StatusGreenSteady green for normal operation.
      AmberSteady during startup and when restoring settings.
      RedSlow flash for failed upgrade.
      PowerGreenNormal operation.
      AmberFlashes green/amber during firmware upgrade.
      RelayGreenRelay active.(1)
      UnlitRelay inactive.
      1. Relay is active when COM is connected to NO.

      Buttons

      Control button

      Connectors

      Network connector

      RJ45 Ethernet connector with Power over Ethernet Plus (PoE+).

      UL: Power over Ethernet (PoE) shall be supplied by a UL 294 listed Power over Ethernet IEEE 802.3af/802.3at Type 1 Class 3 or Power over Ethernet Plus (PoE+) IEEE 802.3at Type 2 Class 4 power limited injector that provides 44–57 V DC, 15.4 W / 30 W.  Power over Ethernet (PoE) has been evaluated by UL with AXIS T8133 Midspan 30 W 1-port.

      Reader connector

      One 8-pin terminal block supporting both OSDP and Wiegand protocols for communication with the reader.

      It can connect up to two OSDP readers (multi-drop) or one Wiegand reader. 500 mA at 12 V DC is reserved for all readers connected to the door controller.

      Configured for one OSDP reader

      FunctionPinNoteSpecifications
      DC ground (GND)10 V DC
      DC output (+12 V)2Supplies power to reader.12 V DC, max 500 mA
      A 3Half duplex
      B4Half duplex

      Configured for two OSDP readers (multi-drop)

      FunctionPinNoteSpecifications
      DC ground (GND)10 V DC
      DC output (+12 V)2Supplies power to both readers.12 V DC, max 500 mA combined for both readers
      A 3Half duplex
      B4Half duplex
      Important
      • When the reader is powered by the controller, the qualified cable length is up to 200 m (656 ft). Verified only for Axis readers.
      • When the reader is not powered by the controller, the qualified cable length for reader data is up to 1000 m (3280,8 ft) if the following cable requirements are met: 1 twisted pair with shield, AWG 24, 120 ohm impedance. Verified only for Axis readers.

      Configured for one Wiegand reader

      FunctionPinNoteSpecifications
      DC ground (GND)10 V DC
      DC output (+12 V)2Supplies power to reader.12 V DC, max 500 mA
      D03
      D14
      LED 15Red LED
      LED 26Green LED
      TAMPER7Digital input — Connect to pin 1 to activate, or leave floating (unconnected) to deactivate.0 to max 30 V DC
      BUZZER8Digital output — If used with an inductive load, e.g., a relay, connect a diode in parallel with the load, to protect against voltage transients.0 to max 30 V DC, open drain, 100 mA
      Important
      • When the reader is powered by the controller, the qualified cable length is up to 150 m (500 ft).
      • When the reader is not powered by the controller, the qualified cable length for reader data is up to 150 m (500 ft) if the following cable requirement is met: AWG 22.
      Supervised inputs

      To use supervised inputs, install end of line resistors according to the diagram below.

      Parallel first connection

      The resistor values must be 4.7 kΩ and 22 kΩ.

      Serial first connection

      The resistor values must be the same and possible values are 1 kΩ, 2.2 kΩ, 4.7 kΩ and 10 kΩ.

      Note

      It is recommended to use twisted and shielded cables. Connect shielding to 0 V DC.

      Door connector

      One 4-pin terminal block for door monitoring devices (digital input).

      Only door monitor supports supervision with end of line resistors. If the connection is interrupted, an alarm is triggered. To use supervised inputs, install end of line resistors. Use the connection diagram for supervised inputs. See .

      FunctionPinNotesSpecifications
      DC ground1, 30 V DC
      Input2, 4For communicating with door monitor.
      Digital input or Supervised input — Connect to pin 1 or 3 respectively to activate, or leave floating (unconnected) to deactivate.
      0 to max 30 V DC
      Important

      The qualified cable length is up to 30 m (98.4 ft) if the following cable requirement is met: AWG 24.

      Relay connector

      One 4-pin terminal block for form C relays that can be used, for example, to control a lock or an interface to a gate.

