UFC 4-021-02NF
27 September 2006
change 1, 23 October 2006
CHAPTER 3
ACCESS CONTROL SYSTEMS
3-1
OVERVIEW
3-1.1
The function of an ACS is to ensure that only authorized personnel are
permitted ingress and egress from a controlled area. The ACS should be able to log and
archive all transactions and alert authorities of unauthorized entry attempts. ACS can be
interfaced with the CCTV system to assist security personnel in the assessment of
unauthorized entry attempts.
3-1.2
As illustrated in Figure 3-1, an ACS has many elements, including electric
locks, card readers, biometric readers (when required, but not always part of every
system), alarms, and computer systems to monitor and control the ACS. An ACS
generally includes some form of enrollment station used to assign and activate an
access control device. Detailed descriptions of the various elements of an ACS are
described later in this chapter.
3-1.3
In general, an ACS compares an individual's credential against a verified
database. If authenticated, the ACS sends output signals which allow authorized
personnel to pass through controlled portals such as gates or doors. The system has
the capability of logging entry attempts (authorized and unauthorized) that are archived.
(Event and tracking logs are discussed in more detail in a subsequent subsection.)
Typically the ACS interfaces with the IDS for input of digital alarm signals at access
portals controlled by the ACS. An example of this would be "door forced" alarms at a
card reader controlled door. Similarly, the ACS interfaces with the CCTV system in that
cameras could be placed at remote gates to verify identity of entrants before manually
actuating the remote gate. Signals from the ACS are communicated to the Dispatch
Center through the transmission lines of the DTM. Further information on the specifics
of ACS interfaces with the rest of the ESS are developed in Chapter 8, "ESS Subsystem
24