      FunctionPinNotesSpecifications
      DC ground (GND)10 V DC
      NO2Normally open.
      For connecting relay devices. Connect a fail-secure lock between NO and DC ground.
      The two relay pins are galvanically separated from the rest of the circuitry if the jumpers are not used.
      Max current = 2 A
      Max voltage = 30 V DC
      COM3Common
      NC4Normally closed.
      For connecting relay devices. Connect a fail-safe lock between NC and DC ground.
      The two relay pins are galvanically separated from the rest of the circuitry if the jumpers are not used.

      Relay power jumper

      When the relay power jumper is fitted, it connects 12 V DC or 24 V DC to the relay COM pin.

      It can be used to connect a lock between the GND and NO, or GND and NC pins.

      Power sourceMax power at 12 V DCMax power at 24 V DC
      DC IN1 600 mA800 mA
      PoE1200 mA600 mA
      NOTICE

      If the lock is non-polarized, we recommend you to add an external flyback diode.

      Auxiliary connector

      Use the auxiliary connector with external devices in combination with, for example, motion detection, event triggering, and alarm notifications. In addition to the 0 V DC reference point and power (DC output), the auxiliary connector provides the interface to:

      Digital input –
      For connecting devices that can toggle between an open and closed circuit, for example PIR sensors, door/window contacts, and glass break detectors.
      Digital output –
      For connecting external devices such as relays and LEDs. Connected devices can be activated by the VAPIX® Application Programming Interface or from the product’s webpage.

      4-pin terminal block

      FunctionPinNotesSpecifications
      DC ground10 V DC
      DC output2Can be used to power auxiliary equipment.
      Note: This pin can only be used as power out.
      12 V DC
      Max load = 50 mA in total
      Configurable (Input or Output)3–4Digital input – Connect to pin 1 to activate, or leave floating (unconnected) to deactivate.0 to max 30 V DC
      Digital output – Internally connected to pin 1 (DC ground) when active, and floating (unconnected) when inactive. If used with an inductive load, e.g., a relay, connect a diode in parallel with the load, to protect against voltage transients. Each I/O is capable of driving 12 V DC, 50 mA (max) external load, if internal 12 V DC output (pin 2) is used. In the case of using open drain connections in combination with an external power supply, then the I/Os can manage DC supply of 0–30 V DC, 100 mA.0 to max 30 V DC, open drain, 100 mA
      1. DC ground
      2. DC output 12 V
      3. I/O configured as input
      4. I/O configured as output

      External connector

      Two 2-pin terminal blocks for external devices, for example glass break or fire detectors.

      UL: The connector has not been evaluated by UL for burglar or fire alarm use.

      FunctionPinNotesSpecifications
      DC ground10 V DC
      TAMPER2Digital input – Connect to pin 1 to activate, or leave floating (unconnected) to deactivate.0 to max 30 V DC
      FunctionPinNotesSpecifications
      DC ground10 V DC
      ALARM2Digital input – Connect to pin 1 to activate, or leave floating (unconnected) to deactivate.0 to max 30 V DC

      Power connector

      2-pin terminal block for DC power input. Use a Safety Extra Low Voltage (SELV) compliant limited power source (LPS) with either a rated output power limited to ≤100 W or a rated output current limited to ≤5 A.

      FunctionPinNotesSpecifications
      DC ground (GND)10 V DC
      DC input2For powering controller when not using Power over Ethernet.
      Note: This pin can only be used as power in.
      12 V DC, max 36 W

      UL: DC power to be supplied by a UL 294 or UL 603 listed power supply, depending on application, with appropriate ratings.

      Troubleshooting

      Reset to factory default settings

      Important

      Reset to factory default should be used with caution. A reset to factory default resets all settings, including the IP address, to the factory default values.

      To reset the product to the factory default settings:

      1. Disconnect power from the product.

      2. Press and hold the control button while reconnecting power. See Product overview.

      3. Keep the control button pressed for 25 seconds until the status LED indicator turns amber for the second time.

      4. Release the control button. The process is complete when the status LED indicator turns green. The product has been reset to the factory default settings. If no DHCP server is available on the network, the default IP address is 192.168.0.90.

      5. Use the installation and management software tools, assign an IP address, set the password, and access the product.

      You can also reset parameters to factory default through the device’s webpage. Go to Maintenance > Factory default and click Default.

      Firmware options

      Axis offers product firmware management according to either the active track or the long-term support (LTS) tracks. Being on the active track means continuously getting access to all the latest product features, while the LTS tracks provide a fixed platform with periodic releases focused mainly on bug fixes and security updates.

      Using firmware from the active track is recommended if you want to access the newest features, or if you use Axis end-to-end system offerings. The LTS tracks are recommended if you use third-party integrations, which are not continuously validated against the latest active track. With LTS, the products can maintain cybersecurity without introducing any significant functional changes or affecting any existing integrations. For more detailed information about Axis product firmware strategy, go to axis.com/support/firmware.

      Check the current firmware version

      Firmware is the software that determines the functionality of network devices. When you troubleshoot a problem, we recommend you to start by checking the current firmware version. The latest firmware version might contain a correction that fixes your particular problem.

      To check the current firmware:

      1. Go to the device interface > Status.

      2. See the firmware version under Device info.

      Upgrade the firmware

      Important
      • Preconfigured and customized settings are saved when you upgrade the firmware (provided that the features are available in the new firmware) although this is not guaranteed by Axis Communications AB.
      • Make sure the device remains connected to the power source throughout the upgrade process.
      Note

      When you upgrade the device with the latest firmware in the active track, the product receives the latest functionality available. Always read the upgrade instructions and release notes available with each new release before you upgrade the firmware. To find the latest firmware and the release notes, go to axis.com/support/firmware.

      Note

      Because the database of users, groups, credentials, and other data are updated after a firmware upgrade, the first start-up could take a few minutes to complete. The time required is dependent on the amount of data.

      1. Download the firmware file to your computer, available free of charge at axis.com/support/firmware.

      2. Log in to the device as an administrator.

      3. Go to Maintenance > Firmware upgrade and click Upgrade.

      4. When the upgrade has finished, the product restarts automatically.
      5. When the product has been restarted, clear the web browser's cache.

      Technical issues, clues, and solutions

      If you can’t find what you’re looking for here, try the troubleshooting section at axis.com/support.

      Problems upgrading the firmware

      Firmware upgrade failure

      If the firmware upgrade fails, the device reloads the previous firmware. The most common reason is that the wrong firmware file has been uploaded. Check that the name of the firmware file corresponds to your device and try again.

      Problems after firmware upgrade

      If you experience problems after a firmware upgrade, roll back to the previously installed version from the Maintenance page.

      Problems setting the IP address

      The device is located on a different subnet

      If the IP address intended for the device and the IP address of the computer used to access the device are located on different subnets, you cannot set the IP address. Contact your network administrator to obtain an IP address.

      The IP address is being used by another device

      Disconnect the Axis device from the network. Run the ping command (in a Command/DOS window, type ping and the IP address of the device):

      • If you receive: Reply from <IP address>: bytes=32; time=10... this means that the IP address may already be in use by another device on the network. Obtain a new IP address from the network administrator and reinstall the device.

      • If you receive: Request timed out, this means that the IP address is available for use with the Axis device. Check all cabling and reinstall the device.

      Possible IP address conflict with another device on the same subnet

      The static IP address in the Axis device is used before the DHCP server sets a dynamic address. This means that if the same default static IP address is also used by another device, there may be problems accessing the device.

      The device can’t be accessed from a browser

      Can’t log in

      When HTTPS is enabled, ensure that the correct protocol (HTTP or HTTPS) is used when attempting to log in. You may need to manually type http or https in the browser’s address field.

      If the password for the user root is lost, the device must be reset to the factory default settings. See Reset to factory default settings.

      The IP address has been changed by DHCP

      IP addresses obtained from a DHCP server are dynamic and may change. If the IP address has been changed, use AXIS IP Utility or AXIS Device Manager to locate the device on the network. Identify the device using its model or serial number, or by the DNS name (if the name has been configured).

      If required, a static IP address can be assigned manually. For instructions, go to axis.com/support.

      Certificate error when using IEEE 802.1X

      For authentication to work properly, the date and time settings in the Axis device must be synchronized with an NTP server. Go to System > Date and time.

      The device is accessible locally but not externally

      To access the device externally, we recommend you to use one of the following applications for Windows®:

      • AXIS Companion: free of charge, ideal for small systems with basic surveillance needs.

      • AXIS Camera Station: 30-day trial version free of charge, ideal for small to mid-size systems.

      For instructions and download, go to axis.com/vms.

      Contact support

      Contact support at axis.com/support.